beautypg.com

Operations – Allied Telesis AT-S20 User Manual

Page 119

background image

AT-S20 User’s Guide

A-3

2SHUDWLRQV

When spanning tree is enabled for the first time or when the network
topology changes due to a failure, the addition, or removal of a
component, the spanning tree algorithm automatically sets up the
active topology of the current network.

Communication between bridges. Periodically, all devices running
STP on a network transmit packets to each other through the Bridge
Group Address which all bridges share. When a bridge receives a
packet sent to the Bridge Group Address, the bridge’s STP processes
the packet. The packet is ignored by application software and other
LAN segments. Bridges communicate between each other in order to
determine the Root Bridge.

Selecting a root bridge and designated bridges. During
communication between bridges, one bridge is determined to have
the lowest bridge identifier. This bridge becomes the Root Bridge.

After the Root Bridge has been selected, each LAN segment looks for
the bridge that has the lowest cost relative to the Root Bridge. These
bridges become Designated Bridges.

Selecting designated ports. Each Designated Bridge selects a
Designated Port. This port is responsible for forwarding packets to
the Root Bridge.

Handling duplicate paths. When the active topology of the network
is determined, all packets between any two nodes in the network use
only one path. Where a duplicate path exists, the non-designated
port is put into a blocking state.

Remapping network topology. If there is a change in the network
topology due to a failure, removal, or addition of any active
components, the active topology also changes. This may trigger a
change in the state of some blocked ports.

The blocked ports do not forward packets immediately. They first
pass through two states, listening and learning, to verify that they
may begin forwarding. A port remains in each of these two states for
the time defined by the Forwarding Delay parameter. This algorithm
ensures that no temporary loops exist in the active network topology
and is a safeguard against packet forwarding during a network
topology change period.