Spanning-Tree Protocol (STP)
Spanning-Tree Protocol (STP)
Spanning-tree uses cost to determine the shortest path to the root bridge. The
slower the interface, the higher the cost is. The path with the lowest cost will be
used to reach the root bridge. Below is the cost table
Cost
10 Mbit 100
100 Mbit 19
1000 Mbit 4
If the bandwidth of both links are equal, then both of Switch 2’s interfaces have an
equal path cost to the Root Bridge. Which interface will become the Root Port?
The tiebreaker should be the lowest Bridge ID, but that cannot be used in this
circumstance
In this circumstance, Port ID will be used as the tiebreaker. An interface’s Port ID
consists of two parts - a 6-bit port priority value, and the MAC address for that
port. Whichever interface has the lowest Port ID will become the Root Port.
By default, the port priority of an interface is 128. Lowering this value will ensure
a specific interface becomes the Root Port:
Switch(config)# int fa0/22
Switch(config-if)# spanning-tree port-priority 60
Remember, that port priority is the last tiebreaker STP will consider. STP decides
Root and Designated Ports based on the following criteria, and in this order:
RSTP:-
Interview Questions
1. What is Spanning tree aka STP ?
2. How does STP maintain a loop-free network?
3. What parameters can be tuned to influence the selection of a
port as a
Root or Designated Port?
4. What is BDPU ?what is the basics function of BPDU?
5. Using the default STP timers, how long does it take for a port to
move
from the Blocking state to the Forwarding state?
6. What is the STP listening state?
7. Which command enables RSTP on a switch?
8. what is Per-VLAN Spanning Tree Protocol (PVST)
9. What is the default bridge priority in a Bridge ID for all Cisco
switches?
10. Which STP version run default on cisco switches ?
11. What is the purpose of Spanning Tree Protocol in a switched
LAN?
12. Difference between Spanning Tree Protocol (STP) and Rapid
Spanning
Tree Protocol (RSTP)?
13. What is the STP blocking state?
14. What is the STP Forwarding state?
15. Difference between Root Port and Designated Port?
16. What is the difference between path cost and root path cost?
17. What is the difference between STP, MSTP, PVST and RSTP?
18. What is path cost?
19. Define selection criteria of STP root bridge.
20. What are the four spanning tree port states?
21. How to non bridge decide which port will elect as root port?
22. If a nonroot bridge has two redundant ports with the same root
path
cost, how does the bridge choose which port will be the root port?
23. Port states of spanning tree protocol.
24. If the users face delay during initial login, what you will suggest
to
implement?
25. Why spanning tree BPDU filter is used?
26. Can I use BPDU filter on trunk ports?
27. Which port state is introduced by Rapid-PVST?
28. What is Spanning Tree Protocol (STP) PortFast?
29. What does STP do when it detects a topology change in the
network due
to a bridge or link failure?
QinQ:-
802.1Q tunneling
IEEE 802.1Q tunneling can be used to achieve simple layer 2 VPN connectivity
between sites by encapsulating one 802.1Q trunk inside another. 802.1Q tunneling
also called QinQ
Business customers of service providers often have specific requirements for
VLAN IDs and the number of VLANs to be supported. The VLAN ranges required
by different customers in the same service-provider network might overlap, and
traffic of customers through the infrastructure might be mixed. Assigning a unique
range of VLAN IDs to each customer would restrict customer configurations and
could easily exceed the VLAN limit (4096) of the IEEE 802.1Q specification.
802.1Q tunneling solves this issues by assigning each customer a single VLAN
number, chosen by the service provider. Within each customer VLAN exists a
secondary 802.1Q trunk, which is controlled by the customer. Each customer
packet traversing the service provider network is tagged twice: the inner-most
802.1Q header contains the customer-chosen VLAN ID, and the outer-most header
contains the VLAN ID assigned to the customer by the service provider.
Customer traffic tagged in the normal way with appropriate VLAN IDs comes
from an IEEE 802.1Q trunk port on the customer device and into a tunnel port on
the service-provider edge switch. The link between the customer device and the
edge switch is asymmetric because one end is configured as an IEEE 802.1Q trunk
port, and the other end is configured as a tunnel port.
Note: By default, the native VLAN traffic of a dot1q trunk is sent untagged, which
cannot be double-tagged in the service provider network. Because of this situation,
the native VLAN traffic might not be tunneled correctly. Be sure that the native
VLAN traffic is always sent tagged in an asymmetrical link.Also we must verify
that all of our switches support the necessary maximum transmission unit (MTU),
1504 bytes before configuring 802.1Q tunneling
These are some ways to solve Native VLAN tagging problem:
•Use the vlan dot1q tag native global configuration command to configure the edge
switch so that all packets going out an IEEE 802.1Q trunk, including the native
VLAN, are tagged. If the switch is configured to tag native VLAN packets on all
IEEE 802.1Q trunks, the switch accepts untagged packets, but sends only tagged
packets.
•Ensure that the native VLAN ID on the edge-switch trunk port is not within the
customer VLAN range. For example, if the trunk port carries traffic of VLANs 100
to 200, assign the native VLAN a number outside that range.