Mod 5.1-5.2: Purpose and Operations of STP Flashcards
____ is a loop-prevention network protocol that allows for redundancy while creating a loop-free Layer 2 topology.
Spanning Tree Protocol (STP)
____is the original IEEE MAC Bridging standard for STP.
IEEE 802.1D
Issues with Redundant Switch Links:
____ provides multiple network services by eliminating the possibility of a single point of failure.
Path redundancy
When multiple paths exist between two devices on an Ethernet network, and there is no spanning tree implementation on the switches, a____ occurs.
Layer 2 loop
A Layer 2 loop can result in ___instability, link saturation, and ___ on switches and end-devices, resulting in the network becoming unusable.
MAC address table
high CPU utilization
True or false
Unlike the Layer 3 protocols, IPv4 and IPv6, Layer 2 Ethernet does not include a mechanism to recognize and eliminate endlessly looping frames.
True
Both IPv4 and IPv6 include a mechanism that limits the number of times a Layer 3 networking device can retransmit a packet via TTL (time to live) which is decremented by routers or hop limit in ipv6
____ was developed specifically as a loop prevention mechanism for Layer 2 Ethernet.
STP
Without STP enabled, Layer 2 loops can form, causing broadcast, multicast and unknown unicast frames to ___.
loop endlessly
An____ frame is when the switch does not have the destination MAC address in its MAC address table and must forward the frame out all ports, except the ingress port.
unknown unicast
A ____is an abnormally high number of broadcasts overwhelming the network during a specific amount of time.
broadcast storm
Broadcast storms can be caused by a hardware problem such as a___ or from a___ in the network.
faulty NIC
Layer 2 loop
SPANNING TREE ALGORITHM:
STP is based on an algorithm invented by ____while working for Digital Equipment Corporation, and published in the 1985 paper “An Algorithm for Distributed Computation of a Spanning Tree in an Extended LAN.”
Radia Perlman
Radia Perlman’s ____ creates a loop-free topology by selecting a single root bridge where all other switches determine a single least-cost path.
spanning tree algorithm (STA)
STA PROCESS:
Step 1:STP prevents loops from occurring by configuring a loop-free path through the network using strategically placed ____” ports
“blocking-state
STA PROCESS:
Step 1: The switches running STP are able to compensate for failures by ___ the previously blocked ports and permitting traffic to traverse the alternate paths.
dynamically unblocking
STA
Step 2: The spanning tree algorithm begins by selecting a ___
single root bridge
Note: The STA and STP refers to ___ as bridges
switches
STA
Step 3: STP ensures that there is only one logical path between all destinations on the network by intentionally ____ that could cause a loop
blocking redundant paths
STA
Step 4: A blocked port has the effect of making that link a non-forwarding link between the two switches. Thus, this creates a ___ topology.
Loop-Free
STA
Step 5: The physical paths still exist to provide redundancy, but these paths are disabled to prevent the loops from occurring. If the path is ever needed to compensate for a network cable or switch failure, STP ___ the paths and unblocks the necessary ports to allow the redundant path to become active.
recalculates
True or false
STP recalculation happens only during link failure.
False
STP recalculations can also occur any time a new switch or new inter-switch link is added to the network.
Reorder the following:
Steps to a Loop-Free Topology
Elect Alternate (blocked) ports
Elect root ports
Elect root bridge
Elect designated ports
Elect the root bridge.
Elect the root ports.
Elect designated ports.
Elect alternate (blocked) ports.
During STA and STP functions, switches use ___ to share information about themselves and their connections.
Bridge Protocol Data Units (BPDUs)
BPDUs are used to elect the___.
root bridge, root ports, designated ports, and alternate ports
Each BPDU contains a ___ that identifies which switch sent the BPDU.
bridge ID (BID)
The ___is involved in making many of the STA decisions including root bridge and port roles.
BID
The lowest BID value is determined by the combination of these three fields:
bridge priority value, an extended system ID, and the MAC address of the switch
Bridge Priority has ___ bits
4
Extended System Id has __ bits
12
MAC address has __ bits
48