Solved

The purpose of Root Bridge

Posted on 2016-10-29
7
54 Views
Last Modified: 2016-10-29
Knowing that STP is to prevent switching loops.
Well, after you connect the switches together, the STP goes into its calculation to elect the Root Bridge and block redundant  links.  Now will the traffic to the next switch never go from blocked to non-blocked port and vice-versa ?
example:
on the screenshot below, if a PC plugged to Switch B wants to reach a PC plugged to Switch D, will the traffic go B to C then to D or straight B to D.
Also the other way around if PC plugged to Switch D wants to reach PC plugged  to Switch B, will the traffic go D to C then to B or straight D to B?

Thank you
stp
0
Comment
Question by:jskfan
  • 4
  • 3
7 Comments
 
LVL 27

Expert Comment

by:Predrag Jovic
ID: 41865144
STP root bridge starts with every switch believes that it is the root bridge. Than - negotiate with other switches who have the the best BridgeID. Winner (Highlander - There can be only one) becomes root bridge (all paths lead to Root bridge), for the rest of the switches rules are relatively simple. Simplified version - Find the best (lowest cost path) to the root bridge (Root port) - block the rest of the paths to the root bridge (not exactly, since there can be downstream switches that path should not be blocked - that's why it is simplified version :) ). In reality similar process is happening between non root bridge switches in the case that there are 2 or more paths to reach Root bridge and both switches have the same cost to reach Root bridge. If cost to reach root bridge is the same again switches compare BridgeID values, whoever looses, needs to block alternative path to the root bridge, however the first criteria is always cost to reach root bridge...
Purpose of all of this is to prevent bridging loops (or switching loops).

You can read more details in article Spanning Tree Protocol: Bridge ID, Priority, System ID Extension & Root Bridge Election Process.
0
 

Author Comment

by:jskfan
ID: 41865151
I understand how root bridge election happens, What I need to understand, is how network traffic is handled as I mentioned in the example:

on the screenshot above, if a PC plugged to Switch B wants to reach a PC plugged to Switch D, will the traffic go B to C then to D or straight B to D.
Also the other way around if PC plugged to Switch D wants to reach PC plugged  to Switch B, will the traffic go D to C then to B or straight D to B?
0
 
LVL 27

Expert Comment

by:Predrag Jovic
ID: 41865163
Traffic will go through unblocked links. In your drawing - without red dots.
From switch B to D path will lead through C. The same is for opposite direction.
(Path B -> D (or D -> B) will not be used as long as path B - D is blocked).
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:jskfan
ID: 41865175
I have not tested yet ..so if you ping  PC on Switch B from PC on Switch D, ping packets will go through C ?
0
 
LVL 27

Accepted Solution

by:
Predrag Jovic earned 500 total points
ID: 41865178
Yes in topology with blocked ports marked as above. Block ports can't be used.
Check MAC addresses on ports after ping and you will see the path..
0
 

Author Closing Comment

by:jskfan
ID: 41865228
Thank you
0
 
LVL 27

Expert Comment

by:Predrag Jovic
ID: 41865229
You're welcome.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now