Solved

The purpose of Root Bridge

Posted on 2016-10-29
7
88 Views
Last Modified: 2016-10-29
Knowing that STP is to prevent switching loops.
Well, after you connect the switches together, the STP goes into its calculation to elect the Root Bridge and block redundant  links.  Now will the traffic to the next switch never go from blocked to non-blocked port and vice-versa ?
example:
on the screenshot below, if a PC plugged to Switch B wants to reach a PC plugged to Switch D, will the traffic go B to C then to D or straight B to D.
Also the other way around if PC plugged to Switch D wants to reach PC plugged  to Switch B, will the traffic go D to C then to B or straight D to B?

Thank you
stp
0
Comment
Question by:jskfan
  • 4
  • 3
7 Comments
 
LVL 29

Expert Comment

by:Predrag Jovic
ID: 41865144
STP root bridge starts with every switch believes that it is the root bridge. Than - negotiate with other switches who have the the best BridgeID. Winner (Highlander - There can be only one) becomes root bridge (all paths lead to Root bridge), for the rest of the switches rules are relatively simple. Simplified version - Find the best (lowest cost path) to the root bridge (Root port) - block the rest of the paths to the root bridge (not exactly, since there can be downstream switches that path should not be blocked - that's why it is simplified version :) ). In reality similar process is happening between non root bridge switches in the case that there are 2 or more paths to reach Root bridge and both switches have the same cost to reach Root bridge. If cost to reach root bridge is the same again switches compare BridgeID values, whoever looses, needs to block alternative path to the root bridge, however the first criteria is always cost to reach root bridge...
Purpose of all of this is to prevent bridging loops (or switching loops).

You can read more details in article Spanning Tree Protocol: Bridge ID, Priority, System ID Extension & Root Bridge Election Process.
0
 

Author Comment

by:jskfan
ID: 41865151
I understand how root bridge election happens, What I need to understand, is how network traffic is handled as I mentioned in the example:

on the screenshot above, if a PC plugged to Switch B wants to reach a PC plugged to Switch D, will the traffic go B to C then to D or straight B to D.
Also the other way around if PC plugged to Switch D wants to reach PC plugged  to Switch B, will the traffic go D to C then to B or straight D to B?
0
 
LVL 29

Expert Comment

by:Predrag Jovic
ID: 41865163
Traffic will go through unblocked links. In your drawing - without red dots.
From switch B to D path will lead through C. The same is for opposite direction.
(Path B -> D (or D -> B) will not be used as long as path B - D is blocked).
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 

Author Comment

by:jskfan
ID: 41865175
I have not tested yet ..so if you ping  PC on Switch B from PC on Switch D, ping packets will go through C ?
0
 
LVL 29

Accepted Solution

by:
Predrag Jovic earned 500 total points
ID: 41865178
Yes in topology with blocked ports marked as above. Block ports can't be used.
Check MAC addresses on ports after ping and you will see the path..
0
 

Author Closing Comment

by:jskfan
ID: 41865228
Thank you
0
 
LVL 29

Expert Comment

by:Predrag Jovic
ID: 41865229
You're welcome.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Hit router interface limit 7 64
Routing protocols 5 34
Switched virtual interface on layer 2 switch 2 41
Password recovery 2960S 4 32
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question