Accton Technology 4508, CheetahSwitch Workgroup manual Advanced Topics, Spanning Tree Algorithm

Page 85

Chapter 4: Advanced Topics

Spanning Tree Algorithm

The Spanning Tree Algorithm (that is, the STA configuration algorithm as outlined in IEEE 802.1D) can be used to detect and disable network loops, and to provide link backup. This allows the switch to interact with other bridging devices (including STA compliant switches, bridges or routers) in your network to ensure that only one route exists between any two stations on the network. If redundant paths or loops are detected, one or more ports are put into a blocking state (stopped from forwarding packets) to eliminate the extra paths. Moreover, if one or more of the paths in a stable spanning tree topology fail, this algorithm will automatically change ports from blocking state to forwarding state to re-establish contact with all network stations.

The STA uses a distributed algorithm to select a bridging device (STA compliant switch, bridge or router) that serves as the root of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device. Then it selects a designated bridging device from each LAN which incurs the lowest path cost when forwarding a packet from that LAN to the root device. All ports connected to designated bridging devices are assigned as designated ports. After determining the lowest cost spanning tree, it enables all root ports and designated ports, and disables all other ports. Network packets are therefore only forwarded between root ports and designated ports, eliminating any possible network loops.

Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transmitted from the Root Bridge. If a bridge does not get a Hello BPDU after a predefined interval (Maximum Age), the bridge assumes that the link to the Root Bridge is down. This bridge will then initiate negotiations with other bridges to reconfigure the network to re-establish a valid network topology.

The following figure gives an illustration of how the Spanning Tree Algorithm assigns bridging device ports.

4-1

Image 85
Contents CheetahSwitch Workgroup-4508 Management Guide CheetaSwitch Workgroup-4508 RMA International Headquarters USA HeadquartersPage Contents Using the Web Agent Advanced Topics Appendix a TroubleshootingAppendix B Pin Assignments IiiPage Configuration Options Managing the SwitchCheetahSwitch Workgroup-4508 Making Connections for System ConfigurationOnsite Connection Modem ConnectionIn-Band Network Connection Management Guide Telnet ConnectionCheetahSwitch Workgroup-4508 Using the System Configuration Program Parameter Description Main MenuParameter Description Management GuideDisplaying System Information System Information MenuManagement Guide Displaying Version Information Management Setup MenuChanging the Network Configuration IP Configuration IP Connectivity Test Ping Access Host ConfigurationHttp Configuration Parameter Default Description CheetahSwitch Workgroup-4508 Configuring the Serial PortManagement Guide Assigning Snmp Parameters Configuring IP Trap Managers Configuring Community NamesConsole Login Configuration Using Tftp Protocol to Download Over the Network CheetahSwitch Workgroup-4508 Downloading System SoftwareConfiguring the Switch Enabled CheetahSwitch Workgroup-4508 Configuring Port ParametersUsing the Spanning Tree Algorithm Management Guide Viewing the Current Port ConfigurationPriority 32,768 Configuring Bridge STADisabled Configuring STA for PortsDisplaying the Current Bridge STA Displaying the Current STA for Ports Information. Port address table is cleared, and the port Igmp Multicast Filtering Management Guide Using a Mirror Port for AnalysisConfiguring Igmp Management Guide Broadcast Storm Control Refer to Network Monitor Menu / Static Unicast Address Table Port Priority Configuration Management Guide Configuring Traffic Classes802.1p Port Traffic Class Information 802.1Q Vlan Base Information Management Guide Configuring Virtual LANsMAX Vlan ID VID 802.1Q Vlan Current Table Information802.1Q Vlan Static Table Configuration Pvid 802.1Q Vlan Port ConfigurationMenu Description Monitoring the SwitchCheetahSwitch Workgroup-4508 Displaying Port Statistics Displaying Rmon Statistics Formed MAC Using the Address TableVlan ID assigned to this multicast group Multicast IP Parameter Management Guide Configuring Static Unicast AddressesVID MAC Logging Off the System Resetting the SystemPost Navigating the Web Browser Interface Using the Web AgentCheetahSwitch Workgroup-4508 Home Panel Display Console ConfigurationSTA SnmpVlan System Information Main Board Switch InformationIP Configuration Network ConfigurationCheetahSwitch Workgroup-4508 Access Host Snmp ConfigurationSnmp Administration Enable Trap Managers Management Guide Snmp CommunityFirmware Upgrade Options Security ConfigurationChange Password Web Upload ManagementTftp Download Management Address Table Configuration Spanning Tree Spanning Tree InformationPorts Switch Parameter Default Description Management Guide Spanning Tree ConfigurationWhen the Switch Becomes Root Parameter Default Description Path Cost 100/19/4 STA Port ConfigurationBridge Capability Configuring Bridge MIB ExtensionsPort Priority Configuration Bridge SettingsPriority Port Traffic Class Information Vlan Basic Information Configuring VLANsVlan ID Management Guide Vlan Current TableVlan Static Table CheetahSwitch Workgroup-4508 Vlan Static ListVlan Static Membership by Port CheetahSwitch Workgroup-4508 Vlan Port Configuration Igmp Multicast Filtering Configuring IgmpPort Information Port MenusPort Configuration Port Statistics Port Mirroring ConfigurationEtherlike Statistics Sum of alignment errors and code errors frames received with Undersize Frames CheetahSwitch Workgroup-4508 Rmon StatisticsFCS or alignment error Broadcast Storm Control Spanning Tree Algorithm Advanced TopicsAssigning Ports to VLANs Virtual LANsPort Overlapping Management Guide Vlan ClassificationForwarding Tagged/Untagged Frames Igmp Snooping and IP Multicast Filtering Class-of-Service CoS SupportRemote Monitoring Snmp Management SoftwareCheetahSwitch Workgroup-4508 In-Band Connection Console ConnectionUpgrading Firmware via the Serial Port Loader DB9 Serial Port Pin Description Connection from Switch’s Serial Port to PC’s 9-Pin COM PortDB9 Port Pin Assignments Switchs 9-Pin Ccitt Signal Modems Serial Port Pin COM Port Connection from Switchs Serial Port to PCs 25-Pin DTE PortSwitchs 9-Pin Serial Null Modem PortES4508 E022000-R01

CheetahSwitch Workgroup, 4508 specifications

Accton Technology is a pioneering force in networking solutions, and one of its standout products is the Accton Technology 4508, commonly referred to as the CheetahSwitch Workgroup. This switch is designed to cater to the evolving demands of workgroup networking, providing an innovative blend of performance, scalability, and manageability.

The CheetahSwitch 4508 is engineered to support high-speed data transfer, making it an ideal solution for small to medium-sized enterprises. It features a robust architecture that can handle a considerable amount of network traffic, ensuring seamless communication within workgroups and across departments. With its ability to connect up to eight devices, the switch guarantees that workgroups can stay connected, productive, and efficient.

One of the main features of the CheetahSwitch 4508 is its impressive bandwidth capacity. It supports multiple Ethernet standards, including Fast Ethernet and Gigabit Ethernet, allowing for flexible deployment options. This scalability is crucial in environments where network demands can rapidly change. The switch is designed with multiple ports, offering numerous connectivity options for various devices.

Another significant characteristic of the CheetahSwitch 4508 is its advanced management capabilities. It comes equipped with user-friendly configuration tools that simplify the management process, making it easy for IT administrators to set up and monitor network performance. This feature not only enhances operational efficiency but also helps in identifying potential issues before they escalate, thereby minimizing downtime.

In terms of security, the CheetahSwitch prioritizes user protection through features like VLAN support and port security, allowing organizations to segment their networks and manage traffic flow securely. This is essential in today’s cybersecurity landscape, where threats are ever-evolving, and data protection is non-negotiable.

Moreover, energy efficiency is a hallmark of the CheetahSwitch 4508. It uses technology that optimizes power consumption, contributing to lower operating costs while being environmentally friendly. This aligns with the growing trend toward sustainable business practices.

Overall, the Accton Technology 4508 CheetahSwitch Workgroup is a reliable networking solution that delivers the performance, scalability, and management features required for today's dynamic business environment. With its commitment to high-speed connectivity and robust security measures, it stands out as an exemplary choice for organizations looking to enhance their network infrastructure.