
Go backward to IEEE 802.1 Transparent Bridges
Go up to Top
The IEEE 803.1 Bridge Spanning Tree Algorithm
- It may be desirable to build networks which contain
bridges that form
loops for reliability reasons.
- If a large sub-LAN (like all of Bronfman) is only
connected to the rest of a LAN (i.e. the rest of
the campus) through a single bridge, that bridge
becomes a single point of failure.
- It would be nice if two bridges could be installed
in such a situation. In this case, the bridges
somehow have to be designed to be smart enough
to deal with the loop.
- IEEE 802.1 bridges are designed to detect loops and deal
with them by making enough ports on enough bridges inactive
that no "active" loops exist.
- If the topology of a LAN is abstracted to form a bipartite
graph where the nodes are networks and sub-LANs and the
edges correspond to bridge ports, then the IEEE 802.1
approach to avoiding loops can be seen as finding
a set of edges that form a spanning tree for this graph.
- The bridges first use broadcast messages to "elect"
a root for this tree.
- While the election is in progress, the bridges are
also exchanging enough information so that when
it is over every bridge will no the cost of sending
a message from it to the root.
- For each sub-LAN, the attached bridges then determine
which has the least cost path to the root.
Those bridges with greater than minimum cost deactivate
their ports that connect to the sub-LAN considered.
- The details of bridge election are fairly simple.
- Each bridge has a unique "priority" assigned to it
actually a non-unique priority with a unique ID
appended to it) and
each port has a "cost". These can be set by the
network administrator or left at default values
supplied by the factory.
- When the bridges recognize the need for an election,
they all start sending packet announcing the
candidate they endorse including:
- The candidate's priority (Initially
this will be their own priority.
- Their ID number.
- The cost
of reaching the candidate from the sending hub.
- As bridges receive such packets, they look for the candidate
with the lowest priority/ID pair and given equal priorities
they look for the lowest path cost.
Each bridge maintains
- The priority/ID of the best candidate for root
it has seen (i.e. the smallest prioirity/ID seen).
- The cost of and port leading to the best known
route to the best candidate for root.
- For each port attached to the bridge,
the contents of the campaign packet received
on that port advertising the least cost to
reach the root.
Computer Science 336
Department of Computer Science
Williams College