Preview

Spanning Tree Protocol

Satisfactory Essays
Open Document
Open Document
610 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Spanning Tree Protocol
Spanning Tree Protocol
• The Spanning Tree Protocol detects and prevents loops in bridged or switched internetworks by preventing some links from being used
• Each Bridge has a unique bridge ID formed from concatenating a defined priority with one of the
Bridge’s MAC addresses
• The Spanning Tree Protocol starts by all bridges broadcasting Bridge Protocol Data Units (BPDUs) which informs all the other bridges of the transmitting bridge’s identity
• The bridge with the lowest Bridge ID is elected as the root bridge

Spanning Tree Protocol
• Each network has a default cost, based on speed
• The Root Bridge broadcasts another BPDU and all the other bridges forward the broadcast but add their own cost into a field within the BPDU
• A bridge will receive copies of the broadcasts forwarded from all the other bridges
• It is therefore easy for a bridge to find which of its ports has the lowest cost path to the root. This is known as the root port and it will be used for forwarding • All the ports of the root bridge are root ports

Spanning Tree Protocol
• In the event of a tie, the lowest port number is selected • From each LAN, the bridge port that has the lowest cost path to the root is called the designated port.
In the event of a tie the lowest bridge ID will be selected • Once the root ports and designated ports have been discovered they will be used for forwarding and all other ports are blocked
• A spanning tree (fully connected with no loops) rooted at the root bridge is therefore created

Spanning Tree Protocol
• The root bridge broadcasts BPDUs every two seconds and the spanning tree gets recalculated if a bridge stops receiving
BPDUs
• If a bridge stops receiving BPDUs on its bridge port it will restart the protocol and attempt to become the root bridge by broadcasting BPDUs to other bridges which will do the same and elect a new root bridge

Spanning Tree Protocol - Example 1
Bridge 1
P=2, A=1
R

Bridge 2
P=1, A=2
1

R

R

1

0

R

Bridge 3
P=1, A=3
0

R

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    This paper will discuss the three types of network topologies discussed in Chapter 3. They are, hierarchical star, bus, and ring network topologies. Each has its advantages and disadvantages as will be discussed…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first network topology is hierarchical star, also known as the tree topology. This topology has different levels. The top level is the ‘root’ node; it serves as the central connection to the next level of computers. Then the second levels of computers serves as a connection to the third level of computers so on and so forth for the rest of the computers.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Pearlman, R. (1999). Interconnections: Bridges, Routers, Switches, and Internetworking Protocols (2nd ed.). : Addison-Wesley .…

    • 3954 Words
    • 16 Pages
    Better Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    Also, applying the original function that is preventing the loop, it is used as a means to secure redundancy of network to automatically switch the path in case of a network failure. There is various kind of spanning tree, including STP, RSTP, PVST, and MSTP. In this section, we will take a look at an implementation of the most basic of STP. Spanning Tree Protocol (STP: IEEE 802.1D) handles a network as a logical tree and by setting all ports for each switch (sometimes called a bridge in this section) to transfer frame or not it suppresses occurrence of broadcast streams packets in a network having a loop structure, figure…

    • 454 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Best Essays

    Because of this they are looking into a new found technology which is virtualization. Virtualization is not a new concept. It has been around since the main frame computer systems. What is virtualization? It is defined as “the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources” (Rouse, Virtualization, 2010). Virtualization falls into three main categories: Operating System, Storage, and Applications. Because of this virtualization can be applied to almost any part of an IT infrastructure. According to Rackspace after conducting a survey found that 57 percent of companies use virtualization with their internal infrastructures (Connor, 2007). Along with that Gartner.com states that “Virtualization will continue as the highest-impact issue challenging infrastructure and operations through 2015, changing how you manage, how and what you buy, how you deploy, how you plan and how you charge” (Press Release, 2010). In this paper we will discuss server…

    • 2369 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 9

    • 474 Words
    • 2 Pages

    Tree Topology – All nodes attached to separate lines that lead to the HUB. If one computer crashes the others are not effected.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sst5 Unit 4 Communication

    • 2368 Words
    • 10 Pages

    • Skills Demonstration 50% This is ongoing assessment throughout the year, which is made up of an Interview (15%), a Meeting (10%), an IT Practical Skills Demo (10% and an Oral Presentation (15%)…

    • 2368 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    It is an arrangement of the various elements of a communication network. There are different types of topology as Lowe (2012, p8) said “each type of networking topology (bus, star, expanding star, ring, mesh) offers advantages and disadvantages”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wannsee protocol was a meeting of the most senior government officials of the Nazi Germany. The meeting was held in the Germany capital city, Berlin in the suburbs of Wannsee on January 20th, 1942.the meeting was convened by the director SS-Reichssicherheitshauptamt. The conference was to ensure the cooperation of administrative officials of the different government departments in making sure that a solution to the Jewish question was found. The Jewish question had raised issues on whether the German Jewish in Europe would be deported to Poland and killed the protocol was aimed to allow the Jews to migrate from Europe to Poland. The Holocaust historians wanted the Jews to vacate Germany without force or else they would be deported and murdered…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    2 IT Protocol questions

    • 289 Words
    • 1 Page

    f. No Default Gateway – One can communicate via his local LAN but not on another IP subnet if the network does not support default gateway configuration.…

    • 289 Words
    • 1 Page
    Satisfactory Essays

Related Topics