close
test_template

The Experiment of Spanning Tree Report

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 448 |

Page: 1|

3 min read

Published: Feb 12, 2019

Words: 448|Page: 1|3 min read

Published: Feb 12, 2019

In this experiment, I implemented spanning tree protocol which is a layer 2 protocol. Spanning tree protocol was invented by Radia Perlman to avoid loops in the network. Spanning tree protocol helps to avoid loops in case of redundant paths. Loops are avoided in spanning tree protocol because they are leather in a network. Spanning tree protocol are used in places where we want redundant links but not loops. In case of a network failure redundant links can play the crucial role of a backup in the network. With spanning tree protocol used on the switch, if there is a failure in the primary link it automatically turns to the backup links so that the network is never down and is ready to use always.

Spanning tree protocol builds a loop free topology for ethernet networks. There is no Time to Leave logic (TTL) in ethernet networks because of this loop is created or broadcast storm happens and thus spanning tree is used. Thus, it’s basic role is to avoid such loops and the broadcast storms (radiations) and provide backup links to avoid failures. Spanning tree protocol (STP) creates spanning tree within a network of connected layer 2 switches and it will disable the links that are not part of the spanning tree. Thus, it leaves behind only one single active part between the two network nodes.

In this experiment, we also learned about the root bridge of the spanning tree. The root bridge is decided with the bridge having the lowest bridge ID. All the bridge ID have a Mac address and a priority number. The default bridge ID is 32768 and it is in multiples of 4096. When we see the 2 bridge ID’s, we first compare their priority and then the Mac addresses are compared (if and only if their priorities are equal). The root bridge is decided when the bridge has lowest priority and lowest Mac address. In my topology, switch 1 was made the root port since it has the lowest priority number and the lowest Mac address.

Get a custom paper now from our expert writers.

I practiced 3 basic commands which were ‘show spanning-tree root’, ‘show spanning-tree blockedports’ ‘show spanning-tree brief’. When the show spanning tree brief operation was performed, fastethernet 1/0 from switch 3 was blocked and so it couldn’t reach the root bridge. During this process, the switch sends a message which in turn helps the formation of loop free network. This loop free network is know as Bridge Protocol Data Units (BPDU). It is necessary that each bridge should have enough information and to confirm that some special data frames are being which are called as bridge protocol data units to exchange information about bridge ID’s and root path cost.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Experiment of Spanning Tree Report. (2019, February 11). GradesFixer. Retrieved December 8, 2024, from https://gradesfixer.com/free-essay-examples/the-experiment-of-spanning-tree-report/
“The Experiment of Spanning Tree Report.” GradesFixer, 11 Feb. 2019, gradesfixer.com/free-essay-examples/the-experiment-of-spanning-tree-report/
The Experiment of Spanning Tree Report. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-experiment-of-spanning-tree-report/> [Accessed 8 Dec. 2024].
The Experiment of Spanning Tree Report [Internet]. GradesFixer. 2019 Feb 11 [cited 2024 Dec 8]. Available from: https://gradesfixer.com/free-essay-examples/the-experiment-of-spanning-tree-report/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now