-
Essay / The Spanning Tree Report Experiment
In this experiment, I implemented the Spanning Tree protocol which is a layer 2 protocol. The Spanning Tree protocol was invented by Radia Perlman to avoid loops in the network. The Spanning Tree protocol helps avoid loops in the event of redundant paths. Loops are avoided in the Spanning Tree protocol because they are leather in a network. The Spanning Tree protocol is used in places where we want redundant links but no loops. In the event of a network outage, redundant links can play the crucial backup role in the network. With the Spanning Tree protocol used on the switch, if the primary link fails, it automatically turns to the backup links so that the network is never down and is always ready for use. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay The Spanning Tree protocol creates a loop-free topology for Ethernet networks. There is no TTL (Time to Leave) logic in Ethernet networks because this loop is created or a broadcast storm occurs and therefore a spanning tree is used. Thus, its fundamental role is to avoid such loops and broadcast (radiation) storms and to provide backup links to avoid outages. The Spanning Tree Protocol (STP) creates a spanning tree within a network of connected Layer 2 switches and disables links that are not part of the spanning tree. Thus, it leaves only one active part between the two nodes of the network. In this experiment, we also learned about the root bridge of the spanning tree. The root bridge is chosen with the bridge with the lowest bridge ID. All bridge IDs have a Mac address and priority number. The default bridge ID is 32768 and it is in multiples of 4096. When we see the 2 bridge IDs, we first compare their priority, then the Mac addresses are compared (if and only if their priorities are equal) . The root bridge is decided when the bridge has the lowest priority and the lowest Mac address. In my topology, switch 1 became the root port because it has the lowest priority number and lowest Mac address. Keep in mind: this is just an example. Get a personalized document now from our expert writers. Get a custom essay I practiced 3 basic commands which were “show spanning-tree root”, “show spanning-tree blockports” “show spanning-tree brief”. When the brief show spanning tree operation was performed, fastethernet 1/0 of switch 3 was blocked and therefore could not reach the root bridge. During this process, the switch sends a message which, in turn, contributes to the formation of a loop-free network. This loop-free network is known as Bridge Protocol Data Units (BPDU). It is necessary for each bridge to have sufficient information and confirm that some special data frames are called as bridge protocol data units to exchange information about bridge IDs and root path cost..