Preview

Networking

Good Essays
Open Document
Open Document
3910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Networking
The operation is simple as collection of bridges in a local area network (LAN) can be depicted as a graph whose nodes are bridges and LAN segments (or cables), and whose edges are the interfaces connecting the bridges to the segments. To break loops in the LAN while maintaining access to all LAN segments, the bridges collectively compute a spanning tree. The spanning tree is not necessarily a minimum cost spanning tree. A network administrator can reduce the cost of a spanning tree, if necessary, by altering some of the configuration parameters in such a way as to affect the choice of the root of the spanning tree. The spanning tree that the bridges compute using the Spanning Tree Protocol can be determined using the following rules. The example network at the right, below, will be used to illustrate the rules.

1. An example network. The numbered boxes represent bridges (the number represents the bridge ID). The lettered clouds represent network segments.

2. The smallest bridge ID is 3. Therefore, bridge 3 is the root bridge.

3. Assuming that the cost of traversing any network segment is 1, the least cost path from bridge 4 to the root bridge goes through network segment c. Therefore, the root port for bridge 4 is the one on network segment c.

4. The least cost path to the root from network segment e goes through bridge 92. Therefore the designated port for network segment e is the port that connects bridge 92 to network segment e.

5. This diagram illustrates all port states as computed by the spanning tree algorithm. Any active port that is not a root port or a designated port is a blocked port.

6. After link failure the spanning tree algorithm computes and spans new least-cost tree.
Select a root bridge. The root bridge of the spanning tree is the bridge with the smallest (lowest) bridge ID. Each bridge has a configurable priority number and a MAC Address; the bridge ID contains both numbers combined together - Bridge priority + MAC

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Network Topology – A drawing of a series of connected nodes via links, including descriptions.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 3 Lab Report

    • 532 Words
    • 2 Pages

    4. Does this network require an access layer? What devices would operate at the access layer? Draw a diagram of these devices at the access layer. Label all of the devices. (10 points)…

    • 532 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    where (i, j) representing a link between node i and node j. n is the total number of nodes in the network.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 4.1 Case Study

    • 2532 Words
    • 11 Pages

    Using the description of Network C and Figure 4- 6, create a cabling solution for this network that meets the owner’s needs. Justify your choices.…

    • 2532 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Research

    • 489 Words
    • 2 Pages

    2007 to generate a diagram for a proposed network topology. Write a 1-2 page proposal for…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    4. Does this network require an access layer? What devices would operate at the access layer? Draw a diagram of these devices at the access layer. Label all of the devices.…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    5. An engineer’s desktop PC connects to a switch at the main site. A router at the main site connects to each branch office via a serial link, with one small router and switch at each branch. Which of the following commands must be configured, in the listed configuration mode, to allow the engineer to telnet to the branch office switches?…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    Also, applying the original function that is preventing the loop, it is used as a means to secure redundancy of network to automatically switch the path in case of a network failure. There is various kind of spanning tree, including STP, RSTP, PVST, and MSTP. In this section, we will take a look at an implementation of the most basic of STP. Spanning Tree Protocol (STP: IEEE 802.1D) handles a network as a logical tree and by setting all ports for each switch (sometimes called a bridge in this section) to transfer frame or not it suppresses occurrence of broadcast streams packets in a network having a loop structure, figure…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    interfaces. Finally, you used Zenmap to perform a scan of the network and created a network…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Read questions 80 and 81 on pp. 274-275 of the text. Identify the problems with the TCP/IP network in each scenario and complete the table. Explain your answer for each of the scenarios.…

    • 328 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Topology Diagram Topology

    • 349 Words
    • 2 Pages

    A network redundant topology where nodes are connected using two concentric rings with four branches.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays

Related Topics