WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

Spanning Tree Protocol Overview – Better CCNA Exam Preparation

You are most welcome to this post.
Really thanks to you for your interest in this topics. :)

Spanning Tree Protocol

You will get Spanning Tree Protocol out of the box! Its there in your switch or router. In the first place, it saves a networking from being overwhelmed with broadcast messages.

Usually, when networks are designed, redundant connections are used. Its because, if a single connection fails, another one can serve the users. However, problem occurs when one device send a broadcast message like a DHCP or ARP request. As, switches forward broadcast messages to every port, same messages are sent over and over. Due to this, soon a network is flooded with broadcast messages. This is sometimes called broadcast loop death.

To solve this issue spanning tree protocol is used. In this article we will see how this protocol works.

How Spanning Tree Protocol Works

Spanning Tree Protocol

To understand how this protocol works, consider the above network diagram. Though it is a very network diagram, but it will serve our purpose perfectly.

There is redundant connections in above network topology. So when one host broadcasts a message it will be sent infinitely. To solve this problem, STP takes three steps.

  • Elect the root – First of all STP select a root for a network. Usually it selects the oldest switch of a network as a root.
  • Find the best path to root – After selecting the root, then it find the best path to root for every devices. As a matter of fact, STP considers three criteria when select the best path to root.
  1. Lowest cost – First of all, STP calculates the cost of every path to find the lowest cost. In this case, higher the bandwidth lower the cost for a path.
  2. Lower bridge id –  If costs for two paths are same, then STP considers bridge id. Bridge id is a identification number. This id is given by STP, which consists of MAC of address of a device with some additional number. STP selects lower bridge id path as best path to root.
  3. Lowest port number – If both cost and bridge id ties, then STP selects the path with lower port number as best path to root.
  • Block whatever is left – After selecting best path to root, STP blocks every other path. This is how STP resolves redundant issue.

 

Normally STP blocks all redundant path to avoid broadcast loop. But in every two seconds it checks if the best path is okay. If for any reason best is not available, then it opens second best path, which was previously blocked.

Apr 18, 2018Tamal Tomal
 

Share with friends :

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Tumblr (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Skype (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to print (Opens in new window)

Related

Wireshark, a network analysis tool, know the basicUnderstanding Dynamic Host Configuration Protocol (DHCP) working principle

Leave a Reply Cancel reply

four + eleven =

Tamal Tomal
April 18, 2018 CCNA271
Feel Free to Share :)
0
GooglePlus
0
Facebook
0
Twitter
0
Digg
0
Delicious
0
Stumbleupon
0
Linkedin
0
Pinterest
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Packet tracer 6.2 student version for Linux - Free download
  • How to change Cisco packet tracer default language?
  • Know the Diamond Model for Intrusion Analysis
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 14 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking
     

    Loading Comments...