Solved

ethernet level loops

Posted on 2002-04-04
6
253 Views
Last Modified: 2012-05-04
Hi,

Do loops do exist at ethernet level. Are there ways to detect such loops. I want to write a program that would attempt to find out if such loops exist,  but I don't know how to go about it. I would appreciate some pointers.

regards
0
Comment
Question by:bsd_linux
  • 3
  • 2
6 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 6920005
Im not positive that I know what you mean by loops, but I assume you mean a case where data on the wire is circulating and never reaching it's destination. If that's what you mean I don't think it's possible for hardware that is operating properly. At the transport level the data is being send from one NIC to some other NIC on the network, addressed by MAC. That seems to me to mean that the data is going to be accepted by the target NIC or it isn't, so either way the data will make a one-way trip.
0
 
LVL 10

Expert Comment

by:kiranghag
ID: 6922415
loops can occur on switched/bridged lans where u can connect the network physically in a loop. but i think the higher levels employ techniques to prevent this from creating a big problem (for a long time). they are TTL (in ip) or s/w timeouts

0
 
LVL 4

Expert Comment

by:svindler
ID: 6936476
A loop in an ethernet will instantly create a broadcast storm, therefore the way to detect a loop is that the whole network is down ;-)
To experience it yourself:
Put Machine A on Hub A. Put Machine B on Hub B. Ping machine B from machine A. No reply.
Connect the two hubs. Everything is working fine.
Make a second connecting between the two hubs. If the hub has collision lamps they should be constantly on now, as the packets are being sent back and forth between the two hubs.
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 40

Expert Comment

by:jlevie
ID: 6936745
Well yes, if the network is physically or logically via a wrong configuration connected if a loop then you've got a problem. But, then I'd consider that to be a case where the hardware wasn't working properly (the network certainly wouldn't be usable for normal traffic). My asumption was that the question related to a normally operating network and in that case I don't believe a loop is possible at the transport (ehternet) layer.

It is easy to have loops at higher layers by mis-configured routing tables.
0
 
LVL 4

Accepted Solution

by:
svindler earned 300 total points
ID: 6936778
I have yet to see an ethernet loop that wasn't created by either physically doing doing something like mentioned above or disabling spanning tree on a switch port.
In every case it was discovered almost instantaneously. Signs to look for:
Excessive broadcasts indicated by LEDs on switches and hubs
No servers accessible from workstations
Lynch mob marching down the hall
0
 
LVL 40

Expert Comment

by:jlevie
ID: 6936918
Don't for get the notification that occurs when the mob of peasants appears outside of your door with pitchforks and torches.

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now