Solved

Resource For implementing Spanning Tree

Posted on 2004-10-15
6
302 Views
Last Modified: 2013-11-29
Hi Experts,
Do you have A good Resource that describe How implementing Spanning Tree on Layer 2 from OSI Model?

Best Regards
Hamid Reza

0
Comment
Question by:123456
6 Comments
 
LVL 5

Accepted Solution

by:
zerofield earned 100 total points
ID: 12320563
0
 
LVL 2

Author Comment

by:123456
ID: 12320670
Sorry if I have Some Mistakes on Telling MY question.
PLease Tell me a link that describe what is the  spanning tree on ?

I will award Another 50 points.
0
 
LVL 5

Assisted Solution

by:zerofield
zerofield earned 100 total points
ID: 12320801
Here, ill just describe it..

STP is used to prevent ethernet frames from looping when redundant paths are provided between switches.  Plain and simple, thats what it does.

Say you have 3 switches, all connected to one another, in a pyramid shape.

If you did not have STP, you could loop an ethernet frame, due to the fact a frame has the ability to come back to itself.  STP creates a spanning tree of interfaces that forward or block frames as it receives them.  STP will pick what interfaces should forward, and which ones shouldnt, that way the frames are not looped.

You can also use STP for redundancy in the sense of connecting 2 ports between each switch, and letting STP block one of them.  Granted, etherchannelling is a much better solution, you can use STP for it.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 12

Expert Comment

by:Mazaraat
ID: 12321061
Good explanation zerofield
0
 
LVL 2

Author Comment

by:123456
ID: 12322509
Thanks For Your Answer.
0
 
LVL 2

Expert Comment

by:wmilliga
ID: 12343640


Read the book "Interconnections" by Radia Perlman. It's an all-time geek classic!
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now