StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Spanning Tree Protocol Issues - Essay Example

Cite this document
Summary
The essay "Spanning Tree Protocol Issues" focuses on the critical analysis of the major issues in the spanning tree protocol (STP). It refers to a network protocol utilized in the creation of a topology that is free from loops that occur on bridged Ethernet networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Spanning Tree Protocol Issues
Read Text Preview

Extract of sample "Spanning Tree Protocol Issues"

The rapid spanning tree protocol (RSTP) can be described as an extension of the STP that resulted from the evolution of the STP network protocol. This protocol provides a faster-spanning tree compared to STP resulting in the introduction of new convergence behaviors of networks at the bridge ports. This protocol functions similarly to the standard STP but the fundamental difference occurs in the time taken to complete the convergence process (Huang et al., 2006). RSTP completes the convergence process quickly eliminating the possibility of lost communication.

Cisco utilizes additional spanning trees in seeking to ensure that the protocols operate smoothly in environments where there are several virtual LANs in existence. As the networks grow, Cisco creates multiple spanning trees to ensure each network utilizes its independent links for establishing connections. Cisco has developed multiple instances spanning tree protocol MISTP which is fully compatible with the standards RSTP, and its integration causes the many bridges to be perceived as a single bridge by the RSTP. The configuration of the standard STP and RSTP does not need to be changed when these Cisco evolutions are integrated, but rather they make the function faster.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 3 d 2 Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Week 3 d 2 Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1657815-week-3-d-2
(Week 3 D 2 Essay Example | Topics and Well Written Essays - 250 Words)
Week 3 D 2 Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1657815-week-3-d-2.
“Week 3 D 2 Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1657815-week-3-d-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Spanning Tree Protocol Issues

Routing Protocol Security

This would be done using authentication method to compare both of them in order to pinpoint the issues arising from it.... In order to achieve the set project objective, issues of concern included the history of OSPF, types of OSPF packet type, Authentication Mechanisms in OSPF v2, OSPF security, Authentication Mechanism in OSPF v2, Digital Signature of OSPF, methodology used, system design, hardware and software, testing scenarios, and analysis of data analysis....
3 Pages (750 words) Dissertation

Networking Funamentals

rinciple of operation of the Ethernet and Token-ring protocolsEthernet ProtocolEthernet MAC is one of the mainly significant protocols and is also the mainly broadly used protocol nowadays.... This simulator is deliberate to assist companies envisage the variants of the Ethernet protocol.... Ethernet uses the CSMA/CD protocol through a few extra details (Baskett,F.... In this regard Wireless LAN can check the packets transmitted over the media and view the protocol in operations (D....
14 Pages (3500 words) Essay

Routine CT scanning protocols

A study by Hausleiter et al 2006, showed that in a 64-slice CT cardiac procedure, a 100 kV protocol used instead of a 120 kV protocol along with an ECG gated technique, resulted in a 64% reduction in the effective dose.... These patients were randomly assigned to one of three protocol groups: (1) protocol A (the standard protocol) with 120 kilovolt (peak) (kV[p]) and 100 effective milliampere-second (eff mA s); (2) protocol B, with 100 kV (p) and 140 eff mA s; and (3) protocol C, with 80 kV(p) and 180 eff mA s....
13 Pages (3250 words) Essay

Network Configurations

A Virtual LANs otherwise known as a VLANs which are usually defined within switches, are broadcast domain that control broadcast, multicast, and unicast within a device in layer 2.... They are placed on specific ports to restrict access.... One VLAN cannot communicate with the other.... ... ... ...
2 Pages (500 words) Essay

Local Area Networking Technology

This paper looks into the Local Area Technologies with regard to a primary school setting.... In this regard, a specific networking technology is utilized to give a clear insight into the best way of having the primary school's networking devices connected in the most effective way possible.... ... ...
15 Pages (3750 words) Assignment

Adjustment of CT Scanning Protocol for Headaches

The aims of the research study are to get an understanding of the current protocols used for CT scanning in headaches and through an assessment of the current protocols in use for CT scanning to arrive at a more safe and suitable protocol for the use of CT scanning in headaches.... ...
28 Pages (7000 words) Research Proposal

A Network Model For an International Organization

This Chapter will also include an understanding of the theories and concepts based on the research of other academics on the ground of equal opportunities and disability issues.... Ethernet MAC is one of the mainly significant protocols and is also the mainly broadly used protocol nowadays.... This simulator is deliberate to assist companies to envisage the variants of the Ethernet protocol.... Ethernet uses the CSMA/CD protocol through a few extra details (Baskett, F....
20 Pages (5000 words) Research Proposal

Administrative Issues in Multihoming

The object of analysis for the purpose of this paper "Administrative issues in Multihoming" is multihoming is a configuration technique that provides a number of network-based interfaces or Internet protocol addresses on a particular computer.... ... ... ... Multi-homing offers an extra tool to keep network linking active and well in the case of natural disasters or other occasions that would usually render a host out of action for a comprehensive period of time (Tatum)....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us