Identify the bridges that transmit BPDUs after the spanning tree protocol has converged. For each Ethernet segment, determine the following fields for the BPDU sent on that segment: root ID, root path cost, and bridge ID. Explain how these message are interpreted. Show how the entire spanning tree can be constructed from these messages.
What will be an ideal response?
Router4#show spanning-tree
```
Bridge group 1 is executing the IEEE compatible Spanning Tree protocol
Bridge Identifier has priority 128, address 0007.50c1.0700
Configured hello time 2, max age 20, forward delay 15
Current root has priority 128, address 0006.5b4b.e1da
Root port is 3 (Ethernet0/1), cost of root path is 200
Port Number size is 9
Topology change flag not set, detected flag not set
Times: hold 1, topology change 35, notification 2
hello 2, max age 20, forward delay 15
Timers: hello 0, topology change 0, notification 0
bridge aging time 300
Port 2 (Ethernet0/0) of Bridge group 1 is blocking
Port path cost 100, Port priority 128
Designated root has priority 128, address 0006.5b4b.e1da
Designated bridge has priority 128, address 0007.853b.5e40
Designated port is 3, path cost 100
Timers: message age 2, forward delay 0, hold 0
BPDU: sent 3, received 303
Port 3 (Ethernet0/1) of Bridge group 1 is forwarding
Port path cost 100, Port priority 128
Designated root has priority 128, address 0006.5b4b.e1da
Designated bridge has priority 128, address 0007.50c4.7780
Designated port is 3, path cost 100
Timers: message age 2, forward delay 0, hold 0
BPDU: sent 3, received 292
```
You might also like to view...
The ________ defines whether the datasheet displays above, below, to the left, or to the right of the form when using split form
A) Split Form Splitter Bar B) Split Form Size C) Split Form Orientation D) Split Form Datasheet
Compare connectionless (UDP) and connection-oriented (TCP) communication for the implementation of each of the following application-level or presentation-level protocols: i) virtual terminal access (for example, Telnet); ii) file transfer (for example, FTP); iii) user location (for example, rwho, finger); iv) information browsing (for example, HTTP); v) remote procedure call.
What will be an ideal response?