SlideShare a Scribd company logo
3
Most read
Broadcast Storm
 In practical Local Area Networking, it is common that the
switches are interconnected for redundancy.
 When switches are interconnected, the network will not fail
completely even one if the connected link fails.
 When switches are interconnected for redundancy as shown
below, another serious network problem can occur, which is
known as broadcast storm.
 The Layer 2 traffic can be classified as unicast (one to one),
multicast (one to many), and broadcast (one to
all).Broadcasts and Multicasts are required for the normal
operation of the network. MAC addresses for broadcast and
multicast are given below.
• Broadcast Destination MAC address -
FF:FF:FF:FF:FF:FFF
• Multicast Destination MAC addresses - 01:00:5E:00:00:00
to
01:00:5E:7F:FF:FF
 In case of a broadcast and multicast switch need to forward
the frame out all its ports.
 For unknown destination MAC addresses also, the switch
need to forward the Ethernet frame to all ports (known as
flooding) except the source port, to make sure that the frame
reach the destination.
 Broadcasts from each network segment are received and
processed by every device in the network. Most of the
network devices discard broadcasts because these
broadcasts may be irrelevant to those devices. These
broadcasts can consume large amount of available network
bandwidth.
Broadcast storm
 When switches are interconnected for redundancy as shown
above, a broadcast originating from a device connected to
any switch, can cause the circulation of broadcasts around
the network and can saturate the network consuming all
available bandwidth. This network condition known as a
broadcast storm. Broadcast storms consume entire
bandwidth and deny bandwidth for normal network traffic.
 Broadcast storm is a serious network problem and can shut
down entire network in seconds.
 Broadcast storms are prevented in networks using Spanning
Tree Protocol.

More Related Content

PPTX
Distance Vector & Link state Routing Algorithm
PPTX
GSM Radio interface
PPT
PPT
Switching
PPTX
Congestion control
PPTX
Controlled Access Protocols
PPTX
Spanning tree protocol
PPTX
Unit 2 data link control
Distance Vector & Link state Routing Algorithm
GSM Radio interface
Switching
Congestion control
Controlled Access Protocols
Spanning tree protocol
Unit 2 data link control

What's hot (20)

PPTX
Open Shortest Path First
PPT
Routing algorithm network layer
PPTX
Access Control List (ACL)
PPTX
Media Access Control (MAC Layer)
PPTX
Csma cd and csma-ca
PPTX
Spanning tree protocol
PPTX
Routing algorithms
PPTX
Open shortest path first (ospf)
PPTX
Routing algorithm
PDF
Mobile computing (Wireless) Medium Access Control (MAC)
PPTX
Mobile IP
PDF
Spanning tree protocol (stp)
PPTX
OPEN SHORTEST PATH FIRST (OSPF)
PDF
Routing in Mobile Ad hoc Networks
PPT
Spanning tree protocol
PPTX
Unicast multicast & broadcast
PPTX
Ppt of routing protocols
PDF
Lecture 23 27. quality of services in ad hoc wireless networks
PPTX
Physical and logical topologies in computer network and client server
Open Shortest Path First
Routing algorithm network layer
Access Control List (ACL)
Media Access Control (MAC Layer)
Csma cd and csma-ca
Spanning tree protocol
Routing algorithms
Open shortest path first (ospf)
Routing algorithm
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile IP
Spanning tree protocol (stp)
OPEN SHORTEST PATH FIRST (OSPF)
Routing in Mobile Ad hoc Networks
Spanning tree protocol
Unicast multicast & broadcast
Ppt of routing protocols
Lecture 23 27. quality of services in ad hoc wireless networks
Physical and logical topologies in computer network and client server
Ad

Viewers also liked (6)

PPTX
Importance of MIS
PPTX
IP Source Guard
PPTX
Storm-Control
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPTX
MPLS Layer 3 VPN
Importance of MIS
IP Source Guard
Storm-Control
Common Layer 2 Threats, Attacks & Mitigation
MPLS Layer 3 VPN
Ad

Similar to Broadcast storm (20)

PPTX
Layer 2 switching loop
DOCX
Some Ccna basic detail
PPT
Ethernet Switching for netwoking systems
PPT
Cisco Switch Security
PDF
PPT
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
PPTX
Networking Technologies : Segmentation
PPT
EOS Principle and description in SDH 37p.ppt
PPT
6.switching vla ns
PPTX
Lan switching technologies
PPTX
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
PPTX
Westermo webinar: Learning the Basics of Ethernet Networking
PDF
CCNA - Switching Concepts made easy
PPTX
Presentation1
PPTX
The Basics of Industrial Ethernet Communications
PDF
4. Hubs vs. Switches vs. Router_Networks v1.11 – Aaron Balchunas
PPTX
Network Topologies, L1-L2 Basics, Networking Devices
PDF
Switching
PPT
Network Security - Layer 2
Layer 2 switching loop
Some Ccna basic detail
Ethernet Switching for netwoking systems
Cisco Switch Security
Lecture 2 Connecting LANs, Backbone Networks, and Virtual LANs.ppt
Networking Technologies : Segmentation
EOS Principle and description in SDH 37p.ppt
6.switching vla ns
Lan switching technologies
Chapter V-Connecting LANs, Backbone Networks, and Virtual LANs.pptx
Westermo webinar: Learning the Basics of Ethernet Networking
CCNA - Switching Concepts made easy
Presentation1
The Basics of Industrial Ethernet Communications
4. Hubs vs. Switches vs. Router_Networks v1.11 – Aaron Balchunas
Network Topologies, L1-L2 Basics, Networking Devices
Switching
Network Security - Layer 2

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
Dynamic ARP Inspection (DAI)
PPTX
DHCP Snooping
PPTX
Password Recovery
PPTX
Application & Data Center
PPTX
Cisco ISR 4351 Router
PPTX
Cisco ASR 1001-X Router
PPTX
Securing management, control & data plane
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
Avoid DNS lookup when mistyping a command
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
PPTX
Private VLANs
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
PPTX
OTV Configuration
PPTX
Cisco OTV 
PPTX
OTV(Overlay Transport Virtualization)
PPTX
Regular expression examples
PPTX
Eigrp is restricted to stub connections
PPTX
Converting ipv4 to ipv6 and vice versa
PPTX
Password recovery cisco catalyst 3850
Basic Cisco ASA 5506-x Configuration (Firepower)
Dynamic ARP Inspection (DAI)
DHCP Snooping
Password Recovery
Application & Data Center
Cisco ISR 4351 Router
Cisco ASR 1001-X Router
Securing management, control & data plane
Point to-point protocol (ppp), PAP & CHAP
Avoid DNS lookup when mistyping a command
TCLSH and Macro Ping Test on Cisco Routers and Switches
Private VLANs
MTU (maximum transmission unit) & MRU (maximum receive unit)
OTV Configuration
Cisco OTV 
OTV(Overlay Transport Virtualization)
Regular expression examples
Eigrp is restricted to stub connections
Converting ipv4 to ipv6 and vice versa
Password recovery cisco catalyst 3850

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
PPTX
Sustainable Sites - Green Building Construction
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
573137875-Attendance-Management-System-original
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Welding lecture in detail for understanding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Geodesy 1.pptx...............................................
Sustainable Sites - Green Building Construction
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
OOP with Java - Java Introduction (Basics)
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
573137875-Attendance-Management-System-original
Internet of Things (IOT) - A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Welding lecture in detail for understanding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
bas. eng. economics group 4 presentation 1.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Broadcast storm

  • 2.  In practical Local Area Networking, it is common that the switches are interconnected for redundancy.  When switches are interconnected, the network will not fail completely even one if the connected link fails.  When switches are interconnected for redundancy as shown below, another serious network problem can occur, which is known as broadcast storm.
  • 3.  The Layer 2 traffic can be classified as unicast (one to one), multicast (one to many), and broadcast (one to all).Broadcasts and Multicasts are required for the normal operation of the network. MAC addresses for broadcast and multicast are given below. • Broadcast Destination MAC address - FF:FF:FF:FF:FF:FFF • Multicast Destination MAC addresses - 01:00:5E:00:00:00 to 01:00:5E:7F:FF:FF  In case of a broadcast and multicast switch need to forward the frame out all its ports.
  • 4.  For unknown destination MAC addresses also, the switch need to forward the Ethernet frame to all ports (known as flooding) except the source port, to make sure that the frame reach the destination.  Broadcasts from each network segment are received and processed by every device in the network. Most of the network devices discard broadcasts because these broadcasts may be irrelevant to those devices. These broadcasts can consume large amount of available network bandwidth.
  • 6.  When switches are interconnected for redundancy as shown above, a broadcast originating from a device connected to any switch, can cause the circulation of broadcasts around the network and can saturate the network consuming all available bandwidth. This network condition known as a broadcast storm. Broadcast storms consume entire bandwidth and deny bandwidth for normal network traffic.  Broadcast storm is a serious network problem and can shut down entire network in seconds.  Broadcast storms are prevented in networks using Spanning Tree Protocol.