Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Friday, 28 February 2014
On 08:19 by Unknown in Blocking State, Forwarding state, learning State, Lesson, Listening State, Protocol, Spanning tree, Tutorial No comments
Introduction to spanning tree protocol.
Description: STP, a link management protocol that is part of the IEEE 802.1 standard for media access control bridges. Using the spanning tree algorithm, STP provides path redundancy while preventing undesirable loops in a network that are created by multiple active paths between stations. Loops occur when there are alternate routes between hosts. To establish path redundancy, STP creates a tree that spans all of the switches in an extended network, forcing redundant paths into a standby, or blocked state. STP allows only one active path at a time between any two network devices (this prevents the loops) but establishes the redundant links as a backup if the initial link should fail. If STP costs change, or if one network segment in the STP becomes unreachable, the spanning tree algorithm reconfigures the spanning tree topology and re-establishes the link by activating the standby path. Without spanning tree in place, it is possible that both connections may be simultaneously live, which could result in an endless loop of traffic on the LAN.
Description: STP, a link management protocol that is part of the IEEE 802.1 standard for media access control bridges. Using the spanning tree algorithm, STP provides path redundancy while preventing undesirable loops in a network that are created by multiple active paths between stations. Loops occur when there are alternate routes between hosts. To establish path redundancy, STP creates a tree that spans all of the switches in an extended network, forcing redundant paths into a standby, or blocked state. STP allows only one active path at a time between any two network devices (this prevents the loops) but establishes the redundant links as a backup if the initial link should fail. If STP costs change, or if one network segment in the STP becomes unreachable, the spanning tree algorithm reconfigures the spanning tree topology and re-establishes the link by activating the standby path. Without spanning tree in place, it is possible that both connections may be simultaneously live, which could result in an endless loop of traffic on the LAN.
Spanning
Tree Protocol Port Roles: Once the root switch is elected, each of the ports is given a role
depending on its place within the STP
topology; the available port roles when using 802.1D spanning tree are shown
below:
·
Root: The port given this role is the selected best path to reach the
root switch
·
Designated: The port given this role is selected with the best path to a
specific switched segment; there is only one designated port per switched
segment.
·
Alternate: The port given this role is selected as a backup to the root port;
if the root port should have a problem, this port would take over the root port
role.
·
Backup: The port given this role is selected as a back to the designated
port; if the designated port should have a problem this port would take over
the designated port role.
There are five different states that a port can be in, described
below:
· Blocking State: Ports
that are in the blocking state do not forward traffic; they simply listen to the
network to ensure that they should continue to block traffic. Should the state
of the switched network change, the port could transition to listening state.
All ports start in blocking state after initial switch initialization.
· Listening State: Ports
that are in the listening state do not forward traffic. While in this state,
the port will only listen to traffic as they did when in blocking state. This
is the first state that comes after the blocking state after the port is set to
start frame forwarding. The default time in the listening state is 15 seconds.
· Learning State: Ports
that are in the learning state do not forward traffic; while in this state the
port will listen to traffic and begin to learn addresses from the connected
devices on a segment. The default time in the learning state is 15 seconds.
· Forwarding State: Ports that are in the forwarding state forward traffic as well
as continue to learn addresses from the segment.
·
Disabled State: Ports that are in the disabled state do not forward traffic or
listen to the network traffic.
Solution:
The given topology is:
Spanning tree protocols commands:
1.
Show
spanning-tree
Syntax:
switch# show spanning-tree
Use: This command will display the root
switch as well as root ID, bridge ID and port status.
Output:
2.
Show
spanning-tree summary
Syntax: switch# show spanning-tree summary
Use: It will display the summary of port
status.
Output:
3.
Show
spanning-tree detail
Syntax: switch# show spanning-tree detail
Use: It will display detailed information
of ports.
Output:
4.
Show
spanning-tree interface fa0/1 or fa0/2
Syntax: switch# show spanning-tree detail
Use: It will display the STP
interface status and configuration.
Output:
Output:
1.
Root switch: Switch0
Priority: 327689
MAC
address: 0002.16BC.9D27
2.
Non -root switch:
switch1, switch2
Switch 1:
Priority: 327689
MAC
address: 000C.CF67.7622
Switch
2:
Priority:
327689
MAC
address: 0060.3E85.3269
3. Blocked
port: Fa0/3 on switch 2
4. Port
status on switch 0
fa0/1
is in designated forwarding state.
fa0/2
is in designated forwarding state.
fa0/3
is in designated forwarding state.
fa0/4
is in designated forwarding state.
5. Port
status on switch 1
fa0/1
is in designated forwarding state.
fa0/2
is in designated forwarding state.
fa0/3
is in root forwarding state.
fa0/4
is in designated forwarding state.
6. Port
status on switch 2
fa0/1
is in designated forwarding state.
fa0/2
is in designated forwarding state.
fa0/3
is in alternating blocking state.
fa0/4
is in root forwarding state.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment