What is Spanning Tree Protocol and how it work? I know it
is - STP is Spanning tree Protocol. It Stops the looping in
the network? How STP work? How it stop Looping in network?
Answers were Sorted based on User's Feedback
Answer / guest
STP is a Protocol used for the loop free environment, when a
network is totally based on a switch....as we know that to
ensure the all time availability of the network we have to
develop redundancy....if the destination is unknown and has
to find out by the switch.... now because of this redundancy
loop occurs..
to solve this problem STP is used..in STP there is a main
head of all switches called ROOT BRIDGE (the Switch having
lowest MAC address or Lowest Priority value - default is 32678).
Main step is to find out all the possible paths to each
destination. After that root bridge uses STA (spanning Tree
algorithm)to find out the best suitable path to the destination.
Other paths to the same destination are set to blocking
mode to avoid the looping....
In this the other non-Root bridge switches continues to
update them selves by receiving the BPDU every 2 secs
generated by the root bridge....
In STP there are five main modes that a switch can have:
1. Blocking :in this case the switch doesn't forwards the
data, but receives BPDUS
2. Listening :in this switch starts checking the updates
3. Learning :in this the switch starts updating itself,
according to the updates
4. Forwarding :switch starts forwarding the main data(here
the network is called as Converged-meand each and every
switch has its cam table equal)
5. Disabled :port is disabled by admin
Is This Answer Correct ? | 31 Yes | 4 No |
Answer / ramesh
STP is a spanning tree protocol which is used in switched
network to avoid the network loop in the network.
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / rahul sharma
STP is a Protocol used for the loop free environment, when a
network is totally based on a switch....as we know that to
ensure the all time availability of the network we have to
develop redundancy....if the destination is unknown and has
to find out by the switch.... now because of this redundancy
loop occurs..
Is This Answer Correct ? | 5 Yes | 9 No |
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
HI friends mine one of the friends have ask a good question i also donot know the answer so i am putting here Please poet the answer no matter it is wright or wrong put yours view here The question is like that when we are going to configure ospf then there are three way 1st way router ospf 10 netwrok 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 the 2nd way is like that router ospf 10 netwrok 192.168.0.0 0.0.255.255 area 0 but he inrodused the thrird way like router ospf 10 netwrok 192.168.00000001.0 < ?.?.?.?>area 0 router ospf 10 netwrok 192.168.00000010 <?.?.?.?>area 0 now problem is that what should i put the mask in this way so i puted ? sign Please solve this problem i think this is good one plz donot see for answer please contribute any thing i am reqesting Than you Jitendera kuamr sinha
what is diffrence betwwen mpls and frame really
If i had 400 computers set in a site how many VLAN i should configure so that i can share a proper bandwith,and also i had two lease line connection of 2Mbps each,
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
What is the difference between switch, routers, and hub?
Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc
How signalling can be explained in D channel of ISDN?
Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Why is vlan used?
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables