How the STP determinw that which Port should be Root Port,
which port should be Designeted Port , Blocking Port and
Forwarding Port in Layer 2 STP topology
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
this protocol is called BPDU.
remember that i am not going to expalin the prorty value
mac value.
BPDU is the best answer for the interview
if you need explanation then post it i will send the
explanation
| Is This Answer Correct ? | 27 Yes | 4 No |
Answer / guest
the port that has the least cost toward the root bridge is
considered theroot port andthe one that is in the opposite
direction is considered the designated port.
now the one that has the better cost (remember lower is the
better)among the two parellel connections is considered the
forwarding port and the one that has higher cost is takes
as the blocking.
| Is This Answer Correct ? | 6 Yes | 1 No |
Answer / guest
@ Jitendera Sinh- Please don't misguide if u don't know the answer.
BPDU's are packets exchanged b/w switches to to know the interface to which it is connected to. (not protocol.
TO answer the question you need to explain the STP.
This is how entire STP works in simple words.
1.Lowest Bride ID will be elected as ROOT bridge.
2.All the ports of ROOT bridge will be DP
3.All ports directly connected to ROOT bridge will become RP
4.Based on the path cost to reach ROOT bridge, the Port will become RP(Other than directly connected bridge)
5.The Port to which RP is connected will be a DP.
6.All other(Extra) port will be either DP/BP based on the Bridge ID.(Lower will be DP)
| Is This Answer Correct ? | 6 Yes | 1 No |
Answer / venkatesh
ports enter into the root bridge,these ports are called as
designated ports.The out going ports which are enter into
the root bridge is known as root ports.The alternative root
for the network is known as blocking port.Which port
overcome the listening,learning,blocking modes is called as
forwarding port
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / vinoth
STP to identify the Root Port used by Priority value and mac
address, and designated port calculated by closed port of
root port per link, other ports are non-designated port.
| Is This Answer Correct ? | 0 Yes | 0 No |
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
Which 2 commands shows the Cisco IOS filename? A.) show IOS B.) show ver C.) show flash D.) show mem E.) show NVRAM
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Which of the following are Distant Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGRP
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255
plz send me cisco contact no india?
Why ip address called logical address?
Explain how an spf algorithm works?
The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination