09 STP Principles and Configuration
| Institution | Huawei - JKUAT |
| Course | Information Technolo... |
| Year | 3rd Year |
| Semester | Unknown |
| Posted By | Jeff Odhiambo |
| File Type | |
| Pages | 60 Pages |
| File Size | 1.37 MB |
| Views | 4360 |
| Downloads | 1 |
| Price: |
Buy Now
|
Description
On an Ethernet switching network, redundant links are used to implement link backup and enhance network reliability. However, the use of redundant links may produce loops, leading to broadcast storms and an unstable MAC address table. As a result, communication on the network may deteriorate or even be interrupted. To prevent loops, IEEE introduced the Spanning Tree Protocol (STP).
Devices running STP exchange STP Bridge Protocol Data Units (BPDUs) to discover loops on the network and block appropriate ports. This enables a ring topology to be trimmed into a loop-free tree topology, preventing infinite looping of packets and ensuring packet processing capabilities of devices.
IEEE introduced the Rapid Spanning Tree Protocol (RSTP) to improve the network
convergence speed.
Below is the document preview.
Employee Health and Safety
Trending!
Employee health and safety
Employee safety
Deal with safety hazards aspects of work
environment that have the potential of causing
immediate and sometimes violent harm or even
death
Examples of safety hazards include:
poorly maintained equipment
Unsafe machinery
Exposure to hazardous chemical
Employees health
Employee health ensures that employees are
physically, emotionally and psychologically
fit to do work
36 Pages
4359 Views
0 Downloads
281.08 KB
Employee Relations Management
Trending!
A continuous relationship between a defined group of employees (represented by a union or association) and an employer.
The relationship includes:
The initial recognition of the rights and responsibilities of
union and management
The negotiations of a written contract concerning wages, hour
and other conditions of employment
and the interpretation and administration of this contract over
its period of coverage.
54 Pages
4578 Views
0 Downloads
623.27 KB
KALA JOINT MAY MOCK 2024; Mathematics PP1 & PP2 Q&A
Trending!
Download a copy of the KALA JOINT MAY MOCK 2024; Mathematics PP1 & PP2 Q&A Question Papers with well coordinated Marking Schemes attached. This is good revision material for your upcoming exams.
46 Pages
4770 Views
0 Downloads
3.48 MB
2920/204 Qualitative methods lecture notes
Trending!
This are lecture on qualitative methods That will cover various topics. Data collection, repestation, measures of dispersion, measures central tendency , regression and correlation, network and time series, financial mathematics
211 Pages
5621 Views
0 Downloads
1021.78 KB
DESIGN OF CABLE FAULT DISTANCE LOCATOR- diploma electrical trade project
Trending!
CABLE FAULT DISTANCE LOCATOR.pdf
30 Pages
5135 Views
0 Downloads
422.54 KB
BIT 2108: Lesson 2 Categories of a network
Trending!
There are no generally accepted criteria to classify the computer networks however, two dimensions are considered more important, which are scale and transmission technology. On the basis of scale, computer networks can be classified into three types local area network (LAN), metropolitan area network (MAN) and wide area network (WAN).
32 Pages
4767 Views
0 Downloads
339.42 KB
BIT 2108: Lesson 5 Networking Hardware.
Trending!
Networking hardware refers to the physical devices required to establish, operate, and maintain computer networks. These devices enable data transfer, communication, and connectivity between systems within a network or across multiple networks
33 Pages
4256 Views
0 Downloads
503.2 KB
BIT 2108: Transmission Media.
Trending!
Transmission media refers to the physical pathways or communication channels through which data, information, or signals travel from one device or system to another.
41 Pages
4492 Views
0 Downloads
308.92 KB
BIT 2108: Access methods.
Trending!
Access methods refer to the techniques and protocols used to retrieve, store, and manipulate data or resources in a computer system or network. These methods determine how users, devices, or applications interact with data or services.
11 Pages
4349 Views
0 Downloads
390.92 KB