09 STP Principles and Configuration

Institution Huawei - JKUAT
Course Information Technolo...
Year 3rd Year
Semester Unknown
Posted By Jeff Odhiambo
File Type pdf
Pages 60 Pages
File Size 1.37 MB
Views 2756
Downloads 1
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

On an Ethernet switching network, redundant links are used to implement link backup and enhance network reliability. However, the use of redundant links may produce loops, leading to broadcast storms and an unstable MAC address table. As a result, communication on the network may deteriorate or even be interrupted. To prevent loops, IEEE introduced the Spanning Tree Protocol (STP). Devices running STP exchange STP Bridge Protocol Data Units (BPDUs) to discover loops on the network and block appropriate ports. This enables a ring topology to be trimmed into a loop-free tree topology, preventing infinite looping of packets and ensuring packet processing capabilities of devices. IEEE introduced the Rapid Spanning Tree Protocol (RSTP) to improve the network convergence speed.
Below is the document preview.

No preview available
Isomerism II Trending!
UPDATED NOTES ON ISOMERISM
12 Pages 3277 Views 0 Downloads 1.88 MB
TORTS_2 Trending!
UPDATED NOTES ON TORTS
24 Pages 2655 Views 0 Downloads 710.8 KB
PSY 211: GUIDANCE AND COUNSELLING
Guidance means of helping individuals to understand and use wisely the educational, vocational and personal opportunities they have as a form of systematic assistance in achieving satisfactory adjustment to school and to life in general.
1990 Views 1 Downloads 608.55 KB
Ethics for IT Workers and IT Users
Ethics in Information Technology, Fourth Edition
1962 Views 0 Downloads 710 KB
Computer Legal and Ethical Issues Trending!
The focus is on technical approaches to the detection, prevention, and recovery from computer and network attacks. One other tool is the deterrent factor of law enforcement. Many types of computer attacks can be considered crimes and, as such, carry criminal sanctions. This section begins with a classification of types of computer crime and then looks at some of the unique law-enforcement challenges of dealing with computer crime.
2367 Views 0 Downloads 113.27 KB
Law of Agency Trending!
It is a general principle of contract law that only the parties to the contract acquire rights and liabilities under it. A well recognized exception to this general rule is the concept of agency.
12 Pages 2624 Views 1 Downloads 211.25 KB
LAW OF CONTRACT
BASIC PRINCIPLES OF CONTRACT LAW
26 Pages 448 Views 0 Downloads 208.13 KB
PP1 TERM 3 SCHEMES OF WORK- ART Trending!
UPDATED ARTS SCHEMES OF WORK TERM3 PP1
12 Pages 3268 Views 0 Downloads 837.93 KB
CRE SCHEMES OF WORK PP1 TERM3 Trending!
UPDATED CRE SCHEMES OF WORK PP1 TERM3
9 Pages 2605 Views 0 Downloads 868.76 KB
ENVIROMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3 Trending!
UPDATED ENVIRONMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3
18 Pages 2825 Views 0 Downloads 873.3 KB