09 STP Principles and Configuration

Institution Huawei - JKUAT
Course Information Technolo...
Year 3rd Year
Semester Unknown
Posted By Jeff Odhiambo
File Type pdf
Pages 60 Pages
File Size 1.37 MB
Views 3025
Downloads 1
Price: Buy Now whatsapp Buy via whatsapp
  • whatsapp
  • facebook
  • twitter

Description

On an Ethernet switching network, redundant links are used to implement link backup and enhance network reliability. However, the use of redundant links may produce loops, leading to broadcast storms and an unstable MAC address table. As a result, communication on the network may deteriorate or even be interrupted. To prevent loops, IEEE introduced the Spanning Tree Protocol (STP). Devices running STP exchange STP Bridge Protocol Data Units (BPDUs) to discover loops on the network and block appropriate ports. This enables a ring topology to be trimmed into a loop-free tree topology, preventing infinite looping of packets and ensuring packet processing capabilities of devices. IEEE introduced the Rapid Spanning Tree Protocol (RSTP) to improve the network convergence speed.
Below is the document preview.

No preview available
Isomerism II Trending!
UPDATED NOTES ON ISOMERISM
12 Pages 3392 Views 0 Downloads 1.88 MB
TORTS_2 Trending!
UPDATED NOTES ON TORTS
24 Pages 2774 Views 0 Downloads 710.8 KB
PSY 211: GUIDANCE AND COUNSELLING Trending!
Guidance means of helping individuals to understand and use wisely the educational, vocational and personal opportunities they have as a form of systematic assistance in achieving satisfactory adjustment to school and to life in general.
2318 Views 1 Downloads 608.55 KB
Ethics for IT Workers and IT Users Trending!
Ethics in Information Technology, Fourth Edition
2343 Views 0 Downloads 710 KB
Computer Legal and Ethical Issues Trending!
The focus is on technical approaches to the detection, prevention, and recovery from computer and network attacks. One other tool is the deterrent factor of law enforcement. Many types of computer attacks can be considered crimes and, as such, carry criminal sanctions. This section begins with a classification of types of computer crime and then looks at some of the unique law-enforcement challenges of dealing with computer crime.
2680 Views 0 Downloads 113.27 KB
Law of Agency Trending!
It is a general principle of contract law that only the parties to the contract acquire rights and liabilities under it. A well recognized exception to this general rule is the concept of agency.
12 Pages 2991 Views 1 Downloads 211.25 KB
LAW OF CONTRACT
BASIC PRINCIPLES OF CONTRACT LAW
26 Pages 451 Views 0 Downloads 208.13 KB
PP1 TERM 3 SCHEMES OF WORK- ART Trending!
UPDATED ARTS SCHEMES OF WORK TERM3 PP1
12 Pages 3445 Views 0 Downloads 837.93 KB
CRE SCHEMES OF WORK PP1 TERM3 Trending!
UPDATED CRE SCHEMES OF WORK PP1 TERM3
9 Pages 2763 Views 0 Downloads 868.76 KB
ENVIROMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3 Trending!
UPDATED ENVIRONMENTAL ACTIVITIES SCHEMES OF WORK PP1 TERM3
18 Pages 3006 Views 0 Downloads 873.3 KB