What is Spanning Tree Protocol and how it work? I know it
is - STP is Spanning tree Protocol. It Stops the looping in
the network? How STP work? How it stop Looping in network?
Answers were Sorted based on User's Feedback
Answer / guest
STP is a Protocol used for the loop free environment, when a
network is totally based on a switch....as we know that to
ensure the all time availability of the network we have to
develop redundancy....if the destination is unknown and has
to find out by the switch.... now because of this redundancy
loop occurs..
to solve this problem STP is used..in STP there is a main
head of all switches called ROOT BRIDGE (the Switch having
lowest MAC address or Lowest Priority value - default is 32678).
Main step is to find out all the possible paths to each
destination. After that root bridge uses STA (spanning Tree
algorithm)to find out the best suitable path to the destination.
Other paths to the same destination are set to blocking
mode to avoid the looping....
In this the other non-Root bridge switches continues to
update them selves by receiving the BPDU every 2 secs
generated by the root bridge....
In STP there are five main modes that a switch can have:
1. Blocking :in this case the switch doesn't forwards the
data, but receives BPDUS
2. Listening :in this switch starts checking the updates
3. Learning :in this the switch starts updating itself,
according to the updates
4. Forwarding :switch starts forwarding the main data(here
the network is called as Converged-meand each and every
switch has its cam table equal)
5. Disabled :port is disabled by admin
Is This Answer Correct ? | 31 Yes | 4 No |
Answer / ramesh
STP is a spanning tree protocol which is used in switched
network to avoid the network loop in the network.
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / rahul sharma
STP is a Protocol used for the loop free environment, when a
network is totally based on a switch....as we know that to
ensure the all time availability of the network we have to
develop redundancy....if the destination is unknown and has
to find out by the switch.... now because of this redundancy
loop occurs..
Is This Answer Correct ? | 5 Yes | 9 No |
What does vlan provide?
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
Q1> Which are the ports on CISCO Device? Q2> If our links are down then what we suppose to check? Steps? Q3> This is the ip address x.x.y.y/27 then what is the subnet mask? Q4> What do you mean by Static and Dynamic routing? Give Example of each? Q5> Suppose there are two routers i.e. Router A and Router B and if they are connected on P2P N/w, Then how to configure the router?or Which are the components of router? Q6> This is the ip address x.x.y.y/24 then what is the subnet mask? Q7> There are 4 departments and 10,000 pc's are their so how many vlans are created ? Q8> what is the number of standard vlan creation? Options Prasad Saldur hey guys any openings in mumbai i am fresher i finished my BSC -IT in the year 2011 if any opening please let me know..Like · · Follow Post · July 11 at 10:41am Options Mayank Shah pls any one send me the latest dumps of ccna my email addr is mayankshah20089@gmail.comLike · · Follow Post · July 10 at 1:49am Options Gupta Manoj Any idea About Wipro Telephonic Round for Network Engg?Like · · Unfollow Post · July 9 at 10:35pm Options Gupta Manoj What is mean by Catalyst Switch?Like · · Unfollow Post · July 9 at 6:28am Mohd Yaseen Catalyst Switch is the series which is launched by Cisco and it also awarded my many times becoz of its flexibily and technology..Example of Catalyst Swict r :- 1700 1800 2900 July 9 at 8:47am · Like Options Sheelgandh Chandankhede Extensive use of GRE tunnels ? Function of GRE tunnels?Like · · Follow Post · July 7 at 6:15am Options Gupta Manoj Wheather this is Good Company or Not Firstsource Solutions Ltd i Got selected for NOC Engg sholud i join or not?Like · · Unfollow Post · July 3 at 11:19pm Mohd Yaseen BHai No Idea,,,,I Think u Should go for Review.......... July 5 at 2:00am · Like Kapil Mhatre Salary? & location? July 6 at 10:44am via mobile · Like · 1 Options Somil Keswani Attachment Unavailable This attachment may have been removed or the person who shared it may not have permission to share it with you.Like · · Follow Post · July 6 at 10:40am Options Gupta Manoj Baap Se Bapadaaaaaaaaaaaaaaaaaaaaaaaaa​aaaLike · · Unfollow Post · July 6 at 10:16am Mohd Yaseen and Shrikant Shitole like this. Options Chintan Shah friends tell me how to make two internet lines work on same switch without cisco routerLike · · Follow Post · July 1 at 11:32pm near Mumbai Options Suhas Salunkhe What is the difference between Alternate and Backup port in RSTP ?Like · · Follow Post · July 1 at 12:41pm Options Gupta Manoj Practical Question Suppose there is 1 switch and on Switch at port 1 Hub is connected and on hub port 2 and 3 Computer 1 and Computer 2 is connected? Then How many MAC learn at switch1?Like · · Unfollow Post · June 28 at 1:56am Vinod Kumar Vishwakarma At this stage i think 2 July 1 at 9:04am · Like Gupta Manoj Manageable cisco switch July 1 at 9:24am · Like · 1 Options Yogesh Dilip Lotlikar Like · · Follow Post · July 1 at 8:18am Shrikant Shitole and 2 others like this. Options Somil Keswani Wall Photos Disaster recovery illustrated :D The best difference between all of them. Share it if you liked it. :) By: UNISOFT TECHNOLOGIES Like · · Follow Post · July 1 at 8:12am Options Gupta Manoj In windows 2000 if we want to take a remote axcess then which command is used? http://192.168.0.1/ 192.168.0.1Like · · Unfollow Post · Share · June 28 at 2:00am Mohd Yaseen sorry June 29 at 4:27am · Like Gupta Manoj what are u giving the ans man? July 1 at 6:08am · Like Options Gupta Manoj Switch works on which layer?Like · · Unfollow Post · June 28 at 2:01am Gaurav Dhargalkar L2 switch on layer 2 and L3 switch works on layer 3 after command:no switchport (acts as router) July 1 at 12:06am · Like · 2 Amar Chavan good question July 1 at 1:59am · Like · 1 Options Gupta Manoj What is the Default priority of STP?Like · · Unfollow Post · June 28 at 2:01am Mohd Yaseen sorry June 29 at 4:32am · Like Gaurav Dhargalkar ‎32768 July 1 at 12:04am · Like Options Gupta Manoj ‎1>What is Triple X Network? 2>What is 5 4 3 Rule? 3>Difference between BIT Rate and Boud Rate?Like · · Unfollow Post · June 27 at 10:07am Gaurav Dhargalkar bhai log itna tension kyu lete ho google is baap of knowledge u will get info on any query u want. just u have to search deep for easy explainations. July 1 at 12:00am · Like Gaurav Dhargalkar For all the alsi ppl. Enjoy :) 1.http://​www.allinterview.com/​showanswers/13964.html 2.http://www.webopedia.com/​TERM/5/5_4_3_rule.html 3. http://www.tech-faq.com/​difference-between-bit-rate​ -and-baud-rate.htmlWhat do you meant by "triple X" in Networks? www.allinterview.com What do you meant by "triple X" in Networks? Interview Questions July 1 at 12:03am · Like · 1 Options Gupta Manoj Q>If we want to learn the Neigbours IP address then which command is used? a>show cdp neighbours b>show run c>show cdp networks d>show ip routeLike · · Unfollow Post · June 28 at 2:05am Vishal Duraphe always welcomed yaar !! June 29 at 7:35am · Like Gaurav Dhargalkar show cdp will be shown if cdp is enabled. But in real-time designs it is not usually enabled. Whereas in sh run u will all info and config on the router where the neighbours are also published. June 30 at 11:58pm · Like Options Gupta Manoj Practical Question Suppose there is 1 switch and on Switch at port 1 Hub is connected and on hub port 2 and 3 Computer 1 and Computer 2 is connected? Then How many MAC learn at switch1?Like · · Unfollow Post · June 29 at 4:33am Options Gupta Manoj What is the resposibility of Network Layer?Like · · Unfollow Post · June 28 at 2:02am Mohd Yaseen Responsibility to learn all routes and place best route in a RoutingTable and do routes filteration through ACL June 29 at 4:31am · Like Options Older Posts Facebook © 2012 · English (US) About · Create an Ad · Create a Page · Developers · Careers · Privacy · Cookies · Terms · Help Abhi Singh 1
What we called 64 bit mac-address in ipv6?
Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal number B. 24 bits expressed as a hexadecimal number C. 36 bits expressed as a binary number D. 48 bits expressed as a decimal number E. 48 bits expressed as a hexadecimal number
Which ISDN protocol prefix specifies switching and signalling? A.) I B.) E C.) Q D.) S
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
Explain the draw back of eigrp protocol?
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking