CCNA Experiment 15 Protection of the STPEnvironment: Windows XP ,Packet Tracert 5.3.Purpose: To understand how to protect STP NetworkDescriptionBPDU Guard (BPDU protection ):BPDU protection is typically used in PortFast mode. after configuring BPDU protection on a port with PortFast mode enabled , receiving BPDUs will turn the port into a err-disable state . (portfast is typically usedon ports in Access mode)Root guard: The purpose of root protection
1. Problems after successful STP plug-in Installation
After the plug-in is installed, You can see SOA tools and JAX-WS and SCA sub-Menus under eclipse menu window --> preferences.
However, if you select the Java item below SCA, an error message is displayed: the current page contain invalid value .:
This is caused by a bug in STP.
Solution:You can download the corrected
650) this. width = 650; "src =" http://img1.51cto.com/attachment/201309/164626789.jpg "title =" stp.jpg "alt =" 164626789.jpg"/>
"Networking requirements 』1. All devices run the Spanning Tree Protocol to generate the Tree Protocol.2. SwitchB is used as the root bridge to block loops in the network and achieve redundant link backup."Switch STP configuration process 』By changing the STP priority of the switch
3.9 advanced STP Configuration
Purpose:
1. Master the configuration and principles of Portfast, Uplinkfast, and Backbonefast.
2. Understand STP link convergence.
Tutorial topology:
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/06224SF3-0.png "title =" 3.9.png "/>
Tutorial steps:
1. Deploy STP Technology Based on the topology in the
Switch STP Configuration
The value range of the Spanning Tree priority is 0 ~ 61440, increment is 4096, its valid value is ,......, 61440. The smaller the priority value, the higher the priority. 0 is the highest, and 61440 is the lowest.
When oneVswitchWhen the root port or blocked port of receives the inferior BPDUs package, it indicates that the indirect link from the switch to the root bridge is faulty, and the link between the switch and the root
STP algorithms and advanced featuresStep 1: select the least bridge ID for the root bridge: bridge priority + MAC address composition Step 2: select the root port (on a non-root bridge) 1. select the minimum overhead from the port to the root bridge: Generally, the port rate is 2. select 3. step 3: select the specified port (all switches involved in the calculation. select the minimum overhead from the bridge to the root bridge.2. Select the smallest
STP (Spanning-tree Protocol, Spanning Tree Protocol), the protocol can be used to establish a tree topology in the network, eliminate loops in the network, and can be achieved through a certain method of path redundancy. 1.1 Problems in a redundant topology650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M02/5A/17/wKiom1T2W7Gi2-9CAADY8l6k6sQ671.jpg "title=" No redundancy. png "alt=" wkiom1t2w7gi2-9caady8l6k6sq671.jpg "/>Figure 1-1 Topology of a
Build tree initialization and Convergence
STP establishes a root node, called the root bridge, and constructs a topology in which each node in the network can arrive at only one path, the final generated tree originated from the root node. redundant links that are not part of the shortest path tree will be blocked because such paths are blocked, therefore, it is possible to implement a non-loop topology. When a data frame is received on the blocked li
STP protocol and working process STP protocol (Spanning Tree Protocol) is a layer-2 management protocol with the standard of 802.1d. IEEE 802.1d is the earliest STPS standard. It provides a dynamic redundancy switching mechanism for the network. The STP protocol can deploy backup lines in the network design and ensure that * the backup line is closed when the mas
CCNA Experiment 13 STP the Load Balancer Environment: Windows XP , GNS3.0.7 Purpose: Learn how to Achieve load balancing in STP Description: The load balancing of STP is actually the use of another blocking link in the loop to share the load in the network steps: Open the GNS to build the project with the following topology:650) this.width=650; "src=" Http://
The implementation analysis of STP in Linux Network Bridge
This article turns from: http://blog.sina.com.cn/s/blog_a3eacdb2010158hn.html
I. The framework structure of STPSTP sends the BPDU package, which has two types: Configuration and TCN (topology change notification);There are two kinds of processing for BPDU packages: Receive and send (nonsense),For the configuration type of the BPDU packet sent, it is done by the timer, parameter BPDU packet of
I have mentioned in the previous article that if an enterprise only uses one vswitch for networking, there will be a single point of failure. If the switch is broken, then several modules cannot work normally at this time, A client cannot access the server, connect to the internet, or access the printer. In other words, if a fault occurs, the entire network cannot work normally. Therefore, in a general switched network, we all need to perform redundancy on the switch, but introducing redundancy
STP protocol ParsingIntroduction: a switch is also known as a bridge. In a bridge LAN, a redundant path is usually established to enhance the reliability. The network segment is connected by a redundant bridge. However, because the bridge does not isolate broadcast, the bridge loop is fatal to a LAN.Description of the STP Protocol www.2cto.com STP-Spanning Tree P
1. BPDU Message FormatThe switches use BPDUs (Bridge Protocol data units) to Exchange STP (Spanning Tree Protocol) information, and the BPDU messages are divided into two scenarios (STP working at the data Link layer) that are two classes of configuration BPDUs and TCN BPDUs respectively.
BPDU Frame
Frame Header
Data (BPDU message)
Fcs
Configure BPDUs (con
Analysis and Summary of STP Spanning Tree ProtocolI. STP overview STP (Spanning Tree Protocol) is applicable to anti-loops between switches. The function is used to prevent loops. Basic principle: the network topology is determined by transmitting a special protocol packet (BPDU) between switches. Two types of BPDU are available: configuration BPDU and tc bpdu ).
STP spanning tree protocol that's it. A circular structure is changed into a tree structure. Logically blocks some ports to form a logical tree structure.--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Spanning Tree algorithm1. Select the root bridge2. Select the root port3. Select the specified
looks simpler because its logic is simple. However, in the actual environment, rip needs to adapt a lot to avoid loops and other problems, and the path convergence speed and Packet Volume need to be balanced.
Algorithm used: Ford-Fulkerson
STP is a vswitch-oriented protocol., Similar to OSPF, but much simpler (because L2 Networks are simpler), there are also root bridge, RootPorts and designated ports. At the beginning of the bridge, assume that
STP Definition
1. STP Spanning Tree Protocol) is a layer-2 link management protocol. Its main function is to provide redundant paths in Layer 2 links to ensure reliable and stable network operation on the basis of ensuring that there is no loop in the network.
2. The loop will cause infinite data loops in the loop, and the terminal site will receive duplicate information,VswitchObtain the MAC address of the
One, STP overviewSTP (Spanning tree Protocol, Spanning Tree Protocol) is a ring-proof application that is applied to the switch. function is used for anti-ring.Basic principle:By passing a special protocol message between the switches, the Bridge Protocol Data Unit (BPDU) is adopted to determine the topology of the network. There are two types of bpdus, one of which is configuration BPDUs (configuration BPDUs) and one TC BPDU (topology change BPDUs).T
Lab Requirements:The dual-core architecture combines three-layer switching technology with VTP, STP, and Ethernet channels to achieve high-speed network conversion, high availability, high reliability and redundant backup functions, mainly for the network of dual-core topologies.Experimental design:1. Configure VLANs on the switch to control broadcast traffic.2. Configure the Ethernetchannel between the 2 three-layer switches to achieve high-speed int
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.