"Copyright notice: Original translation articles, translation level is limited, errors are unavoidable, The Translator is not responsible for the consequences of errors or omissions in the article, please be careful to reprint them. Reproduced please retain this statement and source: blog.csdn.net/shallnet, download the English version of the book "In the most basic scenario, spanning Tree Protocol (STP) is a loop protection protocol that allows the b
Integrated wiring system with cutting-edge technology and intelligent design, with unparalleled superiority. The integrated cabling solution delivers a complete end-to-end solution that includes copper and fiber based solutions, high performance components in the design to achieve the most perfect match, and the choice of UTP, FTP, or STP cables to meet current and future requirements over five categories, Six or future seven types of copper technolog
It may take 30 seconds or more to connect a computer to a vswitch before the computer can communicate over the network. If you are waiting for a long time, 30 seconds of waiting will make you feel very long. Let's take a look at how to accelerate the port initialization process of the switch.Understanding the process of vswitch port InitializationWhen a device is connected to the port of a started switch, the switch port usually goes through four steps. Let's take a closer look.Spanning Tree Pro
funds from the higher departments, and we have to do our job most efficiently. Your task is to find a workable solution that has the least control unit. InputThe first line contains an integer n that represents the number of units in the organization. The next n rows are n bits per row. In the position of section J of the line I, if 1 means I unit Control J Unit, otherwise J unit control I unitOutputa total of one row, the first integer ans indicates the minimum number of control unitsThere see
To install a Linux operating system with virtualization functions (CentOS is used as an example here), we generally have two methods:
1. Install the virtualization package or configure the virtualization package on the PXE Server during the CD installation.2. Manually install virtualization components in a system without virtualization components installed
If the environment we build must use virtualization, or virtualization is one of the main purposes of building this environment, we will inst
reliability, security, manageability, and scalability. In order to achieve high reliability, We must redundant Key Device Links in the switching network. Redundancy is designed to solve single point of failure and ensure high network reliability. Generally, the convergence layer or the core layer is redundant, that is, the dual-star topology is used. The implementation of redundancy will bring about the problem of switching network loops. In order to solve the loop, we have to adopt
not active at this time,But as long as the related interface is opened, the span will become active.The monitoring port is preferably> = the bandwidth of the controlled port. Otherwise, packet loss may occur.
SPAN traffic -- span trafficUse a local span to monitor all network traffic, including multicast, Bridge Protocol Data Unit (BPDU), and CDP,VTP, DTP, STP, pagp, lacp packets. rspan cannot monitor layer-2 protocols.
Traffic types -- traffic typeT
of the performance of each link group. The analysis includes:
---- Unavailable duration of the signaling link group
---- Number of times a signaling link group fault occurs
---- Number of times a route group unavailable event occurs to one or more dpcs
---- The duration of the routing group to one or more dpcs is unavailable.
3.2.4 Statistical Analysis of the Performance of signaling points (STP/SP)
Statistical Analysis of the Performance of signalin
port of a vswitch is in the err-disabled status, the switch sends the log information for this operation to the Console port. You can also use show log to view system logs, such:% SPANTREE-SP-2-BLOCK_BPDUGUARD:Received BPDU on port gigabitethernet2/1 with BPDU guard enabled. Disabling port.
% PM-SP-4-ERR_DISABLE:BpduguardError DetectedOn gi2/1, putting gi2/1 in err-Disable state
% SPANTREE-2-CHNMISCFG: STP loop-channel 11/1-2 is disabled in VLAN 1
on each ring at a time, and all points on the ring except the root of the ring form a chain F0/F1 indicates that a point is not selected/not enforced when the maximum independent set in the DFS subtree G0/G1 represents a point not selected/does not make a mandatory requirement, But at the bottom of the chain where this point is forced is not selected when the maximum independent set transfer in a DFS subtree is similar to a tree DP#include Const intn=51000, r=1500000;Charbuf[r+4],*ptr=buf-1;int
_ #] view STP information of a VLAN2950 # access the vlan database (used before ISO12.1)2950 (vlan) # vlan _ # [name VLAN_name] Create a VLAN2950 (config) # vlan _ # access the VLAN database (used after ISO12.1)2950 (config-vlan) # name VLAN_name create VLAN2950 (config-if) # switchport mode access specifies that the connection is an access link connection.2950 (config-if) # switchport access vlan _ # specify VLAN as access link connection4000> (enab
transmission in the LAN, and complies with the IEEE 10Base-T standard. 5th twisted pair wires currently have the largest LAN market, with a maximum rate of 100 Mbps, in line with the IEEE 3u 100Base-TX standard.
The main difference between Category 5 and Category 5 is the application. Only two pairs of cables are used for transmission during use of Category 5 cables. Category 5 uses four pairs of full duplex transmission to meet Gigabit Ethernet applications. Category 5 has higher performance r
Cat-5e bandwidth is 100 MHz, cat-5e is 155 MHz, and cat-5e is 250 MHz. The single copper cores in category 5 and Category 5 are 24awg, and category 6 is 23awg. No isolation band exists in category 5 and Category 5 lines, and category 6 lines contain a word or cross isolation band. Cat5 is printed on cat5, cat5e is cat5e or 5E, and cat6 is cat6. Category 5 and Category 5 support MB of applications, Categ
I am going to have a Linux I/O training in the company in the near future. I will sort out the relevant materials and share them with you.
Position of various I/O monitoring tools in the Linux I/O Architecture
From Linux Performance and Tuning Guidelines.pdf1 system-level IO monitoring iostat
Iostat-xdm 1 # personal habits
Avgrq-sz = (RMB/s + wMB/s) * 2048/(r/s + w/s) #2048 is 1 M/512
2 process-level IO monitoring iotop and pidstat (only rhel6u Series)
#-U CPU usage
#-T take
------------------------------------Fa1/0/1 Forwarding 20.00% 0.00%3. for network loop problems that cannot be ruled out by default STP configuration, use the BPDUguard feature of STP to prevent broadcast storms. This loop is as follows:Switch ------ hub (portA --- portB)The Switch enables STP, and the hub is intentionally or unintentionally connected with a netw
When the SharePoint list template is exported, an. stp file is generated, and the language attributes contained in the file are consistent with the site language.If your import template's Web site is inconsistent with the language of the template, the template can be imported, but it cannot be used in the Create list.Open this file by 7zip to find a manifest.xml file.Open the Manifest.xml file, where you can see the If you want to modify the template'
An improper port connection between switches in the Ethernet may cause a network loop. If the related switch does not enable the STP function, this loop will lead to endless repeated packet forwarding, forming a broadcast storm, this causes network faults. We have encountered such a fault many times during the maintenance of the campus network, and we were impressed by the troubleshooting process.
Fault description
One day, we found a problem with a V
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.