Preview

Vtp Objectives

Good Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Vtp Objectives
Explain the role of redundancy in a converged network.
Summarize how STP works to eliminate Layer 2 loops in a converged network.
Explain how the STP algorithm uses three steps to converge on a loop-free topology.
Implement rapid PVST+ in a LAN to prevent loops between redundant switches.
Hierarchical design model addresses issues found in flat model networks. One of these issues is redundancy. Having multiple paths for data to travel the network allows for a single path to be disrupted without impacting the devices connectivity to the network. With multiple paths on a network between two devices a layer 2 loop can occur because Ethernet frames do not have ttl. A broadcast storm can occur with so many broadcasts frames are caught in a loop and are using up all available bandwidth. When this occurs the network becomes unavailable for data communications.
STP ensures that there is only one logical path between destinations on a network by blocking redundant paths. A port is blocked when network traffic cannot enter or leave that port. STA will designate a single switch as the root bridge and use that switch as a reference point for all path calculations. Each switch uses the STA to determine which port to block. STA determines which paths are to be left open by labeling distinct port roles. Elects the Root ports, designated ports and non-designated ports.
Rapid PVST+ adds vlan support to RSTP and is the preferred STP on a Cisco network. To turn this feature on use the following commands:
Switch#conf t
Switch(config-if)# spanning-tree mode rapid-pvst
Switch(config-if)#interface(#)
Switch(config-if)# spanning-tree link-type point-to-point

You May Also Find These Documents Helpful

  • Satisfactory Essays

    VLAN Trunking Protocol (VTP) will add speed and efficiency to the network while reducing overhead and building the strength of the network. Switches on the network must be configured in two ways for VTP to work properly. There must be at least one VTP Server and VTP clients. Changes to the VTP must be made in VTP Server mode and will be communicated to all other VTP client switches. Also, the network needs to be physically laid out in a star topology as a backup to the VLAN to ensure that the network continues to operate during a…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This mesh type application of switches provides multiple paths for network traffic to flow. What this means is that if one link in the traffic flow or a switch goes down, traffic can continue to flow using an alternate path. This type of mesh interlinked switches uses Spanning Tree Protocol (STP) to detect and prevent loops. A loop occurs when there are multiple active paths to the same switch and this causes the system to crash.…

    • 681 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt 1310 Unit 3 Analysis

    • 1188 Words
    • 5 Pages

    STP most often refers to the 150 ohm IBM Type 1, 2, 6, 8, and 9 cables used with Token Ring networks. Unlike UTP cabling, the pairs in STP cable have an individual shield, and the individual shielded cables are wrapped in an overall shield. The primary advantages of STP cable are that it has less attenuation at higher frequencies and is less susceptible to EMI. Since the advent of standards-based structured wiring, STP cable is rarely used in the United States. (Oliviero & Woodward,…

    • 1188 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    There are many different types of network topologies. They each have their different strong points. They also have their own disadvantages. There are 3 main network topologies used today, hierarchical star, bus and ring. In the following paragraphs I will go into each of these topologies.…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Scalability: The network design is scalable so that more network cable equipment can be added if needed and as funding becomes available without having to redo the installed network…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    IT299 Unit 8 Project

    • 2529 Words
    • 7 Pages

    Network topology refers to the physical layout of a network. The chosen layout directly impacts how each node on a given network communicates with another. There are multiple types of topologies that can be used based on the need of the project. The ultimate goal is to provide multiple lines of data communication which will increase fault tolerance on the network and reduce or eliminate a complete disruption of service.…

    • 2529 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    ITN Final Chp 7 Through 12

    • 7250 Words
    • 75 Pages

    As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.…

    • 7250 Words
    • 75 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    Also, applying the original function that is preventing the loop, it is used as a means to secure redundancy of network to automatically switch the path in case of a network failure. There is various kind of spanning tree, including STP, RSTP, PVST, and MSTP. In this section, we will take a look at an implementation of the most basic of STP. Spanning Tree Protocol (STP: IEEE 802.1D) handles a network as a logical tree and by setting all ports for each switch (sometimes called a bridge in this section) to transfer frame or not it suppresses occurrence of broadcast streams packets in a network having a loop structure, figure…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    There are a few requirements when building a network in order for the network to operate. There is the hardware components with the end nodes (i.e. the sending and receiving computers). The intermediate nodes that perform the data exchange (i.e. , switches, and hubs). And the telecommunication links (i.e. wired &…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    The layers are all about how the application handles data, not the network, which is what the model demonstrates. They could be combined or separated.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    10. What is the difference between STP and UTP cable? What might an application be for each type?…

    • 896 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    Because of this they are looking into a new found technology which is virtualization. Virtualization is not a new concept. It has been around since the main frame computer systems. What is virtualization? It is defined as “the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources” (Rouse, Virtualization, 2010). Virtualization falls into three main categories: Operating System, Storage, and Applications. Because of this virtualization can be applied to almost any part of an IT infrastructure. According to Rackspace after conducting a survey found that 57 percent of companies use virtualization with their internal infrastructures (Connor, 2007). Along with that Gartner.com states that “Virtualization will continue as the highest-impact issue challenging infrastructure and operations through 2015, changing how you manage, how and what you buy, how you deploy, how you plan and how you charge” (Press Release, 2010). In this paper we will discuss server…

    • 2369 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Lab 7

    • 1276 Words
    • 9 Pages

    Now it is time for you to put your networking knowledge to work. Read through the Network Design:…

    • 1276 Words
    • 9 Pages
    Powerful Essays

Related Topics