第2章 交换机应用.ppt

第2章 交换机应用.ppt

Slide 1 of 3 Purpose: Emphasize: Broadcast frames are flooded. Slide 2 of 3 Purpose: Emphasize: Slide 3 of 3 Purpose: Emphasize: Layer 2 has no TTL mechanism to stop looping frames. Slide 1 of 2 Purpose: Emphasize: This slide assumes Router Y Mac address has not been learned by Switch A and Switch B yet so the unknown unicast frame to Router Y will be flooded. Slide 2 of 2 Purpose: Emphasize: Slide 1 of 2 Purpose: Emphasize: This slide assumes Router Y Mac address has not been learned by Switch A and Switch B yet so the unknown unicast frame to Router Y will be flooded. Slide 2 of 2 Purpose: Emphasize: Slide 1 of 1 Purpose: Emphasize: Slide 1 of 1 Purpose: Emphasize: A looped topology is often desired to provide redundancy, but looped traffic is undesirable. The Spanning Tree protocol was originally designed for bridges. Today, it is also applied to LAN switches and routers operating as a bridge. STP ensures all bridged segments are reachable but any points where loops occur will be blocked. Slide 1 of 1 Purpose: Emphasize: The three general rules when dealing with STP: 1. One root bridge per network. The root is the bridge with the lowest Bridge ID. All the ports on the root bridge are designated ports (forwarding). 2. For every non root bridge, there is a root port (forwarding). The root port is the port with the lowest accumulated path cost to the root bridge. 3. For every segment, there is only one designated port. The designated port forwards traffic for the segment. The designated port has the lowest accumulated path cost to the root bridge. Slide 1 of 1 Purpose: Emphasize: By default, the switch with the lowest MAC address will be the Root bridge. Note: The Catalyst switches support an instance of Spanning tree per vlan. Each vlan will use an unique mac address for Spanning tree purpose. On the Cat 1900, the address it uses for Spanning tree are the Mac address on the various ports. VLAN is discussed in the next chapte

文档评论(0)

1亿VIP精品文档

相关文档