Configure spanning tree- ccna, Computer Networking

Assignment Help:

Configure Spanning Tree

Step 1: Examine the default configuration of 802.1D STP.

On each switch, display the spanning tree table with the show spanning-tree command. Root selection

varies depending on the BID of each switch in your lab resulting in varying outputs.

 

S1#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

 

             This bridge is the root

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     0019.068d.6980

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Desg FWD 19        128.3    P2p 

Fa0/2            Desg FWD 19        128.4    P2p 

Fa0/3            Desg FWD 19        128.5    P2p

S2#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

             Cost        19

             Port        1 (FastEthernet0/1)

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     001b.0c68.2080

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Root FWD 19        128.1    P2p 

Fa0/2            Desg FWD 19        128.2    P2p

Fa0/6            Desg FWD 19        128.6    P2p 

Fa0/11           Desg FWD 19        128.11   P2p

Fa0/18           Desg FWD 19        128.18   P2p 

S3#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

             Cost        19

             Port        1 (FastEthernet0/1)

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     001b.5303.1700

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Root FWD 19        128.1    P2p 

Fa0/2            Altn BLK 19        128.2    P2p

 


Related Discussions:- Configure spanning tree- ccna

What are super servers, These are fully-loaded machines which consists of m...

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.

How receiver detects error, How receiver detects error The frame is 100...

How receiver detects error The frame is 10011101. The generator is 1001. The message after appending the three zeros is 10011101000. The reminder on dividing 10011101000 by 100

Explain ethernet frame, Explain Ethernet Frame. The heart of Ethernet s...

Explain Ethernet Frame. The heart of Ethernet system is the Ethernet Frame, which is used to deliver information among the computers. The frame having of a set of bits organize

What is stateful multi-layer inspection, What is Stateful Multi-Layer Inspe...

What is Stateful Multi-Layer Inspection (SMLI) They are considered as the third generation of firewall technology and usually combine the facilities of the above two. They are

Network layer of the osi responsible for, What is the Network Layer of the ...

What is the Network Layer of the OSI responsible for? Ans) The Network Layer routes data from single node to another sends data from the source network to the destination networ

Features of parallel virtual machine pvm, Features 1. Simple to install...

Features 1. Simple to install; 2. Simple to configure; 3. Multiple applications from one user can implement; 4. Multiple users can each use PVM concurrently; 5. C, C++, and

Recognize the definition of demarcation, Demarcation is the point in which ...

Demarcation is the point in which responsibility changes hands.

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Power supply and cpu bus, CPU bus It is connect with various component...

CPU bus It is connect with various components of the system and  transformation of data between components.   Power Supply It is separate  external part of cisco rou

Comparison of distance-vector and link-state algorithm, DISTANCE-VECTOR ROU...

DISTANCE-VECTOR ROUTING: It is easy to implement. Packet switch modifies its own routing table first. It is used in RIP. LINK-STATE ALGORITHM: It is ve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd