Configure spanning tree- ccna, Computer Networking

Assignment Help:

Configure Spanning Tree

Step 1: Examine the default configuration of 802.1D STP.

On each switch, display the spanning tree table with the show spanning-tree command. Root selection

varies depending on the BID of each switch in your lab resulting in varying outputs.

 

S1#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

 

             This bridge is the root

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     0019.068d.6980

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Desg FWD 19        128.3    P2p 

Fa0/2            Desg FWD 19        128.4    P2p 

Fa0/3            Desg FWD 19        128.5    P2p

S2#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

             Cost        19

             Port        1 (FastEthernet0/1)

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     001b.0c68.2080

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Root FWD 19        128.1    P2p 

Fa0/2            Desg FWD 19        128.2    P2p

Fa0/6            Desg FWD 19        128.6    P2p 

Fa0/11           Desg FWD 19        128.11   P2p

Fa0/18           Desg FWD 19        128.18   P2p 

S3#show spanning-tree

VLAN0001

  Spanning tree enabled protocol ieee

  Root ID    Priority    32769

             Address     0019.068d.6980

             Cost        19

             Port        1 (FastEthernet0/1)

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

 

  Bridge ID  Priority    32769  (priority 32768 sys-id-ext 1)

             Address     001b.5303.1700

             Hello Time   2 sec  Max Age 20 sec  Forward Delay 15 sec

             Aging Time 300

 

 

Interface        Role Sts Cost      Prio.Nbr Type

---------------- ---- --- --------- -------- --------------------------------

Fa0/1            Root FWD 19        128.1    P2p 

Fa0/2            Altn BLK 19        128.2    P2p

 


Related Discussions:- Configure spanning tree- ccna

Explain pipeline processing, Pipeline Processing Pipelining is a scheme...

Pipeline Processing Pipelining is a scheme to realize, overlapped parallelism in the proposed way out of a problem on a digital computer in an economical way. To understand the

Describe the method of one way redistribution and mutual, Define  the conce...

Define  the concept of one way redistribution and mutual

What is fcs, FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) alg...

FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) algorithm runs in switch that known as FCS (Frame Check Sequence)

Define co-axial cable, Define Co-axial cable. A solid central conducto...

Define Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is called as co-axial cable. The shie

Define the term - proxy servers, Define the term - Proxy servers These ...

Define the term - Proxy servers These types of firewalls have been further classified into two types: application level gateways and circuit level gateways. The application

Critical path method, You are the Senior Project Manager in a software comp...

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have stu

Data sharing - fundamentals of networks, Data Sharing One of the most ...

Data Sharing One of the most important uses of networking is to allow the sharing of data. Before networking was common an accounting employee who wanted to prepare a report f

Error detection and correction, Error detection and correction The digi...

Error detection and correction The digital traffic stream of second generation systems also lends itself to the use of error detection and correction methods. The result can be

Message passing in pvm, Message Passing The PVM communication model giv...

Message Passing The PVM communication model gives asynchronous blocking receive, asynchronous blocking send and nonblocking receive functions. In our methodology, a blocking se

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd