->

Spanning Tree Protocol (Stp) Zero-To-Hero

Published 3/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 4.98 GB | Duration: 12h 33m


 

STP / RSTP / MSTP Concepts and Configuration

What you'll learn

Traditional Spanning Tree Protocol (STP) concepts , configuration and verification

Traditional STP ( IEEE 802.1d) Advanced Features

Protecting the Spanning Tree Protocol (STP)

Rapid Spanning Tree Protocol (RSTP) concepts , configuration and verification

Multiple Spanning Tree Protocol (MSTP) concepts , configuration and verification

Requirements

You need to know about Ethernet Switching Fundamentals . You can implement the scenarios in Cisco Packet Tracer and EVE-NG.

Description

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails.As the name suggests, STP creates a spanning tree that characterizes the relationship of nodes within a network of connected layer-2 bridges, and disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. STP is based on an algorithm that was invented by Radia Perlman while she was working for Digital Equipment Corporation.In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.STP was originally standardized as IEEE 802.1D but the functionality of spanning tree (802.1D), rapid spanning tree (802.1w), and multiple spanning tree (802.1s) has since been incorporated into IEEE 802.1Q-2014.The need for the Spanning Tree Protocol (STP) arose because switches in local area networks (LANs) are often interconnected using redundant links to improve resilience should one connection fail. However, this connection configuration creates a switching loop resulting in broadcast radiations and MAC table instability If redundant links are used to connect switches, then switching loops need to be avoided.To avoid the problems associated with redundant links in a switched LAN, STP is implemented on switches to monitor the network topology. Every link between switches, and in particular redundant links, are catalogued. The spanning-tree algorithm then blocks forwarding on redundant links by setting up one preferred link between switches in the LAN. This preferred link is used for all Ethernet frames unless it fails, in which case a non-preferred redundant link is enabled. When implemented in a network, STP designates one layer-2 switch as root bridge. All switches then select their best connection towards the root bridge for forwarding and block other redundant links. All switches constantly communicate with their neighbors in the LAN using bridge protocol data units (BPDUs).

Overview

Section 1: Traditional Spanning Tree Protocol (STP) Concept,Configuration and Verification

Lecture 1 Spanning-Tree Protocol[A]

Lecture 2 Spanning-Tree Protocol

Lecture 3 Spanning-Tree Protocol[C]

Lecture 4 Spanning-Tree Protocol[D]

Lecture 5 Spanning-Tree Protocol[E]

Lecture 6 Advanced STP Tuning

Section 2: Rapid Spanning-Tree Protocol (RSTP) Concept,Configuration and Verification

Lecture 7 Rapid Spanning-Tree Protocol (RSTP) Concept,Configuration and Verification

Section 3: Multiple Spanning Tree Protocol[MST] Concept,Configuration and Verification

Lecture 8 Multiple Spanning Tree Protocol[MST] Concept,Configuration and Verification

Section 4: Protecting the Spanning Tree Protocol (STP)

Lecture 9 Protecting the Spanning Tree Protocol (STP)

Enterprise Network Eeer , Service Provider Eeers , Datacenter Network Eeer

HomePage:

https://www.udemy.com/course/spanning-tree-protocol-stp-zero-to-hero/

 

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss