Published 3/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 4.98 GB | Duration: 12h 33m
STP / RSTP / MSTP Concepts and Configuration What you'll learn Traditional Spanning Tree Protocol (STP) concepts , configuration and verification Traditional STP ( IEEE 802.1d) Advanced Features Protecting the Spanning Tree Protocol (STP) Rapid Spanning Tree Protocol (RSTP) concepts , configuration and verification Multiple Spanning Tree Protocol (MSTP) concepts , configuration and verification Requirements You need to know about Ethernet Switching Fundamentals . You can implement the scenarios in Cisco Packet Tracer and EVE-NG. Description The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails.As the name suggests, STP creates a spanning tree that characterizes the relationship of nodes within a network of connected layer-2 bridges, and disables those links that are not part of the spanning tree, leaving a single active path between any two network nodes. STP is based on an algorithm that was invented by Radia Perlman while she was working for Digital Equipment Corporation.In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.STP was originally standardized as IEEE 802.1D but the functionality of spanning tree (802.1D), rapid spanning tree (802.1w), and multiple spanning tree (802.1s) has since been incorporated into IEEE 802.1Q-2014.The need for the Spanning Tree Protocol (STP) arose because switches in local area networks (LANs) are often interconnected using redundant links to improve resilience should one connection fail. However, this connection configuration creates a switching loop resulting in broadcast radiations and MAC table instability If redundant links are used to connect switches, then switching loops need to be avoided.To avoid the problems associated with redundant links in a switched LAN, STP is implemented on switches to monitor the network topology. Every link between switches, and in particular redundant links, are catalogued. The spanning-tree algorithm then blocks forwarding on redundant links by setting up one preferred link between switches in the LAN. This preferred link is used for all Ethernet frames unless it fails, in which case a non-preferred redundant link is enabled. When implemented in a network, STP designates one layer-2 switch as root bridge. All switches then select their best connection towards the root bridge for forwarding and block other redundant links. All switches constantly communicate with their neighbors in the LAN using bridge protocol data units (BPDUs). Overview Section 1: Traditional Spanning Tree Protocol (STP) Concept,Configuration and Verification Lecture 1 Spanning-Tree Protocol[A] Lecture 2 Spanning-Tree Protocol Lecture 3 Spanning-Tree Protocol[C] Lecture 4 Spanning-Tree Protocol[D] Lecture 5 Spanning-Tree Protocol[E] Lecture 6 Advanced STP Tuning Section 2: Rapid Spanning-Tree Protocol (RSTP) Concept,Configuration and Verification Lecture 7 Rapid Spanning-Tree Protocol (RSTP) Concept,Configuration and Verification Section 3: Multiple Spanning Tree Protocol[MST] Concept,Configuration and Verification Lecture 8 Multiple Spanning Tree Protocol[MST] Concept,Configuration and Verification Section 4: Protecting the Spanning Tree Protocol (STP) Lecture 9 Protecting the Spanning Tree Protocol (STP) Enterprise Network Eeer , Service Provider Eeers , Datacenter Network Eeer HomePage: gfxtra__SpanningTr.part1.rar.html gfxtra__SpanningTr.part2.rar.html gfxtra__SpanningTr.part3.rar.html
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.