VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

Size: px
Start display at page:

Download "VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology"

Transcription

1 VLN and bridges dvanced Computer Networks Interconnection Layer : bridges and VLNs Contents Transparent bridges Spanning Tree Protocol (STP) apid Spanning Tree Protocol (STP) VLNs Prof. ndrzej uda duda@imag.fr Interconnection structure utonomous systems router autonomous system border router internal router interconnection layer subnet switch (bridge) interconnection layer switch (bridge) subnetwork subnet subnetwork VLN interconnection layer VLN host host Internet Interconnection of S autonomous system NP, GI, IP subnetworks order routers interconnect S NP or GI, or IP exchange of traffic - peering oute construction based on the path through a series of S based on administrative policies routing tables: aggregation of entries works if no loops and at least one route - routing protocols (EGP - External outing Protocols) border router 6

2 VLN and bridges Transparent ridging (T) ridges are intermediate systems that forward MC frames to destinations based on MC addresses Interconnect systems beyond one LN segment, keeping main characteristics of LN without additional addresses MC addresses used to identify end systems End systems ignore that there are transparent bridges bridge is transparent MC frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous listens to all frames and retransmits if needed Transparent ridging (T) dministrator creates the forwarding table T operation connectionless forwarding, unstructured addresses Forwarding Table Forwarding Table est Port MC Nb port ridge port addr C port C 7 8 L: Learning ridge epeater port ridge port port C Forwarding Table est Port MC Nb addr Forwarding Table est Port MC Nb addr C ridge builds forwarding table by reading all traffic bridges are plug and play: no address configuration (no IP address needed) table built by learning from S field in MC frame a table entry has limited life (MaxLife, minutes) Flooding if destination address unknown or group address 9 Several Learning ridges Can the learning bridge be extended to a network of bridges? How does see the network? port port port port C Z 0 Loops What happens when sends a frame to? assume empty forwarding table port port Loop-Free topology Learning bridge works well on Loop-Free topology only idirectional graph: node = bridge, edge = connection through LN Loop free - bidirectional graph = bidirectional tree examples: line, star On a tree, there is only one path from to port port port port C Z

3 VLN and bridges Spanning Tree ridges ased on learning bridge: table driven forwarding, flooding if unknown or multicast, learning Forces topology to a tree Spanning Tree algorithm run by all bridges Some ports blocked to prevent loops ports that are allowed to forward frames (in either way) are said to be in the forwarding state or called forwarding ports Interconnection of bridges several parallel paths for reliability Spanning Tree algorithm chooses one path at a given instant Forwarding Method Individual PU forwarding Copy all frames on all forwarding ports Frame received on port i -> /* port i is forwarding */ If is unicast, is in forwarding table with port j and j is a forwarding port then copy to port j else flood all forwarding ports i Update forwarding table with (i, S) Maintain spanning tree and port states Control method Learn addresses on reading traffic T Spanning Tree Specification Spanning Tree Specification Set of bridges with - bridge Id and prio - bridge ports on LNs - LN s T Spanning Tree ridges viewed as a bidirectional graph (nodes = bridges) Selection of the root bridge lowest priority with lowest identifier One bridge selected as root On every bridge - one root port - designated ports (other ports are blocked) Spanning Tree = shortest path tree from root to all bridges edge s set by management, high = less traffic based on distributed ellman-ford (distance vector) _to_root = best_announced_ + local_ oot port on one bridge = port towards root, shortest path in case of equal s, lowest id chosen esignated bridge one per LN it has the shortest path to root via root port esignated ports all ports for which the bridge is designated connect LNs to the spanning tree Ports other than root or designated are blocked Configuration messages rootid._to_root.senderid.port (..9.) simplified: rootid._to_root.senderid 6 Spanning Tree example Spanning Tree example est root: est : + =, on port or (=) oot port:, because < New message:..9 Ports and are designated:..9 is better than and.9. Port and are blocked:..9 is not better than.. nor Message..9 sent periodically on ports and Ports,, participate in forwarding (they are in the Spanning Tree) 8

4 VLN and bridges Spanning Tree example Spanning Tree example STP - Spanning Tree protocol STP (IEEE 80.d) IEEE 80. istributed in all bridges ridges exchange messages with neighbours in order to both elect a root determine shortest path tree to root root port = port towards root on shortest path tree designated ports = connect LNs to the spanning tree designated bridge = one per LN, has shortest path to root via root port Each bridge has a ridge Identifier number, based on MC address + configurable offset ridge with smallest ridge Identifier is the root Each link has a Link it ate Cost Mb/s 0 0 Mb/s 00 6 Mb/s 6 Mb/s 9 00 Mb/s 9 Mb/s 6 Mb/s 6 Gb/s 0 Gb/s ridge PUs Control method uses control frames called ridge PUs (PUs) 80. encapsulation, LLC frame with SP = x MC = all bridges (multicast) 0 80 C PUs are not forwarded by bridges unlike all other frames PUs are sent by one bridge to all bridges on the same LN segment reminder: a data frame is never sent to bridge by end system Configuration PU contains root Id to root (from sender of config PU) id of sender port number (omitted in the examples) Initialization of Spanning Tree ridge initially assumes self as a root ridge computes own new config PU based on received information determine best root so far distance to root with ellman-ford distance from me to root = min [(me, neighbor) + (neighbor, root)] On every port, ridge transmits config PU until it receives a better config PU on that port better = closer to root (lower or lower Id) On every port, bridge maintains copy of best config PU sent or received

5 VLN and bridges asic ST Procedure Complex example config PU received on any port or port enabled -> = compute new root; compute new to root; /* ellman Ford */ build new_config_pu; for all ports i do if new_config_pu better than stored_config[i] then store and send on port i; end = T = Z compute root port /* smaller distance to root */ designated ports = ports where config PU was sent blocked ports = other ports r.c.s better than r.c.s iff (r<r ) or (r=r and c<c ) or (r=r and c=c and s<s ) = = 9 99 = 6 Initialization of Spanning Tree ridge 90 prepares config PU and sends on all ports; 90 configuration tables: < , > < > oot Port : esignated Ports :, locked Ports : message received on port : <.0. oot Port : esignated Ports : locked Ports : message format: rootid._to_root.senderid 7 Comments When receiving a message we compare the (with the local included), but we store the message received (without the ) On receiving.0. on port :.. < ? yes -> becomes root new config msg = < ? yes -> becomes designated..90 < ? yes -> becomes designated On receiving..99 on port :..99 <..? yes -> becomes root new config msg = <..90? yes -> becomes designated..90 <.0.? no -> becomes blocked 8 Constructed ST = = 8 = T Z 8 90 = 99 = 9 = Forwarding Tables: : :Z :T 8 :ZT root port designated port 8 :ZT 90 :ZT : blocked port 9 :ZT : 99 : :ZT 9 STP Topology Management Topology change can be local - a configuration msg changes the state of a port (one port changes into the Forwarding or locking state) global - topology update mechanism via root etection configuration message is too old (the path to the root is no longer available) receive a new better configuration When topology change detected inform root restart spanning tree computation purge the forwarding table (force bridges to use a shorter timeout interval) 0

6 VLN and bridges Synchronization with Forwarding Topology changes cause loops or loss of connectivity during reconfiguration, topology is not yet (in general) loop free even transient loops should be avoided Solution: Forwarding state is not immediately operational pre-forwarding states: Listening (accept config msgs, no forwarding): wait for stabilization of ST (Forwardelay, sec) Learning (learn MC addresses, no forwarding): wait for addresses to be learnt (Forwardelay, sec) ctions State Forward ST Learn Forwarding Table entry timers MaxLife = duration of an entry in the forwarding table Two timer values are used long timer (mn): normal case short timer = Forwardelay ( s): after spanning tree updates Timer switching mechanism ridge detects change in ST -> MaxLife = Forwardelay locking Listening Learning Forwarding Configuration monitoring root sends a configuration message every HelloTime ( s) message received with ge = 0, retransmitted with ge = 0 if not received, retransmitted with ge > 0 if ge = Maxge (0 s), delete the stored configuration and restarts basic ST procedure oot sends config PUs every HelloTime; ridge receives config PU on root port i -> eset timer ge on stored_config[i] for all designated ports j sends own config PU resets timer ge on stored_config[j] Topology change When one bridge detects a topology change bridge sends topology update PU towards root and enters Listening state (upstream bridges repeat PU up to root) root forwards new config PU with topology change flag set during Forwardelay ( s) + Maxge (0 s) causes all bridges to use the short timeout value for the forwarding table until PU from root received with topology change flag cleared ridge timeouts (Maxge) stored_config[j]-> delete stored_config[j]; performs basic ST procedure; Timers Timers used in topology management HelloTime ( s): time interval between Config PUs sent by the oot ridge. Forwardelay ( s): time interval that a bridge port spends in both the Listening and Learning states Maxge (0 s): time interval that a bridge stores a PU before discarding it Time to update detect and rebuild: s = 0 s + s Time to change from blocking to forwarding state detect, rebuild, and learn addresses: 0 s = 0 s + s + s Example New link added to bridge Topology update sent to root Topology update sent by root on ST for Maxge + Forwardelay ll bridges recompute ST + set forwarding tables in learning state Source: CISCO STP White Paper 6 6

7 VLN and bridges Example ridge newly connected to root. What happens?. and root run ST procedure on new ports.. This triggers new PUs sent to and C. computes port p as new root. p at is set to listening state for s. p at is set to learning state for s Source: CISCO STP White Paper topology change is fast (in this case), but forwarding is not enabled immediately 7 8 Example 99 powered off; stored config at 90:.0. timeout..99 [], []..90 < Spanning Tree after failure?.0., > oot Port : esignated Ports : locked Ports : Comments fter timeout:.. is the best configuration -> becomes root new config msg =..90 and becomes designated On receiving..8 on port :.6.99 <..? no -> stays root new config msg =..90 stays designated..90 <..8? no -> becomes blocked 9 0 ST after failure STP - apid ST protocol = 8 = T 8 = = 9 90 U = 99 = Z IEEE 80.W Evolution of STP Goal: fast reconfiguration Improvement of handling topology changes and synchronization with packet forwarding avoids use of timers as much as possible Main improvements are fast reconfiguration: use of alternate paths to root or backup path to a LN fast transition to forwarding state with negotiation protocol instead of relying on timers fast flushing of forwarding tables after topology changes 7

8 VLN and bridges Port oles in STP port role is one of: root, designated, alternate, backup, blocked root port = port towards root (same as STP) designated port = connects LN to the spanning tree (same as STP) Port that is not root nor designated is alternate: connects the bridge to root after topology update (alternate path to root) is backup: connects LN to the spanning tree after topology update (alternate path to root for the LN) is blocked: not in the spanning tree nother example of STP L L9 6 L L L L0 L L8 L L L7 Constructed ST ST constructed by STP L L9 6 L L L0 L L L9 U 6 L L L0 L L L L8 L7 L L L L8 L7 U L - root - root ports, - designated ports, - blocked ports - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports 6 L fails L fails L L9 U 6 L L L L0 L L L9 U 6 L L L L0 L L L8 L7 U L L L8 L7 U L - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports On port on L becomes and state estruction port on L becomes and state Forwarding 7 8 8

9 VLN and bridges fails fails L L9 U 6 L L L L0 L L8 L7 U L L L L9 U 6 L L L L L0 L L8 L7 L U - root - root ports, - designated ports, - blocked ports - alternative ports, U - backup ports On port on becomes U and state estruction port on L becomes and state Forwarding 9 0 STP - apid ST protocol If topology change same reconstruction protocol as STP topology change notification flooded accross ST apid recovery Proposal/greement sequence between bridges that change state of a port: immediate transition to Forwarding state link failure detection by MC layer change to and to U (order of 0 ms) but similar delay to STP, if topology update VLN - Virtual LN Keep the advantages of Layer interconnection auto-configuration (addresses, topology - Spanning Tree) performance of switching Enhance with functionalities of Layer extensibility spanning large distances ridge/switch traffic filtering Limit broadcast domains Security separate subnetworks C E VLN VLN Virtual LNs VLNs No traffic between different VLNs VLNs build on bridges or switches trunk ridge/switch ridge/switch C E Z U VLN VLN VLN VLN T How to define which port belongs to a VLN? per port simple, secure, not flexible for moving hosts (one host per port) per MC address several hosts per port, flexible for moving hosts, not secure, difficult to manage, problems with protocols Layer (should be coupled with dynamic address negotiation - HCP) per Layer protocol allows to limit frame broadcast (VLN: IP, VLN: IP) per Layer address one VLN per IP subnetwork flexible for moving hosts less efficient (requires inspecting packets) per IP Multicast group hosts that join an IP multicast group can be seen as members of the same virtual LN 9

10 VLN and bridges VLNs How to extend VLN to several bridges/switches? needs frame identification - tagging Frame tagging explicit tagging add VLN identifier to MC frames implicit tagging VLN Id deduced from port number, MC address, layer protocol, layer address, IP Multicast group implicit tagging makes use of filtering database mapping between VLN Id and the appropriate field (e.g. layer address) Frame tagging VLN identifier in frames usually done by the first switch/bridge host is not aware of tagging Standards CISCO: ISL (Inter-Switch Link) IEEE 80.Q/80.P 6 ISL (Inter-Switch Link) 80.Q VLN trunk VLN trunk frame ISL frame CC S T data S tag T data 80. frame 80./P frame CISCO: ISL (Inter-Switch Link) proprietary solution: encapsulates a frame in an ISL frame (6 bytes header, bytes CC) incompatible with other vendors - accepts increased maximal length of 80. frame Frame encapsulation of IEEE 80.P extension for assigning frame priority and VLN tag bytes of TPI (Tag Protocol Information): x800 bytes of TCI (Tag Control Information): priority ( bits), VLN Id ( bits) length may exceed 00 bytes (a standard project extends the maximal size of the data to bytes) Q ridge/switch keeps track of VLN members based on dynamic filtering entries ynamic egistration: specify ports registered for a specific VLN added and deleted using GP VLN egistration Protocol (GVP), GP is the Generic ttribute egistration Protocol Group egistration: indicate frames to a group MC address added and deleted using Group Multicast egistration Protocol (GMP) multicasts sent on a single VLN without affecting other VLNs GP efines method to declare attributes to other GP participants frame type to use (GPU) rules for registering/deleting attributes How does it work? bridge wants to declare an attribute send a declaration other bridges propagate the declaration

11 VLN and bridges GP GP attribute to next bridge N O P attribute ttribute propagation ridge/switch C attribute stored at bridge multiple attributes are filtered out - only one declaration is propagated E ttributes on VLN memebership are sent over the spanning tree Frames are forwarded according to this information blocked : VLN : VLN : VLN M C: VLN : VLN C: VLN : VLN C propagation follows the spanning tree of bridges 6 6 Conclusion Ethernet switches/bridges dominate 00 Mb/s switches for hosts, Gb/s in the backbone Complex interconnection parallel paths may exist for reliability SPT or STP guarantees loop-free interconnection VLNs help to structure the interconnection separate broadcast domains limited scalability Products Switch/outer - integrated ports: Layer and Layer administrator chooses the right level for each port 6

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Interconnection Layer 2: bridges and VLANs Prof. Andrzej uda duda@imag.fr http://duda.imag.fr 1 Contents Transparent bridges Spanning Tree Protocol (STP) Rapid Spanning Tree

More information

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub Contents ÉCOLE POLYTECHNIQUE FÉÉRLE E LUSNNE Bridging Jean-Yves Le Boudec Fall 007!.Transparent bridging!. Spanning Tree Protocol (STP) "#specification $#an exotic version of Bellman-Ford %#the STP protocol,

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer s Principles LN - thernet Prof. ndrzej Duda duda@imag.fr Interconnection structure - layer subnetwork interconnection layer interconnection layer subnet subnet router switch (bridge) VLN http://duda.imag.fr

More information

Configuring STP and RSTP

Configuring STP and RSTP 7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Configuring Rapid PVST+ Using NX-OS

Configuring Rapid PVST+ Using NX-OS Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

Configuring Rapid PVST+

Configuring Rapid PVST+ This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page

More information

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC

DD2490 p Layer 2 networking. Olof Hagsand KTH CSC DD2490 p4 2010 Layer 2 networking Olof Hagsand KTH CSC 1 Literature Radia Pearlman Interconnections - Bridges, Routers, Switches and Internetworking Protocols, Addison-Wesley. Section 3: Transparent bridges

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Implementing Spanning Tree Protocol

Implementing Spanning Tree Protocol Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.

More information

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking

Maintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.

The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard. CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda

Why Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media

More information

Implement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008

Implement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 Implement VTP LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my PowerPoint

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity.

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25

More information

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)

3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist

More information

Spanning Tree Protocol(STP)

Spanning Tree Protocol(STP) Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might

More information

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Understanding Issues Related to Inter VLAN Bridging

Understanding Issues Related to Inter VLAN Bridging Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN

More information

RSTP Configuration. Page 1 of 26

RSTP Configuration. Page 1 of 26 RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol

More information

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38

62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38 Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How

More information

Loop Cutting in the Original and Rapid Spanning Tree Algorithms

Loop Cutting in the Original and Rapid Spanning Tree Algorithms Loop utting in the Original and apid Spanning Tree lgorithms Introduction Mick Seaman This note compares the different strategies for preventing temporary loops in the original (STP) and rapid reconfiguration

More information

Guide des Configurations du switch HYC5310-C2

Guide des Configurations du switch HYC5310-C2 Guide des Configurations du switch HYC5310-C2 200Mbps x 4 liaisons aggrégées = 800Mbps Link A 200Mbps 192.168.1.242 192.168.1.243 192.168.1. 237 192.168.1. 238 Link B 200Mbps 192.168.1.244 192.168.1.245

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA

2D1490 p Bridging, spanning tree and related issues. Olof Hagsand KTHNOC/NADA D490 p4 007 Bridging, spanning tree and related issues Olof Hagsand KTHNOC/NADA Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:

More information

Configuring Spanning Tree Protocol

Configuring Spanning Tree Protocol CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in

More information

Packet Switching on L2 (LAN Level)

Packet Switching on L2 (LAN Level) Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

DD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC

DD2490 p Bridging, spanning tree and related issues. Olof Hagsand KTH/CSC DD490 p4 009 Bridging, spanning tree and related issues Olof Hagsand KTH/CSC Literature Radia Pearlman Interconnections Section 3 (Handouts) Building a network: routing or bridging? Scaling differences:

More information

Configuring PIM. Information About PIM. Send document comments to CHAPTER

Configuring PIM. Information About PIM. Send document comments to CHAPTER CHAPTER 3 This chapter describes how to configure the Protocol Independent Multicast (PIM) features on Cisco NX-OS switches in your IPv4 networks. This chapter includes the following sections: Information

More information

Bridging Transmitting Non-IP Traffic or Merging Two Networks

Bridging Transmitting Non-IP Traffic or Merging Two Networks 10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................

More information

Advanced Computer Networks

Advanced Computer Networks istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

Table of Contents 1 MSTP Configuration 1-1

Table of Contents 1 MSTP Configuration 1-1 Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction

More information

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel? Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning

More information

Spanning-Tree Protocol

Spanning-Tree Protocol Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and

More information

Exam Questions

Exam Questions Exam Questions 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) https://www.2passeasy.com/dumps/200-105/ 1.At which layer of the OSI model is RSTP used to prevent loops? A. physical

More information

Configuring Private VLANs

Configuring Private VLANs Finding Feature Information, on page 1 Prerequisites for Private VLANs, on page 1 Restrictions for Private VLANs, on page 1 Information About Private VLANs, on page 2 How to Configure Private VLANs, on

More information

Expert Reference Series of White Papers. How a Spanning Tree Works

Expert Reference Series of White Papers. How a Spanning Tree Works Expert Reference Series of White Papers How a Spanning Tree Works 1-800-COURSES www.globalknowledge.com How a Spanning Tree Works Carol Kavalla, Global Knowledge Instructor, S, CCSI, CCDP Introduction

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol

More information

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008

Implement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you

More information

Extending Switched Networks with Virtual LANs. 2000, Cisco Systems, Inc. 7-1

Extending Switched Networks with Virtual LANs. 2000, Cisco Systems, Inc. 7-1 Extending Switched Networks with Virtual LANs 2000, Cisco Systems, Inc. 7-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Configure a VLAN Configure VLAN

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs

Campus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information

More information

Transparent Bridging and VLAN

Transparent Bridging and VLAN Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers

More information

Configuring Private VLANs

Configuring Private VLANs CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco

More information

MSTP Technology White Paper

MSTP Technology White Paper MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration

More information

Configuring EtherChannels and Link-State Tracking

Configuring EtherChannels and Link-State Tracking CHAPTER 37 Configuring EtherChannels and Link-State Tracking This chapter describes how to configure EtherChannels on Layer 2 and Layer 3 ports on the switch. EtherChannel provides fault-tolerant high-speed

More information

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190 Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information

More information

Table of Contents 1 MSDP Configuration 1-1

Table of Contents 1 MSDP Configuration 1-1 Table of Contents 1 MSDP Configuration 1-1 MSDP Overview 1-1 Introduction to MSDP 1-1 How MSDP Works 1-2 Protocols and Standards 1-7 MSDP Configuration Task List 1-7 Configuring Basic Functions of MSDP

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN modes and the VLAN Membership

More information

Configuring VLAN CHAPTER

Configuring VLAN CHAPTER CHAPTER 10 LMS collects data about devices so that you can configure and manage Virtual Local Area Network (VLAN) in your network. You must set up your LMS server properly to ensure that Data Collection

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information

More information

VLANs and Trunking C H A P T E R. 6-1: VLAN Configuration. Section 6-1

VLANs and Trunking C H A P T E R. 6-1: VLAN Configuration. Section 6-1 C H A P T E R 6 Section 6-1 VLANs and Trunking See the following sections for configuration information about these topics: 6-1: VLAN Configuration Describes the method for configuring, creating, and configuring

More information

VLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains

VLANs. Traditional Campus Networks. Performance Issues. Broadcast Issues. Bridges terminate collision domains Traditional Campus Networks Broadcast Domain VLANs Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc.

More information

RSTP Configuration. RSTP Configuration

RSTP Configuration. RSTP Configuration RSTP Configuration Contents 16. STP Configuration...1 1.1 STP Overview...1 1.1.1 Function of STP... 1 1.1.2 Protocol Packets of STP... 1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree Interface States...

More information

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1 VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.

More information

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1

VLANs. 2003, Cisco Systems, Inc. All rights reserved. 2-1 VLANs 2003, Cisco Systems, Inc. All rights reserved. 2-1 Traditional Campus Networks Broadcast Domain Collision Domain 1 Collision Domain 2 Bridges terminate collision domains 2003, Cisco Systems, Inc.

More information

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS)

BSCI. Section 5. Intermediate System-to- Intermediate System (IS-IS) BSCI Section 5 Intermediate System-to- Intermediate System () Intermediate System-to-Intermediate System () is a routing protocol developed by the ISO. It is a link-state protocol and behaves much like

More information

Lab 5: Inter-VLANs Routing

Lab 5: Inter-VLANs Routing Lab 5: Inter-VLANs Routing Network Topology:- Device Interface IP Address Subnet Mask Gateway/Clock Rate Fa 0/0.10 10.5.0.1 255.255.255.192 ----- R1 Fa 0/0.20 10.6.0.1 255.255.255.192 ----- Fa 0/0.30 10.10.0.1

More information

Introduction to OSPF

Introduction to OSPF Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Agenda OSPF Primer OSPF in Service Provider Networks OSPF BCP - Adding Networks OSPF Command Summary 2 OSPF Primer 3

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to

Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to Upon completion of this chapter, you will be able to perform the following tasks: Identify what a VLAN is and how it operates. Configure a VLAN to improve network performance. Identify what role the switch

More information

For information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.

For information about configuring these settings from Cluster Management Suite (CMS), refer to the online help. Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Table of Contents 1 OSPF Configuration 1-1

Table of Contents 1 OSPF Configuration 1-1 Table of Contents 1 OSPF Configuration 1-1 Introduction to OSPF 1-1 Basic Concepts 1-2 OSPF Area Partition 1-4 Router Types 1-7 Classification of OSPF Networks 1-9 DR and BDR 1-9 OSPF Packet Formats 1-11

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

Configuring Spanning Tree

Configuring Spanning Tree CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast

More information

Configuring VLANs. Understanding VLANs CHAPTER

Configuring VLANs. Understanding VLANs CHAPTER 7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN

More information

Routing Protocols --- Exterior Gateway Protocol

Routing Protocols --- Exterior Gateway Protocol Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13

More information

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date

HUAWEI AR Series SEP Technical White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 1.0. Date HUAWEI AR Series SEP Technical White Paper Issue 1.0 Date 2015-01-19 HUAWEI TECHNOLOGIES CO., LTD. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by

More information

Configuring IGMP Snooping

Configuring IGMP Snooping This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites

More information

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description

vines access-group vines access-group access-list-number no vines access-group access-list-number Syntax Description vines access-group vines access-group To apply an access list to an interface, use the vines access-group command in interface configuration mode. To remove the access list, use the no form of this command.

More information

Resilient Ethernet Protocol (REP)

Resilient Ethernet Protocol (REP) The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information