Spanning Tree Protocol Thesis - Aditya Bayu Putranto
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Spanning Tree Protocol Thesis - Aditya Bayu Putranto

  • 2,169 views
Uploaded on

Hi all, this is my bachelor thesis presentation. About Spanning Tree Protocol. ...

Hi all, this is my bachelor thesis presentation. About Spanning Tree Protocol.
Not so good, but I've tried my best. :)

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,169
On Slideshare
2,157
From Embeds
12
Number of Embeds
1

Actions

Shares
Downloads
122
Comments
0
Likes
2

Embeds 12

https://twitter.com 12

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 1© 2010 Cisco and/or its affiliates. All rights reserved. What You Make Possible
  • 2. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Cisco Confidential 2© 2010 Cisco and/or its affiliates. All rights reserved. Aditya Bayu Putranto – Fresh Graduate & CCNA Certified
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential 3© 2010 Cisco and/or its affiliates. All rights reserved. Aditya Bayu Putranto – Fresh Graduate & CCNA Certified
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4Cisco Confidential 4© 2010 Cisco and/or its affiliates. All rights reserved. Actually 4 things
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5Cisco Confidential 5© 2010 Cisco and/or its affiliates. All rights reserved. At Universitas Sanata Dharma Yogyakarta, Indonesia
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 • WebEx Meeting • Technical & Non Technical • Topic for My Thesis • Only 2960 and 1900 • Spanning Tree Protocol • My Thesis Supervisor Agree
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7Cisco Confidential 7© 2010 Cisco and/or its affiliates. All rights reserved. Just technical issue.
  • 8. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Business Communication Reliable Network Redundant Network Small Company Cisco Switch 2960 Spanning Tree Protocol Legacy protocol STP timers
  • 9. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Convergence Time 30 – 50 second Maximum Network Diameter 7
  • 10. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Timers Setting vs Convergence Time. Timers Setting vs Network Diameter.
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 STP Timers impact for initial convergence, failover convergence, dan recovery convergence. Probability, Fail to Convergent.
  • 15. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 • Literature Review • Planning • Implement • Data Measurement • Data Analysis
  • 16. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16Cisco Confidential 16© 2010 Cisco and/or its affiliates. All rights reserved. Aditya Bayu Putranto - 085314113
  • 17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19Cisco Confidential 19© 2010 Cisco and/or its affiliates. All rights reserved. Let’s zoom in
  • 20. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20Cisco Confidential 20© 2010 Cisco and/or its affiliates. All rights reserved. The legacy protocol
  • 21. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21Cisco Confidential 21© 2010 Cisco and/or its affiliates. All rights reserved.
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Electing a root switch Determining the root port Determining the designated port
  • 23. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Hello Time Forward Delay Maximum Age
  • 24. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25Cisco Confidential 25© 2010 Cisco and/or its affiliates. All rights reserved. My technical constraint device constraint.
  • 26. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Only 9 Catalyst 2960 Data Measurement Whole Network
  • 27. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Network Diameter Debug Spanning Tree Protocol Network Time Protocol
  • 28. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Switch>enable Switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#spanning-tree vlan 1 hello 2 Switch(config)#spanning-tree vlan 1 forward 15 Switch(config)#spanning-tree vlan 1 max 20 Switch(config)#
  • 31. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 • Initial Convergence • Failover Convergence • Recovery Convergence
  • 32. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35Cisco Confidential 35© 2010 Cisco and/or its affiliates. All rights reserved. …
  • 36. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36Cisco Confidential 36© 2010 Cisco and/or its affiliates. All rights reserved. *Direct Topology Change
  • 37. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 40. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40Cisco Confidential 40© 2010 Cisco and/or its affiliates. All rights reserved.
  • 41. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44Cisco Confidential 44© 2010 Cisco and/or its affiliates. All rights reserved.
  • 45. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51Cisco Confidential 51© 2010 Cisco and/or its affiliates. All rights reserved. Aditya Bayu Putranto - 085314113
  • 52. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 • Forward Delay • Flapping
  • 53. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 • More Maximum Network Diameter • Packet Filtering • How far STP timers default can accommodate network diameter? • How's STP 802.1D, PVST+, dan Rapid PVST+
  • 54. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 • Hucaby, David (2010), CCNP Switch 642-813 Official Certification Guide, Chapter 7: “Traditional Spanning Tree Protocol”. • Cisco System, Inc. (2007), CCNA Exploration 4.0: LAN Switching and Wireless, Cisco System, Inc., Chapter 1: “Switched LAN Architecture”. • Cisco System, Inc. (2007), CCNA Exploration 4.0: LAN Switching and Wireless, Cisco System, Inc., Chapter 3: “VLANs”. • Cisco System, Inc (2007), CCNA Exploration 4.0: LAN Switching and Wireless, Cisco System, Inc., Chapter 4: “STP”. • Sofana, Iwan (2010), Cisco CCNA & Jaringan Komputer, Penerbit Informatika. • Hucaby, David (2010), CCNP Switch 642-813 Official Certification Guide, Chapter 4: “VLANs and Trunks” • Sincoskie, W. D., Cotton, C. J (1988), Extended Bridge Algorithms for Large Networks, IEEE Network Journal January • Bryant, Chris (2011), What Are Broadcast Storms?, MC MCSE Certification Resources (www.mcmse.com/cisco/guides/broadcasts.shtml), Diakses pada tanggal: 5 Juni 2012. • Cisco Systems, Inc. (2006), Understanding and Tuning Spanning Tree Protocol Timers, Document ID: 19120. • Cisco Systems, Inc. (2005), Data Sheet: Cisco Catalyst 2960 Series Switches. • The Wireshark Team, “Wireshark FAQ”, (www.wireshark.org/faq.html), Diakses pada tanggal 9 September 2012. • IEEE 802.1 Working Group (1998), “802.1D-1998 ANSI/IEEE Standards 802.1D, 1998 Edition Document: Media Access Control Bridges” • Cisco Systems, Inc., “Cisco Catalyst 2960 Series Switches” (www.cisco.com/en/US/products/ps6406/index.html), Diakses pada tanggal 18 November 2012. • Networkers 2004, “Accurate Time Synchronization on Cisco Routers”, Cisco Document ID: NMS-1N03. • Quigley, J Colin (2011), “An Investigation into Spanning Tree Protocol 802.1D and Convergence Performance”, Honours Final Project Report.
  • 55. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
  • 56. Thank you.