The document provides answers to questions about CCNA 3 Chapter 5 on spanning tree protocol. It includes 20 multiple choice questions about concepts like the criteria switches use to select the root bridge, how STP prevents loops in a switched network, and how port roles are assigned in RSTP. It also includes exhibits showing STP output from switches to help illustrate concepts.
Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops. It is standardized as IEEE 802.D protocol. STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure loop-free topology. With STP in place, you can have redundant links between switches in order to provide redundancy.
Spanning Tree Protocol (STP) is standardized as IEEE 802.1D.
Is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network.
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly
faster spanning tree convergence after a topology change, introducing new convergence behavior and
bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond
to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical
link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP
for several purposes; its default value is 2 seconds.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops. It is standardized as IEEE 802.D protocol. STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure loop-free topology. With STP in place, you can have redundant links between switches in order to provide redundancy.
Spanning Tree Protocol (STP) is standardized as IEEE 802.1D.
Is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network.
In 2001, the IEEE introduced Rapid Spanning Tree Protocol (RSTP) as 802.1w. RSTP provides significantly
faster spanning tree convergence after a topology change, introducing new convergence behavior and
bridge port roles to do this. RSTP was designed to be backwards-compatible with standard STP.
While STP can take 30 to 50 seconds to respond to a topology change, RSTP is typically able to respond
to changes within 3 × Hello times (default: 3 times 2 seconds) or within a few milliseconds of a physical
link failure. The so-called Hello time is an important and configurable time interval that is used by RSTP
for several purposes; its default value is 2 seconds.
Difference between Spanning Tree Protocol (STP) and Rapid Spanning Tree
Protocol (RSTP)
1. The main difference between Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) and Spanning
Tree Protocol (STP IEEE 802.1D) is that Rapid Spanning Tree Protocol (RSTP IEEE 802.1W)
assumes the three Spanning Tree Protocol (STP) ports states Listening, Blocking, and Disabled are
same (these states do not forward Ethernet frames and they do not learn MAC addresses).
Hence Rapid Spanning Tree Protocol (RSTP IEEE 802.1W) places them all into a new called
Discarding state. Learning and forwarding ports remain more or less the same.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
The concept of the spanning tree protocol was devised to address broadcast storming. The spanning tree algorithm itself is defined by the IEEE standard 802.1D and its later revisions.
The IEEE Standard 802.1 uses the term bridge to define the spanning tree operation, and uses terms such as Bridge Protocol Data Units and Root Bridge when defining spanning tree protocol functions.
When a bridge receives a frame, it reads the source and destination address fields. The bridge then enters the frame’s source address in its forwarding database. In doing this the bridge associates the frame’s source address with the network attached to the por t on which the frame was received. The bridge also reads the destination address and if it can find this address in its forwarding database, it forwards the frame to the appropriate port. If the bridge does not recognize the destination address, it forwards the frame out from all its por ts except for the one on which the frame was received, and then waits for a reply. This process is known as “flooding”. Similarly, packets with broadcast or multicast destination MAC addresses will be flooded by a bridge.
A significant problem arises where bridges connect via multiple paths. A frame that arrives with an unknown or broadcast/multicast destination address is flooded over all available paths. The arrival of these frames at another network via different paths and bridges produces major problems. The bridges find the same source MAC address arriving on
multiple different por ts, making it impossible to maintain a reliable forwarding database. As a result, increasing numbers of packets will be forwarded to multiple paths. This process is selfperpetuating and produces a condition known as a packet storm, where the increase of circulating frames can eventually overload the network.
This document describes the features of the operation of the OSPF routing protocol in general. In some subjects, theoretical information that was explained by establishing lab environments was reinforced by applications.
The purpose of this document is not to analyze OSPF from start to finish, but to create a simple quick learning booklet. For this reason, some topics are described only superficially, while some topics details are covered. Also, some concepts such as Sham Link or FRR are not included in the document.
It prevents a network from frame looping by putting some interfaces in forwarding state & some
interfaces in blocking state.
Whenever two or more switches are connected with each other for redundancy purpose loop can occur.
STP Protocol is used to prevent the loop. STP is layer 2 Protocol & by default it is enabled on switches.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
In simple terms, detailed descriptions on how RSVP works in this document have been made. Some detail issues are not covered, such as CSPF or protection mechanisms. Purpose of this document is to create an idea of the working structure of the protocol and how to manage it in general.
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
The concept of the spanning tree protocol was devised to address broadcast storming. The spanning tree algorithm itself is defined by the IEEE standard 802.1D and its later revisions.
The IEEE Standard 802.1 uses the term bridge to define the spanning tree operation, and uses terms such as Bridge Protocol Data Units and Root Bridge when defining spanning tree protocol functions.
When a bridge receives a frame, it reads the source and destination address fields. The bridge then enters the frame’s source address in its forwarding database. In doing this the bridge associates the frame’s source address with the network attached to the por t on which the frame was received. The bridge also reads the destination address and if it can find this address in its forwarding database, it forwards the frame to the appropriate port. If the bridge does not recognize the destination address, it forwards the frame out from all its por ts except for the one on which the frame was received, and then waits for a reply. This process is known as “flooding”. Similarly, packets with broadcast or multicast destination MAC addresses will be flooded by a bridge.
A significant problem arises where bridges connect via multiple paths. A frame that arrives with an unknown or broadcast/multicast destination address is flooded over all available paths. The arrival of these frames at another network via different paths and bridges produces major problems. The bridges find the same source MAC address arriving on
multiple different por ts, making it impossible to maintain a reliable forwarding database. As a result, increasing numbers of packets will be forwarded to multiple paths. This process is selfperpetuating and produces a condition known as a packet storm, where the increase of circulating frames can eventually overload the network.
This document describes the features of the operation of the OSPF routing protocol in general. In some subjects, theoretical information that was explained by establishing lab environments was reinforced by applications.
The purpose of this document is not to analyze OSPF from start to finish, but to create a simple quick learning booklet. For this reason, some topics are described only superficially, while some topics details are covered. Also, some concepts such as Sham Link or FRR are not included in the document.
It prevents a network from frame looping by putting some interfaces in forwarding state & some
interfaces in blocking state.
Whenever two or more switches are connected with each other for redundancy purpose loop can occur.
STP Protocol is used to prevent the loop. STP is layer 2 Protocol & by default it is enabled on switches.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
In simple terms, detailed descriptions on how RSVP works in this document have been made. Some detail issues are not covered, such as CSPF or protection mechanisms. Purpose of this document is to create an idea of the working structure of the protocol and how to manage it in general.
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
buy old yahoo accounts buy yahoo accountsSusan Laney
As a business owner, I understand the importance of having a strong online presence and leveraging various digital platforms to reach and engage with your target audience. One often overlooked yet highly valuable asset in this regard is the humble Yahoo account. While many may perceive Yahoo as a relic of the past, the truth is that these accounts still hold immense potential for businesses of all sizes.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Navigating the world of forex trading can be challenging, especially for beginners. To help you make an informed decision, we have comprehensively compared the best forex brokers in India for 2024. This article, reviewed by Top Forex Brokers Review, will cover featured award winners, the best forex brokers, featured offers, the best copy trading platforms, the best forex brokers for beginners, the best MetaTrader brokers, and recently updated reviews. We will focus on FP Markets, Black Bull, EightCap, IC Markets, and Octa.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
1. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
CCNA 3 Chapter 5 V4.0 Answers
1. Which two criteria does a switch use to select the root bridge? (Choose two.)
bridge priority
switching speed
number of ports
base MAC address
switch location
memory size
2. Which two statements are true about the default operation of STP in a Layer 2
switched environment that has redundant connections between switches? (Choose
two.)
The root switch is the switch with the highest speed ports.
Decisions on which port to block when two ports have equal cost depend on the port
priority and identity.
All trunking ports are designated and not blocked.
Root switches have all ports set as root ports.
Non-root switches each have only one root port.
3.
Refer to the exhibit. All switches in the network have empty MAC tables. STP has
been disabled on the switches in the network. How will a broadcast frame that is
sent by host PC1 be handled on the network?
Switch SW1 will block the broadcast and drop the frame.
Switch SW1 will forward the broadcast out all switch ports, except the originating port.
This will generate an endless loop in the network.
Switch SW1 will forward the broadcast out all switch ports, except the originating port.
All hosts in the network will reply with a unicast frame sent to host PC1.
2. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
Switch SW1 will forward the traffic out all switch ports except the originating port as a
unicast frame. All hosts in the network will reply with a unicast frame sent to switch
SW1.
4. Which two statements describe the BIDs used in a spanning tree topology?
(Choose two.)
They are sent out by the root bridge only after the inferior BPDUs are sent.
They consist of a bridge priority and MAC address.
Only the root bridge will send out a BID.
They are used by the switches in a spanning tree topology to elect the root bridge.
The switch with the fastest processor will have the lowest BID.
5. Which statement or set of paired statements correctly compares STP with RSTP?
STP and RSTP have the same BPDU format and flag field information.
STP specifies backup ports. RSTP has only root ports, alternate ports, and designated
ports.
STP port states are independent of port roles. RSTP ties together the port state and port
role.
STP waits for the network to converge before placing ports into forwarding state. RSTP
places designated ports into forwarding state immediately.
6. How can a network administrator influence which STP switch becomes the root
bridge?
Configure all the interfaces on the switch as the static root ports.
Change the BPDU to a lower value than that of the other switches in the network.
Assign a lower IP address to the switch than that of the other switches in the network.
Set the switch priority to a smaller value than that of the other switches in the network.
7. In which STP state does a port record MAC addresses but not forward user data?
blocking
learning
disabling
listening
forwarding
8. When PVST+ was developed, the Bridge ID was modified to include which
information?
bridge priority
MAC address
protocol
VLAN ID
9. What is the first step in the process of convergence in a spanning tree topology?
election of the root bridge
blocking of the non-designated ports
3. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
selection of the designated trunk port
determination of the designated port for each segment
10. What two elements will exist in a converged network with one spanning tree?
(Choose two.)
one root bridge per network
all non-designated ports forwarding
one root port per non-root bridge
multiple designated ports per segment
one designated port per network
11.
Refer to the exhibit. What can be determined from the output shown?
Two hosts communicating between ports Fa0/2 and Fa0/4 have a cost of 38.
The priority was statically configured to identify the root.
STP is disabled on this switch.
The timers have been altered to reduce convergence time.
12. What two features of the Spanning-Tree Protocol contribute to the time it takes
for a switched network to converge after a topology change occurs? (Choose two.)
the max-age timer
the spanning-tree hold down timer
the forward delay
the spanning-tree path cost
the blocking delay
4. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
13. What three link types have been defined for Rapid Spanning-Tree Protocol?
(Choose three.)
shared
end-to-end
edge-type
boundary-type
point-to-many
point-to-point
14.
Refer to the exhibit. The spanning-tree port priority of each interface is at the
default setting. The network administrator enters the spanning-tree vlan 1 root
primary command on S4. What is the effect of the command?
Spanning tree blocks Gi0/1 on S3.
Gi0/2 on S3 transitions to a root port.
Port priority makes Gi0/2 on S1 a root port.
S4 is already the root bridge, so there are no port changes.
15. In which two ways is the information that is contained in BPDUs used by
switches? (Choose two.)
to negotiate a trunk between switches
to set the duplex mode of a redundant link
to identify the shortest path to the root bridge
to prevent loops by sharing bridging tables between connected switches
to determine which ports will forward frames as part of the spanning tree
5. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
16. What Rapid Spanning Tree Protocol (RSTP) role is assigned to the forwarding
port elected for every Ethernet LAN segment that links two switches?
alternate
backup
designated
edge
17. Which two items are true regarding the spanning-tree portfast command?
(Choose two.)
PortFast is Cisco proprietary.
PortFast can negatively effect DHCP services.
PortFast is used to more quickly prevent and eliminate bridging loops.
Enabling PortFast on trunks that connect to other switches improves convergence.
If an access port is configured with PortFast, it immediately transitions from a blocking
to a forwarding state.
18. Which two actions does an RSTP edge port take if it receives a BPDU? (Choose
two.)
immediately loses its edge status
inhibits the generation of a TCN
goes immediately to a learning state
disables itself
becomes a normal spanning-tree port
19.
Refer to the exhibit. Server sends an ARP request for the MAC address of its
default gateway. If STP is not enabled, what will be the result of this ARP request?
6. www.ccnafinal.net www.ccnafinalexam.com www.ccnaanswers.org www.ccna4u.net
www.ccna4u.org www.ccna4u.info
Router_1 will drop the broadcast and reply with the MAC address of the next hop router.
Switch_A will reply with the MAC address of the Router_1 E0 interface.
Switch_A and Switch_B will continuously flood the message onto the network.
The message will cycle around the network until its TTL is exceeded.
20. Which three statements are accurate regarding RSTP and STP? (Choose three.)
RSTP uses a faster algorithm to determine root ports.
RSTP introduced the extended system ID to allow for more than 4096 VLANs.
Both RSTP and STP use the portfast command to allow ports to immediately transition
to forwarding state.
Like STP PortFast, an RSTP edge port that receives a BPDU loses its edge port status
immediately and becomes a normal spanning-tree port.
Configuration commands to establish primary and secondary root bridges are identical
for STP and RSTP.
Because of the format of the BPDU packet, RSTP is backward compatible with STP.
Taged:
ccna 3 chapter 5 exam answers
Related Posts
• CCNA 4 Chapter 5 V4.0 Answers
• CCNA 3 Final Exam V4.0 Answers
• CCNA 3 Chapter 7 V4.0 Answers
• CCNA 3 Chapter 6 V4.0 Answers
• CCNA 3 Chapter 4 V4.0 Answers
• CCNA 3 Chapter 3 V4.0 Answers6
• CCNA 3 Chapter 2 V4.0 Answers
• CCNA 3 Chapter 1 V4.0 Answers
• CCNA 3 Final Exam Answers (2009)
• CCNA 3 Final Exam Answers (2010)
Tags: CCNA 3, ccna 3 2011, CCNA 3 Final, CCNA 3 Final Exam, CCNA 3 Final Exam
Answers, CCNA 3 Final Exam Answers (2010), ccna 3 final exam answers 2011, CCNA
3 Final Exam Questions and Answers 2010, ccna final exam answers 4.0, ccna3 final
exam
← CCNA 2 Final Exam Answers CCNA 3 Final Exam Answers (2009) →
Leave a Reply
Your email address will not be published. Required fields are marked *
Name *