88
C
HAPTER
6: S
PANNING
T
REE
P
ROTOCOL
(STP)
Figure 13
Network with an illegal topology
This configuration is illegal because it creates loops that cause the
network to overload. However, STP allows you to use this configuration
because STP detects duplicate paths and immediately prevents (or
blocks
)
one of them from forwarding traffic.
Figure 14
shows an example of enabling STP on the bridges in the
configuration. The STP system has decided that traffic from LAN segment
2 to LAN segment 1 can only flow through Bridges C and A.
Figure 14
Traffic flowing through Bridges C and A
Содержание 3C17705
Страница 1: ... http www 3com com SuperStack II Switch 9100 User Guide Part No DUA1770 5AAA01 Published January 2000 ...
Страница 10: ...GLOSSARY INDEX INDEX OF COMMANDS 3COM CORPORATION LIMITED WARRANTY EMC STATEMENTS ...
Страница 14: ...14 ABOUT THIS GUIDE ...
Страница 32: ...32 CHAPTER 2 INSTALLATION AND SETUP ...
Страница 62: ...62 CHAPTER 3 ACCESSING THE SWITCH ...
Страница 80: ...80 CHAPTER 4 VIRTUAL LANS VLANS ...
Страница 86: ...86 CHAPTER 5 FORWARDING DATABASE FDB ...
Страница 98: ...98 CHAPTER 6 SPANNING TREE PROTOCOL STP ...
Страница 110: ...110 CHAPTER 7 QUALITY OF SERVICE QOS ...
Страница 124: ...124 CHAPTER 8 STATUS MONITORING AND STATISTICS ...
Страница 130: ...130 CHAPTER 9 USING THE WEB INTERFACE ...
Страница 136: ...136 CHAPTER 10 SOFTWARE UPGRADE AND BOOT OPTIONS ...
Страница 156: ...156 APPENDIX C TROUBLESHOOTING ...
Страница 162: ......
Страница 176: ...176 INDEX ...
Страница 180: ...180 INDEX OF COMMANDS ...