Prepare the network of spanning tree protocol -ccna, Computer Networking

Assignment Help:

626_CCNA.png

Prepare the Network 

Step 1: Disable all ports by using the shutdown command.

Ensure that the initial switch port states are inactive with the shutdown command. Use the interface-

range command to simplify this task.

S1(config)#interface range fa0/1-24

S1(config-if-range)#shutdown

S1(config-if-range)#interface range gi0/1-2

S1(config-if-range)#shutdown

S2(config)#interface range fa0/1-24

S2(config-if-range)#shutdown

S2(config-if-range)#interface range gi0/1-2

S2(config-if-range)#shutdown

S3(config)#interface range fa0/1-24

S3(config-if-range)#shutdown

S3(config-if-range)#interface range gi0/1-2

S3(config-if-range)#shutdown

 

Step 2: Re-enable the user ports on S1 and S2 in access mode.

Refer to the topology diagram to determine which switch ports on S2 are activated for end-user device

access. These three ports will be configured for access mode and enabled with the no shutdown

command.

S1(config)#interface fa0/3

S1(config-if)#switchport mode access

S1(config-if)#no shutdown  

S2(config)#interface range fa0/6, fa0/11, fa0/18

S2(config-if-range)#switchport mode access

S2(config-if-range)#no shutdown  

 

 


Related Discussions:- Prepare the network of spanning tree protocol -ccna

Explain client and server networking model, Explain Client/Server Networkin...

Explain Client/Server Networking Model. A networking model where one or more powerful  computers (servers) give the dissimilar network services and all other user's computers (

Unguided media - wireless, Unguided Media: Wireless - A Wireless commu...

Unguided Media: Wireless - A Wireless communication transporting electromagnetic waves without a physical conductor Wireless Propagation Methods - Ground - radio

Name the steps included in creating the checksum, List the steps included i...

List the steps included in creating the checksum. a. Separate the data into sections b. Add the sections together using 1's complement arithmetic c. Take the complement o

Explain FDDI media access control, FDDI Media Access Control Unlike CSM...

FDDI Media Access Control Unlike CSMA/CD networks such like Ethernet token-passing networks are deterministic--you are able to calculate the maximum time that will pass before

State the term - netbios and imap, State the term - NetBIOS and IMAP Ne...

State the term - NetBIOS and IMAP NetBIOS: Network Basic Input Output System is an API (applications programming interface) used with other programs to transmit messages betwee

Summary of special ip addresses, The table below gives a summary of special...

The table below gives a summary of special IP addresses.

What is a java package, What is a Java package and how is it used? A J...

What is a Java package and how is it used? A Java package is a naming context for classes and interfaces. A package is used to make a separate name space for groups of classes

Error detection in lrc, Error Detection- 2D/LRC Adds an additional...

Error Detection- 2D/LRC Adds an additional character (instead of a bit) A block of bits is prearranged in a table The Parity Bit for every data unit is calculate

How is computer networks used in sales and marketing, Q. How is computer ne...

Q. How is computer networks used in sales and marketing?  Marketing and sales:   Computer networks are used extensively in both marketing and sales organizations. Marketing pr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd