Prepare the network of spanning tree protocol -ccna, Computer Networking

Assignment Help:

626_CCNA.png

Prepare the Network 

Step 1: Disable all ports by using the shutdown command.

Ensure that the initial switch port states are inactive with the shutdown command. Use the interface-

range command to simplify this task.

S1(config)#interface range fa0/1-24

S1(config-if-range)#shutdown

S1(config-if-range)#interface range gi0/1-2

S1(config-if-range)#shutdown

S2(config)#interface range fa0/1-24

S2(config-if-range)#shutdown

S2(config-if-range)#interface range gi0/1-2

S2(config-if-range)#shutdown

S3(config)#interface range fa0/1-24

S3(config-if-range)#shutdown

S3(config-if-range)#interface range gi0/1-2

S3(config-if-range)#shutdown

 

Step 2: Re-enable the user ports on S1 and S2 in access mode.

Refer to the topology diagram to determine which switch ports on S2 are activated for end-user device

access. These three ports will be configured for access mode and enabled with the no shutdown

command.

S1(config)#interface fa0/3

S1(config-if)#switchport mode access

S1(config-if)#no shutdown  

S2(config)#interface range fa0/6, fa0/11, fa0/18

S2(config-if-range)#switchport mode access

S2(config-if-range)#no shutdown  

 

 


Related Discussions:- Prepare the network of spanning tree protocol -ccna

The world wide web http, The World  Wide Web HTTP The Hyper text Tran...

The World  Wide Web HTTP The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP(

Determine the level of fibre channel standard, Determine the level of Fibre...

Determine the level of Fibre Channel standard The Fibre Channel standard is organized into five levels: FC-0: The Physical Interface and Media Level handles a variety of phy

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Shared variable programme structures, Shared variable programme structures ...

Shared variable programme structures  In this section, we talk about some more concepts related to the shared programme. Concept of Lock Locks are used for protected a

Determine the window positions for succession of events, Two neighbouring n...

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r

What is unbound transmission media, Unbound Transmission Media Unbound ...

Unbound Transmission Media Unbound transmission media extend beyond the limiting confines of cabling. They give a good communication alternative for WANS. The lack of physical

Switched virtual circuits, Most networks give dynamic connections, which la...

Most networks give dynamic connections, which last for a relatively short period. To operate this, ATM can dynamically join a switched virtual circuit (SVC), allow it last as long

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd