There are a total of 79 devices in the ring, all supporting RSTP.
All port costs are the same, all segment speeds are the same.
My assumptions -
When the network starts up, the the bridge with priority 0 will be elected as root.
At all the switches which are upto 39 hop counts away from the root in each direction in the ring, the received BPDUs are still valid (Message age < Max Age) . Hence the port on the 39th switch with the higher MAC ID than it's neighbor will have the 'Alternate' role. With this an ethernet loop is prevented.
Will the network converge as described in point 2 above or is my assumption flawed?
Only if it is valid, consider the second scenario - suppose there is a link failure between the 2nd and 3rd switch from the root bridge in one direction. Now instead of a ring, we have a long daisy chain of 79 switches. There will be 2 switches at one side of the root switch, and 76 switches on the other side. At the switch at a hop count of 40 from the root bridge, the BPDUs will be discarded, since the Message Age will be equal to the Max Age.
Is there a chance of a stable network convergence in this network?
What happens to the switches #40 to #76 and their ports? Switch #41 will not see the BPDUs indicating the root bridge with priority 0. So it will send BPDUs in both directions with Max Age set to 40. How will switch #40 and #39 react to these BPDUs?
how do we restrict a router interfaces from directly connected to Some vlans? can any one help me to figureout?the question is Router should not have interfaces directly connected to Vlan 30 and Vlan 40
I've got a one problem. Me and my friend have the same ISP. I checked my External IP address at WhatIsMyIp.com and my friend do it to. And we saw we have the same External IP.So my question is can 2 routers have the same External IP address?If i'm right 2...
LISP Protocol (Location Identifier Separation Protocol)! - The LISP protocol has become a brilliant stardom with the digital transformation that we are now experiencing. - Today we will talk about the LISP protocol and its advantages and method of p...
SD-Access provides automated end-to-end services (such as segmentation, quality of service, and analytics) for user, device, and application traffic. SD-Access automates user policy so organizations can ensure the appropriate access control and applicati...