Ooops. I meant to do reply, not reply all. ;-) No offence to Robert Padjen. 
His answers are straight-forward too except when he is purposely trying to 
emulate CID answers!

Leigh Anne, your VLAN paper was excellent, by the way. I almost don't want 
to see an "enhancement" to it. But I'm sure it will be good. The suspense 
is killing me...

Priscilla

At 04:15 PM 7/31/01, Leigh Anne Chisholm wrote:
>No, it wasn't one of my questions.  Since there's a new CCNA paper on VLANs
>going online at CertificationZone tomorrow, I'd expect that it's a question
>from whomever authored that paper.  I don't know who that is.  I guess we'll
>have to wait and see tomorrow!
>
>
>   -- Leigh Anne
>
>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
>Priscilla Oppenheimer
>Sent: Tuesday, July 31, 2001 4:00 PM
>To: [EMAIL PROTECTED]
>Subject: RE: thoughts on this one from cert zone [7:14394]
>
>
>I wonder who the author is? I thought it might be you, but your answers are
>more straight-forward.
>
>It's a mystery. ;-) It really does read a lot like a CID question. Maybe
>it's Robert Padjen?
>
>Talk to you later,
>
>Priscilla
>
>At 04:14 PM 7/31/01, Leigh Anne Chisholm wrote:
> >Actually, Spanning Tree Protocol can give a worst-possible-case path
> >depending on the design of the network.  All Spanning Tree Protocol does
in
> >terms of best path selection is determines the best path to the root
>bridge,
> >not to any layer 2 end-host.
> >
> >
> >   -- Leigh Anne
> >
> >-----Original Message-----
> >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
> >Donald B Johnson jr
> >Sent: Tuesday, July 31, 2001 1:00 PM
> >To: [EMAIL PROTECTED]
> >Subject: thoughts on this one from cert zone [7:14394]
> >
> >
> >Question
> >Spanning Tree protocol was designed to:
> >
> >a) Simulate a layer 3 (link-state) routing protocol, efficiently
forwarding
> >packets between layer two devices.
> >
> >b) Dynamically determine best path selection for layer 2 devices.
> >
> >c) Provide capability for SNA gateways to use duplicate MAC addresses,
> >enabling network redundancy.
> >
> >d) Trunk multiple pathways effectively increasing inter-segment bandwidth
>by
> >multiples of the trunk paths.
> >
> >e) Provide load balancing between redundant network connections.
> >
> >Answer
> >b) Dynamically determine best path selection for layer 2 devices.
>________________________
>
>Priscilla Oppenheimer
>http://www.priscilla.com
________________________

Priscilla Oppenheimer
http://www.priscilla.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=14409&t=14394
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to