ada 0
.docx
keyboard_arrow_up
School
York University *
*We aren’t endorsed by this school
Course
ITC5202
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
12
Uploaded by ProfSeal8125
Chapter 8 Assignment
8.1
How many broadcast domains are in this picture? 3 Broadcast domains
8.2 Explain at least 4 features of VLAN’s? With VLAN’s a workstation can be used with full bandwidth at each port.
VLAN makes terminal relocations easy
On VLAN’s changing hosts/users is easy
It reduces the security risk as the number of hosts decreases.
8.3 Why VLan Trunking is a better approach when it comes to configuring VLANS’s? VLan Trunking is a better approach because it helps to extend a VLAN across the network. While implementing the multiple VLANs across the network, trunk links plays a
very important role of making sure that the VLAN signals remain properly segregated for each to reach their intended destination. VLAN trunking is very efficient, as it can configure multiple VLANs on a single port.
8.4 Name two Vlan Trunking Protocols which Cisco IOS supports? 802.1Q and ISL.
8.5 Following the diagram write steps of code which Creates VLAN2 on Port fa0/13 and fa0/14 and Assign Access VLANs to those interface. As per example 8.2 in the book
SW1# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)# vlan 2
SW1(config-vlan)# name Freds-vlan
SW1(config-vlan)# exit
SW1(config)# interface range fastethernet 0/13 - 14
SW1(config-if)# switchport access vlan 2
SW1(config-if)# switchport mode access
SW1(config-if)# end
SW1# show vlan brief
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/15, Fa0/16, Fa0/17, Fa0/18
Fa0/19, Fa0/20, Fa0/21, Fa0/22
Fa0/23, Fa0/24, Gi0/1, Gi0/2
2 Freds-vlan active Fa0/13, Fa0/14
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
8.6
Name different Trunking Administrative Mode Options and their functions?
Modes Function Access Acts as an access port
Trunk Puts interface in trunking
Dynamic desirable Negotiate and chooses which type of trunking to be used.
Dynamic auto Waits to receive a trunk negotiation
message and then chooses which type of trunking to be used.
Chapter 9 Assignment
9.1 What are three reasons Spanning tree protocol is used in LAN’s? The three reason why Spanning tree is used in Lan’s is to avoid the following issues: Broadcast Stroms MAC table instability Multiple frame transmission
9.2 Write five port states of STP and how they work? Five port states of STP are:
Blocking: Port in blocking stage will not participate or forward any frame.
Listening: Port directs BPDUs to the switch system module for processing
Learning: Port is listening and processing BPDUs
Forwarding: Port will process BPDUs and update its MAC address table with frames that it receives and forward user traffic through the port.
Disabled: Port will not participate in any frame forwarding and is considered non operational
9.3 From figure shown below which switch will win the root election process?
SW1 will win the root election process
9.4 Write the default port costs suggested by IEEE? Ethernet Speed IEEE Cost : 1998 (and before) IEEE Cost : 2004 (and after) 10 Mbps 100 2000000
100Mbps 19 200000
1 Gbps 4 20000
10 Gbps 2 2000
100 Gbps N/A 200
1Tbps N/A 20
9.5 What is the main difference in STP and RSTP? As per the book following are the points that shows the main difference between STP and RTP
RSTP and STP elect the root switch using the same rules and tiebreakers.
RSTP and STP switches select their root ports with the same rules.
RSTP and STP elect designated ports on each LAN segment with the same rules and tiebreakers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
There are a variety of networking modes available in the context of digital networking. Explain the differences between the digital networking modes of NAT, bridged, and host-only networks.Examples of scenarios in which virtual machines (VMs) should be provided with their own personal digital network should be provided.Provide your thoughts on the advantages and drawbacks of developing personal digital networks among Virtual Machines (VMs) that are housed on the same physical host?
arrow_forward
There are a variety of networking modes available in the context of digital networking. Explain the
differences between the digital networking modes of NAT, bridged, and host-only networks.
Examples of scenarios in which virtual machines (VMs) should be provided with their own personal
digital network should be provided.
Provide your thoughts on the advantages and drawbacks of developing personal digital networks
among Virtual Machines (VMs) that are housed on the same physical host?
arrow_forward
Ethernet is a distributed LAN protocol, which means that there is no centralized control node, and therefore a single node's failure will never bring the whole network down. However, can you see any advantage in establishing a centralized LAN in which a single node is in charge of the whole network and determines who receives messages and who waits? Explain.
arrow_forward
If you are connected to a network via any device, does your device need to know the address of every device that exists on the Internet? Explain why or why not.
What is a forwarding table?
What is source independence?
What is the one important characteristic of a WAN that differentiates it from LAN networks?
What is store and forward paradigm?
What is a queue as it relates to packet switches?
Do packet switches consume (meaning keep them for themselves) packets?
What type of addressing is used in WANs?
arrow_forward
8. What is the fastest line speed at which a host can blast out 1500-byte TCP payloads
with a 120 sec maximum packet lifetime without having the sequence numbers
wrap around? Take TCP, IP, and Ethernet overhead into consideration. Assume
that Ethernet frames may be sent continuously and one Ethernet PDU will hold each
one.
arrow_forward
Write the three classes of Ip address ranges which are used for LAN and WAN.
arrow_forward
Question: Question Two: Write Down What Best Describe The
Following:
An Infrastructure That...
Question two: write down what best describe the following:
1.
an infrastructure that provides services to applications
2. Which layer do internet protocols like HTTP, FTP and DNS belong to?
3. What is the name for a uniquely identifiable endpoint of a connection?
4.
defines the format and the order of messages exchanged
5.
use store-and-forward transmission at the inputs to the links.
6. What information a uniquely identifiable endpoint of a connection (see question before) consist of?
7.
allow many devices to share the same media.
8. The function of
works as network translator.
9. Which layer do internet protocols like HTTP, FTP and DNS belong to?
10.
a collection of computer networks interconnected together.
11. The protocol
used for sending email on Internet.
12. Which TCP/IP stack layers have to be passed when a computer accesses an Internet website in a web
browser
13. The
protocol…
arrow_forward
a. How many hosts does each LAN contain?
b. How many intermediary devices does each LAN contain?
c. How many access links and trunk links are there in each LAN?
d. What is the total number of access links and trunk links?
e. How many network nodes are there in the enterprise network?
f. What intermediary devices are used for intra-networking in each LAN?
g. What intermediary device is used for inter-networking?
arrow_forward
What does the VLAN Trunk Protocol (VTP) do?
a. It is the protocol used by a trunk port for establishing a trunk with another switch.
O b. It is the protocol that defines how VLAN tagging is accomplished in an Ethernet network.
c. It shares trunking information amongst switches that participate.
d. It shares VLAN database information amongst switches that participate.
arrow_forward
Question Four:
What is the principal difference between connectionless communication and connection-oriented communication?
Why and how do we break the problem of networking into layers? Why into sublayers? Illustrate this concept by sublayering the transport layer and putting TCP’s major features into the appropriate sublayer
List the types of service which provided by a packet switch network
Which protocol works at the Transport layer and provides virtual circuits between hosts
Describe one advantage and one disadvantage circuit-switched networks have over a packet-switched networks
Consider sending a packet from a sending host to a receiving host over a fixed route. List the delay components in the end-to-end delay computation. Which of these delays are constant and which are variable?
Compare between datagram and virtual circuit networks.
What is the peer-to-peer communication in the OSI Model?
Which of the OSI layers handles each of the following:
provides synchronization…
arrow_forward
What use can virtual LANs serve if many subnets may be built on a single switch, and if users on different subnets cannot communicate with one another? Give a justification for your answer using a topological illustration.
arrow_forward
Explain the concept of VLAN tagging (802.1Q). How does it work, and why is it crucial in virtual LAN deployments, especially in environments with multiple switches?
arrow_forward
Explain the concept of VLAN trunking and the use of protocols like 802.1Q in managing VLAN traffic across switches. Provide a practical scenario where trunking is necessary.
arrow_forward
Two typical LAN topologies are the "Mesh" and "Ring." Could you give me a description of them?
arrow_forward
Explain in details the Services, Layering and Encapsulation in TCP/IP reference with draw?
Explain DNS in details
arrow_forward
Describe the process of VLAN trunking and the use of VLAN trunking protocols like 802.1Q. How do trunking protocols facilitate communication between VLANs?
arrow_forward
Why do we need virtual LANs if we can construct numerous subnets on a switch and users on one subnet cannot connect to users on another? Use topology to explain your answer.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- There are a variety of networking modes available in the context of digital networking. Explain the differences between the digital networking modes of NAT, bridged, and host-only networks.Examples of scenarios in which virtual machines (VMs) should be provided with their own personal digital network should be provided.Provide your thoughts on the advantages and drawbacks of developing personal digital networks among Virtual Machines (VMs) that are housed on the same physical host?arrow_forwardThere are a variety of networking modes available in the context of digital networking. Explain the differences between the digital networking modes of NAT, bridged, and host-only networks. Examples of scenarios in which virtual machines (VMs) should be provided with their own personal digital network should be provided. Provide your thoughts on the advantages and drawbacks of developing personal digital networks among Virtual Machines (VMs) that are housed on the same physical host?arrow_forwardEthernet is a distributed LAN protocol, which means that there is no centralized control node, and therefore a single node's failure will never bring the whole network down. However, can you see any advantage in establishing a centralized LAN in which a single node is in charge of the whole network and determines who receives messages and who waits? Explain.arrow_forward
- If you are connected to a network via any device, does your device need to know the address of every device that exists on the Internet? Explain why or why not. What is a forwarding table? What is source independence? What is the one important characteristic of a WAN that differentiates it from LAN networks? What is store and forward paradigm? What is a queue as it relates to packet switches? Do packet switches consume (meaning keep them for themselves) packets? What type of addressing is used in WANs?arrow_forward8. What is the fastest line speed at which a host can blast out 1500-byte TCP payloads with a 120 sec maximum packet lifetime without having the sequence numbers wrap around? Take TCP, IP, and Ethernet overhead into consideration. Assume that Ethernet frames may be sent continuously and one Ethernet PDU will hold each one.arrow_forwardWrite the three classes of Ip address ranges which are used for LAN and WAN.arrow_forward
- Question: Question Two: Write Down What Best Describe The Following: An Infrastructure That... Question two: write down what best describe the following: 1. an infrastructure that provides services to applications 2. Which layer do internet protocols like HTTP, FTP and DNS belong to? 3. What is the name for a uniquely identifiable endpoint of a connection? 4. defines the format and the order of messages exchanged 5. use store-and-forward transmission at the inputs to the links. 6. What information a uniquely identifiable endpoint of a connection (see question before) consist of? 7. allow many devices to share the same media. 8. The function of works as network translator. 9. Which layer do internet protocols like HTTP, FTP and DNS belong to? 10. a collection of computer networks interconnected together. 11. The protocol used for sending email on Internet. 12. Which TCP/IP stack layers have to be passed when a computer accesses an Internet website in a web browser 13. The protocol…arrow_forwarda. How many hosts does each LAN contain? b. How many intermediary devices does each LAN contain? c. How many access links and trunk links are there in each LAN? d. What is the total number of access links and trunk links? e. How many network nodes are there in the enterprise network? f. What intermediary devices are used for intra-networking in each LAN? g. What intermediary device is used for inter-networking?arrow_forwardWhat does the VLAN Trunk Protocol (VTP) do? a. It is the protocol used by a trunk port for establishing a trunk with another switch. O b. It is the protocol that defines how VLAN tagging is accomplished in an Ethernet network. c. It shares trunking information amongst switches that participate. d. It shares VLAN database information amongst switches that participate.arrow_forward
- Question Four: What is the principal difference between connectionless communication and connection-oriented communication? Why and how do we break the problem of networking into layers? Why into sublayers? Illustrate this concept by sublayering the transport layer and putting TCP’s major features into the appropriate sublayer List the types of service which provided by a packet switch network Which protocol works at the Transport layer and provides virtual circuits between hosts Describe one advantage and one disadvantage circuit-switched networks have over a packet-switched networks Consider sending a packet from a sending host to a receiving host over a fixed route. List the delay components in the end-to-end delay computation. Which of these delays are constant and which are variable? Compare between datagram and virtual circuit networks. What is the peer-to-peer communication in the OSI Model? Which of the OSI layers handles each of the following: provides synchronization…arrow_forwardWhat use can virtual LANs serve if many subnets may be built on a single switch, and if users on different subnets cannot communicate with one another? Give a justification for your answer using a topological illustration.arrow_forwardExplain the concept of VLAN tagging (802.1Q). How does it work, and why is it crucial in virtual LAN deployments, especially in environments with multiple switches?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning