Solutions for Exercises of Lecture 5 - Bridges
|
|
- Rodger Newman
- 6 years ago
- Views:
Transcription
1 Question 1: Solutions for Exercises of Lecture 5 - Bridges For the two hosts shown in the figure, the ethernet MAC addresses are provided. All the LANs are BRIDGE 7 LAN G LAN A LAN B BRIDGE 3 LAN C Host II port 4 BRIDGE 1 BRIDGE 2 LAN F 0:1:87:3e:ff:75 LAN D BRIDGE 6 BRIDGE 5 LAN E LAN H BRIDGE 4 LAN I Host I 5:80:87:3e:ff:75 ethernet LANs. Assume that the root path costs are computed using a hop count from the root (in other words, use the root path cost computation scheme shown in the lecture notes of lecture 5). Also assume that the bridge IDs are the numbers shown in the figure, i.e., the bridge ID of bridge 1 is 1, and so on. Answer the following questions: a. What BPDUs are generated by each bridge? Assume that all the bridges are operating Time Bridge 1 Bridge 2 Bridge 3 Bridge 4 Bridge 5 Bridge 6 Bridge 7 t=0 [1,0,1] [2, 0, 2] [3,0,3] [4,0,4] [5,0,5] [6,0,6] [7,0,7] t=1 [1,0,1] [1,1,2] [1,1,3] [2,1,4] [1,1,5] [1,1,6] [2,1,7] t=2 [1,0,1] [1,1,2] [1,1,3] [1,2,4] [1,1,5] [1,1,6] [1,2,7] in sync generating BPDUs based on the BPDUs received in the previous time slot. List the root ID, root path cost and sender s bridge ID using the three-tuple notation we used in the lecture notes. b. What is the root bridge? Bridge 1 1
2 c. What is the root port and root path costs of all the bridges? Bridge Root port Root path cost Bridge 1-0 Bridge Bridge Bridge Bridge Bridge Bridge d. What is the designated bridge and designated port for each LAN? LAN Designated bridge Designated port LAN A 2 1 LAN B 3 1 LAN C 1 1 LAN D 1 3 LAN E 5 1 LAN F 1 2 LAN G 2 2 LAN H 6 3 LAN I 5 2 For LAN H, bridge 4 is at a cost of 2 away from root, hence choose bridge 6; similarly, for lan I, bridge 5 is closer to the root than bridge 4. e. Which ports of each bridge are in forwarding and which ports are in blocking? Bridge forwarding blocking Bridge 1 1,2,3-2
3 Bridge forwarding blocking Bridge 2 1,2,4 3 Bridge 3 1,2 3 Bridge 4 1 2, 3 Bridge 5 1,2,3 Bridge 6 1,3 2 Bridge f. Draw a spanning tree with the root bridge as the root node of the tree, and show all other bridges and LANs in the tree. LAN F Bridge 1 LAN D LAN C Bridge 2 Bridge 5 Bridge 3 Bridge 6 LAN G LAN A Bridge 4 Bridge 7 LAN E LAN I LAN B LAN H g. When Host I sends a MAC frame to Host II, what is the total number of frames generated if the bridges have no addresses in their filtering databases (i.e., the bridges have not yet gone through their address learning phase)? Answer: 9 frames h. When Host I sends a MAC frame to Host II, what is the total number of frames generated if the bridges have all learned the location of host II, i.e., every bridge has a correct entry in its filtering database for host II? Answer: 2 frames Bridge 6 will forward it to. Bridge 4 receives it on a blocking port and hence will not forward. Bridges 1 and 3 will not forward since they have learnt where host II is located. i. For this case described in question (g), show the filtering database entry (MAC address and outgoing port number) for host II in each bridge. 3
4 The answer to this is none, because in question (g), nothing was learned and furthermore since host II does not send a frame, nothing can be learnt. Question 2: Solve the problem described on slide 37 in Lecture 5 notes. Make sure that you explain your answers. Root = 3 (lowest bridge ID) Root Path Cost = 0 (Bridge 3 itself is root) No root port. The configuration message is [3,0,3] All ports 1 to 5 are designated ports. Question 3: Solve the problem given on slide 38 in Lecture 5 notes. Assume that the bridge IDs are the numbers shown in the figure, i.e., the bridge ID of bridge 1 is 1, and so on. Show which messages are exchanged between the bridges until the algorithm is stabilized. BPDU sent by bridges: Table 1: BPDUs sent Time Bridge 1 Bridge 2 Bridge 3 Bridge 4 Bridge5 1 [1,0,1] [2,0,2] [3,0,3] [4,0,4] [5,0,5] 2 [1,0,1] [1,1,2] [1,1,3] [1,1,4] [1,1,5] Root ports: 2a, 3a, 4a, 5b Designated ports: 1a, 1b, 2b, 2c, 3b Blocking ports: 5a, 4b The spanning tree includes all the root ports and designated ports. Question 4: 4
5 Assume that the bridged network shown below executes the spanning tree algorithm. The Bridge IDs and BRIDGE 1 LAN G LAN A LAN B BRIDGE 2 port 4 BRIDGE 3 LAN C Host II LAN F 0:1:87:3e:ff:75 LAN D BRIDGE 4 BRIDGE 6 LAN E LAN H BRIDGE 5 LAN I Host I 5:80:87:3e:ff:75 port IDs are shown for all the bridges in the network. For the two hosts shown in the figure, the ethernet MAC addresses are provided. All the LANs are ethernet LANs. Assume that the root path costs are computed using a hop count from the root (in other words, use the root path cost computation scheme shown in the lecture notes of lecture 5). Answer the following questions: a. What BPDUs are generated by each bridge? Assume that all the bridges are operating Time Bridge 1 Bridge 2 Bridge 3 Bridge 4 Bridge 5 Bridge 6 t=0 [1, 0, 1] [2, 0, 2] [3, 0, 3] [4, 0, 4] [5, 0, 5] [6, 0, 6] t=1 [1, 0, 1] [1, 1, 2] [1, 1, 3] [3, 1, 4] [3, 1, 5] [2, 1, 6] t=2 [1, 0, 1] [1, 1, 2] [1, 1, 3] [1, 2, 4] [1, 2, 5] [1, 2, 6] in sync generating BPDUs based on the BPDUs received in the previous time slot. List the root ID, root path cost and sender s bridge ID using the three-tuple notation we used in the lecture notes. b. What is the root bridge? BRIDGE 1 5
6 c. What is the root port and root path costs of all the bridges? Bridge Root port Root path cost Bridge 1-0 Bridge Bridge Bridge Bridge Bridge d. What is the designated bridge and designated port for each LAN? LAN Designated bridge Designated port LAN A 1 2 LAN B 1 1 LAN C 2 2 LAN D 2 3 LAN E 4 1 LAN F 3 3 LAN G 3 2 LAN H 5 2 LAN I 4 2 e. Which ports of each bridge are in forwarding and which ports are in blocking? Bridge forwarding blocking Bridge 1 1, 2 Bridge 2 1, 2, 3 Bridge 3 1, 2, 3 4 Bridge 4 1, 2, 3 6
7 Bridge forwarding blocking Bridge 5 1, 2 3 Bridge 6 1 2,3 f. When Host I sends a MAC frame to Host II, what is the total number of frames generated (i.e., how many LANs see the frame) if the bridges have no addresses in their filtering databases (i.e., the bridges have not yet gone through their address learning phase)? Answer: 9 frames Bridges haven t learned addresses, MAC frames are generated on lan h, through bridge 5 to lan g, through bridge 3 to lan f and lan a, through bridge 4 to lan e, lan i, through bridge 1 to lan b, through bridge 2 to lan c, lan d: total of 9 MAC frames g. When Host I sends a MAC frame to Host II, what is the total number of frames generated (i.e., how many LANs see the frame) if the bridges have all learned the location of host II, i.e., every bridge has a correct entry in its filtering database for host II? Answer: 5 frames lan h, through bridge 5 to lan g, through bridge 3 to lan a, through bridge 1 to lan b, through bridge 2 to lan d: 5 MAC frames h. For this case described in question (g), show the filtering database entry (MAC address and outgoing port number) for host II in each bridge. Bridge MAC address Outgoing port number Bridge 1 0:1:87:3e:ff:75 1 Bridge 2 0:1:87:3e:ff:75 3 Bridge 3 0:1:87:3e:ff:75 1 Bridge 4 0:1:87:3e:ff:75 3 Bridge 5 0:1:87:3e:ff:75 1 Bridge 6 0:1:87:3e:ff:75 1 Hint: Remember that if a bridge does not have an entry for a MAC frame in its filtering database, it sends the MAC frame on its ports that are on the spanning tree (of course excluding the port on which it received the frame). 7
8 i. Draw the spanning tree: Bridge 2 lan b lan d Bridge 1 Bridge 4 lan c lan f lan e lan a lan i Bridge 3 lan g Bridge 5 lan h Bridge 6 8
Practice exercises on Ethernet switching
Practice exercises on Ethernet switching Problem. Hosts HA through HA0 LAN A b 4 photon 3 b LAN D LAN G LAN B 3 duke b utopia 3 LAN C catt LAN F LAN E A network o Ethernet bridges (switches) and hubbed
More informationCommunication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4
More informationSpanning Tree Configuration
Using the Console Interface Spanning Tree Configuration The Spanning Tree Configuration Menu screen (Figure 3-29) allows you to view spanning tree parameters and configure individual switch ports to participate
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationCSE 1 23: Computer Networks
CSE 1 23: Computer Networks Total Points: 47.5 Homework 2 Out: 10/18, Due: 10/25 1. The Sliding Window Protocol Assume that the sender s window size is 3. If we have to send 10 frames in total, and the
More informationChapter 5: STP. * What is STP? How does STP work?
Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between
More informationSupplemental Note on Count-to-Infinity Induced Forwarding Loops in Ethernet Networks
Supplemental Note on Count-to-Infinity Induced Forwarding Loops in Ethernet Networks Khaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng Department of Computer Science Rice University Abstract Ethernet forwarding
More informationSpanning Trees and IEEE 802.3ah EPONs
Rev. 1 Norman Finn, Cisco Systems 1.0 Introduction The purpose of this document is to explain the issues that arise when IEEE 802.1 bridges, running the Spanning Tree Protocol, are connected to an IEEE
More informationPeer-to-Peer Systems Exercise Winter Term 2014/2015
Peer-to-Peer Systems Exercise Published: 3..4 Presentation date: 3..4 Peer-to-Peer Systems Exercise Winter Term 4/5 General Remarks Welcome to the exercise for the lecture Peer-to-Peer Systems. Please
More informationLab STP configuration on Catalyst 1900 Command Line Interface
Lab STP configuration on Catalyst 1900 Command Line Interface Estimated Time: 30 mins Objectives: Background: To gain a better understanding of how STP works. To be able to configure and monitor STP on
More informationLecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?
Lecture 7 Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Thursday, September 15 CS 475 Networks - Lecture 7 1 Outline Chapter
More informationVirtual University of Pakistan. Describe the Hidden Node and Exposed Node problems in Standard? VUSR. [Larry L. Peterson]
www..net Solution Assignment No. 2 Question No. 1 Describe the Hidden Node and Exposed Node problems in 802.11 Standard? Hidden Node Problem: Consider the figure below. [Larry L. Peterson] B can exchange
More informationUniversity of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.
University of Toronto Faculty of Applied Science and Engineering Final Exam, December 2009 ECE 461: Internetworking Examiner: J. Liebeherr Exam Type: A Calculator: Type 2 There are a total of 10 problems.
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationCSE 473 Introduction to Computer Networks. Exam 2. Your name here: 11/7/2012
CSE 473 Introduction to Computer Networks Jon Turner Exam 2 Your name here: 11/7/2012 1. (10 points). The diagram at right shows a DHT with 16 nodes. Each node is labeled with the first value in its range
More informationEIGRP Features and Operation
EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 20 Pu+ng ALL the Pieces Together Spring 2018 Rachit Agarwal What is a computer network? A set of network elements connected together, that implement
More informationThis is a sample Lab report from ECE 461 from previous years. L A B 6
This is a sample Lab report from ECE 461 from previous years. L A B 6 Part 1 1. o the source and destination M A C/IP addresses change when a packet traverses a bridge? Provide an explanation and include
More informationImplement Spanning Tree Protocols. LAN Switching and Wireless Chapter 5
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of redundancy in a converged
More informationRapid spanning tree protocol
Rapid spanning tree protocol Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti http://www.studioreti.it Based on chapter 4 of: M. Baldi, P. Nicoletti, Switched
More informationCS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee
Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE 333: Introduction to Communication Networks Fall 00 Lecture 9: Switching and Multiplexing More on transparent bridges. Introduction to Switching and Multiplexing Transparent bridges continued: Last
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationConnecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic
1 Connecting LANs Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro + 6.11.1) CSE 3213, Fall 20105 Instructor: N. Vlajic Connecting Devices 2 Why Connecting Devices in LANs? (1) LANs do not normally
More informationUpgrading From a Successful Emergency Control System to a Complete WAMPAC System for Georgian State Energy System
Upgrading From a Successful Emergency Control System to a Complete WAMPAC System for Georgian State Energy System Dave Dolezilek International Technical Director Schweitzer Engineering Laboratories SEL
More informationLink layer: introduction
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,
More informationspanning tree exercise
spanning tree exercise 4.1 Assume a bridge receives a frame from port x, with destination MAC address D and source MAC address S. Which of the following statements about frame forwarding are NOT correct?
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 351-001 Title : CCIE Cisco Certified InterNetworking Expert Vendors : Cisco
More informationChapter 3 Lab 3-1, Spanning Tree Protocol (STP) Default Behavior
Chapter 3 Lab 3-1, Spanning Tree Protocol (STP) Default Behavior Topology Objective Background Observe the default behavior of STP. Four switches have just been installed. The distribution layer switches
More informationCS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13
CS 3700 Networks and Distributed Systems Lecture 5: Bridging Revised 1/14/13 Just Above the Data Link Layer 2 Application Presentation Session Transport Network Data Link Physical Bridging! How do we connect
More informationProblem Max. Points Act. Points Grader
Networks and Protocols Course: 00 Jacobs University Bremen Date: 007-0-4 Dr. Jürgen Schönwälder Duration: 75 minutes Midterm Examination The Jacobs University s Code of Academic Integrity applies to this
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationThe multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
CHAPTER 18 This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the IE 3010 switch. Note The multiple spanning-tree (MST) implementation is based on
More informationCompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches
More informationCSE 461: Bridging LANs. Last Topic
CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access
More informationConfiguring Spanning Tree Protocol
Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25
More informationConfiguring Access and Trunk Interfaces
Configuring Access and Trunk Interfaces Ethernet interfaces can be configured either as access ports or trunk ports. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend
More information802.1AS Fast Master Clock Selection
802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWOKS NETW 501 TUTOIAL 5 Presented by: Eng. Hana Hesham Eng. Mohamed Atef LAN Extension For Multiple Users to be connected within the same Network they may suffer from some problems such
More informationCCNA Layer 2 switching. Revision no.: PPT/2K605/03
CCNA 640-801 Layer 2 switching Revision no.: PPT/2K605/03 What is Switching? It breaks the Collision Domain It takes the packet and forwards to destined port without any modification. Network still remains
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationConfiguring Spanning Tree Protocol
Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page
More informationExamination IP routning inom enkla datornät, DD2490 IP routing in simple networks, DD2490 KTH/CSC Date: 24 May :00 19:00
Examination IP routning inom enkla datornät, DD490 IP routing in simple networks, DD490 KTH/CSC Date: 4 May 00 4:00 9:00 a) No help material is allowed - You are not allowed to use books or calculators!
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationIntroduction to Communication Networks Spring Unit 13 Network extensions Bridges.
Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures
More information3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)
3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationLAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks
LAN Interconnection different interconnecting devices, many approaches 1 Need for ability to expand beyond single LAN; appears concept of Extended LAN, extending the number of attached stations and maximum
More informationSwitching and bridging
Switching and bridging CSCI 466: Networks Keith Vertanen Fall 2011 Last chapter: Overview Crea7ng networks from: Point- to- point links Shared medium (wireless) This chapter: SoCware and hardware connec7ng
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More information- Network Time Protocol -
1 Network Time Protocol (NTP) - Network Time Protocol - Time and date information can be configured locally on both Cisco routers and switches. However, in environments with a large amount of equipment,
More informationToken Ring VLANs and Related Protocols
CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might
More informationTable of Contents 1 MSTP Configuration 1-1
Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction
More informationThe Spanning Tree Protocol
Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description
More informationA B C D E Total / 24 / 23 / 12 / 18 / 3 / 80
Carnegie Mellon Computer Science Department. 15-441 Spring 2010 Midterm Name: Andrew ID: INSTRUCTIONS: There are 10 pages (numbered at the bottom). Make sure you have all of them. Please write your name
More informationEE122 Midterm Exam UC Berkeley, Spring 1999
Problem 1: (10 points) EE122 Midterm Exam UC Berkeley, Spring 1999 (a)(1) briefly define time-division multiplexing (TDM) and statistical multiplexing (b)(2) assume 4 data sources each have a peak rate
More informationManual:Interface/Bridge - MikroTik Wiki
1 of 14 3/22/2015 11:57 AM Manual:Interface/Bridge From MikroTik Wiki < Manual:Interface Summary Ethernet-like networks (Ethernet, Ethernet over IP, IEEE802.11 in ap-bridge or bridge mode, WDS, VLAN) can
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationSwitching & ARP Week 3
Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly
More informationConfiguring Spanning Tree
CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast
More informationLAN Overview (part 2) Interconnecting LANs - Hubs
LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationCisco CCNA Basic IP Routing Part I
Cisco CCNA Basic IP Routing Part I Cisco CCNA IP Routing In this chapter, we re to discuss the IP routing process. This is an important subject to understand since it pertains to all routers and configurations
More informationHuawei GB Constructing Enterprise-level Switching Networks.
Huawei Constructing Enterprise-level Switching Networks http://killexams.com/exam-detail/ QUESTION: 391 To enable most of the subscribers to visit the file server at a rapid speed, usually we set the switch
More informationRedundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)
Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet
More informationHP 6125G & 6125G/XG Blade Switches
HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Configuration Guide Part number:5998-3155a Software version: Release 2103 and later Document version: 6W102-20141218 Legal and notice information
More information4th Slide Set Computer Networks
Prof. Dr. Christian Baun 4th Slide Set Computer Networks Frankfurt University of Applied Sciences WS1718 1/29 4th Slide Set Computer Networks Prof. Dr. Christian Baun Frankfurt University of Applied Sciences
More informationRevision of Previous Lectures
Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture
More informationToken Ring VLANs and Related Protocols
Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationTable of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w)
Table of Contents Understanding Rapid Spanning Tree Protocol (802.1w)...1 Introduction...1 Support of RSTP in Catalyst Switches...2 New Port States and Port Roles...2 Port States...2 Port Roles...3 New
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol
More informationArtificial Intelligence
Artificial Intelligence Exercises & Solutions Chapters -4: Search methods. Search Tree. Draw the complete search tree (starting from S and ending at G) of the graph below. The numbers beside the nodes
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More information4 Spanning Tree Protokoll 802.1D-2004
Computernetze 1 (CN1) 4 Spanning Tree Protokoll 82.1D-24 Prof. Dr. Andreas Steffen Institute for Information Technologies and Applications Steffen/Stettler, 6.1.213, 4-SpanningTree.pptx 1 What happens
More informationCS/ECE 4457 FALL Name: Computing ID: WARM UP. Question 1: What type of transmission mode is depicted in the photo below:
CS/ECE 4457 FALL 2018 Name: Computing ID: WARM UP Question 1: What type of transmission mode is depicted in the photo below: 1) Simplex 2) Full Duplex 3) Half Duplex 4) None of the above LINK LAYER Error
More informationCisco Exam Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ]
s@lm@n Cisco Exam 200-101 Interconnecting Cisco Networking Devices Part 2 Version: 10.0 [ Total Questions: 149 ] Topic break down Topic No. of Questions Topic 1: LAN Switching Technologies 18 Topic 2:
More informationLecture 8: Networks to Internetworks
Lecture 8: Networks to Internetworks CSE 123: Computer Networks Alex C. Snoeren NO CLASS FRIDAY Lecture 8 Overview Bridging & switching Learning bridges Spanning Tree Internetworking Routering Internet
More informationApplied Networks & Security
Applied Networks & Security Local Area Networks (LANs) http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1 Local Area Network
More informationRSTP Configuration. Page 1 of 26
RSTP Configuration Page 1 of 26 Content Chapter 1 STP Configuration... 1 1.1 STP Overview... 1 1.1.1 Function of STP...1 1.1.2 Protocol Packets of STP...1 1.1.3 Basic Concepts in STP... 1 1.1.4 Spanning-Tree
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationCS164 Final Exam Winter 2013
CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationConfiguring Transparent Bridging
Configuring Transparent Bridging Document ID: 10676 Contents Introduction Before You Begin Conventions Prerequisites Components Used Bridging Transparent Bridging Configuration Examples Example 1: Simple
More informationConfiguring Spanning Tree Protocol
CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in
More informationDuke University CompSci 356 Midterm Spring 2016
Duke University CompSci 356 Midterm Spring 2016 Name (Print):, (Family name) (Given name) Student ID Number: Date of Exam: Feb 25, 2016 Time Period: 11:45am-1pm Number of Exam Pages: 15 (including this
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationData Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I
Data Communication Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 34 TCP/ IP I Hello and welcome to today s lecture on TCP/IP. (Refer Slide
More informationUniversity of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences
University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Sciences EE122 MIDTERM EXAMINATION Monday, 18 October 2010 Scott Shenker INSTRUCTIONS READ
More informationLab 2. Spanning Tree Protocols. Overview. JNCIS-ENT++ Bootcamp
Lab 2 Spanning Tree Protocols Overview This lab demonstrates basic configuration and monitoring tasks when implementing spanning tree and some related protection features on EX Series switches. In this
More informationDesign and Analysis of Algorithms Prof. Madhavan Mukund Chennai Mathematical Institute
Design and Analysis of Algorithms Prof. Madhavan Mukund Chennai Mathematical Institute Module 07 Lecture - 38 Divide and Conquer: Closest Pair of Points We now look at another divide and conquer algorithm,
More informationData Communications. Connecting Devices
Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use
More informationConfiguring MSTP CHAPTER
CHAPTER 16 Configuring MSTP This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Catalyst 2960 switch. Note The multiple spanning-tree (MST) implementation
More informationA primer on modern LANs
Advanced Networks http://disi.unitn.it/locigno/index.php/teaching-duties/ A primer on modern LANs Renato Lo Cigno Copyright Quest opera è prote1a dalla licenza: Crea&ve Commons A-ribuzione- Non commerciale-
More informationChapter 5. Spanning Tree Protocol (STP) Part I
Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More information