Two ethernet switches sw1 and sw2 , Computer Engineering

Six machines H1, H2, ..., H6 are linked by two Ethernet switches SW1 and SW2 as given below. Both switches have four ports drawn. The port numbers are as indicated. Suppose the two switches are just turned on, so both switch tables are empty. Give the content of the switch tables at SW1 and SW2 after the following transmissions: 

 

(1) H1 sends a frame to H2; 

(2) H3 sends a frame to H5; 

(3) H4 sends a frame to H2;  

(4) H6 sends a frame to H3; 

(5) H5 sends a frame to H6. 

 

Use H1 to H6 to show the MAC addresses in your answer. Ignore the time stamp in every entry. Suppose no table entry expires. You do not have to list the table content after every transmission.

 

Posted Date: 3/28/2013 5:35:09 AM | Location : United States







Related Discussions:- Two ethernet switches sw1 and sw2 , Assignment Help, Ask Question on Two ethernet switches sw1 and sw2 , Get Answer, Expert's Help, Two ethernet switches sw1 and sw2 Discussions

Write discussion on Two ethernet switches sw1 and sw2
Your posts are moderated
Related Questions
Asymptotic Notations These notations are used for evaluating functions. Assume we have two functions f(n) and g(n) defined on real numbers, Theta Notation Big Notation

draw 4 bit binary to gray code

Fuzzy set theory provides a means for modeling the kind of uncertainty associated with vagueness, with imprecision, and/or with a lack of information regarding a particular element


We are planning an orienteering game. The aim of this game is to arrive at the goal (G) from the start (S) with the shortest distance. However, the players have to pass all the che

Which transmission mode is used for data communication along telephone lines? Serial transmission mode is utilized for data communication along telephone lines.

Three projects as follows: a. Life  static library, code for every needed  function in the Life program. b. LifeGame  .exe application, i.e., a standard console application t

What is binary adder? Binary adder is constructed with full adder circuit linked in cascade, with the output carry from one full adder linked to the input carry of next full ad

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

1)    Describe challenges involved for both the sender and the receiver in the communication process. 2)    Describe the purpose of a subject line in an email message and give gui