Which switch should be the root switch

Assignment Help Computer Networking
Reference no: EM13336902

Question 1
Can PC2-1 ping PC2-2? Explain why.
Can PC2-1 ping PC7-1? Explain why.

Question 2
In Q8.pkt, which switch is the root switch? Explain why.

Which switch should be the root switch? Explain why.

Question 3
-  Explain why link 1 is active while link 2 is blocked by STP.
-  Explain why link 8 is active while link 5 and link 6 are blocked by STP.
-  Explain why link 7 is active while link 3 and link 4 are blocked by STP.
-  Explain why in link 6, port 6 of Distribution-3 is non-designated and port 6 of Core-1 is designated.
-  Explain why in link 3, port 3 of Distribution-2 is designated and port 3 of Core-1 is non-designated.

Question 4

In Q8.pkt, force Distribution-2 to be the root for the Spanning tree protocol.

Question 5

Assign all switches in Q8.pkt from question 4 to the VTP domain "USQ" except Access-1. Using Access-2 and Access-3 as VTP Severs while other switches act as VTP Clients, set up 2 VLANs in Q8.pkt:
 
VLAN  number  10  20
VLAN Name  Finance  Sales
 
Does VTP works as expected? Why?

Make sure VTP works before you proceed to Question 6.

Question 6  

In Q8.pkt from question 5, associate port 1 of all Access-2 to Acces-7 to VLAN 10. Associate port 2 of all Access-2 to Acces-7 to VLAN 20.

Question 7

In Q8.pkt from question 6, can PC2-1 ping PC2-2? Explain why.

Can PC2-1 ping PC7-1? Explain why.

Apply DTP to the switches in Q8.pkt from question 6 such that PC2-1 can ping PC7-1.

Question 8

In Q8.pkt from question 7, set up port security for Access-2:
-  Port 12
o  Dynamic
o  Sticky
-  Port 1
o  Dynamic

o  Sticky

such that no other PCs except PC1-1 and PC1-2 are allowed to access port 12 of Access-2, and only PC2-1 can access port 1 of Assess-2
Save Q8.pkt.

Question 9

Save Q8.pkt as Q9.pkt. Continue to work on Q9.pkt

Connect a router USQ (model 2811) to Core-1 in Q9.pkt to enable inter-VLAN routing using one VLAN per interface.

Make sure all PCs can ping all PCs

Save Q9.pkt.

Question 10

Save Q8.pkt as Q10.pkt. Continue to work on Q10.pkt

Connect a router to Core-1 in Q10.pkt to enable inter-VLAN routing using router on a stick configuration.

Make sure all PCs can ping all PCs

Reference no: EM13336902

Questions Cloud

Calculate how much kinetic energy does the ball have : Professional baseball pitchers can deliver a pitch which can reach the blazing speed of 100 mph (miles per hour). how much kinetic energy does the ball have
Determine the focal length of the eyepiece : A telescope has an angular magnification of -30× and a barrel 1.02m long. What is the focal length of the eyepiece
What is the initial vertical acceleration of the submarine : Submarines control their buoyancy using ballast tanks. To sink the tanks can be flooded with water and to rise compressed air can be fed into the tanks to expel the water, lowering the density of the sub.
How to calculate delta h in kilojoules for the reaction : Assuming that the specific heat of the solution is 4.18 KJ and that the calorimeter itself absorbs a negligible amount of heat, calculate delta H in kilojoules for the reaction K2O+H2O->2KOH
Which switch should be the root switch : Connect a router USQ (model 2811) to Core-1 in Q9.pkt to enable inter-VLAN routing using one VLAN per interface.
Obtain the angular speed of the wheel : An automobile tire has a radius of 0.325 m, and its center moves forward with a linear speed of v = 24.8 m/s. Determine the angular speed of the wheel
What is the density of the buoy reaches the ocean floor : A dense rubber buoy is attached to a lead weight when it is accidentally lost overboard from an ocean going vessel. The density of the buoy at the surface was 661 kg/m^3.
Explain the emf generated by the cell under standard : Which electrode gains mass and which loses mass as the cell reaction proceeds. What is the equation for the equation for the overall cell reaction. What is the emf generated by the cell under standard conditions
Find speed does the hockey player recoil : A 74- kg ice hockey player standing on a frictionless sheet of ice throws a 6.2- kg bowling ball horizontally with a speed of 3.9 m/s. what speed does the hockey player recoil

Reviews

Write a Review

Computer Networking Questions & Answers

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  Design network to integrate wireless-existing wired network

Design a network that will integrate a wireless network into an existing wired network. The wired network consists of five departments in a two-story building.

  Ciphertext which was encoded with a shift cipher

the following ciphertext which was encoded with a shift cipher: xultpaajcxitltlxaarpjhtiwtgxktghidhipxciwtvgtpilpitghlxiwiwtxgqadds.1. Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify th..

  Design a simple layout of omni directional antennas

Would you recommend security for this network, and if so, what type of security? Discuss the options and justify your choice and design a simple layout of omni directional antennas to cover the entire warehouse.

  Two hosts, a and b, are separated by 20,000

two hosts, A and B, are separated by 20,000 kilometers and are connected by a link of R=2 Mbps, and there are 4 routers between A and B. Suppose the propagation speed over the link is 2.5*108 meters/sec, average queueing time is 2ms,

  How to allot ip address to different subnets

How would you allot IP address to different subnets? How would you control process by which IP address are allotted to individual computers?

  Find maximum number of telephone supported by office

Average telephone is used to make four calls per 8-hour workday, with mean call duration of six minutes. Ten percent of calls are long distance. Determine maximum number of telephones an end office can support?

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

  How many hosts can there be in each subnet

Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the above description.

  Assume there are n nodes

Assume there are N nodes connected to a wireless access point (AP) operating on IEEE 802.11b, and every node has at least one packet to send at a given time.

  Design own message format and provide ids

You have to create your own message format and provide IDs in any way you want. At minimum message should have source address, destination address, TTL and address of sending node etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd