packet, Computer Networking

Assignment Help:
a transperent switch is inserted between two local area networks ABC and XYZ.network ABC has workstation 1,2,and 3 and Network XYZ has workstation 4,5, and 6.
show the contents of two forwading tables in the switch as the following packets are transmitted.both forwading tables start off empty.

workstation 2 sends packet to workstation 3.
workstation 2 sends packet to workstation 5.
workstation 1 sends packet to workstation 2.
workstation 2 sends packet to workstation 3.
workstation 2 sends packet to workstation 6.
workstation 6 sends packet to workstation 3.
workstation 5 sends packet to workstation 4.
workstation 2 sends packet to workstation 1.
workstation 1 sends packet to workstation 3.
workstation 1 sends packet to workstation 5.
workstation 5 sends packet to workstation 4.
workstation 4 sends packet to workstation 5.

Related Discussions:- packet

Twisted pair cable - computer network, Twisted Pair Cable Twisted pair...

Twisted Pair Cable Twisted pair cable  consists of two insulated copper  wires  each  about 1 mm  thick arranged in a regular spiral  pattern. The wires  are twisted together

What is dynamic host configuration protocol, How does dynamic host configur...

How does dynamic host configuration protocol aid in network administration? Instead of having to visit every client computer to configure a static IP address, the network admin

Parallel virtual machine (pvm), PVM (Parallel Virtual Machine) is a portabl...

PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link divide heterogeneous host machines to form a "virtual machine" which is a one, man

Objective of parallel algorithms, After studying this part the students wil...

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

How does a switch use store and forward, The LAN switch copies the whole fr...

The LAN switch copies the whole frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and verifies the outgoing interface

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd