Explain how inter-vlan communication, Computer Network Security

Assignment Help:

QUESTION

a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store and forward switching, fast-forward cut-through switching and fragment-free cut-through switching.

b) Switching in a network isn't free from problems. Some of the most important issues that arise within a switched network are switching loops, multiple frames transmission and MAC address instability. Fortunately, the IEEE 802.1D Spanning Tree Protocol (STP) has been developed to address these issues.

Describe with the aid of a diagram(s) and with reference to the following key words, how STP operates in order to solve the above mentioned problems.

  • Root Bridge
  • Hello PBDU
  • Designated, Blocked and Root ports
  • Downtime

c) A nice feature of a switched network is the ability to set up Virtual Local Area Networks (VLANs).

(i) Explain how frame tagging within a VLAN can be used to set up trunk ports.

(ii) Explain how inter-VLAN communication can be achieved through subinterfaces.


Related Discussions:- Explain how inter-vlan communication

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Cryptographic algorithms-cryptography, Cryptographic algorithms Cryptogr...

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

Explain the random key distribution, Q. Explain the random key distribution...

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Explain about security aware protocols, Q. Explain about Security aware pro...

Q. Explain about Security aware protocols? The security-Aware ad hoc Routing (SAR) protocol based on the security attributes integrated into the ad hoc route discovery provides

Describe the functionality of a router, QUESTION: (a) Explain, with the...

QUESTION: (a) Explain, with the aid of a diagram, a Star topology of a network of your choice. (b) Illustrate on the use of a MAN and give an example of one. (c) Describe

Explain the rsa algorithm, Question: (a) What is the minimum length of...

Question: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

Malicious node detection mechanisms, Many applications are vulnerable to in...

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

Estimate the average throughput, Question (a) Estimate the average thr...

Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

Determine the round trip time, QUESTION a) Determine the RTT (round tr...

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd