Screenshot 2024-04-23 170524
.png
keyboard_arrow_up
School
University of California, Los Angeles *
*We aren’t endorsed by this school
Course
MISC
Subject
Computer Science
Date
Apr 25, 2024
Type
png
Pages
1
Uploaded by BailiffWallaby4255 on coursehero.com
Use Cisco Packet Tracer to create the network with values shown below containing 3 interconnected Ethernet switches and 3 computers. Verify that from PC1, you can ping the IP address of the other five devices. Subnet mask of all devices should be 255.255.255.0. STP priority STP priority vlan2 49152 32768 a 1] switcht g e 3] swih2 |1 vlan2 5 192.168.1.11 192.168.1.22 e 192 TgS‘l.‘l 10 7 Network 4 192.168.1.20 192.168.1.0/24 vian2 vian2 6 5 Switch3 1 vian2 5 192.168.1.33 e STP priority 192.168.1.30 16384 1. (1 pt) Submit screenshot of Cisco Packet Tracer network diagram created. Make sure that the port labels are shown (Options->Preferences->Show Port Labels) 2. Submit output of “show running-config” of each switch. a. (1 pt) Highlight the Cisco command(s) used to configure each connected switch port to be in vlan 2. b. (1 pt) Highlight the Cisco command(s) used to configure the ip address of the switches to be in vlan 2. c. (1 pt) Highlight the Cisco command(s) used to configure the spanning-tree priority for vlan 2 of each switch. 3. (1pt) Which switch is the root bridge? Support your answer with an appropriate screenshot of “show spanning-tree” executed on the root bridge. 4. (1pt) Which switch ports will become a Spanning-Tree Protocol root port? Support your answer with screenshots of “show spanning-tree” executed on switches containing a root port 5. (1pt) Which switch port(s) on each switch will Spanning-Tree Protocol place into forwarding state? Support your answer with screenshots. 6. (1pt) Which switch ports(s) on which switch will Spanning-Tree Protocol place into blocking state? Support your answer with a screenshot of “show spanning-tree” executed on switch with blocked port. 7. (1pt) If PC1 were to send ICMP ping packets to PC2, which network links will the packets traverse? 8. (1pt) On the switch that has a STP blocked port, what will spanning tree protocol do to this port if you were to administratively “shutdown” the interface of this switch’s original STP root port?
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Apply subnetting for the following topology, use the major network is “160.20.0.0".
Find only the subnet id and the broadcast IP address for all the subnets.
LaptapT
Laptop
Laptpr
Lapties
Routero
Laptao
Laptap
Laptupr
Laptapo
26200
295OT-24
2620M
95OT-24
Router1
Router2
Switcha
Switcho
Laptap
Laptop
Laptpr
Laptp
Subnet id
Broadcast IP Address
Subnet 1
a.
b.
Subnet 2
с.
d.
Subnet 3
е.
f.
Subnet 4
g.
h.
Subnet 5
i.
j.
Subnet 6
k.
1.
arrow_forward
Convert binary network address to decimal
IP Address: 192.168.20.20/24
Host Address
192
168
20
20
Binary Host Address
Binary Subnet Mask
11111111
11111111
11111111
00000000
Binary Network Address
Network Address
B. Convert the host address to biary to get the binary host address. Use truth table AND to get the binanry network address. Lastly, convert the binary network address to decimal.
C. Show the solution
arrow_forward
List all the static routes on each of the 4 routers required for full communication across the topology. The addresses with question marks have been relabeled.
I think each router should have 3 static routes. This is using the ip route command (ip route <netid> <net mask> <next hop>)
arrow_forward
Assume a packet loss is detected after the 27th round by the receipt of a timeout, what will be the
value of the congestion window size
and what will be the value of the ssthresh
? (We use TCP Reno here.)
17
16
15
14
13
12
11
O 1 2 3 4 56 7 89 1o 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Transmission Round
Window Size
arrow_forward
Assume a packet loss is detected after the 27th round by the receipt of a 3-dupACK, what will be
the value of the congestion window size
and what will be the value of the
ssthresh
? (We use TCP Reno here.)
17
16
15
14
13
12
11
O 1 2 3 4 s6 7 89 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Transmission Round
Window Size
arrow_forward
. Suppose Host A sends over a TCP connection to Host B one segment with sequence number 3777 and 1500 bytes of data. Assuming the segment is received correctly, what is the sequence number of the ACK that Host B sents to Host A for this segment?
2.Calculate the the Internet checksum of 0100 1011 1001 1111 and1100 1100 0101 1101.
3.How many control messages are required to close a TCP connection?
arrow_forward
Every host in an IPv4 network has a 1-
second resolution real-time clock with
battery backup. Each host needs to
generate up to 1000 unique identifiers
per second. Assume that each host has
a globally unique IPv4 address. Design
a 50-bit globally unique ID for this
purpose. After what period (in seconds)
will the identifiers generated by a host
wrap around?
arrow_forward
The first of these packets is from your computer to the DHCP server telling it to release the lease on your IP address. The next 4 packets renew that lease. Note that the source address on the “DHCP Discover” and “DHCP Request” packets is 0.0.0.0. This indicates that your computer does not actually use its new IP address until the interchange has completed. Also note that the destination address in each of the 4 packets is a broadcast address[1]. It should be obvious to you why the first two packets are broadcasted, but what about the last two? Can you explain this? Answer the questions in your Word document right after you post a snapshot of the DHCP packet screen. (#4)
arrow_forward
Hosts A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN Ethernet frames may carry data up to 1500 bytes (ie MTU = 1500byles ) Size of UDP header is 8 bytes and size of IP header is 20 bytes There is no option field in IP header How may total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment?
arrow_forward
The following packet was generated by snort..
[**] [1:491:8] INFO FTP Bad login [**]
[Classification: Potentially Bad Traffic] [Priority: 2]
04/25-08:24:53.007701 192.168.202.16:21 -> 192.168.202.19:46217
TCP TTL:64 TOS:OxO ID:50316 IpLen:20 DgmLen:74 DF
***AP*** Seq: O×52A35467 Ack: O×4E8DE79E Win: 0x39 TcpLen: 32
TCP Options (3) => NOP NOP TS: 85758994 127601244
Please answer the following questions based on the above packet data ..
Q1. What is the Source IP address?
Q2. What is the Destination IP address
Q3. Based on your information above and the 4-tuple, what type of
server is this ?
Q4. What is the IP identification number?
Q5. What is the SID that trigger this rule?
Q6. What is the revision of the rule?
arrow_forward
Suppose you are retrieving your email at the start of a new day at the College and your mail first reaches the BMCC’s web server. Assuming the BMCC webserver does not have the MAC Address of the workstation receiving these mail messages. Explain in detail how the ARP protocol is used in locating the final destination of the internal network computer that will be receiving this Internet traffic. The conversion from IPv4 to IPv6 Addressing has been completed for about 30% of Internet traffic after 22 years. Explain in detail why the Maximum Transmission Unit (MTU) of Ethernet frames is an obstacle in this conversion (hint: look closely at the TCP and IP headers for IPv4 to IPv6 Addressing).
arrow_forward
For the following Ips, write the network name, BC address, Prefix length, and thedefault maskNet name BC Prefix length default mask 11.45.3.5 180.90.27.89 190.35.177.98 192.76.19.1 200.30.50.90 100.100.100.100 107.39.50.20
192.3.5.6
arrow_forward
For a given an IP v4 datagram, with header fields: HLEN - 5. Total length - 2220 and flag field (RDM) - 000. If this datagram is required to pass through a network of MTU - 1164 byte and need to be fragmented, choose the correct answer
1_For the given packet,
the header size is
10 bytes
20 bytes
40 bytes
30bytes
2_The number of fragments to which the given packet is fragmented to pass through the network of MTU: 164:
three
Tour
two
Six
Network Ineed answer after 30 min
arrow_forward
An organization has just obtained a class-B IP 145.93.*.*/16, but it wants to divide it into 32 subnetworks, how many bits should be used to represent the subnet ID (excluding the network ID)? Do all the subnets have the same subnet mask? If the aforementioned question is true, what is the subnet mask? Otherwise, please list the subnet mask for each subnet.
arrow_forward
Q' Figure below shows the IPV4 datagram format. Fill the fields from 1 to 5 by choosing the right
answers
2
16-bit identifier ID
flags
3
4
32 bit source IP address
5
options
Data (variable length, typically a TCP or UDP segment)
1- Field (1) is for:
a- Time to live
b- IP protocol version number
c- Type of service
d- Header checksum
e- Upper layer protocol
f- None of them
2- Field (2) is for:
a- Time to live
b- IP protocol version number
c- Type of service
d- Header checksum
e- Upper layer protocol
f- None of above
3- Field (3) is for:
a- Time to live
b- IP protocol version number
c- Type of service
d- Header checksum
e- 32 bit destination IP address
f- None of them
arrow_forward
Convert IPV4, Combine Prefix, Apply Subnet, Rewrite new address:
Original IPV4
Network
Subnet
Combined
Converted
Prefix
ID
Prefix/Subnet
(48 bits)
(16)
The first valid
address in the second
2001:FEFE:8001
1
2001:FEFE:8001:0001
subnet using
172.31.0.0/26 *
The LAST valid
address in the first
subnet using
172.16.10.0/27 *
3000:1235:F100
16
2FOA:4444:0100
156.100.10.0
187.112.0.1
32
20
arrow_forward
Given the topology below, write the commands to advertise the OSPFv3 networks on the Sohar router. Use the following requirements:
- Enable IPv6 routing- Process ID 10
- Router IDs (Sohar router = 2.2.2.2)
- Advertise Network address for each interface
- LAN interface (G0/0) set to passive interface
- Assign Link-Local Addresses (fe80::1) to G0/0
arrow_forward
What is the size of the effective sending window if the following information is collected in the sending TCP:
Sending buffer size = 32000 Byte
Last Byte Acknowledged (LBA) = 22555
Last Byte Sent (LBS) = 33666
Advertised Window = 15000 Byte
Congestion Window (cwnd) = 12000 Byte
O1. 32000
O II. 12000
O II. 15000
O V. 889
If two hosts start communicating using TCP Reno (with fast retransmit and fast recovery). What would be the size of the
congestion window after the 10th RTT (the window that will be used in the 11th RTT) if the congestion threshold is initially
set to 16 MSS and if 3 duplicate acknowledgments have been observed during the 7th RTT.
O1. 8
O II. 22
O II. 12
O V.512
What is the maximum advertised window size if the following information is collected about the receiver buffer:
Buffer size = 12000 bytes
Next Byte Expected (NBE) = 555
Last Byte Read by the application process (LBR) = 222
No out of sequence data received
O1. 222
O II. 12000
O II. 555
O IV. 11668
arrow_forward
VLSM
Create a IP Address scheme using VLSM. You are told to create the following 8 subnets using
10.10.0.0/22.
8. Network H has 59 hosts
Complete all the fields in the following table. Make sure to show your work.
Network Subnet
Netmask CIDR Broadcast Address
A
B
C
D
E
1. Network A has 50 hosts
2. Network B has 90 hosts
3. Network C has 36 hosts
4. Network D has 190 hosts
5. Network E has 15 hosts
6. Network F has 20 hosts
7. Network G has 100 hosts
FGH
Number of Hosts
arrow_forward
1.The Intra-Site Automatic Tunnel Addressing Protocol is used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.True or false
2. ICMP is a Network-layer protocol the ping program uses to test whether a computer can communicate with another computer.true or false
3.Addresses starting with fe80 are called link-local IPv6 addresses.true or false
4Routing packets is the key responsibility of the TCP protocol.true or false
5.A zone id is used to distinguish which interface an IPv6 unique local IPv6 address is bound to.true or false
arrow_forward
An organization wants to use the private network number 192.168.90.0 across four subnets. The maximum number of hosts that exist per subnet will be 25. What subnet mask would you use to solve the problem?
arrow_forward
B. Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in your local host, so a
DNS lookup is necessary to obtain the IP address.
Suppose that two DNS servers are visited before your host receives the IP address from DNS. The first DNS server visited is the local DNS cache, with an RTT
delay of RTTO = 5 msecs. The second DNS server contacted has an RTT of 8 msecs.
Initially, let's suppose that the Web page associated with the link contains exactly one object, consisting of a small amount of HTML text.
Suppose the RTT between the local host and the Web server containing the object is RTTHTTP=63 msecs.
1. Assuming zero transmission time for the HTML object, how much time elapses from when the client clicks on the link until the client receives the object?
2. Suppose the HTML object references 4 very small objects on the same web server. Neglecting transmission times, how much time elapses from when
the client…
arrow_forward
Suppose you open your BMCC mailbox first thing on a Monday morning and find that your messages have arrived. Assuming the BMCC server does not have access to the MAC address of the device reading these emails. Explain in detail how the ARP protocol determines which device on the LAN will be the recipient of incoming Internet data. After 22 years, the transition to IPv6 addressing is complete for around 30 percent of Internet traffic. When comparing IPv4 and IPv6 address headers, the Ethernet frames' Maximum Transmission Unit (MTU) stands out as a potential stumbling block.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Related Questions
- Apply subnetting for the following topology, use the major network is “160.20.0.0". Find only the subnet id and the broadcast IP address for all the subnets. LaptapT Laptop Laptpr Lapties Routero Laptao Laptap Laptupr Laptapo 26200 295OT-24 2620M 95OT-24 Router1 Router2 Switcha Switcho Laptap Laptop Laptpr Laptp Subnet id Broadcast IP Address Subnet 1 a. b. Subnet 2 с. d. Subnet 3 е. f. Subnet 4 g. h. Subnet 5 i. j. Subnet 6 k. 1.arrow_forwardConvert binary network address to decimal IP Address: 192.168.20.20/24 Host Address 192 168 20 20 Binary Host Address Binary Subnet Mask 11111111 11111111 11111111 00000000 Binary Network Address Network Address B. Convert the host address to biary to get the binary host address. Use truth table AND to get the binanry network address. Lastly, convert the binary network address to decimal. C. Show the solutionarrow_forwardList all the static routes on each of the 4 routers required for full communication across the topology. The addresses with question marks have been relabeled. I think each router should have 3 static routes. This is using the ip route command (ip route <netid> <net mask> <next hop>)arrow_forward
- Assume a packet loss is detected after the 27th round by the receipt of a timeout, what will be the value of the congestion window size and what will be the value of the ssthresh ? (We use TCP Reno here.) 17 16 15 14 13 12 11 O 1 2 3 4 56 7 89 1o 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Transmission Round Window Sizearrow_forwardAssume a packet loss is detected after the 27th round by the receipt of a 3-dupACK, what will be the value of the congestion window size and what will be the value of the ssthresh ? (We use TCP Reno here.) 17 16 15 14 13 12 11 O 1 2 3 4 s6 7 89 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Transmission Round Window Sizearrow_forward. Suppose Host A sends over a TCP connection to Host B one segment with sequence number 3777 and 1500 bytes of data. Assuming the segment is received correctly, what is the sequence number of the ACK that Host B sents to Host A for this segment? 2.Calculate the the Internet checksum of 0100 1011 1001 1111 and1100 1100 0101 1101. 3.How many control messages are required to close a TCP connection?arrow_forward
- Every host in an IPv4 network has a 1- second resolution real-time clock with battery backup. Each host needs to generate up to 1000 unique identifiers per second. Assume that each host has a globally unique IPv4 address. Design a 50-bit globally unique ID for this purpose. After what period (in seconds) will the identifiers generated by a host wrap around?arrow_forwardThe first of these packets is from your computer to the DHCP server telling it to release the lease on your IP address. The next 4 packets renew that lease. Note that the source address on the “DHCP Discover” and “DHCP Request” packets is 0.0.0.0. This indicates that your computer does not actually use its new IP address until the interchange has completed. Also note that the destination address in each of the 4 packets is a broadcast address[1]. It should be obvious to you why the first two packets are broadcasted, but what about the last two? Can you explain this? Answer the questions in your Word document right after you post a snapshot of the DHCP packet screen. (#4)arrow_forwardHosts A sends a UDP datagram containing 8880 bytes of user data to host B over an Ethernet LAN Ethernet frames may carry data up to 1500 bytes (ie MTU = 1500byles ) Size of UDP header is 8 bytes and size of IP header is 20 bytes There is no option field in IP header How may total number of IP fragments will be transmitted and what will be the contents of offset field in the last fragment?arrow_forward
- The following packet was generated by snort.. [**] [1:491:8] INFO FTP Bad login [**] [Classification: Potentially Bad Traffic] [Priority: 2] 04/25-08:24:53.007701 192.168.202.16:21 -> 192.168.202.19:46217 TCP TTL:64 TOS:OxO ID:50316 IpLen:20 DgmLen:74 DF ***AP*** Seq: O×52A35467 Ack: O×4E8DE79E Win: 0x39 TcpLen: 32 TCP Options (3) => NOP NOP TS: 85758994 127601244 Please answer the following questions based on the above packet data .. Q1. What is the Source IP address? Q2. What is the Destination IP address Q3. Based on your information above and the 4-tuple, what type of server is this ? Q4. What is the IP identification number? Q5. What is the SID that trigger this rule? Q6. What is the revision of the rule?arrow_forwardSuppose you are retrieving your email at the start of a new day at the College and your mail first reaches the BMCC’s web server. Assuming the BMCC webserver does not have the MAC Address of the workstation receiving these mail messages. Explain in detail how the ARP protocol is used in locating the final destination of the internal network computer that will be receiving this Internet traffic. The conversion from IPv4 to IPv6 Addressing has been completed for about 30% of Internet traffic after 22 years. Explain in detail why the Maximum Transmission Unit (MTU) of Ethernet frames is an obstacle in this conversion (hint: look closely at the TCP and IP headers for IPv4 to IPv6 Addressing).arrow_forwardFor the following Ips, write the network name, BC address, Prefix length, and thedefault maskNet name BC Prefix length default mask 11.45.3.5 180.90.27.89 190.35.177.98 192.76.19.1 200.30.50.90 100.100.100.100 107.39.50.20 192.3.5.6 arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning