logo

Assignment based on the Network Management

8 Pages1595 Words44 Views
   

Added on  2020-04-13

Assignment based on the Network Management

   Added on 2020-04-13

ShareRelated Documents
Running head: NETWORK MANAGEMENT
Network Management
[Name of the Student]
[Name of the University]
[Author note]
Assignment based on the Network Management_1
NETWORK MANAGEMENT1
1. Explain how a switch learns MAC addresses, and where a switch stores the address.
Ans: Broadcast of frame is never done by a switch neither it is an action which can be taken by a
switch. Flooding of the frame is only possible by the use of a switch. A broadcast is nothing but
a frame which has a destination MAC address that is nnn.nnn.nnn. When a frame is received by a
switch the MAC address table is updated with that of the MAC address and the port where the
frame is received (Tootoonchian et al., 2012). In case if the MAC address at the destination is not
the MAC address at the table, then the frame is flooded to all the ports excluding the port that has
received the frame.
2. How does a layer 3 switch differ from a layer 2 switch?
Ans: The tradition method of switching operates at layer 2 of the OSI model in which the switch
port receives the packets that are generally based on the destination of the MAC address.
Whereas the routing process is operated on the layer 3 switch in which the packets are sent to the
hop IP that present next to it and this is based upon the IP address of the destination (Decusatis,
Carranza & DeCusatis, 2012).
3. Explain how a host knows whether a data packet was not received.
Ans: During the transfer of the packet data from one end to another a dialogue goes on between
the TCP/IP software of the host computer and the receiver computer so as to ensure that the
transfer of files is successful. In cases if the receiver computer dose not receives the whole
packet then the TCP/IP of the receiver sends the message to the TCP/IP of the host asking it to
resend the particular packet that is missing. The receiving of the dialogue continues until the
packets are received by the receiver (Afanasyev et al., 2014).
Assignment based on the Network Management_2
NETWORK MANAGEMENT2
4. Your boss has read about IPv6 and wants to know whether the network you oversee is
ready for the transition. Prepare a response based on the networking and computer
operating systems used in your facility.
Ans: The use of IPv6 will make the elimination of the NAT as the use of IPv6 will make each
device have their own unique IP addresses. All the devices will be able to access the public
network which will help in easy management of the file sharing, peer-to-peer programs and other
applications by avoiding the complex settings in the routers. The security also increases by the
use of IPv6 (Davies, 2012).
5. Your company is assigned a 206.206.155.0/24 CIDR block by your ISP. Your company
consists of 5 different networks.
Network A: 50 users
Network B: 26 users
Network C: 12 users
Network D: 10 users
Your job is to create four subnets and allocate enough IP addresses for the users within the
network. Document how you will do this.
Ans:
Assignment based on the Network Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Network Management Methods
|5
|778
|77

Research Assignment on Network Management
|5
|467
|39

SIT202 Computer Networks: TCP/IP Protocol, Network Loop, Data Encapsulation, Point-to-Point Network, Modulation, Collision
|14
|1888
|349

Computer Networks: Encapsulation, Switched Network, PPP, Modulation
|16
|2497
|343

Understanding Network Topology and Routing Protocols
|9
|2234
|143

Fundamental of Computer System
|11
|2560
|288