Ask a question from expert

Ask now

Report on Network Management Methods

5 Pages778 Words77 Views
   

Added on  2020-04-15

Report on Network Management Methods

   Added on 2020-04-15

BookmarkShareRelated Documents
Running head: NETWORK MANAGEMENTNetwork ManagementName of the StudentName of the UniversityAuthors Note:
Report on Network Management Methods_1
NETWORK MANAGEMENT11. Explain how a switch learns MAC addresses, and where a switch stores the address. Ans: Broadcast of frame cannot be achieved by a switch which is neither can be called as anaction which is performed by switch. Flooding of frame can be easily achieved by the help ofswitch. Broadcast of a frame can be easily achieved by the help of switch which has MACaddress and the particular port which the frame contains (Afanasyev, et al,.2014). In the matterof MAC address which is not present at the destination of MAC address after that frame isbroken into ports which is generally make use of port. 2. How does a layer 3 switch differ from a layer 2 switch? Ans: Traditional method at which switch works generally consist OSI model in this methodswitch models contains packets which generally works on the mode or principle of thedestination of MAC address (Davies, 2012). The routine method generally operates on theknown layer which the third one. In this mechanism the hop IP which is present next to it are theone which totally works on the principle of IP address which situated next to the given layer(Jung & Kim, 2015).3. Explain how a host knows whether a data packet was not received.Ans: At the time of transfer of packet data from one point to another a dialogue is used whichworks between the TCP/ IP software of the system which is considered to be host. The receivedsystem is used so as to ensure that transfer of various files is successful. (Decusatis, Carranza &DeCusatis, 2012) In many cases it is seen whole file which is present at the TCP/ IP of thereceiving message to the TCP/ IP of the system at host which will allow the system the particularpacket which is missing. The process of receiving of packets continues until and unless it is fullyreceived by receiver.
Report on Network Management Methods_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment based on the Network Management
|8
|1595
|44

Research Assignment on Network Management
|5
|467
|39

Understanding Network Topology and Routing Protocols
|9
|2234
|143

Fundamental of Computer System
|11
|2560
|288

SIT202 Computer Networks: TCP/IP Protocol, Network Loop, Data Encapsulation, Point-to-Point Network, Modulation, Collision
|14
|1888
|349

Network and Communication: Data Flow, IP Routing, Frame Forwarding, and Data Acknowledgment Exchange
|9
|2090
|356