Q6. (10 marks) The figure below shows a network of bridges running the Spanning
ID: 3737049 • Letter: Q
Question
Q6. (10 marks) The figure below shows a network of bridges running the Spanning Tree Protocol (STP). Port costs for each bridge in the network are as shown in the figure. Assuming Bridge 1 is the root bridge, i. Draw in your answer sheet the network showing the all root ports, designated ports and blocked ports of each bridge that are determined by the operation of the Spanning Tree Protocol. (2 marks) Write down the cost of each bridge to the root bridge for each bridge after the SPT has converged. (2 marks) If line speeds, L, satisfy L = 1000 Cost in Mbps, determine the maximum throughput in Mbits per second which can be supported for packets going from Bridge 4 to Bridge1 over the Spanning Tree. (2 marks). ii. iii. iv. Show by example that if a line speed is increased between 2 bridges, and a new spanning tree determined, according to the formula in iii) that nevertheless the maximum possible throughput supported between two given bridges can be reduced as a result. (Hint: Use the network below but change the costs (equivalently line speeds)) Suppose that the line speeds are inversely proportional to the costs. (4 marks) Cost 40 Cost 40 Bridge Bridge Cost 120 Cost 60 Cost 80 Cost 120 Bridge Cost 60 Cost 80 Cost 20 Bridge Bridge Cost 140 Cost 20 Cost 140Explanation / Answer
ANS:-
Given that,
The Spanning Tree Protocol (STP). Port costs for each bridge in the network are as shown in the figure. Assuming Bridge 1 is the root bridge, i. Draw in your answer sheet the network showing the all root ports, designated ports and blocked ports of each bridge that are determined by the operation of the Spanning Tree Protocol.
ROOT PART & DEISGNATED PORT:-
the root part is the port the switch chooses for its overall best path to the root switch. the designated port is choosen between switches that share a network segment . it is based on each switch advertised cost to the root.
BLOCKED PORT:-
You can block the ports that you know can be used to attack your network. this stops specified external network . this stops specified external network services. blocking ports can protect your most sensitive services.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.