Computer Network Questions

Section 6.1, Question 3.

The managed switches have enhanced capability compared to the unmanaged switches even though they need a skilled engineer or administrator to achieve the best results from them. A managed switch enables one to have precise control of the network and the entire traffic flowing through it (Wang et al., 2018). On the other hand, the unmanaged switch enables the internet devices to transfer information between each other automatically by the use of auto-negotiation in the determination of the parameters like data rate, the method of half-duplex or in the use of full-duplex mode. A managed switch offers control in the manner which data is shared within a network and who to access it. The unmanaged switches require less time to set-up while the managed switches require a relatively long time.

Section 6.2, Question 1.

The switch never uses network layer to packet forward. The IP address is used on a switch for administrative or network management purposes.  The Cisco switches while on default mode, they perform the process of Ethernet frame forwarding while not configured. One can get a Cisco switch, plug it on a couple of devices linked to the switch, power it, and it will work. Nevertheless, if one is to carry-out switch management within the network, the switch should be configured with an IP address. The configuration of the IP is done through a logical interface which is referred to as the VLAN or management domain (Wang et al., 2018).

 

Section 6.3, Question 1

The configuration of the VLAN interface enables the network managers to put the users in various groups rather than by the use of their physical locations. Cisco 4700 high performance together will its feature-rich NP-1FE enables it to be ideal for low density and high-performance application. On the other hand, Ethernet, GigabitEthernet interface and FastEthernet help the network managers in the implement routing solutions with optimal performance and cost within a great range of uses which include data centers and enterprise backbone (Wang et al., 2018). These type of configuration modes, provide a low-cost manner for the provision of Fast-Ethernet access unlike the low ranking speeds of WAN services.

Section 6.4, Question 1

Creation of VLAN has numerous benefits for a network, and these include natural and enhanced administration, confinement of the broadcast domains, low broadcast traffic, and the security policies enhancement (Wang et al., 2018). Some of the advantages of VLANs include enabling of logical grouping of the end-stations which are dispersed within the network. Another advantage is that VLANs decrease the necessity of deploying routers within the system to contain the broadcast traffic. The broadcast domains confinement within the network significantly reduces traffic. After broadcast domains confinement, VLAN end-stations are barred from receiving or listening to broadcasts not intended for the VLAN end-stations.

 

Section 6.5, Question 1

Trunking is a network which is capable of handling numerous signals at the same time. Data which is transmitted through the trunking is either video, images, audio or even controlling signals. Trunking is a useful technique which is commonly used in the transmission of the data while communicating on various systems to provide network access to several users by sharing of multiple frequencies. The system is usually like a tree with a single trunk and numerous branches. It is generally used in very high frequency (VHF) and telecommunication systems. Trunking is capable of reducing the telecom network size and increase the bandwidth (Wang et al., 2018).

Section 6.5, Question 6

During Spanning Tree Protocol (STP) convergence, the switches and bridges transition to either blocking or forwarding state. After STP convergence, the root switch is built together with the root ports, the designated and non-designated ports in all the switches are also selected. While in convergence state, designated ports and the root ports and are usually in the forwarding state and the other ports in blocking state (Wang et al., 2018). If a port goes through all the four states, the convergence takes fifty seconds, twenty of the seconds in blocking mode and the other seconds in listening and learning equally. Convergence only takes thirty seconds if a port does not go through the blocking state.

 

 

References

Al-Hanjori, M. M., Shaath, M. Z., & Naser, S. S. A. (2017). Learning computer networks using an intelligent tutoring system.

Wang, W., Liu, J., Pitsilis, G., & Zhang, X. (2018). Abstracting extensive data for lightweight      intrusion detection in computer networks. Information Sciences, 433, 417-430.