Cisc100NetworkingAss2

docx

School

Northampton County Area Community College *

*We aren’t endorsed by this school

Course

100

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by HighnessMeerkat3580

Report
Cisc100 Networking Assignment 2 Based on YouTube Networking Fundamentals lessons 4 and 5, Switches and Routers https://www.youtube.com/playlist?list=PLIFyRwBY_4bRLmKfP1KnZA6rZbRHtxmXi 1.) What layer of the OSI model does a Switch operate on? Layer 2. 2.) What is the significance of the MAC (Media Access Controller). How does this help in routing data through the network? Which organization does each manufacturer have to register with? 10 sentences maximum. MAC addresses are used to identify devices on the network uniquely. Each network interface card (NIC) or Ethernet device has a unique MAC address assigned by its manufacturer, which makes it easier for data frames to get to the right place on the network. Manufacturers must register their unique identifier codes with the Institute of Electrical and Electronics Engineers (IEEE). Each manufacturer is given an OUI (Organizationally Unique Identifier) by the IEEE. This makes sure that all MAC addresses are unique around the world. This registration process helps keep address conflicts from happening and makes sure that communication works smoothly in a variety of network settings. 3.) What are the three actions a switch performs? Learning, Switching, Filtering and Forwarding. 4.) What address is learned by the Switch and where is this address stored? It learns the source MAC addresses associated with each incoming frame. The switch then updates its MAC address table, associating each MAC address with the corresponding switch port. 5.) Explain the flooding action of a Switch. Flooding is a temporary measure used by switches to handle situations where the MAC address table is incomplete or lacks information about a particular device. To fix this, the switch engages in “flooding” by broadcasting the incoming frame to all connected ports, except the port on which it received the frame. Once the switch learns the association between the MAC address and the correct port, it can make more targeted forwarding decisions, reducing the need for flooding and enhancing network efficiency.
Cisc100 Networking Assignment 2 6.) What address is used by the switch to make a forwarding decision? Destination MAC. 7.) What is a VLAN? A VLAN is a way to divide a single physical network into multiple isolated and independent networks. It allows you to group devices, even if they are not physically located on the same network switch, and they can communicate as if they were on the same network. VLANs help improve network efficiency, security, and flexibility by creating logical segmentation within a larger physical network infrastructure. 8.) What does a Switch do with a broadcast? When a switch receives a broadcast, it sends that message to all connected devices except the one it received the broadcast from. This ensures that all devices on the network receive the broadcasted message, facilitating communication and coordination among them. 9.) What is the Broadcast MAC address? FF:FF:FF:FF:FF:FF 10.)Why do you need a router on a network? What major functions does a router perform? You need a router on a network because it acts like a traffic cop, directing data between devices within your local network and the broader internet. It helps different devices communicate and share information effectively. Major functions of a router include: Traffic Routing IP Address Assignment Network Address Translation (NAT) Firewall Protection DHCP (Dynamic Host Configuration Protocol) Wireless Connectivity 11.) Define the following: a. Node - A network node can be defined as an active endpoint device that is attached to a network and is capable of creating, receiving, or sending information over the network. b. Router - a device that forwards data packets to the appropriate parts of a computer network. c. Host - A host is a computer or other device that communicates with other hosts on a network. Also known as network hosts, hosts include clients and servers that send or receive data, services, and applications.
Cisc100 Networking Assignment 2 12.) What is a routing table? What are the methods used for networks to populate the routing table? A routing table is like a map that a computer or router uses to decide where to send data in a network. It contains a list of destinations (other devices or networks) and the paths (routes) to reach them. Networks populate the routing table using two main methods: 1. Static Routing: In this method, a network administrator manually enters and configures the routes in the routing table. 2. Dynamic Routing: With dynamic routing, devices communicate with each other to automatically share information about the best paths and update the routing table accordingly. 13.)What is the purpose of a hierarchical design in a routed network? The purpose of a hierarchical design in a routed network is to organize and structure the network in a way that makes it more efficient, scalable, and manageable. It involves dividing the network into distinct layers, each serving a specific function. 14.)What benefits do subnets give on the network? Name at least 3. Subnets provide several benefits on a network: 1. Logical Segmentation: Subnets allow for the logical segmentation of a larger network into smaller, more manageable sections. This helps in organizing and structuring the network, making it easier to administer and troubleshoot. 2. Improved Performance: By breaking a large network into subnets, you can reduce unnecessary broadcast traffic. Devices within a subnet communicate more efficiently, leading to improved network performance and reduced congestion. 3. Enhanced Security: Subnets enable the implementation of network security measures more effectively. By controlling access between subnets using routers or firewalls, you can isolate and protect sensitive information and resources, enhancing overall network security. 15.)What is a default route? A Default Route is the path taken when there's no detailed information about the destination. It's often used as a default gateway, serving as a way for devices to reach destinations outside their immediate network. Imagine it as a default "exit" point for data when a device doesn't know the exact route to a specific location on the internet or another network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help