Capstone_Project_3
.docx
keyboard_arrow_up
School
Los Angeles City College *
*We aren’t endorsed by this school
Course
4545
Subject
Computer Science
Date
May 15, 2024
Type
docx
Pages
2
Uploaded by MagistrateCapybaraMaster2347 on coursehero.com
Capstone Project 3-2 Build a MAC Address Table in Packet Tracer Now that you’re in privileged EXEC mode, you can check the switch’s current
MAC address table. Enter show mac address-table . What entries are listed?
Vlan, mac address, type, ports
Access Switch0’s CLI again. Click at the bottom of the CLI pane and press Enter
. Check Switch0’s MAC address table. What entries are listed?
Vlan, mac address, type, ports
Check Switch0’s MAC address table again. What entries are listed? Given this
information, which connected device is Switch0 currently aware of?
Vlan1 , mac address 0060.3e97.147d, type dynamic, port fa4/1, switcher1
Sending a ping between PC2 and PC0 will inform Switch0 of three devices’ MAC addresses. Which devices do you expect Switch0 to know about after the ping?
Switch 1 and PC2
From PC2, ping PC0. Did the ping work?
yes
Return to Switch0’s CLI and check its MAC address table again. Take a screenshot of the output; submit this visual with your answers to this project’s questions.
Examine the three devices listed in Switch0’s MAC address table and answer the following questions:
How many devices is Switch0 currently aware of?
1
Which device is connected to Switch0’s Fa0/1 interface? How can you confirm which device matches this MAC address?
Which two devices communicated across Switch0’s Fa4/1 interface?
PC0 PC1
Currently, PC1 is not showing in Switch0’s MAC address table. What can you do to make Switch0 aware of PC1?
Ping
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
TCP Window Flow Control, consider the following:
• The MSS Maximum Segment size is 1024 bytes (I kilobyte)
• Window size (rwnd) = 4096 bytes
• The sendbase is 0000, the segment size is 1024 bytes
How many segments can you send (before acknowledgment) then you have to stop, you stop until some ack comes back?
What is the sequence number of the third segment?
arrow_forward
As a network trainer for a major organization, you are required to provide thorough explanations of the following topics: a. What method does a switch use to construct its MAC address table? (three acclaims) "B": What happens if the switch receives a frame and finds the mac addresses of the intended destination in the table?
arrow_forward
What is the purpose of an Ethernet LAN protocol address? Can you think of anything positive?If the address box isn't important to you, you can remove it entirely.Should the address box be filled with a "special" address value?
arrow_forward
Suppose Destination MAC address entry is not found in switch table, what action will be taken by the switch?
Switch is known as transparent device. What do we mean by transparent?
Switch is called a plug and play device. What do we mean by plug and play?
arrow_forward
Identify the incorrect statement:
A. FTP stands for File Transfer ProtocolB. FTP uses two parallel TCP connectionsC. FTP sends its control information in-bandD. FTP sends exactly one file over the data connection
arrow_forward
Suppose Destination MAC address entry is not found in switch table, what action will be taken by the switch?
arrow_forward
With the help of a neat sketch explain the steps and buffers involved when an application writes to a TCP socket.
arrow_forward
Computer Science
Networks and should be done in C language.
Create a UDP client and server program that not only is able to locally transfer files but it gives the client the ability to send multiple copies of the file to multiple servers. Once the server program is initiated, it waits until it receives client packets. It then reads and saves the payload of the packets. The client reads a file from the disk and sends it to each server over a UDP socket by breaking the file up into mtu-byte sized packets. Client needs to be concurrent in sending the packets to all of the servers using threads
arrow_forward
If a destination MAC address is not in the forward/filter table, what will the switch do with the frame?
arrow_forward
The following subjects must be covered in detail by you as a network trainer for a major corporation: a. How does a switch go about creating its MAC address table? b. Three stars are given to those who deserve it. A frame is received by the switch, and its intended destination's MAC addresses are found in the database.
arrow_forward
Given the MAC address of an interface is F3:22:1F:20:30:40, what IPv6 link local address would be generated?
a.
FE80::F122:1FFF:FE20:3040/64
b.
FE80::F322:1FFF:FE20:3040/64
c.
FE80::F122:1F20:FFFE:3040/64
d.
FE80::D322:1F20:FFFE:3040/64
arrow_forward
The MAC address 3333.3333.3333 want to send a message to the MAC address 1111.1111.1112, what is the destination device(s) name for the message?
arrow_forward
What's the use of having an Ethernet LAN protocol address? Can you think of a positive situation? If the address box isn't important to you, you may choose to leave it out entirely.
The address box should be filled with a "special" address value?
arrow_forward
Which of the following statements is true about NIC (Network Interface Card)? There might be multiple correct answers.
When operating in "promiscuous" mode, NIC passes every frame received from the network to the kernel.
Each NIC has a MAC address.
Each NIC has a hardcoded IP address.
NIC checks the destination address for every packet, if the address matches the cards MAC address, it is further copied into a buffer in the kernel.
Every NIC on the network will hear all the frames on the wire.
arrow_forward
Imagine that you are developing an application using TCP as your transport layer protocol. A new version of the protocol is implemented in your operating system that no longer rearranges outof-order data. Must you make any changes to the application to accomodate these changes? If so, what are some specific changes must you make?
arrow_forward
Task 3: Implement OSPF on the given topology.
11.0.0.0
Router-PT
Routero
Router-PT
Roureri
10.0.0.0
12.0.0.0
Swie-PT
Switcho
Switch-PT
Switchi
PC-PT
PC2
PC-PT
PC-PT
PC-PT
PC3
PCO
PC1
arrow_forward
b) A user, on an ethernet LAN, sends an HTTP request to a web server on a
remote network. What is the destination MAC address of the frame carrying
this request?
arrow_forward
Summary
This configuration is applicable in most of windows operating system. In this lesson I used windows 10
version build 14393. In configuring static IP address we need to remember some key points such as,
gateway and dns ip address. We could not create different range of IP addresses that contrast to current
network configuration if we are going to connect our computer to an existing WAN. However, we can
skip DNS and default gateway if just wanted to test the connectivity of two or more different nodes in a
standalone LAN connection and without having router, gateway or any ISP modem
arrow_forward
Refer the configuration below, IT Router is
configured as
follows:
IT (config)#enable secret cisco
IT (config)#line con 0
IT (config-line)#password
class
IT (config-line)#login
IT (config-line)#exit
IT(config)#interface vty 0 15
IT (config-line)#password
class
IT (config-line)#no shutdown
IT (config-line)#end
IT#copy run start
From the above configuration, identify the
mistakes or missing in the configuration and write
the correct commands.
arrow_forward
Based on Figure 4-1 shown below, the Fa0/2 interface on switch S1 is "shutdown" after
switchport port-security mac-address CAFE.AABD.888A command entered the switch S1.
b)
Anticipate what caused the reason that the Fa0/2 interface is shut down. Explain your view.
< Fa0/1
Fa0/24
Fa0/2
PC1
R1
S1
sif show port-security
Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action
(Count)
(Count)
(Count)
---
Fa0/1
Shutdown
Fa0/2
1
Shutdown
Total Addresses in System (excluding one mac per port)
: 0
Max Addresses limit in System (excluding one mac per port)
: 8192
Figure 4-1: A network topology
arrow_forward
Multiple Access Protocols: This is a 6 part question... you dont have to do 19 and 20 they are just there for context, just 21-24
arrow_forward
What use does the MAC address serve in a TLS exchange when the change cypher standard is being used?
arrow_forward
Computer Networking Assignment 2
Lab 2: Web Server Lab
In this lab, you will learn the basics of socket programming for TCP connections in Python: how to create a socket, bind it to a specific address and port, and send and receive a HTTP packet. You will also learn some basics of HTTP header format.
You will develop a web server that handles one HTTP request at a time. Your web server should accept and parse the HTTP request, get the requested file from the server’s file system, create an HTTP response message consisting of the requested file preceded by header lines, and send the response directly to the client. If the requested file is not present in the server, the server should send an HTTP “404 Not Found” message back to the client.
Code
Below you will find the skeleton code for the Web server. You are to complete the skeleton code. The places where you need to fill in code are marked with #Fill in start and #Fill in end. Each place may require one or more lines of code.…
arrow_forward
We have 5 devices connected to an 8-port switch. Each device is numbered starting with 0, and each port of the switch is also numbered starting with 0.
Device 0 has MAC address 40-4A-18-B2-63-DA and is connected to port 0 of the Switch.
Device 1 has MAC address 00-0C-2B-AF-18-7B and is connected to port 1 of the Switch.
Device 2 has MAC address 00-1D-D1-BC-DF-73 and is connected to port 2 of the Switch.
Device 3 has MAC address AC-D9-D6-57-24-A3 and is connected to port 3 of the Switch.
Device 4 has MAC address 04-5D-56-3E-A3-B4 and is connected to port 4 of the Switch.
The switch and all the devices are cold-started, and the following Ethernet frames are sent on the network in sequence:
Frame 0 (source 40-4A-18-B2-63-DA destination 04-5D-56-3E-A3-B4)
Frame 1 (source AC-D9-D6-57-24-A3 destination 00-0C-2B-AF-18-7B)
Frame 2 (source 40-4A-18-B2-63-DA destination 00-1D-D1-BC-DF-73)
Frame 3 (source 00-0C-2B-AF-18-7B destination 00-1D-D1-BC-DF-73)
Frame 4 (source…
arrow_forward
Refer to the exhibit.
Priority 32768
MAC 0000.1111.1111
Priority 32768
MAC 0000.1111.2222
Port 1
Port 8
swi
sw4
Port 2
Port 7
Port 3
Port 6
sw3
sw2
Port 4
Port 5
Priority 32768
MAC 0000.1111.3333
Priority 32768
MAC 0000.1111.4444
A. Which switch is elected as the Root Bridge? Why?
B. Specify the root ports in the Switches directly connected to the Root Bridge.
arrow_forward
ARP queries are broadcast frames for a purpose. Why is an ARP response sent in a frame with a MAC address?
arrow_forward
Is it true that a router routes packets to MAC addresses?
arrow_forward
If many MAC addresses are assigned to the same device, what is the point?
arrow_forward
What is the function of the MAC address during a TLS exchange using the change cypher specification?
arrow_forward
UDP Echo ApplicationA UDP Echo program is a simple network application that demonstrates the basicprinciples of UDP communication. In this program, a server listens for incoming UDPpackets from clients, and when it receives a packet, it echoes (sends back) the samepacket to the client. The client sends a message to the server, and the server returns thesame message. It's often used for testing network connectivity and understanding thefundamentals of UDP communication.
(Answer the following question using python)
Implement both the server and client components of this UDP Echo program whileadhering to the features outlined below. Please ensure that your implementation followsgood coding practices and provides clear prompts and feedback to the user, making ituser-friendly and robust. Please refer to the class example to guide your implementation.
1) UDP Echo Server
Receiving and Displaying Messages: The UDP Echo server should be able toreceive messages sent by clients. For each…
arrow_forward
What will a link-layer switch do when the destination address of a received frame is not in its internal table?
a.It notifies the sending host that the frame cannot be delivered.
b.It sends the frame out on all ports of the switch except for the port at which the frame was received.
c.It sends the frame out on all ports of the switch.
d.It drops the frame.
arrow_forward
If routers operate on so many OSI layers, what are they for?
arrow_forward
4.3 Explain Common Switch Configuration Modes
Prompt
hostname(config)#
hostname(config-line)#
hostname(config-if)#
hostname(vlan)#
arrow_forward
In IEEE 802.11, two-way communication is used to authenticate an open system. In order to authenticate the client, the server must give the station ID (typically the MAC address). Response to the client's previous request is either a successful or failed authentication response from the access point/router. An error may arise if, for example, an AP/router configuration does not include the client's MAC address.In what ways is it advantageous to use this kind of authentication scheme?In what ways does this authentication technique have security vulnerabilities that might be mitigated?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- TCP Window Flow Control, consider the following: • The MSS Maximum Segment size is 1024 bytes (I kilobyte) • Window size (rwnd) = 4096 bytes • The sendbase is 0000, the segment size is 1024 bytes How many segments can you send (before acknowledgment) then you have to stop, you stop until some ack comes back? What is the sequence number of the third segment?arrow_forwardAs a network trainer for a major organization, you are required to provide thorough explanations of the following topics: a. What method does a switch use to construct its MAC address table? (three acclaims) "B": What happens if the switch receives a frame and finds the mac addresses of the intended destination in the table?arrow_forwardWhat is the purpose of an Ethernet LAN protocol address? Can you think of anything positive?If the address box isn't important to you, you can remove it entirely.Should the address box be filled with a "special" address value?arrow_forward
- Suppose Destination MAC address entry is not found in switch table, what action will be taken by the switch? Switch is known as transparent device. What do we mean by transparent? Switch is called a plug and play device. What do we mean by plug and play?arrow_forwardIdentify the incorrect statement: A. FTP stands for File Transfer ProtocolB. FTP uses two parallel TCP connectionsC. FTP sends its control information in-bandD. FTP sends exactly one file over the data connectionarrow_forwardSuppose Destination MAC address entry is not found in switch table, what action will be taken by the switch?arrow_forward
- With the help of a neat sketch explain the steps and buffers involved when an application writes to a TCP socket.arrow_forwardComputer Science Networks and should be done in C language. Create a UDP client and server program that not only is able to locally transfer files but it gives the client the ability to send multiple copies of the file to multiple servers. Once the server program is initiated, it waits until it receives client packets. It then reads and saves the payload of the packets. The client reads a file from the disk and sends it to each server over a UDP socket by breaking the file up into mtu-byte sized packets. Client needs to be concurrent in sending the packets to all of the servers using threadsarrow_forwardIf a destination MAC address is not in the forward/filter table, what will the switch do with the frame?arrow_forward
- The following subjects must be covered in detail by you as a network trainer for a major corporation: a. How does a switch go about creating its MAC address table? b. Three stars are given to those who deserve it. A frame is received by the switch, and its intended destination's MAC addresses are found in the database.arrow_forwardGiven the MAC address of an interface is F3:22:1F:20:30:40, what IPv6 link local address would be generated? a. FE80::F122:1FFF:FE20:3040/64 b. FE80::F322:1FFF:FE20:3040/64 c. FE80::F122:1F20:FFFE:3040/64 d. FE80::D322:1F20:FFFE:3040/64arrow_forwardThe MAC address 3333.3333.3333 want to send a message to the MAC address 1111.1111.1112, what is the destination device(s) name for the message?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning