Post-Lab Questions
Please enter the answers to these questions into your lab notebook.
1. What happens if two bridges share the same lowest priority? Are
they both root bridges? What if all nodes have the same
priority?
2. Why does a network bridged with a Linux PC require the ability to
spoof MAC addresses?
3. Describe a scenario in which a network administrator might want to
configure a VLAN.
4. Describe a test protocol (i.e., the series of steps/tasks)
that could be used to test for fowarding loops in a LAN
configuration.
4. What is the most recent IETF RFC that describes the standard
for Ethernet switching?