CS638 Lab 3: Post-Lab

ObjectivesPre-LabProceduresPost-LabNotesWiki


Post-Lab Questions

Please enter the answers to these questions into your lab notebook.


1. What happens if two bridges share the same lowest priority? Are they both root bridges? What if all nodes have the same priority?

2. Why does a network bridged with a Linux PC require the ability to spoof MAC addresses?

3. Describe a scenario in which a network administrator might want to configure a VLAN.

4. Describe a test protocol (i.e., the series of steps/tasks) that could be used to test for fowarding loops in a LAN configuration.

4. What is the most recent IETF RFC that describes the standard for Ethernet switching?

Copywrite © 2006 WAIL