Question

In: Computer Science

Could i please have assistance with the following. A) TCP/IP protocol stack, how does a switch...

Could i please have assistance with the following.

A) TCP/IP protocol stack, how does a switch differ from a hub?

B) How does a switch/bridge know what station is on a given port?

C) What does a switch/bridge do if it does not know the out-going port of a destination MAC address?

D) How is a token ring similar to a Master-and-slave or polling channel access protocol?

Solutions

Expert Solution

a)
Hubs operates at layer-1(physical layer) while switch operates at layer-2(data link layer) or layer-3(network layer) of OSI model. Hubs transfers data to all the ports which are connected to it while switch is an intelligent device which transfers data only to the required destination and decreases traffic. As hub transfers data to all the ports, there is so much of traffic. Hubs work in half duplex mode whereas switch in full duplex mode.


b)
A Switch/Bridge does an operation which is called "learning". In this operation, it observes the headers of received Ethernet frames. By examining the MAC source address of each received frame it records the port on which it was received, In this way it learns which addresses belong to the computers connected via each port. That is why it is called intelligent devices.

The learned addresses are stored in a table with each port number. Once this table has been setup, the Switch/Bridge examines the destination address of all received frames, it then looks in the table to see if a packet with a source address matching the current destination address is present or not.
In this process we can come accross with 2 scenarios.
1.If the address is not found
2.If the address is found. Even after the address is found. There are 2 cases. i)port number is already associated. ii)port number is not associated.

1.If the address is not found:
It means that such frame has not been received from the source at all or this information has been deleted from the table due to restart of the device or shortage of memory. So, in this scenario as the Switch/Bridge does not know the port number. It sends the frame to all receivers. This process is called as flooding. By this it finds out the port number.

2.If the address is found.
i)port number is already associated: There will be no problem in this case. It directly uses the information.
ii)port number is not associated: The frame is forwarded to the address and gets the port number.

c)
In master-slave polling, slave always renders the services from the master but in token ring, a node get rendered only when it holds the token.


Related Solutions

•Describe security problems inherent to the TCP/IP protocol suite..
•Describe security problems inherent to the TCP/IP protocol suite..
1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of...
1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of the Internet and Web. How does the TCP/IP protocol promote decentralisation? b) Explain how individual machines and end users are empowered by the TCP/IP and HTTP protocols. Give illustrations to support your answers.
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within...
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within such an architecture, the overall communications function is decomposed into a number of distinct layers with a special design principle used. What is this principle and how does it work? Describe in detail.
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the control information embedded in these two layers
What role does TCP play during HTTP requests? Is TCP a connection-oriented protocol? Explain in details....
What role does TCP play during HTTP requests? Is TCP a connection-oriented protocol? Explain in details. Also, show your knowledge about layers.
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed...
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed for business use and meant to run on multiple different computers. COBOL Fortran LISP BASIC 3.Transistors and vacuum tubes are no longer used in computers True False 4.The PDP series of minicomputers were developed by IBM. True False 5.Programming language popular with engineers because the code looked like algebra COBOL Fortran LISP BASIC
Scanning Tools How does IP protocol scanning work, consider the various type and tools? What are...
Scanning Tools How does IP protocol scanning work, consider the various type and tools? What are some of the most popular scanner tools and why? Sniffers Where are sniffers normally placed? What are the components of a sniffer and what are the most popular sniffer and why?
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does...
1.Where does TLS fit on the Internet protocol stack? 2.How do applications use TLS? 3.How does TLS provide authentication? Does it provide mutual authentication (both client and server-side)? Is that required? 4.What is the purpose of padding, Message Authentication Code (MAC), handshake protocol, change cyber suite (CCS) protocol? 5.How does TLS provide: confidentiality, availability, integrity, non-repudiation? 6.Is TCP a user of TLS services or does it provide services to TLS (hard question) – explain your answer in one sentence? 7.Does...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT