Question

In: Computer Science

Could i please have assistance with the following. A) TCP/IP protocol stack, how does a switch...

Could i please have assistance with the following.

A) TCP/IP protocol stack, how does a switch differ from a hub?

B) How does a switch/bridge know what station is on a given port?

C) What does a switch/bridge do if it does not know the out-going port of a destination MAC address?

D) How is a token ring similar to a Master-and-slave or polling channel access protocol?

Solutions

Expert Solution

a)
Hubs operates at layer-1(physical layer) while switch operates at layer-2(data link layer) or layer-3(network layer) of OSI model. Hubs transfers data to all the ports which are connected to it while switch is an intelligent device which transfers data only to the required destination and decreases traffic. As hub transfers data to all the ports, there is so much of traffic. Hubs work in half duplex mode whereas switch in full duplex mode.


b)
A Switch/Bridge does an operation which is called "learning". In this operation, it observes the headers of received Ethernet frames. By examining the MAC source address of each received frame it records the port on which it was received, In this way it learns which addresses belong to the computers connected via each port. That is why it is called intelligent devices.

The learned addresses are stored in a table with each port number. Once this table has been setup, the Switch/Bridge examines the destination address of all received frames, it then looks in the table to see if a packet with a source address matching the current destination address is present or not.
In this process we can come accross with 2 scenarios.
1.If the address is not found
2.If the address is found. Even after the address is found. There are 2 cases. i)port number is already associated. ii)port number is not associated.

1.If the address is not found:
It means that such frame has not been received from the source at all or this information has been deleted from the table due to restart of the device or shortage of memory. So, in this scenario as the Switch/Bridge does not know the port number. It sends the frame to all receivers. This process is called as flooding. By this it finds out the port number.

2.If the address is found.
i)port number is already associated: There will be no problem in this case. It directly uses the information.
ii)port number is not associated: The frame is forwarded to the address and gets the port number.

c)
In master-slave polling, slave always renders the services from the master but in token ring, a node get rendered only when it holds the token.


Related Solutions

Explain both TCP/IP and ISO/OSI communication protocol stacks, identifying each of the protocol layers. How does...
Explain both TCP/IP and ISO/OSI communication protocol stacks, identifying each of the protocol layers. How does encapsulation work in this layered design? In terms of ratio header/payload, estimate the optimistic accumulate overhead these protocols incur for each application “packet” that is transmitted over the Internet.
•Describe security problems inherent to the TCP/IP protocol suite..
•Describe security problems inherent to the TCP/IP protocol suite..
Could i please have some assistance with the following questions. a) What is the purpose of...
Could i please have some assistance with the following questions. a) What is the purpose of port numbers? how are they used? b) Why does TCP probe the network continuously until it experiences a loss? c) What is the difference between the congestion window and the received window? d) What is the benefit of TCP Reno over TCP Tahoe?
Could i please have some assistance with the following questions. a) What are key features of...
Could i please have some assistance with the following questions. a) What are key features of UDP Services? b) What are some of the advantages of UDP compared to TCP? c) What is the aim of the connection setup Phase, ie, 3 way handshake, of TCP? d) What causes duplicate ACK's
1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of...
1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of the Internet and Web. How does the TCP/IP protocol promote decentralisation? b) Explain how individual machines and end users are empowered by the TCP/IP and HTTP protocols. Give illustrations to support your answers.
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within...
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within such an architecture, the overall communications function is decomposed into a number of distinct layers with a special design principle used. What is this principle and how does it work? Describe in detail.
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
A common protocol stack used by many applications is to use TCP at the transport layer...
A common protocol stack used by many applications is to use TCP at the transport layer and IP at the network layer. The ICMP protocol is also used to report on problems encountered by IP. The IP protocol provides a service referred to as “best effort”. Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver). Describe the service TCP provides with respect to flow control...
Could i please have some assistance with the following questions. a) When using the exponential weighted...
Could i please have some assistance with the following questions. a) When using the exponential weighted moving average (EWMA) to calculate the running time of the RTT, what does the constant ‘x’ control? b) Consider a TCP segment. What is sequence number? What is the range of the sequence number? What is the acknowledge number (ACK)?
Describe the difference between IP and Network Access layer in TCP protocol and also explain the...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the control information embedded in these two layers
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT