Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Q6. (10 marks) The figure below shows a network of bridges running the Spanning

ID: 3737049 • Letter: Q

Question

Q6. (10 marks) The figure below shows a network of bridges running the Spanning Tree Protocol (STP). Port costs for each bridge in the network are as shown in the figure. Assuming Bridge 1 is the root bridge, i. Draw in your answer sheet the network showing the all root ports, designated ports and blocked ports of each bridge that are determined by the operation of the Spanning Tree Protocol. (2 marks) Write down the cost of each bridge to the root bridge for each bridge after the SPT has converged. (2 marks) If line speeds, L, satisfy L = 1000 Cost in Mbps, determine the maximum throughput in Mbits per second which can be supported for packets going from Bridge 4 to Bridge1 over the Spanning Tree. (2 marks). ii. iii. iv. Show by example that if a line speed is increased between 2 bridges, and a new spanning tree determined, according to the formula in iii) that nevertheless the maximum possible throughput supported between two given bridges can be reduced as a result. (Hint: Use the network below but change the costs (equivalently line speeds)) Suppose that the line speeds are inversely proportional to the costs. (4 marks) Cost 40 Cost 40 Bridge Bridge Cost 120 Cost 60 Cost 80 Cost 120 Bridge Cost 60 Cost 80 Cost 20 Bridge Bridge Cost 140 Cost 20 Cost 140

Explanation / Answer

ANS:-

Given that,

   The Spanning Tree Protocol (STP). Port costs for each bridge in the network are as shown in the figure. Assuming Bridge 1 is the root bridge, i. Draw in your answer sheet the network showing the all root ports, designated ports and blocked ports of each bridge that are determined by the operation of the Spanning Tree Protocol.

ROOT PART & DEISGNATED PORT:-

the root part is the port the switch chooses for its overall best path to the root switch. the designated port is choosen between switches that share a network segment . it is based on each switch advertised cost to the root.

BLOCKED PORT:-

You can block the ports that you know can be used to attack your network. this stops specified external network . this stops specified external network services. blocking ports can protect your most sensitive services.