Part2 Cmit 350

3528 words 15 pages
CMIT 350 WAN and SOHO Skills Implementation

UMUC
Winter 2015
Springfield Site Configuration:
Required Implementation: Device hostnames, banners, secured passwords and spanning tree protocol.

* Device Configurations: Implement device hostnames to match the xACME educational topology labels. Provide a template and sample configuration for the MOTD banner and login banner (wording and implementation) for one of the switches. Keep this generic, as it will be implemented on all switches in the xACME educational topology. Lastly, include the configuration steps for implementing device passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted.

Required
…show more content…
Each message/frame passes through the bridge before being forwarded to its intended destination. A bridge looks at the message’s destination and forwards it to the appropriate segment of the network. Segmenting networks this way greatly reduces the competition for the use of a network path.

In building a network, is typical to use two or more bridges or switches between segments in case the primary fails. Those bridges need to understand who is the primary bridge and the layout of the network continually, even if only one is forwarding the messages. In order to accomplish this the bridges, have separate connection paths between them where they exchange information using bridge protocol data units (BPDUs).
The spanning tree algorithm allows a bridge to determine how to avoid bridge loops; a condition where broadcast messages are forwarded out of every port and the receiving switch or switches will repeatedly rebroadcast the messages flooding the network. Since the Layer 2 header does have a time to live (TTL) value, the messages can loop forever.
The spanning tree algorithm determines the network path to route the message in two steps:
1. The algorithm evaluates the configuration messages it has received and chooses the best bridge it can be sent by.
2. Once the bridge is selected to send a message, it compares this choice with other

Related

  • Determining The Percent Copper and Zinc in Pennies From Density
    1214 words | 5 pages
  • Acct 613
    1404 words | 6 pages
  • Analysis of Watergate
    1863 words | 8 pages
  • Qnt 275 Week 3 Business Decision Making Project Part 2
    880 words | 4 pages
  • Ssa2211 As1
    1606 words | 7 pages
  • Socs 350 Entire Course Week 1 - 8
    1364 words | 6 pages
  • Hcs/350 Personal & Professional Healthcare Communication Paper
    1759 words | 8 pages
  • Nrs-433v Week 1 Literature Search: Prevention of Surgical Site Infection
    1262 words | 6 pages
  • CMIT 320 Network Security Paper Elizabeth Flaim
    974 words | 4 pages
  • Cafè Xaragua
    1566 words | 7 pages