This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Rochester Institute of Technology Department of Networking, Security, & Systems Administration 4050-515/4055-815 Lab 3 - Advanced STA This lab assumes knowledge of the topology used for the Spanning Tree tasks in Lab 2. Activity 1 - Configure the Network Topology 1. Using the following pairings, configure a bridging loop between two tables. Table 1 and table 2 will work together. Table 3 and table 4 will work together. Table 5 and table 6 will work together. Table 7 and table 8 will work together. Configure your topology according to the diagram below. Use the patch panel in the rack at the front of the room if you have to span long distances. The fourth Windows PC will be used later. See Appendix 2 for directions. Hub 1 2514 Hub 3 Hub 2 2950 2514 2. For each of the segments, identify the bridges as B1, B2, and B3. For practice in addressing, configure each of the PCs by assigning an IP address of 172.16.31.TM (where T is your table number and M is the machine number for your table) and a netmask of 255.255.255.128 . Configure the 2514s and the 2950s as you did in Lab 1. Be sure to alter the priority of both 2514s to 32769 . 3. Once this bridging loop has been resolved, identify the root bridge, which port is blocked, and the state of every other configured port and bridge in your topology. Record all this information as well as all the MAC addresses in your topology. This is the initial or original state of your topology Label the diagram of your initial topology. Include the MAC addresses of all nodes, bridges and ports, of your initial topology....
View Full Document
This lab report was uploaded on 04/21/2008 for the course VNSA 515 taught by Professor Mishra during the Spring '08 term at RIT.
- Spring '08