Use the output from ethereal and the MAC forwarding tables to explain why some packets are looping indefinitely.

What will be an ideal response?


```
Router1#show bridge
Total of 300 station blocks, 298 free
Codes: P - permanent, S - self
Bridge Group 1:
Address Action Interface Age RX count TX count
0050.bf90.7d33 forward Ethernet0/0 0 6 37274
0004.75ad.04b8 forward Ethernet0/1 0 37276 6

Router2#show bridge
Total of 300 station blocks, 298 free
Codes: P - permanent, S - self
Bridge Group 1:
Address Action Interface Age RX count TX count
0050.bf90.7d33 forward Ethernet0/1 0 4 37282
0004.75ad.04b8 forward Ethernet0/0 0 1325033 76

Router3#show bridge
Total of 300 station blocks, 298 free
Codes: P - permanent, S - self
Bridge Group 1:
Address Action Interface Age RX count TX count
0050.bf90.7d33 forward Ethernet0/0 0 7 92
0004.75ad.04b8 forward Ethernet0/0 0 92 5

Router4#show bridge
Total of 300 station blocks, 298 free
Codes: P - permanent, S - self
Bridge Group 1:
Address Action Interface Age RX count TX count
0050.bf90.7d33 forward Ethernet0/1 0 5 97
0004.75ad.04b8 forward Ethernet0/1 0 1287824 75
```
Let portA be the port associated with ethernet0 of the bridges, and portB be the port associated with ethernet1.
```
Router1 Router 2 Router3 Router 4 PC2
portA portB portA portB portA portB portA portB portA PortB
PC1 PC4 PC1 PC1 PC4 PC1 PC4 PC4 PC1 PC4
```
The reply messages sent by PC4 to PC1 will follow the loop:
1. Router 3
2. Router 2
3. Router 4
4. … repeat of steps 1, 2, 3
Thus from the captured ethereal output we determine that the paths between PC1 and PC4 have loops and packets are looping indefinitely.

Computer Science & Information Technology

You might also like to view...

To turn Format Painter off, you can press the ________ key

Fill in the blank(s) with correct word

Computer Science & Information Technology

Safe harbors address the concerns associated with __________.

A. Criminal use of cloud computing B. Legacy IT systems C. Reliability of cloud computing services D. The regulatory and legal environmen

Computer Science & Information Technology

A technician needs to access a wireless small office home office (SOHO) network. The SSID of the network does not appear in the listings of wireless networks on the technician's laptop. Which of the following should the technician do to access the wireless network?

A. The technician should reset the wireless card B. The technician should enter the SSID manually C. The technician should change the SSID on the wireless router D. The technician should change the MAC address on the router

Computer Science & Information Technology

A deleted file can be recovered by opening the _____ and returning the file to its original location.

A. Recycle Bin B. Navigation pane C. ScreenTip D. Control Panel

Computer Science & Information Technology