What commands are used to assign the ip address

Assignment Help Basic Computer Science
Reference no: EM131376830

On a word doc please answer the following questions.

1. What is a VLAN and What commands are used to assign the IP address 192.168.20.5 to VLAN1?

2. What is the purpose of a routing table and a gateway address?

3. Can a Layer 2 switch be used in the core of the campus network? Why or why not?

4. What are three factors that should be considered before coming up with the final IP subnet design?

Please provide references

Reference no: EM131376830

Questions Cloud

Read the case below and then answer the questions : Read the case below and then answer the questions. I have attach the case is Murder on a hard drive and the table which you need to follow. please read carefully the material and refer to answer all the questions that the assignment asks.
Minimize any risks involved with a natural disaster : What types of information should be contained in Beltz's disaster recovery plan that will minimize any risks involved with a natural disaster?
Prepare report that include a project history of your recent : Prepare an 8-10-page report in Word. This report should include a project history of your recent Trillo Apparel Company District 4 Production Warehouse Move experience over the last five weeks.
What characteristics from the list presented by jennifer : What makes him or her a good leader? What characteristics from the list presented by Jennifer Witt would you attribute to him or her (focus on no more than three)? Please be as specific as you can in your discussion
What commands are used to assign the ip address : On a word doc please answer the following questions. 1. What is a VLAN and What commands are used to assign the IP address 192.168.20.5 to VLAN1?
Comparing backup and recovery systems : Compare and contrast the three systems and determine which one you would recommend if you were installing a backup and recovery system for a medium-sized business, with 3,500 employees, that maintains information on the stock market.
What failure percentage would be expected in service : To what value would the standard deviation of part strength have to be reduced in order to give a failure rate of only 1%, with no other changes?
What is the cisco hierarchical model : What is the Cisco Hierarchical model? What is the access layer and what are the functions involved at this layer?
Integrated accounting software packages : 1. Describe the benefits of integrated accounting software packages. 2. Explain why web-based customer interaction centres are critical for successful CRM systems.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  List and describe the criteria used for selection

For each of the major types of information security job titles covered in the chapter, list and describe the criteria used for selection.

  Protecting data from destruction and loss

As we begin to rely more and more on our computer systems, including our mobile devices, to store and access data, some of which is highly confidential, the need for a plan to keep our systems and data secure becomes very critical

  Problems with wireless components of a network

Identify and describe several problems with wireless components of a network.

  What exactly are the desired results or output

Am I trying to solve a numerical problem? A graph algorithm problem? A geometric problem? A string problem? A set problem? Which formulation seems easiest?

  Can an index be built over a non-unique field

How is an index affected when a change is made to a file? Does every change to a file affect every one of its indexes?

  Discuss possible problems with this system of quality

Discuss possible problems with this system of quality management.

  Determine the number of the last person left in the circle

Write a program that allows you to place n people in a circle and specify that every mth person will be killed. The program should determine the number of the last person left in the circle. Use a circularly linked list to solve the problem.

  How do software myths affect a software process

Define a software process. How do software myths affect a software process?

  Find the amount of payment per period

assuming the payment per period is the same for all periods.

  create a version of a carnival game

assignment, your job is to create a version of a carnival game in which mechanical dogs race along a track. The racing game is called DogTrack. DogTrack is also the name of the java source file you must submit to complete the assignment. The DogTrack..

  Explain in detail how the darker method in of image works

Explain in detail how the darker method in OFImage works. (Hint: It contains another method call to a method also called darker. Which class does this second method belong to? Look it up.) Implement the lighter filter in OF Image.

  Which scheme is better and why

Also consider two different clustering schemes: (1) where Cluster1 contains records {1,2,3} and Cluster2 contains records {4,5,6} and (2) where Cluster1 contains records {1,6} and Cluster2 contains records {2,3,4,5}. Which scheme is better and why..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd