Explain the three modes of vtp switches, Computer Network Security

Assignment Help:

QUESTION

(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.

(b) What is a trunk port in a VLAN?

(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show  a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.

SwitchA(config)#configure terminal
SwitchA(config)#vlan 2
SwitchA(config)#vlan 2 name marketing
SwitchA(config)#vlan 3
SwitchA(config)#vlan 3 name management
SwitchA(config)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/4
SwitchA(config-if)#switchport access vlan 2
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/5
SwitchA(config-if)#switchport access vlan 2

SwitchA(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/11
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit
SwitchA(config)#interface fastethernet 0/12
SwitchA(config-if)#switchport access vlan 3
SwitchA(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#vlan 2
SwitchB(config)#vlan 2 name marketing
SwitchB(config)#vlan 3
SwitchB(config)#vlan 3 name management
SwitchB(config)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/2
SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/3
SwitchB(config-if)#switchport access vlan 2

SwitchB(config-if)#exit

SwitchB(config)#configure terminal
SwitchB(config)#interface fastethernet 0/4
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit
SwitchB(config)#interface fastethernet 0/5
SwitchB(config-if)#switchport access vlan 3
SwitchB(config-if)#exit

SwitchA(config)#configure terminal
SwitchA(config)#interface fastethernet 0/1
SwitchA(config-if)#switchport mode trunk
SwitchA(config-if)#switchport trunk encapsulation isl
SwitchA(config-if)#end
SwitchB(config)#interface fastethernet 0/1
SwitchB(config-if)#switchport mode trunk
SwitchB(config-if)#switchport trunk encapsulation isl
SwitchB(config-if)#end

(d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.


Related Discussions:- Explain the three modes of vtp switches

Develop a tcp-based client-server socket program, Develop a TCP-based clien...

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Difference between synchronous tdm and statistical tdm, Question (a) A CRC...

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Imap and pop functions, How does the POP functions? What are the advantages...

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

Basic types of agent in order of increasing generality, Question 1: (a)...

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Malicious node detection mechanisms, Many applications are vulnerable to in...

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

Elements of cryptosystems-cryptography, Elements of Cryptosystems Crypto...

Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Ipv6 datagram format, IPV6 DATAGRAM FORMAT It is given in the figure b...

IPV6 DATAGRAM FORMAT It is given in the figure below:

Need assignemnt help in information security assignemnt, Need Assignemnt he...

Need Assignemnt help in Information security assignemnt

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd