Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
QUESTION
(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.
(b) What is a trunk port in a VLAN?
(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.
SwitchA(config)#configure terminal SwitchA(config)#vlan 2 SwitchA(config)#vlan 2 name marketing SwitchA(config)#vlan 3 SwitchA(config)#vlan 3 name management SwitchA(config)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/4 SwitchA(config-if)#switchport access vlan 2 SwitchA(config-if)#exit SwitchA(config)#interface fastethernet 0/5 SwitchA(config-if)#switchport access vlan 2 SwitchA(config-if)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/11 SwitchA(config-if)#switchport access vlan 3 SwitchA(config-if)#exit SwitchA(config)#interface fastethernet 0/12 SwitchA(config-if)#switchport access vlan 3 SwitchA(config-if)#exit SwitchB(config)#configure terminal SwitchB(config)#vlan 2 SwitchB(config)#vlan 2 name marketing SwitchB(config)#vlan 3 SwitchB(config)#vlan 3 name management SwitchB(config)#exit SwitchB(config)#configure terminal SwitchB(config)#interface fastethernet 0/2 SwitchB(config-if)#switchport access vlan 2 SwitchB(config-if)#exit SwitchB(config)#interface fastethernet 0/3 SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit SwitchB(config)#configure terminal SwitchB(config)#interface fastethernet 0/4 SwitchB(config-if)#switchport access vlan 3 SwitchB(config-if)#exit SwitchB(config)#interface fastethernet 0/5 SwitchB(config-if)#switchport access vlan 3 SwitchB(config-if)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/1 SwitchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk encapsulation isl SwitchA(config-if)#end SwitchB(config)#interface fastethernet 0/1 SwitchB(config-if)#switchport mode trunk SwitchB(config-if)#switchport trunk encapsulation isl SwitchB(config-if)#end (d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.
Information System Security 1. Write about: a. Potential Risks to Information Systems b. Factors to be addressed for making information systems more secure 2. Write about t
MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec
QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib
DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta
STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below. Figure: An ideal
Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1
Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t
LOCALITY OF REFERENCE PRINCIPLE: Principle of "Locality of Reference" use to predict computer interaction patterns. There are two patterns shown as follows: a) Spatial loca
1. We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in
TRANSMISSION ERRORS: Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd