Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
QUESTION
(a) What do you understand by a VLAN? Provide one advantage of using a VLAN.
(b) What is a trunk port in a VLAN?
(c) A VLAN will be created using one or more switches. Consider we have switch A and switch B. Analyse the given configurations of switch A and switch B.Show a diagram to show the correct interpretation of the configurations for the creation of VLANs. Consider that switch A and B have twelve ports each.
SwitchA(config)#configure terminal SwitchA(config)#vlan 2 SwitchA(config)#vlan 2 name marketing SwitchA(config)#vlan 3 SwitchA(config)#vlan 3 name management SwitchA(config)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/4 SwitchA(config-if)#switchport access vlan 2 SwitchA(config-if)#exit SwitchA(config)#interface fastethernet 0/5 SwitchA(config-if)#switchport access vlan 2 SwitchA(config-if)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/11 SwitchA(config-if)#switchport access vlan 3 SwitchA(config-if)#exit SwitchA(config)#interface fastethernet 0/12 SwitchA(config-if)#switchport access vlan 3 SwitchA(config-if)#exit SwitchB(config)#configure terminal SwitchB(config)#vlan 2 SwitchB(config)#vlan 2 name marketing SwitchB(config)#vlan 3 SwitchB(config)#vlan 3 name management SwitchB(config)#exit SwitchB(config)#configure terminal SwitchB(config)#interface fastethernet 0/2 SwitchB(config-if)#switchport access vlan 2 SwitchB(config-if)#exit SwitchB(config)#interface fastethernet 0/3 SwitchB(config-if)#switchport access vlan 2
SwitchB(config-if)#exit SwitchB(config)#configure terminal SwitchB(config)#interface fastethernet 0/4 SwitchB(config-if)#switchport access vlan 3 SwitchB(config-if)#exit SwitchB(config)#interface fastethernet 0/5 SwitchB(config-if)#switchport access vlan 3 SwitchB(config-if)#exit SwitchA(config)#configure terminal SwitchA(config)#interface fastethernet 0/1 SwitchA(config-if)#switchport mode trunk SwitchA(config-if)#switchport trunk encapsulation isl SwitchA(config-if)#end SwitchB(config)#interface fastethernet 0/1 SwitchB(config-if)#switchport mode trunk SwitchB(config-if)#switchport trunk encapsulation isl SwitchB(config-if)#end (d) VLAN trunking protocol is a Cisco proprietary protocol. Explain the three modes of VTP switches.
VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph
RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa
Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de
Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach
Why an organization need the issue specific security policy
Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac
Application Gateways / firewall The application level firewall is installed on a dedicated computer; also called as a proxy server. These servers can store the recently accessed
Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ
FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.
Asymmetric Encryption Asymmetric encryption method makes use of two different but related keys and either key can be used to encrypt or decrypt the message. This method is freque
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd