what is vlan and how will you configure vlan on 3650
switch and how many valn can you create on that switch
Answers were Sorted based on User's Feedback
Answer / shahin
Virtual Local Area Network (VLAN) is the process of building
a logical topology over physical network for the purpose of
security, performance & efficient usages of bandwisth.
1. VLAN technology function by logically segmenting the
network into different broadcast domain.
We can create vlan upto 4096.
Switch(config)#vlan (VLAN ID)
Switch(Config-vlan)#name (VLAN Name)
| Is This Answer Correct ? | 10 Yes | 4 No |
Answer / jitendera sinha
switch#vlan database
switch(Vlan)#vlan 2 name jitendra
switch(vlan)#vlan 3 name shain
switch(vlan)#vlan 4 name harish
switch(vlan)#exit
donot wory therer is router that is all interview.com which
is used for intervlan communication
is that correct
| Is This Answer Correct ? | 5 Yes | 1 No |
Answer / harish kumar
Vlan is a logical segmented LAN on an physical device.
switch(config)#vlan (vlan ID)
switch(config-vlan)#name (vlan name)
we can create upto 1005 VLAN'S.
and assign VLAN ID upto 4096.
| Is This Answer Correct ? | 4 Yes | 3 No |
How many parts of ping?
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.
On a network design project you determine that a new testing application requires multiple hosts. These hosts must be capable of sharing data between each host and an enterprise server at 10 Mobs bandwidth. Other divisions in the company use applications that require less than 2 Mobs bandwidth of the enterprise server. What is your most economical recommendation? A. That existing 10BaseT hubs be replaced with 1 00BaseT hubs to improve overall performance B. That a router can separate the testing application from the rest of the network, thus allowing the testing application more bandwidth. C. That a switch be installed, so that the enterprise server can be provided a 100 Mobs pod and each of the testing application hosts can be given dedicated 10 Mobs pods] D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application
What metric does rip use? How is the metric used to indicate an unreachable network?
Which ISDN specification series deals with Concepts and Terminology? A.) World Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Describe ICMP messages
Which command we use for ping in ipv6?
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
What is the frame relay, in which layer it comes?
How many hop counts are by default and how much you can increase in eigrp protocol?