SlideShare a Scribd company logo
1 of 5
Download to read offline
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc's database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one for the private areas. A router that has interfaces in multiple areas is called
an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between
routers using OSPF and routers using other routing protocols is called an Autonomous System
Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using
ABR type 3 LSA filtering, you can have separate private and public areas with the security
appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to
other. This lets you use NAT and OSPF together without advertising private networks.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can
be redistributed inside the private network, either as default or type 5 AS External LSAs.
However, you need to configure static routes for the private networks protected by the security
appliance. Also, you should not mix public and private networks on the same security appliance
interface. You can have two OSPF routing processes and one RIP routing process running on the
security appliance at the same time. For more information about enabling and configuring OSPF,
1) Setup
2)Interface
3)Static Neighbor
4) Virtual Link
5)Filtering
6)Redistribution
7)Summary Address
3) What is the network address of 210.36.54.30/22?
Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network,
Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and
supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to-
understand binary values.
Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0).
Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the
class of your network.
Look at the space between the bits of the addresses: The bits before it are the network part of the
address, the bits after it are the host part. You can see two simple facts: In a network address all
host bits are zero, in a broadcast address they are all set.
The class of your network is determined by its first bits.
If your network is a private internet according to RFC 1918 this is remarked. When displaying
subnets the new bits in the network part of the netmask are marked in a different color
The wildcard is the inverse netmask as used for access control lists in Cisco routers.
Do you want to split your network into subnets? Enter the address and netmask of your original
network and play with the second netmask until the result matches your needs.
Solution
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc's database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one for the private areas. A router that has interfaces in multiple areas is called
an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between
routers using OSPF and routers using other routing protocols is called an Autonomous System
Boundary Router (ASBR).
An ABR uses LSAs to send information about available routes to other OSPF routers. Using
ABR type 3 LSA filtering, you can have separate private and public areas with the security
appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to
other. This lets you use NAT and OSPF together without advertising private networks.
If NAT is employed but OSPF is only running in public areas, then routes to public networks can
be redistributed inside the private network, either as default or type 5 AS External LSAs.
However, you need to configure static routes for the private networks protected by the security
appliance. Also, you should not mix public and private networks on the same security appliance
interface. You can have two OSPF routing processes and one RIP routing process running on the
security appliance at the same time. For more information about enabling and configuring OSPF,
1) Setup
2)Interface
3)Static Neighbor
4) Virtual Link
5)Filtering
6)Redistribution
7)Summary Address
3) What is the network address of 210.36.54.30/22?
Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network,
Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and
supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to-
understand binary values.
Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0).
Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the
class of your network.
Look at the space between the bits of the addresses: The bits before it are the network part of the
address, the bits after it are the host part. You can see two simple facts: In a network address all
host bits are zero, in a broadcast address they are all set.
The class of your network is determined by its first bits.
If your network is a private internet according to RFC 1918 this is remarked. When displaying
subnets the new bits in the network part of the netmask are marked in a different color
The wildcard is the inverse netmask as used for access control lists in Cisco routers.
Do you want to split your network into subnets? Enter the address and netmask of your original
network and play with the second netmask until the result matches your needs.

More Related Content

Similar to (1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdf

1164 Routers
1164 Routers1164 Routers
1164 Routerstechbed
 
19 24 cn practicals
19 24 cn practicals19 24 cn practicals
19 24 cn practicalsMakavanaVeer
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdfngusyirga
 
6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technologyHRJEETSINGH
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfBuntha Chhay
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01amit singh
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 

Similar to (1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdf (20)

1164 Routers
1164 Routers1164 Routers
1164 Routers
 
19 24 cn practicals
19 24 cn practicals19 24 cn practicals
19 24 cn practicals
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
CCNA
CCNACCNA
CCNA
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology6LowPAN etc.pptx computer network and IOT devices in future technology
6LowPAN etc.pptx computer network and IOT devices in future technology
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
What is a Wifi?
What is a Wifi?What is a Wifi?
What is a Wifi?
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
Chapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdfChapter 3-Network Switching.pdf
Chapter 3-Network Switching.pdf
 
wi-fi definition
wi-fi definition wi-fi definition
wi-fi definition
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Vlans_routing
Vlans_routingVlans_routing
Vlans_routing
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 

More from apnashop1

0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf
0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf
0 repersent even 1 for odd parity bitSolution0 repersent eve.pdfapnashop1
 
viscosity and surface tension are both related to.pdf
                     viscosity and surface tension are both related to.pdf                     viscosity and surface tension are both related to.pdf
viscosity and surface tension are both related to.pdfapnashop1
 
Imports System.Net.Sockets Imports System.Text Public Class Form1 .pdf
  Imports System.Net.Sockets Imports System.Text Public Class Form1   .pdf  Imports System.Net.Sockets Imports System.Text Public Class Form1   .pdf
Imports System.Net.Sockets Imports System.Text Public Class Form1 .pdfapnashop1
 
What is Fluorescence Electrons in an atom or a m.pdf
                     What is Fluorescence Electrons in an atom or a m.pdf                     What is Fluorescence Electrons in an atom or a m.pdf
What is Fluorescence Electrons in an atom or a m.pdfapnashop1
 
The F- will react with water to form HF and OH F-.pdf
                     The F- will react with water to form HF and OH F-.pdf                     The F- will react with water to form HF and OH F-.pdf
The F- will react with water to form HF and OH F-.pdfapnashop1
 
The compound is neutral. The Ammonium ion (NH4+) .pdf
                     The compound is neutral. The Ammonium ion (NH4+) .pdf                     The compound is neutral. The Ammonium ion (NH4+) .pdf
The compound is neutral. The Ammonium ion (NH4+) .pdfapnashop1
 
Step1 NaF is the correct answer Step2 Na+ + e --.pdf
                     Step1 NaF is the correct answer  Step2 Na+ + e --.pdf                     Step1 NaF is the correct answer  Step2 Na+ + e --.pdf
Step1 NaF is the correct answer Step2 Na+ + e --.pdfapnashop1
 
SO3 wont react with molecular oxygen because in S.pdf
                     SO3 wont react with molecular oxygen because in S.pdf                     SO3 wont react with molecular oxygen because in S.pdf
SO3 wont react with molecular oxygen because in S.pdfapnashop1
 
Milk neutralises the basics formed. .pdf
                     Milk neutralises the basics formed.              .pdf                     Milk neutralises the basics formed.              .pdf
Milk neutralises the basics formed. .pdfapnashop1
 
Li + 2H2O = Li(OH)2 + 2H2 moles of Li =1.0502 Mo.pdf
                     Li + 2H2O = Li(OH)2 + 2H2  moles of Li =1.0502 Mo.pdf                     Li + 2H2O = Li(OH)2 + 2H2  moles of Li =1.0502 Mo.pdf
Li + 2H2O = Li(OH)2 + 2H2 moles of Li =1.0502 Mo.pdfapnashop1
 
In mathematics, if G is a group, and H is a subgr.pdf
                     In mathematics, if G is a group, and H is a subgr.pdf                     In mathematics, if G is a group, and H is a subgr.pdf
In mathematics, if G is a group, and H is a subgr.pdfapnashop1
 
Use of technology and innovation in Healthcare centerSolutionU.pdf
Use of technology and innovation in Healthcare centerSolutionU.pdfUse of technology and innovation in Healthcare centerSolutionU.pdf
Use of technology and innovation in Healthcare centerSolutionU.pdfapnashop1
 
There are 22 different cuttings.The number of possible tiling of t.pdf
There are 22 different cuttings.The number of possible tiling of t.pdfThere are 22 different cuttings.The number of possible tiling of t.pdf
There are 22 different cuttings.The number of possible tiling of t.pdfapnashop1
 
Sorry for the late response, but please rate!SolutionS.pdf
Sorry for the late response, but please rate!SolutionS.pdfSorry for the late response, but please rate!SolutionS.pdf
Sorry for the late response, but please rate!SolutionS.pdfapnashop1
 
PbTlAtBaSolutionPbTlAtBa.pdf
PbTlAtBaSolutionPbTlAtBa.pdfPbTlAtBaSolutionPbTlAtBa.pdf
PbTlAtBaSolutionPbTlAtBa.pdfapnashop1
 
Option D is the correct answer. As the morphogen is responsible for .pdf
Option D is the correct answer. As the morphogen is responsible for .pdfOption D is the correct answer. As the morphogen is responsible for .pdf
Option D is the correct answer. As the morphogen is responsible for .pdfapnashop1
 
d. Al2S3 note Al is in oxidation state of +3, a.pdf
                     d. Al2S3  note Al is in oxidation state of +3, a.pdf                     d. Al2S3  note Al is in oxidation state of +3, a.pdf
d. Al2S3 note Al is in oxidation state of +3, a.pdfapnashop1
 
increasing.Solutionincreasing..pdf
increasing.Solutionincreasing..pdfincreasing.Solutionincreasing..pdf
increasing.Solutionincreasing..pdfapnashop1
 
In number of government and private case studies include that the in.pdf
In number of government and private case studies include that the in.pdfIn number of government and private case studies include that the in.pdf
In number of government and private case studies include that the in.pdfapnashop1
 
Benzoic Acid is insoluble in nonpolar solvents li.pdf
                     Benzoic Acid is insoluble in nonpolar solvents li.pdf                     Benzoic Acid is insoluble in nonpolar solvents li.pdf
Benzoic Acid is insoluble in nonpolar solvents li.pdfapnashop1
 

More from apnashop1 (20)

0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf
0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf
0 repersent even 1 for odd parity bitSolution0 repersent eve.pdf
 
viscosity and surface tension are both related to.pdf
                     viscosity and surface tension are both related to.pdf                     viscosity and surface tension are both related to.pdf
viscosity and surface tension are both related to.pdf
 
Imports System.Net.Sockets Imports System.Text Public Class Form1 .pdf
  Imports System.Net.Sockets Imports System.Text Public Class Form1   .pdf  Imports System.Net.Sockets Imports System.Text Public Class Form1   .pdf
Imports System.Net.Sockets Imports System.Text Public Class Form1 .pdf
 
What is Fluorescence Electrons in an atom or a m.pdf
                     What is Fluorescence Electrons in an atom or a m.pdf                     What is Fluorescence Electrons in an atom or a m.pdf
What is Fluorescence Electrons in an atom or a m.pdf
 
The F- will react with water to form HF and OH F-.pdf
                     The F- will react with water to form HF and OH F-.pdf                     The F- will react with water to form HF and OH F-.pdf
The F- will react with water to form HF and OH F-.pdf
 
The compound is neutral. The Ammonium ion (NH4+) .pdf
                     The compound is neutral. The Ammonium ion (NH4+) .pdf                     The compound is neutral. The Ammonium ion (NH4+) .pdf
The compound is neutral. The Ammonium ion (NH4+) .pdf
 
Step1 NaF is the correct answer Step2 Na+ + e --.pdf
                     Step1 NaF is the correct answer  Step2 Na+ + e --.pdf                     Step1 NaF is the correct answer  Step2 Na+ + e --.pdf
Step1 NaF is the correct answer Step2 Na+ + e --.pdf
 
SO3 wont react with molecular oxygen because in S.pdf
                     SO3 wont react with molecular oxygen because in S.pdf                     SO3 wont react with molecular oxygen because in S.pdf
SO3 wont react with molecular oxygen because in S.pdf
 
Milk neutralises the basics formed. .pdf
                     Milk neutralises the basics formed.              .pdf                     Milk neutralises the basics formed.              .pdf
Milk neutralises the basics formed. .pdf
 
Li + 2H2O = Li(OH)2 + 2H2 moles of Li =1.0502 Mo.pdf
                     Li + 2H2O = Li(OH)2 + 2H2  moles of Li =1.0502 Mo.pdf                     Li + 2H2O = Li(OH)2 + 2H2  moles of Li =1.0502 Mo.pdf
Li + 2H2O = Li(OH)2 + 2H2 moles of Li =1.0502 Mo.pdf
 
In mathematics, if G is a group, and H is a subgr.pdf
                     In mathematics, if G is a group, and H is a subgr.pdf                     In mathematics, if G is a group, and H is a subgr.pdf
In mathematics, if G is a group, and H is a subgr.pdf
 
Use of technology and innovation in Healthcare centerSolutionU.pdf
Use of technology and innovation in Healthcare centerSolutionU.pdfUse of technology and innovation in Healthcare centerSolutionU.pdf
Use of technology and innovation in Healthcare centerSolutionU.pdf
 
There are 22 different cuttings.The number of possible tiling of t.pdf
There are 22 different cuttings.The number of possible tiling of t.pdfThere are 22 different cuttings.The number of possible tiling of t.pdf
There are 22 different cuttings.The number of possible tiling of t.pdf
 
Sorry for the late response, but please rate!SolutionS.pdf
Sorry for the late response, but please rate!SolutionS.pdfSorry for the late response, but please rate!SolutionS.pdf
Sorry for the late response, but please rate!SolutionS.pdf
 
PbTlAtBaSolutionPbTlAtBa.pdf
PbTlAtBaSolutionPbTlAtBa.pdfPbTlAtBaSolutionPbTlAtBa.pdf
PbTlAtBaSolutionPbTlAtBa.pdf
 
Option D is the correct answer. As the morphogen is responsible for .pdf
Option D is the correct answer. As the morphogen is responsible for .pdfOption D is the correct answer. As the morphogen is responsible for .pdf
Option D is the correct answer. As the morphogen is responsible for .pdf
 
d. Al2S3 note Al is in oxidation state of +3, a.pdf
                     d. Al2S3  note Al is in oxidation state of +3, a.pdf                     d. Al2S3  note Al is in oxidation state of +3, a.pdf
d. Al2S3 note Al is in oxidation state of +3, a.pdf
 
increasing.Solutionincreasing..pdf
increasing.Solutionincreasing..pdfincreasing.Solutionincreasing..pdf
increasing.Solutionincreasing..pdf
 
In number of government and private case studies include that the in.pdf
In number of government and private case studies include that the in.pdfIn number of government and private case studies include that the in.pdf
In number of government and private case studies include that the in.pdf
 
Benzoic Acid is insoluble in nonpolar solvents li.pdf
                     Benzoic Acid is insoluble in nonpolar solvents li.pdf                     Benzoic Acid is insoluble in nonpolar solvents li.pdf
Benzoic Acid is insoluble in nonpolar solvents li.pdf
 

Recently uploaded

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

(1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdf

  • 1. (1) What is the purpose of a VLAN trunk? Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects major switching centers or nodes in communication system. The transmitted data can be voice(as in the conventinal telephone system) data, computer programs, images, video or control signals. Trunks are used to interconnect switches to form nerwors, and to interconnect local area nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and the number of channels that can be accommodated. A trunk can also be a broadband wireless link. The use and management of trunks in a communications system is known as trunking. It minimizes the number of physical signal paths, and thus the total amount of cable hardware, required to serve a given number of suscribers in a nerwork. In Cisco networks, trunking is special function can be assigned to a port, making thar port capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a port is called a trunk port, in contrast to an access port, which carries traffic only to and from the specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and identiying markers are therefore unnecessary. Trunking:- 1)VLANs are local to each swithc's database, and VLAN infromation is not passed between switches. 2)Trunk linksprovies VLAN identification for frames travelling between switches. 3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q 4)certain types of switches can negotiate trunk links. 5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to carry only specified VLAN traffic. 6)Trunk links must be configured to allow trunking on each end of the link 2)Will a router always choose a static route over an OSPF route? Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance vectors for path selecation. OSPF propagates link-state advertisments rather than table updates. Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication. Authentiction should be used with all routing protocols when possible because route redistribution between OSPF and other protocols when possible because route redistribution between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
  • 2. routing information. If NAT is used, if OSPF is operating on public and private areas, and if address filtering is required, then you need to run two OSPF processes—one process for the public areas and one for the private areas. A router that has interfaces in multiple areas is called an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between routers using OSPF and routers using other routing protocols is called an Autonomous System Boundary Router (ASBR). An ABR uses LSAs to send information about available routes to other OSPF routers. Using ABR type 3 LSA filtering, you can have separate private and public areas with the security appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to other. This lets you use NAT and OSPF together without advertising private networks. If NAT is employed but OSPF is only running in public areas, then routes to public networks can be redistributed inside the private network, either as default or type 5 AS External LSAs. However, you need to configure static routes for the private networks protected by the security appliance. Also, you should not mix public and private networks on the same security appliance interface. You can have two OSPF routing processes and one RIP routing process running on the security appliance at the same time. For more information about enabling and configuring OSPF, 1) Setup 2)Interface 3)Static Neighbor 4) Virtual Link 5)Filtering 6)Redistribution 7)Summary Address 3) What is the network address of 210.36.54.30/22? Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to- understand binary values. Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0). Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the class of your network. Look at the space between the bits of the addresses: The bits before it are the network part of the address, the bits after it are the host part. You can see two simple facts: In a network address all host bits are zero, in a broadcast address they are all set. The class of your network is determined by its first bits. If your network is a private internet according to RFC 1918 this is remarked. When displaying
  • 3. subnets the new bits in the network part of the netmask are marked in a different color The wildcard is the inverse netmask as used for access control lists in Cisco routers. Do you want to split your network into subnets? Enter the address and netmask of your original network and play with the second netmask until the result matches your needs. Solution (1) What is the purpose of a VLAN trunk? Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects major switching centers or nodes in communication system. The transmitted data can be voice(as in the conventinal telephone system) data, computer programs, images, video or control signals. Trunks are used to interconnect switches to form nerwors, and to interconnect local area nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and the number of channels that can be accommodated. A trunk can also be a broadband wireless link. The use and management of trunks in a communications system is known as trunking. It minimizes the number of physical signal paths, and thus the total amount of cable hardware, required to serve a given number of suscribers in a nerwork. In Cisco networks, trunking is special function can be assigned to a port, making thar port capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a port is called a trunk port, in contrast to an access port, which carries traffic only to and from the specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and identiying markers are therefore unnecessary. Trunking:- 1)VLANs are local to each swithc's database, and VLAN infromation is not passed between switches. 2)Trunk linksprovies VLAN identification for frames travelling between switches. 3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q 4)certain types of switches can negotiate trunk links. 5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to carry only specified VLAN traffic. 6)Trunk links must be configured to allow trunking on each end of the link 2)Will a router always choose a static route over an OSPF route? Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
  • 4. vectors for path selecation. OSPF propagates link-state advertisments rather than table updates. Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication. Authentiction should be used with all routing protocols when possible because route redistribution between OSPF and other protocols when possible because route redistribution between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert routing information. If NAT is used, if OSPF is operating on public and private areas, and if address filtering is required, then you need to run two OSPF processes—one process for the public areas and one for the private areas. A router that has interfaces in multiple areas is called an Area Border Router (ABR). A router that acts as a gateway to redistribute traffic between routers using OSPF and routers using other routing protocols is called an Autonomous System Boundary Router (ASBR). An ABR uses LSAs to send information about available routes to other OSPF routers. Using ABR type 3 LSA filtering, you can have separate private and public areas with the security appliance acting as an ABR. Type 3 LSAs (inter-area routes) can be filtered from one area to other. This lets you use NAT and OSPF together without advertising private networks. If NAT is employed but OSPF is only running in public areas, then routes to public networks can be redistributed inside the private network, either as default or type 5 AS External LSAs. However, you need to configure static routes for the private networks protected by the security appliance. Also, you should not mix public and private networks on the same security appliance interface. You can have two OSPF routing processes and one RIP routing process running on the security appliance at the same time. For more information about enabling and configuring OSPF, 1) Setup 2)Interface 3)Static Neighbor 4) Virtual Link 5)Filtering 6)Redistribution 7)Summary Address 3) What is the network address of 210.36.54.30/22? Ans) ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. By giving a second netmask, you can design subnets and supernets.It is also intended to be a teaching tool and presents the subnetting results as easy-to- understand binary values. Enter your netmask(s) in CIDR notation (/25) or dotted decimals (255.255.255.0). Inverse netmasks are recognized. If you omit the netmask ipcalc uses the default netmask for the
  • 5. class of your network. Look at the space between the bits of the addresses: The bits before it are the network part of the address, the bits after it are the host part. You can see two simple facts: In a network address all host bits are zero, in a broadcast address they are all set. The class of your network is determined by its first bits. If your network is a private internet according to RFC 1918 this is remarked. When displaying subnets the new bits in the network part of the netmask are marked in a different color The wildcard is the inverse netmask as used for access control lists in Cisco routers. Do you want to split your network into subnets? Enter the address and netmask of your original network and play with the second netmask until the result matches your needs.