List the range of normal vlan

Assignment Help Computer Networking
Reference no: EM13924290

A network engineer typed the following command on a switch hostname S1 and observed the output below. Explain each entry in the output and the possible source for each MAC address in the MAC Address Table.

SW1#sh mac-address-table

Mac Address Table

----------------------------------------------------------------------

Vlan    Mac                             Address Type              Ports

----------------------------------------------------------------------

10        0001.c7ad.cd5a           STATIC                      Fa0/2

1          00d0.5883.5001          DYNAMIC                Fa0/1

1          00d0.5883.5002          DYNAMIC                Fa0/4
45        00d0.d3aa.ec3a           STATIC                      Fa0/15

1. Explain the significance of each of the following types of VLAN: Data, Management, Native, and Blackhole. Explain where each type of VLAN fits into a LAN network. In addition, what is the default VLAN on a Cisco switch for Data, Management, and Native frames? Justify your answer.

2. List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range?

Reference no: EM13924290

Questions Cloud

Extra days of revenue : The owner of Wheat country bakery has asked your firm not to close the revenue accounts at the end of the fiscal year. "Our year-end income statement will look a lot better if we can fatten up those revenue figures with a couple extra days of revenue..
What is your expectation of the market p-e ratio : What is the expected growth rate? What is your expectation of the market P/E ratio? What will be the value for the market index if the expectation is for earnings per share of $95?
Communicating with classmates, coworkers : This happens when you receive, construct meaning from, and respond to the sender's message.
Bertha estimated that warranty : At the time of sale, Bertha estimated that warranty claims would amount to 7% of sales. During the year, she replaced defective merchandise for $6,000
List the range of normal vlan : List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range?
Compute the estimated eps for s and p industrials index : Compute the estimated EPS for 2013. Assume that a member of the research committee for your firm feels that it is important to consider a range of operating profit margin (OPM) estimates.
Sales clerk receives customer orders : The sales clerk receives customer orders by phone. She prepares a four-copy sales order form. She files one copy, one copy goes to the warehouse clerk, one copy goes to credit clerk, and one copy is mailed to the customer.
Challenges in the global business environment : According to the textbook, ongoing challenges in the global business environment are mostly attributed to unethical business practices, failure to embrace technology advancements, and stiff competition among businesses. Imagine that you have been ..
Communication channel involves its own abbreviations : This preparation process involves looking at the characteristics of the receivers of the sender's message.

Reviews

Write a Review

Computer Networking Questions & Answers

  Would you recommend buying the stdm multiplexer

Complete the following exercises from FitzGerald and Dennis, Business Data Communications and Networking, 10th ed.

  Which of following is not class of client-server processing

Retail point of sale systems are an example of horizontal partitioning of data processing.

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

  What role does dns play with active directory

For the second part, consider the use of DNS in Server 2008 and describe how you would employ DNS within your infrastructure. What advantages does DNS provide? What role does DNS play with Active Directory?

  Find all irreducible polynomials

Find all irreducible polynomials

  Define social media and networking technologies

Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking. The president of the university also needs ..

  1outline a plan for the development of an addressing and n

1.outline a plan for the development of an addressing and naming model in an environment of the following scenario ?ten

  Describe the tcp/ip address maintenance process planned

Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses

  How the information would be used to optimize network

The statistics are in the form of counters that start from zero when a valid entry is created. Explained how the information would be used to optimize network. Provided examples of how to change network, based on information gathered and analyzed fro..

  Importance of communication protocols

Question 1: Explain the importance of communication protocols. Question 2: Identify the protocols in your design and provide rationale for your decision. Question 3: Define the overall network architecture.

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Explain information security body of knowledge

Look for the information security body of knowledge(CBK). When you review list of 10 areas in CBK, is policy listed? why do you think this is so?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd