Configure VTP Pruning on the Switches- CCNA, Computer Networking

Assignment Help:

Configure VTP Pruning on the Switches

VTP pruning allows a VTP server to suppress IP broadcast traffic for particular VLANs to switches that do not have any ports in that VLAN. By default, all unknown unicasts and broadcasts in a VLAN are flooded over the whole VLAN. All switches in the network receive all broadcasts, even in situations in which few users are linked in that VLAN. VTP pruning eliminates or prunes this unnecessary traffic. Pruning saves LAN bandwidth because broadcasts do not have to be sent to switches that do not required them.  

 


Related Discussions:- Configure VTP Pruning on the Switches- CCNA

Distinguish between physical topology and logical topology, Question: (...

Question: (a) (i) Distinguish between Physical topology and Logical topology. (ii) Explain the following statement with the help of a diagram: "A star topology can have a l

Overview of the transport layer protocols, Overview of the Transport  Laye...

Overview of the Transport  Layer Protocols Transport layer  can be  available  more than  protocols  to the  network  applications. For  example the network  applications. For

Mechanical characteristics of RS232 interface, Q. Mechanical Characteristic...

Q. Mechanical Characteristics of RS232 interface? - 9-pin connector - 9-pin connector is more usually found in IBM-PC but it covers signals for asynchronous serial com

Coffee and Company Security Case Study, This is a report, I am working on a...

This is a report, I am working on another one. This report is on finding a better solution dealing with customer, wifi, management, etc.

Objective of parallel algorithms, After studying this part the students wil...

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

Networks - fundamental of network , Normal 0 false false fa...

Normal 0 false false false EN-IN X-NONE X-NONE Networks A networks  consists of two  or m

Vpn technology - point to point , VPN Technology For an organization  ...

VPN Technology For an organization  VPN  technology  uses some main  techniques for privacy a.Encryption /Authentication b.Tunnelling c.Fire walls

What is a tp monitor, What is a TP Monitor? There is no commonly accept...

What is a TP Monitor? There is no commonly accepted explanation for a TP monitor. According to Jeri Edwards' a TP Monitor is "an OS for transaction processing".

Uses of fragmentation and reassembly, Uses of fragmentation and reassembly ...

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd