Difference between core switch and normal swtich?
hi this is kittu 23 18 26
What are core and edge switches and why should you care? A core switch is a backbone device, a switch that is central to your network's successful operation. You use it to connect to servers, your Internet service provider (ISP) via a router, and to aggregate all switches that your company uses to connect crucial pieces of equipment that your company can't afford to lose to downtime. As a result, your core switch should always be a fast, full-featured managed switch.
edge switches, on the other hand, connect client devices, such as laptops, desktops, security cameras, and wireless access points, to your network. For this reason, edge switches generally are considered less crucial than core switches to a network's smooth operation. If there are areas of the office such as a conference room where you don't need the features of a fully managed switch, your company can save some money by installing smart switches, such as the Cisco 200 Series, or even unmanaged switches for use at the edges of your network.
Which statement accurately describes a switch with all access ports assigned to the same VLAN?
Performance is increased by keeping all users in the same Layer 2 network
rip is short for routing information protcol
it is a routing protocol that shared routing tables from 1 router to another to a maximum of 16 hops of 16 routers
Distance vector routing in c program?
#include<stdio.h>
int main()
{
int n,i,j,k,a[10][10];
printf("\nEnter the number of nodes: ");
scanf("%d",&n);
for(i=0; i<n; i++)
{
for(j=0; j<n; j++)
{
printf("\nEnter the distance between the host %d%d:", i+1,j+1);
scanf("%d",&a[i][j]);
}
}
for(i=0; i<n; i++)
{
for(j=0; j<n; j++)
printf("%d\t",a[i][j]);
printf("\n");
}
for(k=0; k<n; k++)
{
for(i=0; i<n; i++)
{
for(j=0; j<n; j++)
{
if(a[i][j]>a[i][k]+a[k][j])
a[i][j]=a[i][k]+a[k][j];
}
}
}
for(i=0; i<n; i++)
{
for(j=0; j<n; j++)
{
b[i][j]=a[i][j];
if(i==j)
b[i][j]=0;
}
}
printf("\nThe output matrix is:\n");
for(i=0;i<n;i++)
{
for(j=0;j<n;j++)
printf("%d\t",b[i][j]);
printf("\n");
}
return 0;
}
Will including a router improve computer security?
A router can improve network security if it includes the use of NAT (network address translation) and/or a firewall.
True or false all transport layer protocols are concerned with reliability?
true or false.all transport layer protocols are concerned with reliability
I assume you are logging into the default gateway because you wish to change something in the configuration (that is really the only reason for requiring authentication in a DG).
If you don't know the userid and password you will need to find someone who does. Unless you are responsible for that DG they aren't likely to tell you.
State the purpose of layering in networks?
The purpose of ayering is to separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.
What is the BOOTP protocol used for where might you find it in Windows network infrastructure?
BootP (RFC951) provides
* a unique IP address to the requester (using port 67) similar to the DHCP request on port 68 AND * can provide (where supported) the ability to boot a system without a hard drive (ie: a diskless client) Apple OS X 10.* Server supports BootP (albeit) renamed as NetBoot. The facility allows the Admin to maintain a selected set of configurations as boot images and then assign sets of client systems to share(or boot from) that image. For example Accounting, Management, and Engineering departments have elements in common, but which can be unique from other departments. Performing upgrades and maintenance on three images is far more productive that working on all client systems individually.
Startup is obviously network intensive, and beyond 40-50 clients, the Admin needs to
carefully subnet the infrastructure, use gigabit switches, and host the images local to the clients to avoid saturating the network. This will expand the number of BootP servers and multiply the number of images, but the productivity of 1 BootP server per 50 clients is undeniable :)
Sunmicro, Linux, and AIX RS/600 all support BootP.
Todate, Windows does not support booting "diskless clients".
What are the 3 major classes of IP network?
There 3 major classes of IP Network, i.e. Class A, B & C. In details are as follows, {| ! Class ! Leading bits ! Start ! End ! CIDR
suffix ! Default
subnet mask | Class A 0 0.0.0.0 127.255.255.255 /8 255.0.0.0 Class B 10 128.0.0.0 191.255.255.255 /16 255.255.0.0 Class C 110 192.0.0.0 223.255.255.255 /24 255.255.255.0 |}
What is the domain database location on Windows 2003 servers?
The DNS is a server which masks your public IP, whereas DHCP is a server which automatically assigns a Dynamic IP adress
I wouldn't exactly say "mask". Dns just puts a nice easy name to an ip, like google, or hotmail etc... DHCP just gives out ip addresses.
decapsulates the Layer 3 packet by stripping off the Layer 2 frame header
uses the destination IP Address in the IP header to look up the next-hop address in the routing table
encapsulates the Layer 3 packet into the new Layer 2 frame and forwards it out the exit interface
What class network is reserved for special purposes?
Class D and E are reserved for special purposes. A Class D is 1110 the decimal range will be 224-239. Class E is reserved for InterNIC experiments.
If the sending and receiving protocols are different, then you have a mismatch. Think of a speaker using French but the receiver only understanding Spanish. They will not be able to understand each other, and this is what happens with network protocols.
They can see the communication but have no clue about the content or what to do with the request.
WAN.
LAN is a short range connection, WAN is wide range.
Protocol Analyzer
Conan is on cable because Conan quit network TV because he did not want his show on at midnight.
What is the command used to install a route in a routing table?
R1(Config)#ip route x.x.x.x y.y.y.y z.z.z.z
X will be the source network
Y will be the source network's subnet mask
Z will be the destination network.
*Note you can also set the destination as an outbound interface.