Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In
Continue with Google
or use


Have an account? Sign In Now

Sign In

Continue with Google
or use

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Sorry, you do not have permission to ask a question, You must login to ask a question.

Continue with Google
or use

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Network Classmate Logo Network Classmate Logo
Sign InSign Up

Network Classmate

Network Classmate Navigation

  • Home
  • Article
  • Q&A
  • Guest Post
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Feed
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges

Maryam Khalid

Bronze
Ask Maryam Khalid
60 Visits
0 Followers
0 Questions
Home/ Maryam Khalid/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Asked Questions
  • Followed
  • Favorites
  • Groups
  • Posts
  • Comments
  • Followers Questions
  • Followers Answers
  • Followers Posts
  • Followers Comments
  1. Asked: October 24, 2021In: Q & A

    What Three Services Are Provided By The Transport Layer? (Choose Three.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    What three services are provided by the transport layer? (Choose three.) Flow control. Address mapping. Data transfer. Data encryption. Determination of the path. Representation of the data. Bit transmission. Answer: The responsibility of the transport layer is to identify the digital communicationRead more

    What three services are provided by the transport layer? (Choose three.)

    • Flow control.
    • Address mapping.
    • Data transfer.
    • Data encryption.
    • Determination of the path.
    • Representation of the data.
    • Bit transmission.

    Answer: The responsibility of the transport layer is to identify the digital communication of the source to the destination application with the use of the port’s numbers. The protocols which work on the transport layer are the TCP and UDP. The transmission control provides reliability by forming the connection, maintaining the flow control, and error recovery.

    The responsibility of the transport layer which has to be done is described in the topic. To know them to read the topic to the end.

    Transport layer services

    The services of the transport layers are various in numbers some of them are discussed in the following section:

    Address Mapping

    Address mapping means on the network address the transport address is mapped. As the session entity demands the transport service data unit from another session transport layer entity sends the access point address to the transport service for identification. The transport entity will control the NASP (Network Service Access Point). The whole process is called address mapping.

    Assigning the network connection

    For the transport protocol data units (TPDUs) transfer the transport entity assigned the network connection. The assigned network connection is established by a transport entity. In some transport protocols, recovery after disconnection from the network is possible. When the disconnection happens in some protocols, the TPDUs is reassigned by the transport entity on the different connection.

    Data transfers

    Data Transfers The data carried by the shipping layer are of two types are the regular transfer of data and the accelerated data transfer. In normal data transfer, the user requests data transfer in an integer number of bytes.

    The transfer of the data is transparent such as the boundaries of the data are sustained in the transfer of data and one of the constraints is present on the content and the number of the octet. This type of data transfer can be done in two ways at the same time. The expedited data transfer has different flow control and all the data queues that have the maximum priority can pass for the delivery of data. This type of data flow is an optional or optional service provider and the number of the user data octets is restricted to 16.

    Transport connection multiplexing

    For the optimal network link uses, the transport entity creates the multiple end-to-end transport connection to the network connection which is referred to as multiplexing. There are many TSDUs that are identified by the receiving transport entity by using the TCEPI (transport connection endpoint identifiers), which are attached with each TSDU by transferring transport entity. For every connection, the TCEP is specific and unique.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  2. Asked: October 24, 2021In: Q & A

    Which Memory Technology Allows Two Memory Modules To Be Accessed At The Same Time?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    Which memory technology allows two memory modules to be accessed at the same time? SIMM. SRAM. ECC Dual channel  Answer: Dual channel RAM has two channels which allow the two-memory module to be accessed at the same time. On both sides of the module, the Double-side memory modules are present. StatiRead more

    Which memory technology allows two memory modules to be accessed at the same time?

    • SIMM.
    • SRAM.
    • ECC
    • Dual channel 

    Answer: Dual channel RAM has two channels which allow the two-memory module to be accessed at the same time. On both sides of the module, the Double-side memory modules are present. Static RAM (SRAM) is a memory that does not need any kind of refreshing and gives faster access to the data. For error checking the ECC, the mode is available.

    Memory module

    The memory module is also known as RAM (random access memory) stick which is a printed circuit board where the memory integrated circuit is ascended. in an electronic system, the installation and the replacement are easily done because of the memory module mostly in the computer as personal, computers, workstation, and the servers.

    The first module is specifically for the computer and it is a propriety design made by a specific manufacturer. After some time an organization JEDEC standardized the memory module and is used by any system design. There are different types of memory modules:

    • TransFlash memory module.
    • SIMM: A single in-line memory module.
    • DIMM: dual in-line memory module.
    •   RIMMS: The Rambus memory module and is a subset of DMMIs.
    • SO-DIMM: it is known as the small outline DIMM is also the version of the DIMM but a smaller one and used in laptops.

    Memory module applications

    In most digital electronic platforms the memory is the essential component from mobile phones to radios. For any device which wants to store the information, memory is used for it. In the case of the monitor or the TV, the storage is a kind of internal software that helps in the running of the device or acts as the temporary storage for the processor. Some of the applications of the memory module are discussed in the following section:

    • Personal computer.
    • The motherboard.
    • RAID cards.
    • Digital electronics.
    • Printers.
    • Images.
    • Servers.
    • Networking.

    Features of the memory modules

    The features of memory modules are defined in the following section:

    • The capacity is high which means in a given amount of time how much data is transferred.
    • Clock speed is the feature of the module it is raw MHZ on which the CPU works.
    • Cycle time is the distance of time which is taken by the transmission of the data and shown in the form of less amount of the time taken by the memory to full the cycle such as read, write, read/write or read/modify/write.
    • Checking of error and the correction features of memory which include parity, error the non-parity, etc. When the data forward the possibility of the error shown and the parity detection notifies about the error to the user.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  3. Asked: October 24, 2021In: Q & A

    What Are The Two Sizes (Minimum And Maximum) Of An Ethernet Frame? (Choose Two.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.) 56 bytes. 1324 bytes. 1518 bytes. 64 bytes. 128 bytes. Answer: The lowest frame for the Ethernet is 64 bytes while the maximum frame for the Ethernet is 1518 bytes. For the recognition of the runt and jumbo frames, theRead more

    What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

    • 56 bytes.
    • 1324 bytes.
    • 1518 bytes.
    • 64 bytes.
    • 128 bytes.

    Answer: The lowest frame for the Ethernet is 64 bytes while the maximum frame for the Ethernet is 1518 bytes. For the recognition of the runt and jumbo frames, the technician has to know about the maximum and the minimum frames.

    Ethernet frames

    With Ethernet, the data are shared in the form of data packets. The packets have many items in them such as the ethernet frames. The Ethernet frames are the protocol of the data link layer and use the Ethernet physical transport layer transport mechanism. In Ethernet data transmission methods, the responsibility of Ethernet frames is to ensure proper throttling and successful data packets.

    The Ethernet frames are present at the data link layer of the OSI model and ensure the successful transmission of the data and the bitstream separation. The size of the ethernet is defined by the standard of ethernet 802.3 which is from 64 bytes to 1518 bytes. The least size is 64 bytes and the maximum size is 1518 bytes.

    The frame of ethernet is discovered a long time ago and the first version is based on the 16-bit field which does not have its own defined types whereas modern Ethernet frames are used in Ethernet II.

    Elements of the ethernet frames

    The frames are categorized into several data sets. Records are maintained in which binary code is included which have the essential information such as address information, control, payload data, etc. Moreover, the Ethernet frames have 3 parts: Ethernet header which includes: preamble, SFD, Destination, source, and types, encapsulate data contains: Data and pad, and the Ethernet trailers.

    Let’s see the further explanation of the ethernet frames elements in the following section:

    Permeable: Its work is to provide information about the beginnings of the frame and it enables synchronization to the receiver.

    Start Frame Delimiter (SFD): It tells theta the destinated MAC address filed begins with the next byte. The length of the SFD is 1 byte.

    Destinated MAC: The destination device MAC address is saved in the MAC address. The field length is 6 bytes.

    Source MAC: The MAC address for the source is contained in the Source MAC. The size of the field is 6 bytes. It can identify the source device as well.

    Type field: the length of the type field is 2 bytes .in the IPV4 and IPV5 the protocol types are defined by it.

    Data and pad: the least size of the field is 46 bytes. And the highest is 1500 bytes. The payload data is present in Data and pad. The data with less or high than the size limit in one data packet and cannot be packed by the network layer.

    Frame Check Sequence: the length of the field is 4 bytes. The value with a length of 4 bytes is present in this field which ensures whether the frame is complete or not. The 32-bit cyclic redundancy check is present in it which allows the detection of the corrupted data.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  4. Asked: October 24, 2021In: Q & A

    What Is The Correct Syntax Of A Floating Static Route?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:31 am

    What is the correct syntax of a floating static route? ip route 209.165.200.228 255.255.255.249 serial 0/0/0. ip route 209.165.200.228 255.255.255.248 10.0.0.1 120. Ip route 0.0.0.0.0.0.0.0 serial 0/0/10. Ip route 172.16.0.0.255.248.0.0 10.0.0.0. Answer: The floating static route is for the backup oRead more

    What is the correct syntax of a floating static route?

    • ip route 209.165.200.228 255.255.255.249 serial 0/0/0.
    • ip route 209.165.200.228 255.255.255.248 10.0.0.1 120.
    • Ip route 0.0.0.0.0.0.0.0 serial 0/0/10.
    • Ip route 172.16.0.0.255.248.0.0 10.0.0.0.

    Answer: The floating static route is for the backup of the routes mostly to the routes which are learned from the dynamic routing protocol. For the configuration of the floating static route, the router must have a high administrative distance rather than the primary route, such as for the primary route which is learned through OSPF, then route which gives the backup to the OSPF route must have the administrative distance higher than the 110. the distance of administrative on the floating static route is placed at the end of the static route: ip route 209.165.200.228 255.255.255.248 10.0.0.1 120.

    Floating static route and its configuration

    In case of the failure of the link, the floating static route is used by the network administrator which gives the backup to the primary static or the dynamic route and works only in case of the absence of the primary route. The causes of the failure are due to physical layer problems or maybe wrong configuration. If many routes are presented to the destination then the path with the low administrative distance is preferable by the router.

    The administrative distance by default of the EIGRP is 90, in case someone wants to configure the floating static route of the EIGRP routes. The configuration of the floating is only possible if the administrative value is greater than 90, and if the configuration happens below the value 90 then the router uses the static route first.

    Configuration of floating static route

    In the global configuration, the floating static route happens by using the ‘ip route’ command. If the distance is not specified then the default value is 1. for example suppose in a topology the default static route is configured with the default distance value and referring to the fastest Ethernet 0/0 of router 3. the configuration of the floating route happens with the following commands in the global configuration:

    • Router3>enable.
    • Router3#configure terminal
    • Router3(config)#ip route 0.0.0.0 0.0.0.0 Fast Ethernet 0/1 3
    • Router3(config)#exit
    • Router3#wr.

    Verification of the floating static route

    Router 3 by default refer to router 2 along with the default administrative distance and the floating static route by default refer to router 1 with the value of 3. so the administrative value is higher than the default value which is 1, so this route will float and not available in the routing table unless the pointing route fails. The command “show ip route” is used.

    The verification of the route can also happen with the “tracert and traceroute” command. Another way for the verification is by disconnecting the cable of router 1 and router 3 and checking the routing table of router 3.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  5. Asked: October 24, 2021In: Q & A

    Which Three Statements Describe The Similarities Between Ospfv2 And Ospfv3? (Choose Three.)

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:30 am

    Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.) Both of them are link-state protocols. The source address act as the global address by them in the event of sending the OSPF messages. The concept of multi areas is common in both of them. Assist with the autRead more

    Which three statements describe the similarities between OSPFv2 and OSPFv3? (Choose three.)

    1. Both of them are link-state protocols.
    2. The source address act as the global address by them in the event of sending the OSPF messages.
    3. The concept of multi areas is common in both of them.
    4. Assist with the authentication of the IPsec.
    5. Both of them use the alike DR/BDR election process.
    6. By default, the unicast routing is enabled in them.

    Answer: a correct answer is an option a (Both of them are link-state protocol.), c (the concept of multi-area is common in both of them), e (both of them use the alike DR/BDR election process).

    What is OSPF?

    OSPF stands for the open shortest path first protocol, the protocol is from the IP routing protocol and acts as the IGP (interior gateway protocol) for the internet which routes all the information in the IP network, related to the ip routing to the single autonomous system. 

    The protocol is the link-state protocol which ensures that topology information is also exchanged with the closest network by the routers. in the AS the topology information is present in massive amounts, which allows each router to have a clear picture of the topology in the autonomous system with the help of the Dijkstra algorithm. That’s why the next-hop address is chosen by selecting the best end-to-end path of the destination in the link-state protocols.

    With the help of the algorithms, the routing table is calculated by the routers. The routing table has thorough information about the destination, the protocols for the routing, the next-hop address, and the outgoing interface. Some of the features of the protocol are described in the following:

    • During the fluctuation of the network topology, the protocol has to recalculate routes with the help of the Dijkstra algorithm and reduce the traffic of the routing protocol generated by it.
    • The path with the same cost has the assistance of the protocols.
    • From the outsider router, it can hide the topology information of the specific areas, by giving the multi-level hierarchy which is known as area routing.
    • Extra routing protection and minimization in the routing protocol traffic is also a feature of this protocol.
    • The authentication is enabled for all protocol exchanges so that the known protocol is present in the routing exchange of the AS.

    Let’s see the difference between the OSPFv2 and OSPFv3 in the following:

    Advertises: OSPFv2 advertise IPv4 routes, whereas OSPFv3 advertise routes for IPV6.

    Source address: The source for the OSPFv2 is the exit interface for the IPv4 address while in the OSPFv3 the source for the message is the link-local address of the exit interface. 

    DR/BDR multicast address: for the OSPFv2 the address is 224.0.0.6 while for the OSPFv3 it is FF02::6.

    IP unicast routing: in IPV4 it is allowed by default, while in the IPV6 the command unicast-routing needs to be configured.

    Authentication: the authentication in the OSPFv2 is either the plaintext or the MD5, whereas in the OSPFv3 it is IPV6.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  6. Asked: October 24, 2021In: Q & A

    What Component Must Be Compatible With Every Other Component Of The Computer?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:30 am

    What Component Must Be Compatible with Every Other Component of The Computer? Answer: The component which needs to be compatible with each component of the computer is the motherboard. The motherboard contains almost every electronic part and it is located on the central processing unit. The motherbRead more

    What Component Must Be Compatible with Every Other Component of The Computer?

    Answer: The component which needs to be compatible with each component of the computer is the motherboard. The motherboard contains almost every electronic part and it is located on the central processing unit. The motherboard must be compatible because all parts all connected with the CPU and it is located on it. suppose if the power supply is not proper for the motherboard then the central processing will work? No, it won’t work, that’s why it is necessary for the motherboard to be compatible.

    Let’s discuss further the motherboard its components features and function. All of them all describe in the following section. So, stay connected to the end.

    What is the motherboard?

    The motherboard is the central space or the platform on which all parts of the computer are connected. The CPU, memory, hard drives, video card, sound cards, and various other cards are connected either by direct or with wires.it is known as the backbone of the computer.

    The motherboard is the circuit of the PC which is called the logic board. The motherboard has the chips and the controllers in a group known as the chipset. Each new motherboard has a new chipset and they are effective and fast than the previous ones. The RAM slots, ROM, PCL slots the USB port all are present on the motherboard.

    Motherboard characteristics

    The motherboard has some characteristics which are discussed in the following section:

    • The motherboard variant in a way that supports various and different types of components.
    • It can assist with only one type of CPU and a few of the memories.
    • For the proper functioning of the sound card, video cards, hard disk as to be compatible with the motherboard.
    • In all cases, the power supply unit needs to be cooperative for the correct functioning of the computer.

    Motherboard functions:

    The motherboard performs some functions which are described below:

    • The motherboard is the computer backbone on which all parts are installed as RAM etc.
    • It works as the platform for some expansion slots on which other kinds of interfaces for different devices are installed.
    • The power distribution to the computer parts is the work of the motherboard.
    • Different device connections and the interaction in computer and management of the interface between them is the work of motherboard.
    • Different sizes of the motherboard are BTX, ATX, MINI-ATX, micro-ATX, LPX, NLX, etc.

    Motherboard manufacturers

    Some of the popular manufacturers are listed below:

    • Intel
    • ASUS
    • AOpen
    • ABIT
    • Biostar
    • Gigabyte
    • MSI.
    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  7. Asked: October 3, 2021In: Q & A

    What Is A Best Practice To Use Before Beginning An Etherchannel Implementation?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:30 am

    What is a best practice to use before beginning an EtherChannel implementation? Affected interfaces are assigned to VLAN 1. Affected interfaces are assigned to the management VLAN. Each affected interface is shut down. Enable the affected interface. Affected interfaces are assigned to the unused VLARead more

    What is a best practice to use before beginning an EtherChannel implementation?

    • Affected interfaces are assigned to VLAN 1.
    • Affected interfaces are assigned to the management VLAN.
    • Each affected interface is shut down.
    • Enable the affected interface.
    • Affected interfaces are assigned to the unused VLAN.

    Answer: Before the beginning of the EtherChannel implementation, the affected interface needs to be shut down so that any kind of incomplete configuration will not create activity on the link.

    What is EtherChannel?

    EtherChannel is the combination port for the various physical ports links which are grouped into one link. It gives the speed links and the redundancy. The greatest links are 8 which combine to form the single logical link. EtherChannel helps the connection of multiple links to a single link which prevents the blockage of any less redundant link.

    For example, in a topology, if the switches are connected with a PC and the links between the switches and the PC is considered as 1000mb/s, while in switches it is 100mb/s. Moreover, if the traffic which is sent is greater than the 100mb/s but we have the link of 100mb/s between the switches in this condition the switches restarted to drop. For this problem, the EtherChannel is used in which the high-speed links between switches are established and we can form more links with the same speed. EtherChannel help in building multiple links to a single logical link.

    The standard for the formation of the EtherChannel is given in the following:

    • Twin duplex.
    • Twin speed.
    • Twin VLAN configuration (the native and allowed VLAN has to be the same).
    • The mode of the switch port has to be the same.

    Protocols of the EtherChannel

    For the formation of the EtherChannel, there are two protocols one is PAgP (port aggregation protocol) while the other one is LACP (link aggregation protocol)

    • Port Aggregation Protocol (PAgP):

    The PAgP is the cisco protocol that forms the EtherChannel.

    •  LACP (link aggregation control protocol):

    It is the protocol for the IEEE standards which are described in the 802.3ad which form the EtherChannel it is quite alike to the PAgP protocol.

    Modes in the protocols of EtherChannel:

    The modes in the configuration of this interface are described below:

    ON: the ethernet is part of the EtherChannel but the negation will not take at this place.

    Desirable: the ethernet will attempt to transform the other side interface into an EtherChannel.

    Auto: if the opposite site requests the interface then it will be the portion of the EtherChannel.

    OFF: EtherChannel will not configure in this mode.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  8. Asked: October 3, 2021In: Q & A

    Why Are The Pings From Pc0 To Server0 Not Successful?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 17, 2021 at 12:29 am

    Why are the pings from PC0 to Server0 not successful? The static route to network 192.168.1.0 is misconfigured on router 1. The static route to network 192.168.1.0 is misconfigured on router 2. The static route to network 192.168.2.0 is misconfigured on router 1. The static route to network 192.168.Read more

    Why are the pings from PC0 to Server0 not successful?

    • The static route to network 192.168.1.0 is misconfigured on router 1.
    • The static route to network 192.168.1.0 is misconfigured on router 2.
    • The static route to network 192.168.2.0 is misconfigured on router 1.
    • The static route to network 192.168.2.0 is misconfigured on router 2.

    Answer: The static route has to specify either the local interface or the next-hop IP address.

    Along with the answer to the question we have mentioned about ping as what is ping? and what is the work of the pings? In this topic. those who are interested to know will read the topic to the end.

    What is the ping?

    Ping is the internet program that is used for the verification of the IP address existence and also approves the request in the computer network administration. It is also known as the packet internet or the inter-Network groper. The ping is also used to ensure the computer which is host is operating perfectly when the user is trying to use it. the computer along with the networking ability, the embedded computer is also using the ping.

    The two basic functions of the ping are:

    • Check the availability of the host.
    • Measurement of the time taken by the host to the response.

    The ping works with the help of the ping command and it is a regular command in the command-line interface. Most networks offer the ping function which allows you to access the server’s ping by entering the IP address. The response time of the ping is equally important because it can add the high up to the request over the internet. Ping is mainly used in online games because the events are real. The response time of the ping is proportional to the distance between the source and the destination address.

    Working of the ping

    The working of the ping starts with an ICMP echo request which is sent to the specific interface on the network and then waits for the response. The signals of the pings are sent to the specified address as the command of the ping is sent. When the request is received to the destination then the assurance echo reply packet is sent back toward the source and the basic function of the ping works. Time for the response is measured in milliseconds, the process begins with the server echo request and ends with the response from the destination. Ping command sends several requests about 4 to 5 and then displays the results. The RTT tells the number of the bytes which are received and the time to give a reply.

    Ping Spoofing:

    The fake request which is sent toward the server is considered ping spoofing. in that case, the wrong data shows and it looks like the original packets which are sent toward the server. The receiver will receive the fake information and give the response to the third user instead of the original. And the receiver also receives the unrequested data from another address. The spoofing is hard to detect.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  9. Asked: October 24, 2021In: Q & A

    Which Step Should Be Performed First When Deleting A Vlan That Has Member Switch Ports?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 10:14 pm

    Which step should be performed first when deleting a VLAN that has member switch ports? Charge the switch. Execute the delete command vlan.dat. Reassign the VLAN member ports to other different VLANs. Reinforce or backup the running config. Answer: When someone wants to delete the active VLAN it isRead more

    Which step should be performed first when deleting a VLAN that has member switch ports?

    • Charge the switch.
    • Execute the delete command vlan.dat.
    • Reassign the VLAN member ports to other different VLANs.
    • Reinforce or backup the running config.

    Answer: When someone wants to delete the active VLAN it is needed that the recently assigned ports as a VLAN member need to be reassigned. The port which is a VLAN member which is deleted will become unstable.

    VLAN description and its types

    VLAN a virtual LAN is the subnetwork that makes the device collection jointed on different or separate local area networks (LANs)the LAN is the connection of the devices such as computers which can communicate with each other and with servers in local areas.

    VLAN is useful for the administrator because they can use the single switch partitions to compare their functionality and the security of the system rather than using the new cables and making the changes in the infrastructure of the network. For the management of the traffic over the network VLAN is used by the business on a larger scale by the partition of the switch.

    For the devices which communicate most often VLAN is important because and the performance becomes improve. The security protection is also provided by VLAN to a large network with the control on the devices which can access each other. The VLAN is a logical connection rather than a physical one’s which is kind of flexible.

    Types of VLAN:

    Types of the VLANs are discussed in the following section:

    Protocol-based VLAN:

    The traffic control can be done by the protocol-based VLAN. The switch will move the traffic based on traffic protocol.

    Static based VLAN:

    It is the port-based VLAN and it required the network administrator which can allocate the ports on the network switch with the virtual network.

    Dynamic based VLAN:

    The network memberships which are based on the characteristics of the device are defined by the network administrator and it is allowed by dynamic-based VLAN rather than the location of the switch port.

    Working on the VLAN

    When the workstation sends the data toward the bridge of LAN, it is tagged with the VLAN identifies which shows the VLAN of the incoming data, the process is known as the explicit tagging. With the implicit tagging is almost impossible to find the VLAN of coming data. in implicit tagging the data is not tagged with the VLAN identifier but from the VLAN from where the data came is identified with port numbers.

    Tagging depends on the ports, the media access control source field the network address of the source, or the other filed combinations, VLAN is categorized with the help of the used method to do the tagging with methods the bridge required the database with the new version and also had the map of the fields used and the VLAN.

    IF the tagging is based on the port then the database has the information related to that port VLAN. And the database is called the filtering database. The bridges need to make sure that the information on the LAN is the same on each database, and according to the LAN operation, the bridges define where the data need to go.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
  10. Asked: October 3, 2021In: Q & A

    Which Osi Layer Is Responsible For Directing Data From One Lan To Another?

    Maryam Khalid
    Maryam Khalid Bronze
    Added an answer on December 1, 2021 at 7:59 pm

    Which OSI layer is responsible for directing data from one LAN to another? Physical layer. Network layer. Transport layer. Datalink layer. Answer: The layer which is responsible for directing the data from one LAN to the other is the Network layer of the OSI model. Let’s understand the function andRead more

    Which OSI layer is responsible for directing data from one LAN to another?

    • Physical layer.
    • Network layer.
    • Transport layer.
    • Datalink layer.

    Answer: The layer which is responsible for directing the data from one LAN to the other is the Network layer of the OSI model. Let’s understand the function and the design of the network layer in the mode so that it will be easier for you to understand.

    What is the network layer?

    The function of the subnet is maintained by the network layer. The basic purpose of the network layer is to transfer the packets across the destination to multiple links. When the computers are connected to the same link then there is no need for the network layer. It tells about the path or routes them to from one end to the other across network channels as a network layer.

    The packets division of the departing message in packets forms and gather the incoming message to the higher level. Due to the broadcast, the problem of routing is easy that’s why the end of the network layer is not much or thin.

    The function of the network layer

    The function of the network layer is given in the following section:

    • Related to the packet and the message switching the network translates the IP address (logical address) to the MAC (physical address) connected with the circuit.
    • The process for the routing of the packets to the destination port is controlled by the network layer, gateways are also included in it.
    • The services of the connection are also present by the network layer such as the flow control, network layer control of errors, and sequence for the packets.
    • The network layer splits bigger packets into smaller packets.

    Issue related to design with the network layer

    • A key design problem is determining the packet’s movement toward the destination address. The routes are formed on the base of the static table which is connected to the network layer and does not change easily. These might be dynamic to determine the new route for the packets to show that the load on the network is high.
    • If at the subnet many packets are present then there is a chance that they will move toward the other route by forming the bottlenecks and the control of it are also belong to the network layer.
    • The QoS (Quality of service) also belong to the network layer such as the delay, transmit time, and the jitters.
    • During the packet’s movement from one network to the other destination network various problems arise which are listed below:
    1. The addressing of the destined network is different from the first.
    2. Sometimes because of the packet size, the destination network may not accept the packets.
    3. Maybe there is a difference in the protocol.
    • Everything depends on the network layer to handle these issues and accept the different networks to be interconnected with each other.

    In the end, I must say that the OSI model gives the service to transfer the information from one layer to the other very smoothly. And the information to the destination port is readable.

    See less
    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
1 … 18 19 20 21 22 … 29

Sidebar

Top Members

Shailendra Yadav

Shailendra Yadav

  • 2k Questions
  • 52k Points
Level 50
Sneha Singh

Sneha Singh

  • 2k Questions
  • 41k Points
Level 40
Nilay Sharma

Nilay Sharma

  • 0 Questions
  • 33k Points
Level 30
  • Popular
  • Comments
  • Farwa Khalid

    Half Duplex Versus Full Duplex

    • 3 Comments
  • Shailendra Yadav

    Troubleshooting with TR-069 ACS for ISPs 

    • 0 Comments
  • Farwa Khalid

    What Is Ping Spoofing

    • 0 Comments
  • Farwa Khalid

    What Is Wireless Isolation?

    • 0 Comments
  • Farwa Khalid

    What Is Radio Network Controller?

    • 0 Comments
  • What is Circuit Switching - Network Classmate
    What is Circuit Switching - Network Classmate added a comment […] needs to be established. It is additive into two… November 30, 2022 at 11:36 am
  • Difference Between Router And Switch - Network Classmate
    Difference Between Router And Switch - Network Classmate added a comment […] router works in the full-duplex transmission mode. However, we… November 30, 2022 at 11:36 am
  • Communication Protocols - Network Classmate
    Communication Protocols - Network Classmate added a comment […] receiver. It is two wired protocols. Rx and Tx… November 30, 2022 at 11:35 am

  • Home
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges




Footer

Important Links

  • Home
  • Article
  • Q&A
  • Guest Post

Useful Categories

  • Basic Networking
  • Basic Security
  • CCNA R & S
  • CCNA Security
  • Download

Legal Stuff

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • User Data Policy

Social Links

  • Facebook
  • Instagram
  • Twitter
  • Telegram
  • Linkedin

Copyrights © 2023 Network Classmate™. All Rights Reserved.
Designed by LeadsNut

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}