what are the 3ree way for implementing vlan on cisco switches

what is the layer hierarchy of the cisco

what is the best place of implementing standard access list

what is q stand for isdn

these are the challanging question for me

i am waiting for jitendera sinha answer(it is challenge for
u i have seen lots of answer given by u )it is a challenge
in the frendshipmode plz donot take other wise



Answer Posted / jitendera kumar sinha

ok sohaan
i am always ready to accept challenge.i am trying to give
answer one by one.

your first question is how to implement v lan on cisco switches
then the way are
1 port centric
2 static vlan
3 dynamic vlan

if you are asking about cisco hierarchy layer then here it is
1 core layer
2 asses layer
3 distributed layer

yours 3rd question is where we should placed standard access
list
then the answer is we should placed slandered access list as
source as possible

and your last questions about :q: protocol in isdn the
answer is
q satnd for handling the switching and signaling

hope i have fulfill yours challenge and this will help you more

dear sohan u can send me your challenging problem on my
gmail id that is
jitenderasinha.it@gmail.com
waiting for your and other responce

jitendera sinha

Is This Answer Correct ?    2 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Differentiate User Mode from Privileged Mode?

878


What is the difference between ‘bit rate’ and ‘baud rate’?

725


Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0

2262


Define logical topology.

749


What is trigger rip and from which ios version it starts?

716






Briefly explain the conversion steps in data encapsulation.

776


Explain the difference between tracert and traceroute?

746


What is Route Poisoning?

794


How do you depict an IP address?

780


Which cable called roll-over?

742


What is topology in ccna?

842


What is the network subnet?

747


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

877


What is the Difference Between Windows 2003 And Windows 2008 Server?

1619


how we update the IOS version with the help of TFTP?

1645