Describe how VLAN communication takes place.

What will be an ideal response?


VLAN communication can take place in two ways. If multiple devices in the same VLAN are connected to the same switch, then the switch itself can handle the transfer of packets to the members of the VLAN group. However, if VLAN members on one switch need to communicate with members connected to another switch, then a special "tagging" protocol must be used, either a proprietary protocol or the vendor-neutral IEEE 802.1Q. These special protocols add a field to the packet that "tags" it as belonging to the VLAN.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. With a BufferedOutputStream each output operation is directed to a buffer large enough to hold the data of many output operations. Transfer to the output device is performed in one large physical output operation when the buffer fills. b. With a BufferedOutputStream, a partially filled buffer can be forced out to the device at any time by invoking the stream object’s force method. c. With a BufferedInputStream, many “logical” chunks of data from a file are read as one large physical input operation into a memory buffer. d. With a BufferedInputStream, as a program requests data, it’s taken from the buffer. When the buffer is empty, the next actual physical input operation is performed.

Computer Science & Information Technology

A(n) ________ provides a grid of columns and rows in which you can summarize data in an understandable way

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the following Acts with their major features

1. The Child Sexual Abuse and Pornography Act of 1986 a. regulation of payment system in illegal sites 2. The Child Protection and Obscenity Enforcement Act of 1988 b. the possession of three or more pieces of child pornography 3. The Child Protection Restoration and Penalties Enhancement Act of 1990 c. prosecution of sports wagering and bookmaking activities 4. The Wire Act d. the use of a computer to transport, distribute, or receive child pornography 5. The Unlawful Internet Gambling Enforcement Act of 2006 e. the production or use of advertisements for child pornography

Computer Science & Information Technology

Some internal sort algorithms perform the sorting without exchanging elements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology