Understanding Network Components: Servers, Switches, Routers, and LAN Cables
VerifiedAdded on 2023/04/25
|53
|3138
|62
Assignment
AI Summary
In this document we will discuss about Understanding Network Components and below are the summary points of this document:-
The network components discussed are servers, switches, routers, and LAN cables.
IP planning was done for three groups: Sales, Marketing, and Admin, with the same network address, broadcast address, and IP range.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer has specific functions in the data transmission process.
CSMA/CD is mentioned as well, but the information is incomplete.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Name: Jashandeeep Singh
Student ID: 18020733
Course: ICTS0782
Student ID: 18020733
Course: ICTS0782
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Q 1 Part 1
Topology Diagram .
Q1 part 2
Network components and functionality.
1. Servers: Servers are the computer systems that hold
programs, shared files, and network (OS) operation
system. Servers give access to networks, there are
different types of servers and single server can provide
heaps of functions. There are print servers,
communication servers, mail servers, fax servers and
many more.
2. Switch: This is the telecommunication device grouped as
computer network components. Switch filter the data
properly and then transmit the data .there are different
ways to use the switch mostly we use switch to connect
Topology Diagram .
Q1 part 2
Network components and functionality.
1. Servers: Servers are the computer systems that hold
programs, shared files, and network (OS) operation
system. Servers give access to networks, there are
different types of servers and single server can provide
heaps of functions. There are print servers,
communication servers, mail servers, fax servers and
many more.
2. Switch: This is the telecommunication device grouped as
computer network components. Switch filter the data
properly and then transmit the data .there are different
ways to use the switch mostly we use switch to connect
a PC or Laptop to router .The switch also look like
modems but switches have heaps of connection ports
and modems comes with two or three ports.
Moreover, .The switch and hubs have same RJ-45 ports.
3. Router: The router is used to connect LAN with an
internet connections .When we have two LAN networks
and we want to share internet connection to other
computers we use a Router. There are two types of
Routers wireless and wired .In simple words, A router is
a network device that used to forwards data between
networks.
4. LAN cable : Lan cable also the part of computer network
components .the LAN cable is also known as Ethernet cable
and data cable .The function of LAN cable to connect devices
to the internet and this cable also used to connect other
devices such as computers ,printers and many more.
Q 2 Part c
IP planning for Sales Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
modems but switches have heaps of connection ports
and modems comes with two or three ports.
Moreover, .The switch and hubs have same RJ-45 ports.
3. Router: The router is used to connect LAN with an
internet connections .When we have two LAN networks
and we want to share internet connection to other
computers we use a Router. There are two types of
Routers wireless and wired .In simple words, A router is
a network device that used to forwards data between
networks.
4. LAN cable : Lan cable also the part of computer network
components .the LAN cable is also known as Ethernet cable
and data cable .The function of LAN cable to connect devices
to the internet and this cable also used to connect other
devices such as computers ,printers and many more.
Q 2 Part c
IP planning for Sales Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
IP planning for Marketing Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
IP planning for Admin Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
IP planning for Admin Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Q 2.
Ans: According to the OSI models data reached to their
destination through 7 OSI layers.
There are seven OSI layers:
1. Physical layer is Layer 1.
2. Data link layer is layer 2.
3. Network layer is layer 3.
4. Transport layer is layer 4.
5. Session layer is layer 5.
6. Presentation layer is layer 6.
7. Application layer is layer 7. (Search Network, n.d.)
The data send process start from layer 7, application layer
place header field which include data such as screen fonts
and size, and then passes the information and data to Layer 6
(presentation layer).Moreover, The presentation data covert
data properly for example text messages converted to ASCII
and then pass data to layer 5 (Session layer).After, The
session layer place layer 5 header data and manage the data
and information flow, and pass the data to Layer 4 (Transport
layer). (OSI layers, n.d.)
After data, Layer 3 handles the routing and the addressing
and check the right direction of data, and pass the data to
Ans: According to the OSI models data reached to their
destination through 7 OSI layers.
There are seven OSI layers:
1. Physical layer is Layer 1.
2. Data link layer is layer 2.
3. Network layer is layer 3.
4. Transport layer is layer 4.
5. Session layer is layer 5.
6. Presentation layer is layer 6.
7. Application layer is layer 7. (Search Network, n.d.)
The data send process start from layer 7, application layer
place header field which include data such as screen fonts
and size, and then passes the information and data to Layer 6
(presentation layer).Moreover, The presentation data covert
data properly for example text messages converted to ASCII
and then pass data to layer 5 (Session layer).After, The
session layer place layer 5 header data and manage the data
and information flow, and pass the data to Layer 4 (Transport
layer). (OSI layers, n.d.)
After data, Layer 3 handles the routing and the addressing
and check the right direction of data, and pass the data to
layer 2 (data link layer).Moreover, the data link layer setup
links through physical network and convert the data packets
to network frames and then pass data to layer 1 (physical
layer).After that the process is done by physical layer that is
transmission across the media.
There are seven steps that occur in reverse order to send
data to their destination
The fellow chart below showing how the data reached to
their destination through seven layers.
links through physical network and convert the data packets
to network frames and then pass data to layer 1 (physical
layer).After that the process is done by physical layer that is
transmission across the media.
There are seven steps that occur in reverse order to send
data to their destination
The fellow chart below showing how the data reached to
their destination through seven layers.
Q2 Part B.
CSMA/CD one of the best protocol that we can use to find
the collision and retransmit the data.
CSMA /CD means carrier sense multiple collision
detection.CSMA/CD works with several steps, the process is
based on typical group conversation. IT is very crucial the
participants speak one by one and do not speak all at once
that can make confusing. Apart from that everyone need to
speak one by one so they can understand communication
properly. (Digital Guide, n.d.)
CSMA/CD is mostly used in networks, repeaters and
hubs .The reason is that these devices run half duplex mode
and all the ports of these devices in the same domain
collision.
Moreover, the packet collisions happen when the
transmission happen from another host at the same time .To
prevent this collisions, CSMA/CD forces the station
transmitting to ensure for the availability of the digital
signals. The flow of the protocol below. (Digital Guide, n.d.)
CSMA/CD one of the best protocol that we can use to find
the collision and retransmit the data.
CSMA /CD means carrier sense multiple collision
detection.CSMA/CD works with several steps, the process is
based on typical group conversation. IT is very crucial the
participants speak one by one and do not speak all at once
that can make confusing. Apart from that everyone need to
speak one by one so they can understand communication
properly. (Digital Guide, n.d.)
CSMA/CD is mostly used in networks, repeaters and
hubs .The reason is that these devices run half duplex mode
and all the ports of these devices in the same domain
collision.
Moreover, the packet collisions happen when the
transmission happen from another host at the same time .To
prevent this collisions, CSMA/CD forces the station
transmitting to ensure for the availability of the digital
signals. The flow of the protocol below. (Digital Guide, n.d.)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Q 3.part A
Why IPv6 unavoidable in future technology.
Ans: There is no doubt IPv6 will be unavoidable in
future .IPV6 is most recent version of internet protocol .this
is the more powerful than ipv4 and it was planned to replace
the ipv4 .Moreover, IPv6 have large addressing space and
also other technical benefits .The entire number of ipv6
address is around 7.9×1028 time and ipv4 use 32 bits addresses
and delivers 4.3 billon addresses .As we know that IPV4 also
secure but IPv6 is more secure and encrypts traffic and
Why IPv6 unavoidable in future technology.
Ans: There is no doubt IPv6 will be unavoidable in
future .IPV6 is most recent version of internet protocol .this
is the more powerful than ipv4 and it was planned to replace
the ipv4 .Moreover, IPv6 have large addressing space and
also other technical benefits .The entire number of ipv6
address is around 7.9×1028 time and ipv4 use 32 bits addresses
and delivers 4.3 billon addresses .As we know that IPV4 also
secure but IPv6 is more secure and encrypts traffic and
always check the packet reliability to deliver the VPN like
protection for the standard traffic.
There are number of reasons why ipv6 is unavoidable in
future. (Secure edge, 2018)
1. Huge addresses space.
2. Multicasting.
3. Extension in SLAAC privacy.
4. Easy processing by routers.
5. Headers extension.
6. addresses uniqueness.
7. High security than IPV4.
Security, Efficiency and Inevitability are three main reasons
people will switch to IPV6 in future.
Q 3 part B
Ans: There are three different types of Ipv6 addressing
modes.
Unicast
Multicast
Any cast
1. Unicast : The unicast transmissions from one node to
another node .most of the protocols over the internet
are unicast for example Https / Http web,Smtps / smtp
(sending emails), FTP ( transfer files) ,SSH ( secure
protection for the standard traffic.
There are number of reasons why ipv6 is unavoidable in
future. (Secure edge, 2018)
1. Huge addresses space.
2. Multicasting.
3. Extension in SLAAC privacy.
4. Easy processing by routers.
5. Headers extension.
6. addresses uniqueness.
7. High security than IPV4.
Security, Efficiency and Inevitability are three main reasons
people will switch to IPV6 in future.
Q 3 part B
Ans: There are three different types of Ipv6 addressing
modes.
Unicast
Multicast
Any cast
1. Unicast : The unicast transmissions from one node to
another node .most of the protocols over the internet
are unicast for example Https / Http web,Smtps / smtp
(sending emails), FTP ( transfer files) ,SSH ( secure
terminal) ,DNS , SCP, etc. The three transport layer
protocols work with the unicast transmission mode.
UDP, TCP and SCTP are three transport layers.
The picture below is the example of unicast addressing .
protocols work with the unicast transmission mode.
UDP, TCP and SCTP are three transport layers.
The picture below is the example of unicast addressing .
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 .Multicast: IPV6 multicast mode is similar to the Ipv4
multicast mode. Multicast mode allows a device to send
datagram to specific hosts. All hosts need to join the
multicast group to get access to multicast information.
Moreover, each host that joined the multicast group receive
the packets and also process it. However, other host that are
not interested in multicast packets overlook and ignore the
multicast data and information. (Secure edge, 2018)
The picture is the multicast IPv6 addressing.
multicast mode. Multicast mode allows a device to send
datagram to specific hosts. All hosts need to join the
multicast group to get access to multicast information.
Moreover, each host that joined the multicast group receive
the packets and also process it. However, other host that are
not interested in multicast packets overlook and ignore the
multicast data and information. (Secure edge, 2018)
The picture is the multicast IPv6 addressing.
.
2 .Any cast Addressing: This is the new types of IPv6
addressing. In this mode, number of Hosts are assigned
as same Anycast internet protocol (IP) address.
The photo below is the example of Anycast Addressing mode.
2 .Any cast Addressing: This is the new types of IPv6
addressing. In this mode, number of Hosts are assigned
as same Anycast internet protocol (IP) address.
The photo below is the example of Anycast Addressing mode.
Q 4.
Ans: 4A.
Routing can be essentially characterized as the task that
endeavors to choose a yield interface and maybe a next jump
for a packet based on the packet's goal address. Diverse
routing forms play task of directing distinctive conventions'
parcels. For instance, the IP steering process, which is
empowered naturally, handles directing of IP packets. The
routing procedure settles on its directing choice by
Ans: 4A.
Routing can be essentially characterized as the task that
endeavors to choose a yield interface and maybe a next jump
for a packet based on the packet's goal address. Diverse
routing forms play task of directing distinctive conventions'
parcels. For instance, the IP steering process, which is
empowered naturally, handles directing of IP packets. The
routing procedure settles on its directing choice by
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
counseling its routing table, which it constructs and keeps up
progressively. (Cisco , 2016)
Router goes through these 3 steps when booting up-
1.POST- Power on self test
2. Locate and load IOS
3.Locate and run device configuration file
Here are some MODES of cisco router booting process:
1. ROMMON mode- ROMMON is a versatile IOS program
that enables us to perform different indicative tests. This
program is additionally utilized for password recovery
technique. It has its very own mode known as ROMMON
mode. Boot sequence pursues a restrictive principle for
this mode. On the off chance that bootstrap succeed in
finding and stacking task of IOS, at that point boot
arrangement won't enter in this mode. Boot sequence
will enter in this mode consequently, on the off chance
that it neglects to stack IOS in RAM from every single
possible area.
2. Mini-IOS- Mini IOS is a fallback utility which contains a
stripped-down adaptation of IOS. This is utilized in basic
circumstances where IOS picture in flash isn't found.
Small IOS contains just IP code that enables you to stack
IOS from different assets, for example, TFTP Server.
Cisco IOS mode utilized by this stripped down IOS utility
known as RXBOOT mode.
3. Startup mode
4. Running configuration mode
progressively. (Cisco , 2016)
Router goes through these 3 steps when booting up-
1.POST- Power on self test
2. Locate and load IOS
3.Locate and run device configuration file
Here are some MODES of cisco router booting process:
1. ROMMON mode- ROMMON is a versatile IOS program
that enables us to perform different indicative tests. This
program is additionally utilized for password recovery
technique. It has its very own mode known as ROMMON
mode. Boot sequence pursues a restrictive principle for
this mode. On the off chance that bootstrap succeed in
finding and stacking task of IOS, at that point boot
arrangement won't enter in this mode. Boot sequence
will enter in this mode consequently, on the off chance
that it neglects to stack IOS in RAM from every single
possible area.
2. Mini-IOS- Mini IOS is a fallback utility which contains a
stripped-down adaptation of IOS. This is utilized in basic
circumstances where IOS picture in flash isn't found.
Small IOS contains just IP code that enables you to stack
IOS from different assets, for example, TFTP Server.
Cisco IOS mode utilized by this stripped down IOS utility
known as RXBOOT mode.
3. Startup mode
4. Running configuration mode
STAGES are:-
POST- POST is defined as Power on self-test which is
a low dimension symptomatic utility that performs
different tests on hardware segments. It confirms that
every fundamental component are available and
operational.
BOOTSTARP- Bootstrap is the second utility in booting
grouping. It controls the search and burden procedure
of IOS. Bootstrap program is in charge of raising the
router, discovering IOS on every conceivable area and
stacking it in RAM.
STARTUP
LOADED
Components are:-
1. ROM- ROM is a Read only memory which stores 4
components that are Post, ROMMON mode, Bootstrap
program and Mini IOS
2. FLASH- Flash is a nonvolatile memory. Information store in
flash isn't lost when you turn the switch off. You could expect
flash as hard disk of switch. For eg. Information put away in
hard disk stay secured same as information stored in flash
stay sheltered. Router utilizes flash to store IOS picture.
3. NVRAM- Information stored in NVRAM stay safe. It is a
permanent memory.
4. RAM - RAM is a temporary memory. RAM is the quickest
memory among these memories. Data stored in RAM does
POST- POST is defined as Power on self-test which is
a low dimension symptomatic utility that performs
different tests on hardware segments. It confirms that
every fundamental component are available and
operational.
BOOTSTARP- Bootstrap is the second utility in booting
grouping. It controls the search and burden procedure
of IOS. Bootstrap program is in charge of raising the
router, discovering IOS on every conceivable area and
stacking it in RAM.
STARTUP
LOADED
Components are:-
1. ROM- ROM is a Read only memory which stores 4
components that are Post, ROMMON mode, Bootstrap
program and Mini IOS
2. FLASH- Flash is a nonvolatile memory. Information store in
flash isn't lost when you turn the switch off. You could expect
flash as hard disk of switch. For eg. Information put away in
hard disk stay secured same as information stored in flash
stay sheltered. Router utilizes flash to store IOS picture.
3. NVRAM- Information stored in NVRAM stay safe. It is a
permanent memory.
4. RAM - RAM is a temporary memory. RAM is the quickest
memory among these memories. Data stored in RAM does
not stay in power off stage. Everything in RAM is eradicated,
when you turn off the switch. In a controlled on router, RAM
contains all the data required to work the device.
4 b.
Point To Point Protocol (PPP) and Point To Point Protocol
over Ethernet (PPPOE) are organize conventions that permit
information correspondence between two system elements
or focuses. All through the documentation for the two
conventions, indicates are alluded as nodes, PCs, or hosts.
The conventions are comparable in plan with a noteworthy
distinction - PPPOE is typified in Ethernet outlines. The two
conventions exist at the system get to layer (otherwise called
the data link layer) that underpins arrange layer conventions
including IPv4 and IPv6.
POINT TO POINT PROTOCOL (PPP)
PPP is a convention most broadly utilized by Internet service
providers (ISPs) to empower dial up associations with the
Internet. PPP encourages the transmission of information
parcels between point to point joins. Initially intended to
work with sequential associations, PPP was embraced by ISPs
to give dial up Internet get to. PPP can be typified in various
information interface layer conventions, including Ethernet
(PPPoE) and Asynchronous Transfer Mode (PPPoA).
PPP provides three sorts of client confirmation conventions
that give changing dimensions of security. Password
when you turn off the switch. In a controlled on router, RAM
contains all the data required to work the device.
4 b.
Point To Point Protocol (PPP) and Point To Point Protocol
over Ethernet (PPPOE) are organize conventions that permit
information correspondence between two system elements
or focuses. All through the documentation for the two
conventions, indicates are alluded as nodes, PCs, or hosts.
The conventions are comparable in plan with a noteworthy
distinction - PPPOE is typified in Ethernet outlines. The two
conventions exist at the system get to layer (otherwise called
the data link layer) that underpins arrange layer conventions
including IPv4 and IPv6.
POINT TO POINT PROTOCOL (PPP)
PPP is a convention most broadly utilized by Internet service
providers (ISPs) to empower dial up associations with the
Internet. PPP encourages the transmission of information
parcels between point to point joins. Initially intended to
work with sequential associations, PPP was embraced by ISPs
to give dial up Internet get to. PPP can be typified in various
information interface layer conventions, including Ethernet
(PPPoE) and Asynchronous Transfer Mode (PPPoA).
PPP provides three sorts of client confirmation conventions
that give changing dimensions of security. Password
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Authentication Protocol (PAP) is an entrance control
convention used to verify a client's secret phrase on the
system get to server. The system get to server asks for a
secret phrase from the customer machine and sends the
recovered secret phrase to a confirmation server for check.
As a validation convention, PAP is viewed as the least secure
because the secret word isn't scrambled in transmission.
Challenge Handshake Authentication Protocol (CHAP) is
same as PAP with some different unique characteristics. It is
considered as hardly secure method of authentication.
Extensible Authentication Protocol (EAP) is viewed as a
confirmation system utilized by various secure verification
conventions. EAP is most usually utilized for validation on
remote systems.
POINT TO POINT PROTOCOL OVER ETHERNET (PPPoE);-
PPPoE is a convention that is generally utilized by ISPs to
arrangement digital subsriber line (DSL) fast Internet
administrations, of which the most well known
administration is ADSL. The comparability among PPPoE and
PPP has prompted the across the board selection of PPPoE as
the favored convention for executing rapid Internet get to.
Service providers can utilize a similar verification server for
both PPP and PPPoE sessions, bringing about a cost reserve
funds. PPPoE utilizes standard strategies for encryption,
validation, and pressure indicated by PPP.
DIFFERENCE-
convention used to verify a client's secret phrase on the
system get to server. The system get to server asks for a
secret phrase from the customer machine and sends the
recovered secret phrase to a confirmation server for check.
As a validation convention, PAP is viewed as the least secure
because the secret word isn't scrambled in transmission.
Challenge Handshake Authentication Protocol (CHAP) is
same as PAP with some different unique characteristics. It is
considered as hardly secure method of authentication.
Extensible Authentication Protocol (EAP) is viewed as a
confirmation system utilized by various secure verification
conventions. EAP is most usually utilized for validation on
remote systems.
POINT TO POINT PROTOCOL OVER ETHERNET (PPPoE);-
PPPoE is a convention that is generally utilized by ISPs to
arrangement digital subsriber line (DSL) fast Internet
administrations, of which the most well known
administration is ADSL. The comparability among PPPoE and
PPP has prompted the across the board selection of PPPoE as
the favored convention for executing rapid Internet get to.
Service providers can utilize a similar verification server for
both PPP and PPPoE sessions, bringing about a cost reserve
funds. PPPoE utilizes standard strategies for encryption,
validation, and pressure indicated by PPP.
DIFFERENCE-
1.PPPoE implies Point-to-Point Protocol over
Ethernet while PPPoA implies Point-to-Point Protocol over
ATM.
2. PPPoE embodies PPP outlines inside the Ethernet
outlines while PPPoA typifies outlines inside AAAL5.
3. PPPoE is regularly utilized in lower bundles while
PPPoA is frequently utilized in big business bundles.
4. PPPoE is more generally utilized than PPPoA.
5. PPPoA has marginally less overhead than PPPoE
thusly, it is somewhat quicker.
4 C. Benefits of VLAN networking are listed below:-
1. • Broadcast Control: Broadcasts are required for the
typical capacity of a system. Numerous conventions
and applications rely upon communicate
correspondence to work appropriately. A layer 2
exchanged system is in a solitary communicated
space and the communicates can achieve the system
sections which are so far where a specific
communicate has no degree and devour accessible
system data transfer capacity. A layer 3 gadget
(ordinarily a Router) is utilized to portion a
communicate area.
2. • Security: VLANs give improved system security. In a
VLAN organize condition, with various communicate
areas, arrange directors have power over each port
and client. A malevolent client can no longer simply
plug their workstation into any switch port and sniff
Ethernet while PPPoA implies Point-to-Point Protocol over
ATM.
2. PPPoE embodies PPP outlines inside the Ethernet
outlines while PPPoA typifies outlines inside AAAL5.
3. PPPoE is regularly utilized in lower bundles while
PPPoA is frequently utilized in big business bundles.
4. PPPoE is more generally utilized than PPPoA.
5. PPPoA has marginally less overhead than PPPoE
thusly, it is somewhat quicker.
4 C. Benefits of VLAN networking are listed below:-
1. • Broadcast Control: Broadcasts are required for the
typical capacity of a system. Numerous conventions
and applications rely upon communicate
correspondence to work appropriately. A layer 2
exchanged system is in a solitary communicated
space and the communicates can achieve the system
sections which are so far where a specific
communicate has no degree and devour accessible
system data transfer capacity. A layer 3 gadget
(ordinarily a Router) is utilized to portion a
communicate area.
2. • Security: VLANs give improved system security. In a
VLAN organize condition, with various communicate
areas, arrange directors have power over each port
and client. A malevolent client can no longer simply
plug their workstation into any switch port and sniff
the system traffic utilizing a parcel sniffer. The system
executive controls each port and whatever assets it is
permitted to utilize.
VLANs help to limit touchy traffic starting from an
endeavor office inside itself.
3. • Cost: Segmenting a substantial VLAN to littler VLANs
is less expensive than making a directed system with
switches on the grounds that typically switches
costlier than switches.
4. • Physical Layer Transparency: VLANs are
straightforward on the physical topology and medium
over which the system is associated.
Drawbacks of VLAN networking;-
1. DATA SECURITY PROBLEM-In the event that the server
PC isn't set up effectively and there is a hole in security
then unapproved clients can get to the information too.
So there ought to be security strategy and tenets set up
effectively on the server.
2. LIMITATION OF DISTANCE-Local region systems are
normally made inside a building or close-by building and
can't reach out to the more extensive region.
3. SERVER CRASHESMAY AFFECT ALL COMPUTERS;- On the
off chance that any record on the server is defiled or
hard drive bombs, at that point all the connected PCs
face issues in working appropriately.
4. SETTING UP LAN IS EXPENSIVE- It is costly to set up LAN
on the grounds that there is exceptional programming
executive controls each port and whatever assets it is
permitted to utilize.
VLANs help to limit touchy traffic starting from an
endeavor office inside itself.
3. • Cost: Segmenting a substantial VLAN to littler VLANs
is less expensive than making a directed system with
switches on the grounds that typically switches
costlier than switches.
4. • Physical Layer Transparency: VLANs are
straightforward on the physical topology and medium
over which the system is associated.
Drawbacks of VLAN networking;-
1. DATA SECURITY PROBLEM-In the event that the server
PC isn't set up effectively and there is a hole in security
then unapproved clients can get to the information too.
So there ought to be security strategy and tenets set up
effectively on the server.
2. LIMITATION OF DISTANCE-Local region systems are
normally made inside a building or close-by building and
can't reach out to the more extensive region.
3. SERVER CRASHESMAY AFFECT ALL COMPUTERS;- On the
off chance that any record on the server is defiled or
hard drive bombs, at that point all the connected PCs
face issues in working appropriately.
4. SETTING UP LAN IS EXPENSIVE- It is costly to set up LAN
on the grounds that there is exceptional programming
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
required to make a server. Additionally, specialized
gadgets like center points, switches, switches, links are
expensive. The exceptional chairman is required to keep
up and investigate LAN for an extensive office.
Q 5 Task 1
Switch 1 initial configuration.
gadgets like center points, switches, switches, links are
expensive. The exceptional chairman is required to keep
up and investigate LAN for an extensive office.
Q 5 Task 1
Switch 1 initial configuration.
Q 5 Task 1.
Switch 2 configured.
Switch 2 configured.
Q 5 task 1.
Switch 3 configuration.
Switch 3 configuration.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Q 5 Task 2 .
VLAN configuration for S1 .
VLAN configuration for S1 .
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Switch 2 VLAN configuration
Switch 3 VLAN configuration Vvj
Q 5 Task 2 Part B
Q 5 Task 2 Part B
Access port configured for S1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Access port configured for S2
Access port configured for S3
Q 5 task 1 part C
A : Trunk ports configured for switch 1
A : Trunk ports configured for switch 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Trunk ports configured for switch 2
Trunk ports configured for switch 3
Q 5 : Task 3: Part A
A : Secondary root Bridge for existing VLANs.
A : Secondary root Bridge for existing VLANs.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Q 5 task 3 part A: configuration of S2 as Primary bridge.
Q 5 Part 4:
A: Configuration of rapid PVST and switches.
A: Configuration of rapid PVST and switches.
Q 5 task 4 A:More Configuration of rapid PVST and switches.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Q 5 Task 4 Part B: verifying Rapid PVST.
Q 5 task 4 part B:
Rapid PVST convergence verified.
Rapid PVST convergence verified.
Q 6 TASK No: 1.
A: configuration of Router.
A: configuration of Router.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
B )Further configuration of router 1.
)
)
C: configuration of Switch.
Q 6 Task 2 A : implementing security on ports in S1.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
B : configuration of S1 so that any unknown host connection
cannot connect without permission.
cannot connect without permission.
Task no : 6 Task 3 : After implement the security in
S1 ,unknown host cannot connect to network .you can see in
the screenshot below PC trying to connect with network but
it is showing red sign on wires, that’s mean the security in S1
implemented correctly and unknown host cannot connect
without permissions.
S1 ,unknown host cannot connect to network .you can see in
the screenshot below PC trying to connect with network but
it is showing red sign on wires, that’s mean the security in S1
implemented correctly and unknown host cannot connect
without permissions.
TASK No 7: Task 1
A. setting up the IP ,hostname and domain name.
A. setting up the IP ,hostname and domain name.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Q7 Task 1 :IP configuration
Q 7 Task 2 : You can see in the screenshot below RSA keys
generated for authentication.
generated for authentication.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Q7 Task 3: The picture below showing the configration of
SSH and the maximun of three retries and time out of 30
sec.
SSH and the maximun of three retries and time out of 30
sec.
Q7 : Task no : 4: Local authentication setup ,you can
username as my name ( jashan ) and Password is cisco.
username as my name ( jashan ) and Password is cisco.
Q7 task no : 5 : SSH Access verification.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 out of 53
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.