Understanding Network Components: Servers, Switches, Routers, and LAN Cables

Verified

Added on  2023/04/25

|53
|3138
|62
Assignment
AI Summary
In this document we will discuss about Understanding Network Components and below are the summary points of this document:- The network components discussed are servers, switches, routers, and LAN cables. IP planning was done for three groups: Sales, Marketing, and Admin, with the same network address, broadcast address, and IP range. The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. Each layer has specific functions in the data transmission process. CSMA/CD is mentioned as well, but the information is incomplete.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Name: Jashandeeep Singh
Student ID: 18020733
Course: ICTS0782
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q 1 Part 1
Topology Diagram .
Q1 part 2
Network components and functionality.
1. Servers: Servers are the computer systems that hold
programs, shared files, and network (OS) operation
system. Servers give access to networks, there are
different types of servers and single server can provide
heaps of functions. There are print servers,
communication servers, mail servers, fax servers and
many more.
2. Switch: This is the telecommunication device grouped as
computer network components. Switch filter the data
properly and then transmit the data .there are different
ways to use the switch mostly we use switch to connect
Document Page
a PC or Laptop to router .The switch also look like
modems but switches have heaps of connection ports
and modems comes with two or three ports.
Moreover, .The switch and hubs have same RJ-45 ports.
3. Router: The router is used to connect LAN with an
internet connections .When we have two LAN networks
and we want to share internet connection to other
computers we use a Router. There are two types of
Routers wireless and wired .In simple words, A router is
a network device that used to forwards data between
networks.
4. LAN cable : Lan cable also the part of computer network
components .the LAN cable is also known as Ethernet cable
and data cable .The function of LAN cable to connect devices
to the internet and this cable also used to connect other
devices such as computers ,printers and many more.
Q 2 Part c
IP planning for Sales Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
Document Page
IP planning for Marketing Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
IP planning for Admin Group.
Network Address: 192.168.20.0
Broadcast Address: 192.168.20.255
IP range from: 192.168.20.1 to 192.168.20.254
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q 2.
Ans: According to the OSI models data reached to their
destination through 7 OSI layers.
There are seven OSI layers:
1. Physical layer is Layer 1.
2. Data link layer is layer 2.
3. Network layer is layer 3.
4. Transport layer is layer 4.
5. Session layer is layer 5.
6. Presentation layer is layer 6.
7. Application layer is layer 7. (Search Network, n.d.)
The data send process start from layer 7, application layer
place header field which include data such as screen fonts
and size, and then passes the information and data to Layer 6
(presentation layer).Moreover, The presentation data covert
data properly for example text messages converted to ASCII
and then pass data to layer 5 (Session layer).After, The
session layer place layer 5 header data and manage the data
and information flow, and pass the data to Layer 4 (Transport
layer). (OSI layers, n.d.)
After data, Layer 3 handles the routing and the addressing
and check the right direction of data, and pass the data to
Document Page
layer 2 (data link layer).Moreover, the data link layer setup
links through physical network and convert the data packets
to network frames and then pass data to layer 1 (physical
layer).After that the process is done by physical layer that is
transmission across the media.
There are seven steps that occur in reverse order to send
data to their destination
The fellow chart below showing how the data reached to
their destination through seven layers.
Document Page
Q2 Part B.
CSMA/CD one of the best protocol that we can use to find
the collision and retransmit the data.
CSMA /CD means carrier sense multiple collision
detection.CSMA/CD works with several steps, the process is
based on typical group conversation. IT is very crucial the
participants speak one by one and do not speak all at once
that can make confusing. Apart from that everyone need to
speak one by one so they can understand communication
properly. (Digital Guide, n.d.)
CSMA/CD is mostly used in networks, repeaters and
hubs .The reason is that these devices run half duplex mode
and all the ports of these devices in the same domain
collision.
Moreover, the packet collisions happen when the
transmission happen from another host at the same time .To
prevent this collisions, CSMA/CD forces the station
transmitting to ensure for the availability of the digital
signals. The flow of the protocol below. (Digital Guide, n.d.)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q 3.part A
Why IPv6 unavoidable in future technology.
Ans: There is no doubt IPv6 will be unavoidable in
future .IPV6 is most recent version of internet protocol .this
is the more powerful than ipv4 and it was planned to replace
the ipv4 .Moreover, IPv6 have large addressing space and
also other technical benefits .The entire number of ipv6
address is around 7.9×1028 time and ipv4 use 32 bits addresses
and delivers 4.3 billon addresses .As we know that IPV4 also
secure but IPv6 is more secure and encrypts traffic and
Document Page
always check the packet reliability to deliver the VPN like
protection for the standard traffic.
There are number of reasons why ipv6 is unavoidable in
future. (Secure edge, 2018)
1. Huge addresses space.
2. Multicasting.
3. Extension in SLAAC privacy.
4. Easy processing by routers.
5. Headers extension.
6. addresses uniqueness.
7. High security than IPV4.
Security, Efficiency and Inevitability are three main reasons
people will switch to IPV6 in future.
Q 3 part B
Ans: There are three different types of Ipv6 addressing
modes.
Unicast
Multicast
Any cast
1. Unicast : The unicast transmissions from one node to
another node .most of the protocols over the internet
are unicast for example Https / Http web,Smtps / smtp
(sending emails), FTP ( transfer files) ,SSH ( secure
Document Page
terminal) ,DNS , SCP, etc. The three transport layer
protocols work with the unicast transmission mode.
UDP, TCP and SCTP are three transport layers.
The picture below is the example of unicast addressing .
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2 .Multicast: IPV6 multicast mode is similar to the Ipv4
multicast mode. Multicast mode allows a device to send
datagram to specific hosts. All hosts need to join the
multicast group to get access to multicast information.
Moreover, each host that joined the multicast group receive
the packets and also process it. However, other host that are
not interested in multicast packets overlook and ignore the
multicast data and information. (Secure edge, 2018)
The picture is the multicast IPv6 addressing.
Document Page
.
2 .Any cast Addressing: This is the new types of IPv6
addressing. In this mode, number of Hosts are assigned
as same Anycast internet protocol (IP) address.
The photo below is the example of Anycast Addressing mode.
Document Page
Q 4.
Ans: 4A.
Routing can be essentially characterized as the task that
endeavors to choose a yield interface and maybe a next jump
for a packet based on the packet's goal address. Diverse
routing forms play task of directing distinctive conventions'
parcels. For instance, the IP steering process, which is
empowered naturally, handles directing of IP packets. The
routing procedure settles on its directing choice by
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
counseling its routing table, which it constructs and keeps up
progressively. (Cisco , 2016)
Router goes through these 3 steps when booting up-
1.POST- Power on self test
2. Locate and load IOS
3.Locate and run device configuration file
Here are some MODES of cisco router booting process:
1. ROMMON mode- ROMMON is a versatile IOS program
that enables us to perform different indicative tests. This
program is additionally utilized for password recovery
technique. It has its very own mode known as ROMMON
mode. Boot sequence pursues a restrictive principle for
this mode. On the off chance that bootstrap succeed in
finding and stacking task of IOS, at that point boot
arrangement won't enter in this mode. Boot sequence
will enter in this mode consequently, on the off chance
that it neglects to stack IOS in RAM from every single
possible area.
2. Mini-IOS- Mini IOS is a fallback utility which contains a
stripped-down adaptation of IOS. This is utilized in basic
circumstances where IOS picture in flash isn't found.
Small IOS contains just IP code that enables you to stack
IOS from different assets, for example, TFTP Server.
Cisco IOS mode utilized by this stripped down IOS utility
known as RXBOOT mode.
3. Startup mode
4. Running configuration mode
Document Page
STAGES are:-
POST- POST is defined as Power on self-test which is
a low dimension symptomatic utility that performs
different tests on hardware segments. It confirms that
every fundamental component are available and
operational.
BOOTSTARP- Bootstrap is the second utility in booting
grouping. It controls the search and burden procedure
of IOS. Bootstrap program is in charge of raising the
router, discovering IOS on every conceivable area and
stacking it in RAM.
STARTUP
LOADED
Components are:-
1. ROM- ROM is a Read only memory which stores 4
components that are Post, ROMMON mode, Bootstrap
program and Mini IOS
2. FLASH- Flash is a nonvolatile memory. Information store in
flash isn't lost when you turn the switch off. You could expect
flash as hard disk of switch. For eg. Information put away in
hard disk stay secured same as information stored in flash
stay sheltered. Router utilizes flash to store IOS picture.
3. NVRAM- Information stored in NVRAM stay safe. It is a
permanent memory.
4. RAM - RAM is a temporary memory. RAM is the quickest
memory among these memories. Data stored in RAM does
Document Page
not stay in power off stage. Everything in RAM is eradicated,
when you turn off the switch. In a controlled on router, RAM
contains all the data required to work the device.
4 b.
Point To Point Protocol (PPP) and Point To Point Protocol
over Ethernet (PPPOE) are organize conventions that permit
information correspondence between two system elements
or focuses. All through the documentation for the two
conventions, indicates are alluded as nodes, PCs, or hosts.
The conventions are comparable in plan with a noteworthy
distinction - PPPOE is typified in Ethernet outlines. The two
conventions exist at the system get to layer (otherwise called
the data link layer) that underpins arrange layer conventions
including IPv4 and IPv6.
POINT TO POINT PROTOCOL (PPP)
PPP is a convention most broadly utilized by Internet service
providers (ISPs) to empower dial up associations with the
Internet. PPP encourages the transmission of information
parcels between point to point joins. Initially intended to
work with sequential associations, PPP was embraced by ISPs
to give dial up Internet get to. PPP can be typified in various
information interface layer conventions, including Ethernet
(PPPoE) and Asynchronous Transfer Mode (PPPoA).
PPP provides three sorts of client confirmation conventions
that give changing dimensions of security. Password
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Authentication Protocol (PAP) is an entrance control
convention used to verify a client's secret phrase on the
system get to server. The system get to server asks for a
secret phrase from the customer machine and sends the
recovered secret phrase to a confirmation server for check.
As a validation convention, PAP is viewed as the least secure
because the secret word isn't scrambled in transmission.
Challenge Handshake Authentication Protocol (CHAP) is
same as PAP with some different unique characteristics. It is
considered as hardly secure method of authentication.
Extensible Authentication Protocol (EAP) is viewed as a
confirmation system utilized by various secure verification
conventions. EAP is most usually utilized for validation on
remote systems.
POINT TO POINT PROTOCOL OVER ETHERNET (PPPoE);-
PPPoE is a convention that is generally utilized by ISPs to
arrangement digital subsriber line (DSL) fast Internet
administrations, of which the most well known
administration is ADSL. The comparability among PPPoE and
PPP has prompted the across the board selection of PPPoE as
the favored convention for executing rapid Internet get to.
Service providers can utilize a similar verification server for
both PPP and PPPoE sessions, bringing about a cost reserve
funds. PPPoE utilizes standard strategies for encryption,
validation, and pressure indicated by PPP.
DIFFERENCE-
Document Page
1.PPPoE implies Point-to-Point Protocol over
Ethernet while PPPoA implies Point-to-Point Protocol over
ATM.
2. PPPoE embodies PPP outlines inside the Ethernet
outlines while PPPoA typifies outlines inside AAAL5.
3. PPPoE is regularly utilized in lower bundles while
PPPoA is frequently utilized in big business bundles.
4. PPPoE is more generally utilized than PPPoA.
5. PPPoA has marginally less overhead than PPPoE
thusly, it is somewhat quicker.
4 C. Benefits of VLAN networking are listed below:-
1. • Broadcast Control: Broadcasts are required for the
typical capacity of a system. Numerous conventions
and applications rely upon communicate
correspondence to work appropriately. A layer 2
exchanged system is in a solitary communicated
space and the communicates can achieve the system
sections which are so far where a specific
communicate has no degree and devour accessible
system data transfer capacity. A layer 3 gadget
(ordinarily a Router) is utilized to portion a
communicate area.
2. • Security: VLANs give improved system security. In a
VLAN organize condition, with various communicate
areas, arrange directors have power over each port
and client. A malevolent client can no longer simply
plug their workstation into any switch port and sniff
Document Page
the system traffic utilizing a parcel sniffer. The system
executive controls each port and whatever assets it is
permitted to utilize.
VLANs help to limit touchy traffic starting from an
endeavor office inside itself.
3. • Cost: Segmenting a substantial VLAN to littler VLANs
is less expensive than making a directed system with
switches on the grounds that typically switches
costlier than switches.
4. • Physical Layer Transparency: VLANs are
straightforward on the physical topology and medium
over which the system is associated.
Drawbacks of VLAN networking;-
1. DATA SECURITY PROBLEM-In the event that the server
PC isn't set up effectively and there is a hole in security
then unapproved clients can get to the information too.
So there ought to be security strategy and tenets set up
effectively on the server.
2. LIMITATION OF DISTANCE-Local region systems are
normally made inside a building or close-by building and
can't reach out to the more extensive region.
3. SERVER CRASHESMAY AFFECT ALL COMPUTERS;- On the
off chance that any record on the server is defiled or
hard drive bombs, at that point all the connected PCs
face issues in working appropriately.
4. SETTING UP LAN IS EXPENSIVE- It is costly to set up LAN
on the grounds that there is exceptional programming
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
required to make a server. Additionally, specialized
gadgets like center points, switches, switches, links are
expensive. The exceptional chairman is required to keep
up and investigate LAN for an extensive office.
Q 5 Task 1
Switch 1 initial configuration.
Document Page
Q 5 Task 1.
Switch 2 configured.
Document Page
Q 5 task 1.
Switch 3 configuration.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Document Page
Q 5 Task 2 .
VLAN configuration for S1 .
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Switch 2 VLAN configuration
Document Page
Switch 3 VLAN configuration Vvj
Q 5 Task 2 Part B
Document Page
Access port configured for S1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Access port configured for S2
Document Page
Access port configured for S3
Document Page
Q 5 task 1 part C
A : Trunk ports configured for switch 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Trunk ports configured for switch 2
Document Page
Trunk ports configured for switch 3
Document Page
Q 5 : Task 3: Part A
A : Secondary root Bridge for existing VLANs.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q 5 task 3 part A: configuration of S2 as Primary bridge.
Document Page
Q 5 Part 4:
A: Configuration of rapid PVST and switches.
Document Page
Q 5 task 4 A:More Configuration of rapid PVST and switches.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q 5 Task 4 Part B: verifying Rapid PVST.
Document Page
Q 5 task 4 part B:
Rapid PVST convergence verified.
Document Page
Q 6 TASK No: 1.
A: configuration of Router.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
B )Further configuration of router 1.
)
Document Page
C: configuration of Switch.
Document Page
Q 6 Task 2 A : implementing security on ports in S1.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
B : configuration of S1 so that any unknown host connection
cannot connect without permission.
Document Page
Task no : 6 Task 3 : After implement the security in
S1 ,unknown host cannot connect to network .you can see in
the screenshot below PC trying to connect with network but
it is showing red sign on wires, that’s mean the security in S1
implemented correctly and unknown host cannot connect
without permissions.
Document Page
TASK No 7: Task 1
A. setting up the IP ,hostname and domain name.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Q7 Task 1 :IP configuration
Document Page
Q 7 Task 2 : You can see in the screenshot below RSA keys
generated for authentication.
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Q7 Task 3: The picture below showing the configration of
SSH and the maximun of three retries and time out of 30
sec.
Document Page
Q7 : Task no : 4: Local authentication setup ,you can
username as my name ( jashan ) and Password is cisco.
Document Page
Q7 task no : 5 : SSH Access verification.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
chevron_up_icon
1 out of 53
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]