Networking Fundamentals and Concepts
VerifiedAdded on 2020/05/11
|20
|1398
|35
AI Summary
This assignment delves into fundamental networking concepts. It covers Multiprotocol Label Switching (MPLS), its basic operation, and the role of Label Edge Routers (LERs). The document also explores Point-to-Point WAN Links, discussing protocols like PPP, Frame Relay, ATM, and HDLC used in their establishment. IP addressing (IPv4 and IPv6) is explained, including DNS mappings for IPv6 addresses. Additionally, it examines router memory components like RAM and NVRAM, along with power supply configurations and Out-of-Band management techniques.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
networking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Lab - 1 DHCP............................................................................................................................................1
Lab - 2 NAT...............................................................................................................................................4
Lab 3 ACLs................................................................................................................................................7
Lab 4 - DSL..............................................................................................................................................10
Lab 5 Selecting a WAN link and debugging..........................................................................................14
Questions..................................................................................................................................................15
References................................................................................................................................................18
1
Lab - 1 DHCP............................................................................................................................................1
Lab - 2 NAT...............................................................................................................................................4
Lab 3 ACLs................................................................................................................................................7
Lab 4 - DSL..............................................................................................................................................10
Lab 5 Selecting a WAN link and debugging..........................................................................................14
Questions..................................................................................................................................................15
References................................................................................................................................................18
1
Lab - 1 DHCP
DHCP configuration
To configure the DHCP on router by typing the below command.
Click the router and select the command line interface.
After,
Enter the interface as fa1/0
IP address as 192.168.1.1
Subnet mask as 255.255.255.0
IP dhcp pool as 38214
Network as 192.168.1.0 255.255.255.0
Default-router as 192.168.1.1
IP dhcp excluded-address as 192.168.1.1 192.168.1.20
Exit
It is shown below Jesin A, Packet Tracer Network Simulator (Packt Publishing, 2014).
2
DHCP configuration
To configure the DHCP on router by typing the below command.
Click the router and select the command line interface.
After,
Enter the interface as fa1/0
IP address as 192.168.1.1
Subnet mask as 255.255.255.0
IP dhcp pool as 38214
Network as 192.168.1.0 255.255.255.0
Default-router as 192.168.1.1
IP dhcp excluded-address as 192.168.1.1 192.168.1.20
Exit
It is shown below Jesin A, Packet Tracer Network Simulator (Packt Publishing, 2014).
2
The output is shown in below.
3
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
Lab - 2 NAT
NAT configuration is shown in below.
5
NAT configuration is shown in below.
5
Click the Server and choose the services.
Click HTTP.
After edit the index.html file. It is shown in below.
6
Click HTTP.
After edit the index.html file. It is shown in below.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
The Output is shown in below.
7
7
Lab 3 ACLs
Configuration of ACLs is shown in below Jesin A, Packet Tracer Network Simulator (Packt
Publishing, 2014).
8
Configuration of ACLs is shown in below Jesin A, Packet Tracer Network Simulator (Packt
Publishing, 2014).
8
Once creates the Network, after connect all devices. Then ping the PC. It is shown in below.
9
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Once ping is completed. After configure the ACLs. It is shown in below.
10
10
Lab 4 - DSL
The DSL connection is shown in below. The below diagram shows the DSL connection.
It contains the routers, cloud, DSL modem and PC. The The DSL connection obtain the IP
address for PC.
DSL connection configuration is shown below.
Here first creating the DHCP connection for Router. It is shown in below.
11
The DSL connection is shown in below. The below diagram shows the DSL connection.
It contains the routers, cloud, DSL modem and PC. The The DSL connection obtain the IP
address for PC.
DSL connection configuration is shown below.
Here first creating the DHCP connection for Router. It is shown in below.
11
After, click the cloud and choose the ethernet 6.
Then choose the DSL modem.
12
Then choose the DSL modem.
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Then click the DSL and click the add to add the modem4 to ethernet 6. It is shown in below.
13
13
Finally, DSL connection provides the IP address for a PC. It is shown in below.
14
14
Lab 5 Selecting a WAN link and debugging
Question - 1
How easy is it to add a new location to an existing WAN?
How is performance and reliability for SaaS and public cloud services traffic assured?
Question - 2
To determine the network traffic requirement by consider the following two
consideration such as network transparency and interoperability with application performance
monitoring tools. The network transparency is most important consideration for WAN Network
Basics (Cisco Press/Networking Academy, 2014). It optimizations the network traffic
requirements like payloads. It fully integrates into existing networks. It protects the organization
networks and reduces the ongoing operational expenses. The network transparency includes the
access control lists, router selection, quality of services and firewall policies. The application
performance monitoring tools is an essential part of daily network operations. It helps
troubleshoot problems related to application performance across the network. It includes the
15
Question - 1
How easy is it to add a new location to an existing WAN?
How is performance and reliability for SaaS and public cloud services traffic assured?
Question - 2
To determine the network traffic requirement by consider the following two
consideration such as network transparency and interoperability with application performance
monitoring tools. The network transparency is most important consideration for WAN Network
Basics (Cisco Press/Networking Academy, 2014). It optimizations the network traffic
requirements like payloads. It fully integrates into existing networks. It protects the organization
networks and reduces the ongoing operational expenses. The network transparency includes the
access control lists, router selection, quality of services and firewall policies. The application
performance monitoring tools is an essential part of daily network operations. It helps
troubleshoot problems related to application performance across the network. It includes the
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
following data sources such as TCP time-stamps and net flow statistics.
Question – 3
Advantages
WAN establishment is used to provide the critical business advantages. They are listed below.
It increases the network bandwidth.
It boosts user network privacy.
It centralizes the IT infrastructure.
It increases the business profits
It provides the Guaranteed uptime
It eliminates the need for ISDN.
Disadvantages
The disadvantages are listed below.
Issues in Maintenance
Security Concerns
High setup costs.
Question – 4
The debug and show commands are the primary tools used by cisco network
professionals. The show command is used to obtain a snapshot of the state of a provided
network, media and interface. It used for network performance like monitoring, troubleshooting
and verification of the network. The Debug command is used to check the actual data flow and
control. It used to trouble shoot the configuration issues and protocol issues. The Show
command takes some time to monitor the network. The debug command also slowly check the
data flow and control.
Questions
1) The electricity is one of the most important power sources but it not properly managed.
So, Australia electrical board should manage and provides the Guidance. It use the
portable electrical equipment to manage the electrical risks at the workplace. It eliminate
the electrical risks. It identity, control and access the electrical hazards. The high
16
Question – 3
Advantages
WAN establishment is used to provide the critical business advantages. They are listed below.
It increases the network bandwidth.
It boosts user network privacy.
It centralizes the IT infrastructure.
It increases the business profits
It provides the Guaranteed uptime
It eliminates the need for ISDN.
Disadvantages
The disadvantages are listed below.
Issues in Maintenance
Security Concerns
High setup costs.
Question – 4
The debug and show commands are the primary tools used by cisco network
professionals. The show command is used to obtain a snapshot of the state of a provided
network, media and interface. It used for network performance like monitoring, troubleshooting
and verification of the network. The Debug command is used to check the actual data flow and
control. It used to trouble shoot the configuration issues and protocol issues. The Show
command takes some time to monitor the network. The debug command also slowly check the
data flow and control.
Questions
1) The electricity is one of the most important power sources but it not properly managed.
So, Australia electrical board should manage and provides the Guidance. It use the
portable electrical equipment to manage the electrical risks at the workplace. It eliminate
the electrical risks. It identity, control and access the electrical hazards. The high
16
electrical risk work places are using the certain electrical equipment including the RCDs
and regularly test the electrical equipment.
2) Four steps are listed below.
Identify the hazards
Assessing the Risks
Controlling the Risks
Reviewing the control measures
3) Two things to manage the risks
Regularly test that electrical equipment
Use RCDs
4) The MPLS use the simple unicast IP forwarding to forward the packets based on labels. It
considers the routers in the unicast IP routing table. It does not provide the any significant
advantages by itself. It useful for MPLS applications like MPLS traffic and MPLS VPNs
because it use the MPLS unicast IP forwarding.
5) False
6) Label edge router
It is a router that operates at the MPLS network edge and it acts as the entry and exit
points for the network. The Label edge routers are push an MPLS label onto the incoming
packets and pop the outgoing packets. It uses the LER routing information to determine
the appropriate labels.
7) Basic Operation of MPLS
Link information Distribution
Path Computation
Traffic Selection
8) IP address
IPv4 address - 32-bits
Ipv6 address - It was increased from 32 bits n IPv4 to 128 bits
9) The AAAA records is used to map the host with an IPv6 address in the Domain Name
System.
10) Point to Point WAN Link
Point to point WAN link requires the data link layer protocols to establish the link across
17
and regularly test the electrical equipment.
2) Four steps are listed below.
Identify the hazards
Assessing the Risks
Controlling the Risks
Reviewing the control measures
3) Two things to manage the risks
Regularly test that electrical equipment
Use RCDs
4) The MPLS use the simple unicast IP forwarding to forward the packets based on labels. It
considers the routers in the unicast IP routing table. It does not provide the any significant
advantages by itself. It useful for MPLS applications like MPLS traffic and MPLS VPNs
because it use the MPLS unicast IP forwarding.
5) False
6) Label edge router
It is a router that operates at the MPLS network edge and it acts as the entry and exit
points for the network. The Label edge routers are push an MPLS label onto the incoming
packets and pop the outgoing packets. It uses the LER routing information to determine
the appropriate labels.
7) Basic Operation of MPLS
Link information Distribution
Path Computation
Traffic Selection
8) IP address
IPv4 address - 32-bits
Ipv6 address - It was increased from 32 bits n IPv4 to 128 bits
9) The AAAA records is used to map the host with an IPv6 address in the Domain Name
System.
10) Point to Point WAN Link
Point to point WAN link requires the data link layer protocols to establish the link across
17
the communication line. It defines the how data is encapsulated for the transmission to
remote sites. It use following the protocols like PPP, Frame Relay, ATM and HDLC. It
also use the switching concepts like circuit switching and packet switching. It uses the
LCP protocol to build and maintain the data link connections.
11) Example
Residential Gateways
Set- top boxes
Telephones
Routers
Network Switches
12) To prevent the ESD by using the ESD wrist strap, grounding work bench and grounding
mat. It includes the following steps to reduce the changes of ESD as much as possible.
They are,
Zero Potential
Standing
Cords
13) Organization
United Nations Educational, Scientific and Cultural Organization
International Council for Computer Science
WAN-IFRA International Newspaper
14) The path selection involves the applying a routing metric to various routes to select the
best route.
15) In routers, the RAM store the running configuration, ARP cache, CDP information,
routing table and etc. Basically everything the router needs for its operations. The Router
has sufficient memory to run the particular IOS.
16) The startup configurations are stored on the NVRAM. It basically the running and startup
configuration are manually copy to the flash.
17) Flash Memory is a re-programmable and electrically erasable memory chip. It contains
the fill operating system image like internetwork operating systems and IOS systems. It
retain the content when router is powered down or restarted.
18) Router requires the multiple power supply to implement the power supply router
18
remote sites. It use following the protocols like PPP, Frame Relay, ATM and HDLC. It
also use the switching concepts like circuit switching and packet switching. It uses the
LCP protocol to build and maintain the data link connections.
11) Example
Residential Gateways
Set- top boxes
Telephones
Routers
Network Switches
12) To prevent the ESD by using the ESD wrist strap, grounding work bench and grounding
mat. It includes the following steps to reduce the changes of ESD as much as possible.
They are,
Zero Potential
Standing
Cords
13) Organization
United Nations Educational, Scientific and Cultural Organization
International Council for Computer Science
WAN-IFRA International Newspaper
14) The path selection involves the applying a routing metric to various routes to select the
best route.
15) In routers, the RAM store the running configuration, ARP cache, CDP information,
routing table and etc. Basically everything the router needs for its operations. The Router
has sufficient memory to run the particular IOS.
16) The startup configurations are stored on the NVRAM. It basically the running and startup
configuration are manually copy to the flash.
17) Flash Memory is a re-programmable and electrically erasable memory chip. It contains
the fill operating system image like internetwork operating systems and IOS systems. It
retain the content when router is powered down or restarted.
18) Router requires the multiple power supply to implement the power supply router
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
algorithms. It present the invention facilitates the smart power management for common
residential users. It easily enables the direct and alternate current power supply modes.
19) Because the out of band mode in both layer 2 and layer 3 users. The Out of band is does
not have the IP reachability to the device. It physically connect a console cable to the
devices in order to access and connect to the device through the terminal server. The
terminal server in turn has the console cable connected to the router.
20) The out of band management does not requires the port.
References
A, Jesin, Packet Tracer Network Simulator (Packt Publishing, 2014)
Connecting Networks Companion Guide (Cisco Press, 2014)
Network Basics (Cisco Press/Networking Academy, 2014)
19
residential users. It easily enables the direct and alternate current power supply modes.
19) Because the out of band mode in both layer 2 and layer 3 users. The Out of band is does
not have the IP reachability to the device. It physically connect a console cable to the
devices in order to access and connect to the device through the terminal server. The
terminal server in turn has the console cable connected to the router.
20) The out of band management does not requires the port.
References
A, Jesin, Packet Tracer Network Simulator (Packt Publishing, 2014)
Connecting Networks Companion Guide (Cisco Press, 2014)
Network Basics (Cisco Press/Networking Academy, 2014)
19
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.