Free Essay

It 320 Wan Unit 1

In:

Submitted By Johnsla11
Words 1202
Pages 5
IT 320 WAN

Homework Unit 1

Vocabulary Exercise: Matching (Pg 3)

Matching

a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE)

b) The software used by a router Cisco IOS

c) Dialup and ISDN are examples of these types of networks Circuit Switching

d) Describes the timing between the router and the CSU/DSU Synchronous

e) Lost when a device is powered down or rebooted Contents of RAM

f) Wires or other media through which data is transmitted from one place to another Serial Link

g) Connects LANs to WANs Interface

h) The physical connection point on networking devices where signals enter and exit Router

i) A smaller, more compact physical connection physical interface specification Smart serial interface

j) A WAN link contracted for use by the customer Leased Line

k) Frame relay and ATM are examples of these types of networks Packet Switching

l) When referring to clocking the customer’s router , this piece of equipment is used Data Terminal Equipment (DTE)

m) A communications link that is outside the normal IP network, like a console cable or a phone call between two modems and the aux port. Out of Band Management

n) A network that spans a large geographic region WAN

o) A telecommunications path that sends 1 bit at a time Serial Interface

p) The router port that connects a WAN link Bus

q) A WAN service provider Telephone Company (telco)

r) Connects a router to a DSU Serial Cable

s) The management port on a router Console Port

t) Equipment that is located in the customer’s wiring closet and provides a clocking signal to the router Channel Service Unit/Data Service Unit (CSU/DSU)

u) A general term that describes the measurement of a route Metric

v) If a device does not know how to get to a destination, it sends data to this device Default Gateway

w) The number of bits per second that the service provider can accept and send to the customer Clocking/Clock Rate

x) What the WAN service provider calls your collection of equipment, including the router and the CSU/DSU Customer Premises Equipment (CPE)

Concept Questions (pgs 4-5)

1) What is the most important function of a router? Routers route packets of information from one destination to another

2) Define default gateway. On a computer a reference to an IP address on the same subnet, with that IP address being the address of the router. When the computer needs to send a packet of information another subnet, it sends the packet to its default gateway. It is also called a default router.

3) Explain the purpose of DCE and DTE in WAN links. DCE – A device that connects to the leased line provided by the telco. DCE provides clocking to DTE. DTE – A device that sends data over a circuit. Routers act as DTEs because they send IP packets over WAN Links

4) Explain what a router is and what it does. A router is a specialized piece of computer equipment that is used for forwarding information from one host to another over a network

a. It routes packets of information over WAN Links

b. It acts as a DTE

c. It is the physical connection on a network where packets of information enter and exit

Vocabulary Exercise: Completion (pgs 5-6)

The main purpose of a router is to ROUTE packets. A router, like a typical PC, has a CPU and memory componets. It also has specialized software, which in Cisco routers is the IOS. The provides the basic routing logic. The router also has ROM MEMORY, just like PCs, which holds basic diagnostic software that runs when the router is first booted. All of these basic components (CPU, RAM, ROM, and an OS) are found in PCs.

In addition, just like PCs have an interface to connect to networks (usually called a

or , routers also have interfaces. Instead of using a hard drive, routers use two types of memory to permanently store data ROM and FLASH MEMORY.

The main internal router components are as follows:

• RAM which stores ROUTING tables and the RUNNING CONFIGURATION file while the router is powered. It loses content when a router is powered down or restarted.

• NVRAM which provides storage for the startup CONFIGURATION file and retains content when a router is powered down or restarted.

• FLASH MEMORY which is a type of EEPROM. It holds the image and retains content when the router is powered down or restarted.

• ROM which maintains instructions for MONITOR SOFTWARE diagnostics and stores bootstrap program and basic operating system software

• BUSES which connect routers to a network for packet entry and exit

Flash memory is used for storage of the CISCO IOS software image. The router normally acquires the default IOS from lash. These images can be upgraded by loading a new image into the flash. The IOS can be in uncompressed or compressed form. In most routers, an executable copy of the IOS is transferred to RAM during the boot process.

The three basic types of connections on a router are SERIAL interfaces, DSL interfaces, and ISDN ports. The term interface specifically refers to physical connectors that forward packets. In contrast, the term port refers to a physical connector that manages and controls a router.

The LAN and WAN connections provide network connections through which frame packets are passed. To connect to LAN interfaces, routers use STRAIGHT THROUGH cable to connect to a switch, just like a STRAIGHT THROUGH cable should be used to connect a PC NIC to a switch. If you connect a router direct to a PC NIC without an intermediate device, like a hub or a switch, you must use a CROSSOVER cable. This type of connection is common in many of the labs you will configure. To connect to WAN interfaces, the router uses and ETHERNET or SERIAL cable to attach to a CSU/DSU or when directly connecting tow WAN interfaces in a lab environment.

The function of management ports is different from that of other connections. The management port provides a text-based connection for the configuration and troubleshooting of the router. The common management interfaces are the CONSOLE and AUX ports. The console ports are EIA-232 WAN Interface Card serial ports and are not designed as networking ports.

Concept Questions (pg. 10)

1) What three components of a router retain their memory when power is not present? NVRAM, ROM, and Flash Memory

2) In what three ways can you configure a router? Console, Telenet, Aux

3) Of the two management ports, which is preferred and why? While both are designed to be used for out-of-band management, the main difference is that the console port allows local access, while the aux port is intended for remote access when the engineer is not on site. The console port is used more often than the aux port when the engineer has local access to the router.

4) Besides the PC and the router, what three components (software and hardware) are required to connect a PC to a routers management port? CSU/DSU, Cisco IOS (or other applicable software), and the cabling

Similar Documents

Premium Essay

Wan 1

...IT 320 WAN Homework Unit 1 Vocabulary Exercise: Matching (Pg 3) Matching a) When referring to clocking, the CSU/DSU is this piece of equipment Data Circuit Terminating Equipment (DTE) b) The software used by a router Cisco IOS c) Dialup and ISDN are examples of these types of networks Circuit Switching d) Describes the timing between the router and the CSU/DSU Synchronous e) Lost when a device is powered down or rebooted Contents of RAM f) Wires or other media through which data is transmitted from one place to another Serial Link g) Connects LANs to WANs Interface h) The physical connection point on networking devices where signals enter and exit Router i) A smaller, more compact physical connection physical interface specification Smart serial interface j) A WAN link contracted for use by the customer Leased Line k) Frame relay and ATM are examples of these types of networks Packet Switching l) When referring to clocking the customer’s router , this piece of equipment is used Data Terminal Equipment (DTE) m) A communications link that is outside the normal IP network, like a console cable or a phone call between two modems and the aux port. Out of Band Management n) A network that spans a large geographic region WAN o) A telecommunications path that sends 1 bit at a time Serial Interface p) The router port that connects a WAN link Bus ...

Words: 320 - Pages: 2

Premium Essay

Computing

...Task 1 Element 1 Describe computer network types and standards. 1.1 The description distinguishes types of networks. Homogeneous Networks Homogeneous means similar, it is easy to administer and protect the homogeneous network configuration in networking. In a homogeneous network configuration, the similar operating environment is used to run the all systems. Same protocols are used to run the same operating environment and with the similar security attributes. A homogeneous network used a NIS+ master, is shown in the following figure. Figure (a) Homogeneous Network Heterogeneous Networks Heterogeneous means different, to run different network protocol a Trusted Solaris networks can be used. Different protocols are used to run the same operating environment and with the different security attributes and uses the different NIS (network information service). The following figure shows a typical heterogeneous network and some different protocols. There is a good example of heterogeneous network in networking term, computers with MS windows XP / windows 7 & UNIX, Linux, can communicate to each other by using different network protocols. Figure (b) Heterogeneous Network (Oracle, 2010) Wide Area Network Wide Area Network (WAN) is any network that crosses different far places like national boundaries. In WAN we can shares software and resources with connecting workstations and can Share information/files over a larger area A centralised WAN consist of a central...

Words: 12246 - Pages: 49

Free Essay

Mtr 2012

...Property and Other Businesses – Hong Kong Network Expansion – Mainland and Overseas Growth – Human Resources Financial Review Ten-Year Statistics Investor Relations Risk Management 89 90 94 112 116 124 125 153 154 155 156 157 158 159 160 161 240 Sustainability Corporate Responsibility Corporate Governance Report Remuneration Report Board and Executive Directorate Key Corporate Management Report of the Members of the Board Contents of Accounts and Notes Independent Auditor’s Report Consolidated Profit and Loss Account Consolidated Statement of Comprehensive Income Consolidated Balance Sheet Balance Sheet Consolidated Statement of Changes in Equity Consolidated Cash Flow Statement Notes to the Accounts Glossary Annual Report 2012 1 MTR...

Words: 17904 - Pages: 72

Free Essay

Dove

...Packaging………………………………………………………………………………...17 “Moisturizer”…………………………………………………………………………….18 Process control…………………………………………………………………………...20 References………………………………………………………………………………..20 Introduction   What is hair conditioner? Hair conditioners are basically designed to restore hair to its natural state rather than produce an artificial effect. Mostly, the hair conditions have treatments of washing to dyeing or to sustain permanent waving hair [7]. Hair conditioner has also the ability to undo the damage by giving a better look and feel to the hair fibers. However, hair conditioners are not meant to repair damaged hair. Most hair conditioner is basically compositions containing cationic surfactants in combination with long chain fatty alcohol and other lipid components [1].   Modern hair conditioners are actually derived from old-age practices. For example, anointing the head with polar...

Words: 5515 - Pages: 23

Premium Essay

Voice, Video, Network

...and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR, UK http://www.academicpress.com Library of Congress Cataloging-in-Publication Data Ellis, Juanita. Convergence of voice, video, and data networks / Juanita Ellis, Charles Pursell, Joy Rahman. p. cm. ISBN 0-12-236542-9 1. Convergence (Telecommunication) I. Pursell, Charles. II. Rahman, Joy. III. Title. TK5101.E48 2003 384.3¢3—dc21 International Standard Book Number: 0-12-236542-9 PRINTED IN...

Words: 125371 - Pages: 502

Free Essay

Infrastructure Assignment - 4

...1. Compare and contrast at least five technologies that are readily available for in-home internet access. You should consider practical as well as technical differences in your comparison. Do not include Frame Relay or ATM as these are primarily larger scale business solutions. 802.11N Higher-speed standards up to 300+ Mbps 802.11n uses (MIMO) technology and a wider radio frequency channel. It provides a mechanism called frame aggregation to decrease time between transmissions Channels operating at 40 MHz are another feature incorporated into 802.11n The transmitter and receiver use pre-coding & post-coding techniques to achieve the capacity of a MIMO link Video Conferencing A video conference is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously ITU H.320 is known as the standard for video conferencing over integrated services digital networks H.264 SVC is compression standard that enables video conferencing systems to achieve highly error resilient The components within a Conferencing System layers: User Interface, Conference Control, Control or Signal Plane and Media Plane The RTP and UDP normally carry information such the payload type which is the type of codec, frame rate, video size and many others Browser A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. Web browser is a client program...

Words: 2038 - Pages: 9

Free Essay

Capstone

...employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design …………………………………………………………………………………………………………………………… 12 LAN Design ……………………………………………………………………………………………………………………………. 26 Structured Cabling …………………………………………………………………………………………………………………. 28 Hardware...

Words: 18593 - Pages: 75

Premium Essay

Public Relations

... Revisiting the concept “dialogue” in public relations Petra Theunissen ∗ , Wan Norbani Wan Noordin 1 School of Communication Studies, Faculty of Design & Creative Technologies, AUT University, Private Bag 92006, Auckland 1142, New Zealand a r t i c l e i n f o Article history: Received 2 October 2010 Received in revised form 14 September 2011 Accepted 14 September 2011 Keywords: Public relations Dialogue Two-way symmetric communication Risk a b s t r a c t This paper follows a critical approach in exploring the philosophical underpinnings and key features of dialogue in public relations practice and thinking. It argues that dialogue has been uncritically equated to two-way symmetrical communication, which has not done justice to the nature of dialogue, and has effectively stifled concrete development of a dialogic theory in public relations. The paper draws from a range of literature, including mainstream public relations and communication philosophy—in particular the philosophy of Martin Buber. The purpose of this paper is to inform public relations thinking by encouraging debate rather than proposing a new theoretical approach. As such, it sets out to explore the concept of dialogue and its philosophical underpinning, considers its practical application and suggests that it should not be seen as superior to persuasion. © 2011 Elsevier Inc. All rights reserved. 1. Introduction The term “dialogue” has become ubiquitous in public relations writing...

Words: 8548 - Pages: 35

Premium Essay

Stata

...Economic Modelling 28 (2011) 1348–1353 Contents lists available at ScienceDirect Economic Modelling j o u r n a l h o m e p a g e : w w w. e l s ev i e r. c o m / l o c a t e / e c m o d Foreign direct investment and China's regional income inequality☆ Kang Yu a, Xian Xin b,c, Ping Guo a, Xiaoyun Liu d,⁎ a School of Economics and Management, Zhejiang Forestry University, Zhejiang, 311300, PR China Center for Rural Development Policy, China Agricultural University, Beijing, 100083, PR China c College of Economics and Management, China Agricultural University, Beijing, 100083, PR China d College of Humanities and Development Studies, China Agricultural University, Beijing, 100083, PR China b a r t i c l e i n f o a b s t r a c t China's widening regional income inequality coupled with its pronounced regional disparity in foreign direct investment stock since 1990 has claimed the attention of many scholars. While some researchers confirm regional disparity in China's foreign direct investment, others attribute the widening regional income inequality to this regional disparity. This paper thus assesses the impacts of China's stock of foreign direct investment on its regional income inequality using simultaneous equation model and the Shapley value regression-based decomposition approach. Our results suggest that China's stock of foreign direct investment has accounted for merely 2% of its regional income inequality. Furthermore, the contribution ratio of per...

Words: 5685 - Pages: 23

Premium Essay

Computer

...CHAPTER 1 INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Introduction Modern civilization has become so complicated and sophisticated that to survive one has to be competitive. This compels people to keep themselves informed of all types of happening in the society. And this in turn entails the need for an infrastructure of information. This is the point where information technology or IT becomes most important, as it is the infrastructure that allows us to get information accurately and in time. Before we define information technology, it is important to understand the notion of Data, Information, Technology, and Knowledge. In everyday conversation, people use the terms data and information interchangeably. However, some computer professional make a distinction between the two terms. Data It is the words, numbers, letters, symbol, sound, video and graphics that describe people, events, things and ideas. It is raw facts about people, objects, and events that have little or no meaning. It is the raw material used to create useful information. It becomes information when you use it as the basis for initiating some action or for making a decision. Information It is defined as the words, numbers, letters, symbol, sound, video and graphics used as the basis for human action or decisions. It is data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns that can be used in decision-making. It is data...

Words: 12773 - Pages: 52

Premium Essay

Sql Quiz

...Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the...

Words: 217433 - Pages: 870

Premium Essay

Top Down Cisco

...Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that...

Words: 79785 - Pages: 320

Free Essay

Ilinc Start Up

...BAB111 Revised January 12, 2005 ILinc Case Study of a Start Up “It’s been a long semester,” thought Mark Bernstein. “I have spent a lot of time with Degerhan working on our business plan for our proposed new venture, Interactive Learning Corporation, but can we really make it go? Should we even try? I’ve got a good job waiting for me with a large corporation. Is the upside potential of ILinc great enough to justify taking the risk?” Mark Bernstein and Degerhan Usluel knew each other from MBA classes at Rensselaer Polytechnic Institute. Outside a career fair sponsored by the school in the fall of 1993, Bernstein was sitting on a bench when Usluel approached and asked, “Do you really want to work for any of them?”, referring to the established companies at the career fair. “No, I can’t see myself working for corporate America. I’d really like to start my own business, but I’m not sure what to do,” Mark replied. “I know what you mean. I can’t see myself being a small part of a large corporation. I’ve been doing some work for Professor Jack Wilson that has made me wonder whether there might be something in our project that could be turned into a business,” explained Usluel. Thus began the prospecting. The Players Mark Bernstein Bernstein earned a BA in Economics from Union College. Articulate and hard driving, he had worked in sales and sales management for several computer related companies for over nine years before enrolling in Rensselaer’s MBA program...

Words: 8404 - Pages: 34

Free Essay

Of Mice and Men Analysis

...general information under “Notices” on page 261. Fifth Edition (September 2009) © Copyright Lenovo 2008, 2009. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are sold to governmental entities as commercial items as defined by 48 C.F.R. 2.101 with limited and restricted rights to use, reproduction and disclosure. LIMITED AND RESTRICTED RIGHTS NOTICE: If products, data, computer software, or services are delivered pursuant a General Services Administration ″GSA″ contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. © Lenovo 2008, 2009 Contents About this manual . . . . . . . . . . v Safety information . . . . . . . . . . 1 General safety . . . . . . . . . . . . . . 2 Electrical safety . . . . . . . . . . . . . 3 Safety inspection guide . . . . . . . . . . . 5 Handling devices that are sensitive to electrostatic discharge . . . . . . . . . . . . . . . 6 Grounding requirements . . . . . . . . . . 6 Safety notices (multilingual translations) . . . . . 7 Laser compliance statement (multilingual translations) . . . . . . . . . . . . . . 28 Symptom-to-FRU index . Numeric error codes . Error messages . . . Beep symptoms . . . No-beep symptoms . . LCD-related symptoms Intermittent problems . Undetermined problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 62 66 67...

Words: 57559 - Pages: 231

Premium Essay

Hello

...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...

Words: 23221 - Pages: 93