...infrastructure i.e. Biology lab, Fund-raising office and University Campus network. The Biology Lab is running RIP protocol, whereas the Fund-raising office is running OSPF routing protocol. The new Genome4U Lab network is decided to run on EIGRP routing protocol. The edge router of this network is used to redistribute the RIP, OSPF and EIGRP routes. It will also be used to provide internet access to the Genome4U Lab network through the University Campus Network. Network Design As shown in the figure below, the Biology lab network, fund-raising office network and the University Campus network would be connected to the edge router of Genome4U lab network. The Genome4U edge router would be running multiple routing protocols i.e. EIGRP for internal network, RIP for redistribution with Biology Lab network, OSPF for redistribution with Fund-raising office network. The interface facing the Biology lab network would be configured with RIP protocol, whereas the interface connected to the Fund-raising office network would be configured with OSPF protocol. The interface connected to the Genome4U lab network would be running EIGRP routing protocol. Redistribution will be configured in the edge router. RIP and OSPF will be redistributed into EIGRP LAN with two way redistribution i.e. the redistribution of routes will be done both ways, redistributing EIGRP routes into RIP and OSPF LAN and RIP, OSPF routes into EIGRP LAN. A default route will be added in this router to route all internet traffic...
Words: 981 - Pages: 4
...the past. Due to this there are has been some debate on whether or not the technology in the medical field is harming the medical profession or not. Some people agree with the topic others do not and think that the medical team should be the ones making the decisions not the computers. The passage, Medical Technology and Ethical Issues by William E. Thompson and Joseph V. Hickey, explains the dilemma of technology in the medical field, and the different sides of it. The technology that is being referred to is the RIP computer. This is a computer program that doctors us to help make decisions about whether to administer lifesaving actions to patients that are dying or to let them die. In the passage critics and supporters take opposing sides to the issue of technology being used in the medical field. Some believe computers will be making the decisions, while others believe it just provides data to make decisions on who to treat. On the debate of the use of the RIP in medical field has two main positions, the critics and the supporters. The critics disagree with the technology because, they say that it is a “frightening example” of the overreliance of computer technology that makes decisions that should be reserved to peoples judgments. The supporters on the other hand say that the technology does make the decisions, rather it gives data and information to trained medical professionals that help them make informed decisions about to give expensive treatment procedures and to...
Words: 796 - Pages: 4
...lab. Router-EIGRP routers, as shown in the figure above, are the internal routers of the research lab network. Router-EIGRP/OSPF and Router-EIGRP/RIP are the routers that are at the Fund raising office interface and the Biology lab interface. The file servers are where the data files of the volunteers will be kept. The figure above represents an overview of the internetwork routing of the Research and Biology Labs and the Fund Raising Office. The Router EIGRP/RIP is responsible for route redistribution between EIGRP network and RIP network and also between the research lab and biology lab. Likewise, Router OSPF/RIP redistributes routes between the biology lab and the fundraising office. Redistribution between EIGRP and OSPF is required by the fringe router of the Fund Raising Office and the Research Lab. 2. What information will you redistribute between routing protocols? When there is a network with multiple routing protocols present, the must be a process of route redistribution. The dissimilar segments of the network will learn routes based on the protocol that is configured within them. Route redistribution aids spreading this knowledge in a way that it is comprehended by other segments of the network as well. There must also be a redistribution of routes learned by EIGRP to RIP in a way that it is comprehendible to RIP and vice versa. For this, a default-metric or definitive metric specifically for each redistribution, would meet the need. 3. Identify the problems...
Words: 707 - Pages: 3
...1. Introduction Routing Information Protocol (RIP) is a special type of protocol also known as routing protocol and the main purpose of the protocol. This protocol is to provide communication between different routers so they can exchange information or how to find the best path to a given destination. There is Routing Information Protocol version 1 (RIPv1) and Routing Information Protocol version 2 (RIPv2). RIPv1 uses classful and it sends routing updates as broadcast messages and does not support VLSM. Meanwhile, RIPv2 is created to overcome the RIPv1 problems which is uses classless and it can send multicast messages and also supports VLSM. It have many features between these two routing protocol. Other protocol is Enhanced Interior Gateway...
Words: 1037 - Pages: 5
...Task Summary Actions you were required to perform Change the switch hostname to Branch1 Add a description to FastEthernet 0/1 Add a description to FastEthernet 0/2 Add a description to FastEthernet 0/3 Add a description to FastEthernet 0/24 Save the switch changes Hide Details Save the hostname Save the FastEthernet 0/1 description Save the FastEthernet 0/2 description Save the FastEthernet 0/3 description Save the FastEthernet 0/24 description Change the router hostname to SFO Add a description to FastEthernet0/0 Add a description to Serial 0/1/0 Add a description to Serial 0/1/1 Save the router changes Hide Details Save the hostname Save the FastEthernet 0/0 description Save the Serial 0/1/0 description Save the Serial 0/1/1 description Explanation Use the following commands to complete these tasks: Press Enter Switch>enable Switch#configure terminal Switch(config)#hostname Branch1 Branch1(config)#interface FastEthernet0/1 Branch1(config-if)#description Wrk1 Branch1(config-if)#interface FastEthernet0/2 Branch1(config-if)#description Wrk2 Branch1(config-if)#interface FastEthernet0/3 Branch1(config-if)#description Wrk3 Branch1(config-if)#interface FastEthernet0/24 Branch1(config-if)#description Default gateway Branch1(config-if)#exit Branch1(config)#exit Branch1#copy running-config startup-config Use similar commands on the router to modify the hostname and the interface descriptions...
Words: 15973 - Pages: 64
...Routing Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain on the network; with RIPv2 being the simplest to run, and OSPF being the most...
Words: 4222 - Pages: 17
...1. How often does RIP Broadcast updates? Every 30 seconds 2. Maximum Hops allowed in RIP? 15 3. What area is responsible for call failures? Inadequate switching processing 4. System recovery, software upgrades, routing information are the responsibility of the ? Central Processing System (or DTMF) 5. Link-state protocols limit changes by….? By segmenting the network into area hierarchies 6. Characteristics of OSPF. Hierarchical pen standard 7. Common problems with Bandwidth needed for signaling and calling? Single-Frequency (SF) Signaling 8. Problems associated with CAS A. inability to carry signaling messages with special feature information B. the need to turn off the robbed bit signaling function when transmitting high-speed data C. uses the trunk to carry the signaling information and eats up precious bandwidth 9. What message does RIP display in the debug output. Receiving a malformed packet 10. The command that shows packets sent and received show ip eigrp traffic 11. Four problems with VOIP. Choppiness Dead air Echo Talking over 12. MOS scores indicates what? 2 indicates the call is poor 13. Switching and bridging help bandwidth in what ways? Increases, dedicated 14. What OSI Layer are switches on? Layer 2 15. What connector terminates an 8 wire conductor? RJ-45 for ethernet / RJ-48 for T-1 16. How is refraction described? Core and cladding made of glass 17. What Layer of hierarchical...
Words: 521 - Pages: 3
...NETWORKING Networking Paul F. Scheelk NTC/360 Network and Telecommunications Concepts Instructor: Anthony Bruno University of Phoenix 1. What is the range of usable IP addresses for the following IP subnet? What is the broadcast address for the subnet? 10.150.100.96/27 The range of usable IP addresses is 10.150.100.97 – 10.150.100.126. The first and last addresses are not usable and cannot be assigned to hosts as one is used as the broadcast address, 10.150.100.127 and 10.150.100.96 is the address for the sub network. When initially determining the usable addresses the /27 provides the information that the first 27 bits are network and the remaining 5 are host addresses. The subnet address would be 255.255.255.224. 2. Describe and explain the difference between circuit bandwidth and network throughput. Focus on networking. Communication networks using Ethernet or other protocols distinguish throughput as the average rate of successful packet delivery over a communication channel. The information is passed over a physical or logical link such as Cat5, 5A or 6 or media such as coax and fiber. It is also measured over a wireless network. It is usually measured in bits per second (bit/s or bps), and/or data packets per second or time slot. Throughput is the actual speed that the data is being transmitted. Bandwidth on the other hand is the maximum speed in which packets can be sent or received. Bandwidth is almost always a higher rate than throughput. 3. Research...
Words: 2399 - Pages: 10
...A Rose for Emily Summary How It All Goes Down You might want to look at our discussion of the novel's setting before you enter here, or at least know it's there to help if you get tangled up in this story's crazy chronology. Also keep in mind that the narrator of this story represents several generations of men and women from the town. The story begins at the huge funeral for Miss Emily Grierson. Nobody has been to her house in ten years, except for her servant. Her house is old, but was once the best house around. The town had a special relationship with Miss Emily ever since it decided to stop billing her for taxes in 1894. But, the "newer generation" wasn't happy with this arrangement, and so they paid a visit to Miss Emily and tried to get her to pay the debt. She refused to acknowledge that the old arrangement might not work any more, and flatly refused to pay. Thirty years before, the tax collecting townspeople had a strange encounter with Miss Emily about a bad smell at her place. This was about two years after her father died, and a short time after her lover disappeared from her life. Anyhow, the stink got stronger and complaints were made, but the authorities didn't want to confront Emily about the problem. So, they sprinkled lime around the house and the smell was eventually gone. Everybody felt sorry for Emily when her father died. He left her with the house, but no money. When he died, Emily refused to admit it for three whole days. The town didn't think...
Words: 6285 - Pages: 26
...year, the gross injustice and cruelty to which he is the constant victim” (Douglass p.49). This speech changes the way African Americans view 4th of July, it is not a day of independence and freedom for all Americans. Douglass himself was a former American slave that became an abolitionist. Abolitionism is a commitment to end slavery on the basis of fundamental human interest, slavery was viewed as a moral evil because it reduced a human being to an animal-like existence. Douglass joined the Republican party in 1850, to gain political strength in abolishing slavery. The Republican Party had a basis of antislavery and became the party for antislavery groups. He supported the Republican candidate, Abraham Lincoln, and he continued to plead for federal protection for black Americans lives and civil rights in south till his death in 1895. Washington Irving wrote story, “Rip Van Winkle”, after the American revolution, in 1818. During this time, Americans were struggling to form a new identity that was different from the English rule and culture. In the story, many of the struggle of Rip Van Winkle are similar to the struggle of America. Irving used metaphors directed at the founding of a new society in America, free from Royal England. The story is about a man named Rip Van Winkle, he lived in a small town along the Hudson Valley. Everyone liked Rip because he was always willing to help someone in need. Even the animals and his dog followed this good natured soul...
Words: 2150 - Pages: 9
...is concerned about the lifeless bodies of two soldiers lying at the foot of the alley. Knowing the troops are on route and without a doubt, they will see them. They need to move the bodies, but the sound of the moving trucks and heavy artillery shake the foundation of the cobblestone street, and that cautions the six to make a move before their chances of escape decrease, from slim to none. In any case, before they can act, dozens of soldiers have spotted their dead comrades. The Germans have blocked off the alley with a large truck, rotating a portable spotlight mounted on a trailer. A brilliant beam exposes the small group of rebels. This could be it. Freddie considers, as the blinding spotlight has them all at a disadvantage, with no way out. Without warning a hail of bullets ricochets off the cobblestone alley bouncing around in a dangerous game of Russian roulette, the devastating sounds of gunfire imprison the night as hot projectiles strike the French rebels, leaving two of them dead. A sporadic barrage of bullets is exchanged and Michelle fires several rounds in the direction of the massive...
Words: 1013 - Pages: 5
...have to a nonconformist and to trust yourself. When I think about the term self-reliance I would have never thought it would have meant to not be conformed to what you have but to always rely on yourself only. I don’t mean that in a selfish way, what I mean is to always believe in yourself and what you believe is right. If I think about myself back when I was in high school, I wouldn’t see myself being a self-reliant...
Words: 1795 - Pages: 8
...follow the same path or a different path to the common destination. Once all of the packets have arrived at the destination, they are automatically reassembled to recreate the original message. What OSI layer does a router work on? 3 or network. What type of address does a router use? IP address 2. What is a router hop? In computer networking, a hop is one portion of the path between source and destination. Data packets pass through bridges, routers and gateways on the way. Each time packets are passed to the next device, a hop occurs. Which protocol uses router hops? Routing Information Protocol (RIP). What is the maximum number of hops allowed? This limits the number of hops allowed in a path from source to destination. The maximum is 15, and 16 is deemed unreachable. The hop-count limit prevents routing loops from continuing indefinitely. Although, IGRP will route IP, IPX, Decnet and AppleTalk which makes it very versatile for clients running many different protocols. It is somewhat more scalable than RIP since it supports a hop count of 100, only advertises every 90 seconds and uses a composite of five different metrics to select a best path destination. 3. What is a routing table? A routing table is a set of rules, often viewed in table format, that is used to determine where data...
Words: 739 - Pages: 3
...Peer to Peer network . A peer to peer network is a network where the computers act as both workstations and servers. . Great for small, simple and inexpensive networks. . In a strict peer to peer networking setup every computer is an equal a peer in a network. . Each machine can have resources that are shared with any other machine. .There is no assigned role for any particular device and each of the dev ices usually runs similar software. Any device can and will send request to any other. 2.1.5. Network media . Two main categories: i.Guided: wires, cables ii.Unguided: wireless transmission, e.g. radio, microwave infrared, sound 2.1.6. Routing protocol in wired network The purpose of routing protocols is to learn of available routes that exist on the enterprise network, build routing tables and make routing decisions. Routing algorithm determine the specific choice of route. Each router has a priori knowledge only of networks attached to it directly. A routing protocol share this information first among immediate neighbors, and then throughout the network. This way routers gain knowledge of topology of the network. Routing table can be either static or dynamic. A static table is once with manual entries. A dynamic table, on the other hand is one that is updated automatically when there is a change somewhere in the internet. Desirable properties of a router are as follows: Correctness and Simplicity: The packets are to be correctly delivered. Simpler the routing algorithm, it is...
Words: 4647 - Pages: 19
...Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches Assign mode of access of VLANS Configure trunks between switches Make Switch1 as primary root bridge for all VLANs Configure security to protect from bogus BPDUs Configure Hostname: 1. Enable 2. Router# configure terminal 3. Router(config)#hostname (SpringfieldSw1, SpringfieldSw2, SpringfieldSw3, SpringfieldSw4) 4. End 5. Copy run start Creating Passwords: 1. Conf t 2. Enable password Cisco (or some other password) 3. Enable secret Cisco (or some other password) 4. End 5. Copy run start Create Console Password: 1. Conf t 2. Line con 0 3. Password “cisco” 4. Login 5. End 6. Copy run start Create Telnet Password: 1. Conf t 2. Line vty 0 4 3. Password “cisco” 4. Login 5. End 6. Copy run start...
Words: 3539 - Pages: 15