...Switches, Routers and Gateways Name Institution Date A switch is a multi-port bridge that evaluates the destination MAC address and submits it to the applicable port for a specific computer. It serves to manage information packets along a direction and assumes the role of a router. However, a switch is faster than a router because it does not store information about networks. Switches minimize data overflow by segmenting collision domains especially when the LANs are busy (Bachmutsky, 2013). They also ensure frames are not exploited by computers using the same segment. Routers describe a device that choses the destination of data packet that involves a minimum of two networks. A router establishes and tracks routes given their state. To determine the appropriate route for specific data packet, a router will retrieve the history of the routes and combine them with cost and distance algorithms. Router and networks act as medium for data packets before reaching their target. Using a single IP address, they use Network Address Translation (NAT) combined with IP subterfuge to supply the internet to numerous nodes in the LAN (Briere Hurley & Ferris, 2013). With recent developments, routers can connect to computers directly using switch or hub technology. Route tables enable routers collect network addresses and direct data packets to the suitable port. Gateways refer to the collaboration of software and hardware to connect various types of networks. The devices use a complex...
Words: 638 - Pages: 3
...2) Flooding can be used to gather information in an endeavour to setup the route for a virtual circuit. 3) Flooding is always able to find the shortest pathway because it searches every possible path in parallel. 3. Store and Forward Switches have an advantage over Cut Through Switches. What is it? Ethernet switches have the option of deploying one of two forwarding techniques they are Store and Forward and Cut-through. The main advantage Store and Forward switches have over Cut Through switches is their ability to provide a superior “level of error detection” due to the fact that damaged frames are not forward to the destination port. Whereas Cut Through switches offer no error checking. 4. Very briefly explain the Optimality Principle and the use of Spanning Trees in routing...
Words: 503 - Pages: 3
...NETWORKING LAB Mahantesh Patil 2BV14IS410 Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET LAB-01 List the hardware components 1) Difference between switch and Hub: 2) Difference between SWITCH and ROUTER 3) Differences between Router and Gateway 4) What is the Difference between Subnetting and Supernetting? HARDWARE COMPONENTS Cables: 1|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET Cables: which are used to connect one or more devices to computer or network. Different types of network cables are available market they are Coaxial cable, Optical fiber cable, Twisted pair cable. RJ-45 The most common UTP connector is RJ45 (RJ stands for registered Jack), as shown in Figure. The RJ45 is a keyed connector, meaning the connector, meaning the connector can be inserted in only one way. 2|Page Mahantesh Patil 2BV14IS410 CN LAB REPORT Dept. of ISE, BVBCET SWITCHES: Switches contain many ports to connect different network segments. They are similar to hubs, but offer greater performance. When a network contains a large number of devices, switches are needed instead of hubs to make sure the communications between devices does not slow down. Contrary to hubs, switches send the data it receives only to specific ports. NIC(NETWORK INTERFACE CARD) A network card, network adapter, or NIC is a piece of computer hardware designed to allow computers to communicate over a computer network...
Words: 3647 - Pages: 15
...Devices on the Network Michael Gustafson NTC/405 10/8/2012 JOHN-HUNG HO Devices on the Network There have been many advances in the world of networking and there are a multitude of devices which are a part of any particular network. I will go over the following network devices: Network interface card (NIC), modems, network hubs, switches, routers, gateways, and repeaters. Also the difference between channels and circuits and the difference between circuit switching and packet switching will be addressed as well as the concept of Ohm’s law and its importance to circuit trouble shooting. A NIC or network interface card is a device which lets a piece of equipment interface with a network. A NIC is a card encoded with a special 48 bit unique number known as a MAC address which helps the network recognize the user so that it can access the network, a NIC supports a transfer up to 1000+ mbps. A transceiver is embedded in the NIC that can transfer media from the network to the NIC. A wireless NIC or WNIC is essentially the same as a wired NIC in that it too has a 48 bit address although the connection is through radio waves transmitted electronically from the NIC’s antennae. The connection is started electronically through antennae and transferred over radio waves then back into an electronic signal in the device. A modem is a piece of equipment used to connect a user’s computer to a network. The modem is essentially a converter in that it can convert analog cables to digitals...
Words: 1142 - Pages: 5
...1. Define CISCO IOS a. CISCO Internet Operating System is the software used on routers and current network switches. 2. What is a flat network? a. When all workstations are directly connected to each other, except for the presence of switches, can communicate without the need of routers. 3. Define the purpose of gateway. a. This is a network point that acts as an entrance to another network. 4. A computer with a host IP address of 10.10.5.2. A subnet mask of 255.255.255.0 is being used. Determine weather the packet stays in the LAN or is sent to the gateway. a. Gateway 5. Repeat problem 9 if the subnet mask is changed to 255.0.0.0. a. 6. The IP address for computer C2 is 10.10.1.2. The IP address for computer B1 is 10.10.10.1. A subnet mask of 255.255.0.0 is being used. Are the computers in the same network? a. Yes 7. List all the possible routers from Router B to Router D in the network. a. Router E and Router C 8. List the subnets attached to Router C. a. 9. What is the next hop address for the FastEthernet port 2, Router C? a. Router D 10. What values are used when configuring HyperTerminal for connecting to a Cisco router’s console port? a. Voice and video into a virtual workspace, virtual desktops 11. What is the help command in Cisco IOS? a. The command line interface 12. What command is used to verify that there is sufficient memory available...
Words: 508 - Pages: 3
...2. Is software used on most Cisco Systems routers and current Cisco network switches. 3. Domain is a logical division of a computer network, in which all nodes can reach each other by broadcast at the data link layer. 4. Is a network in which all workstations are directly connected to each other, except for the presence of switches and can communicate without the need for intermediate devices such as routers. 5. Network Layer 6. Gateway describes the networking device that enables data to enter and exit a LAN, and is where the host computers forward data packets that need to exit LAN. 7. TCP/IP protocol 8. The packet will stay in the LAN because the destination IP address is in the same network as the host IP address and therefore has no need for forwarding or routing. 10. The destination subnet address for 255.0.0.0. which is different subnet as the host. Therefore sent to the Gateway. 12. No they are not on the same network, they are on different Networks. 14. Router A, to Router E, to Router D, or Router E to Router D. 16. B is the only one attach 18. It could be E, D, or C. 20. Bits per second 9600, Data Bits 8, Stop Bits 1, Flow control none, Parity None 22.? 24. Show version 26. In the next highest command mode in the CLI mode hierarchy. 28. Enable after the router> prompt 30. conf t 32. enable secret my – secret 34. int fa0/1, ip address 10.10.20.250 255...
Words: 319 - Pages: 2
...L - Us Lab sing IOS CLI wit Switch MAC A S th Address Tables s s T Topology A Addressing Table g Device R1 S1 S2 2 PC C-A PC C-B Interface G0/1 G VLAN 1 V VLAN 1 V NIC N NIC N IP Ad ddress 192.168 8.1.1 192.168 8.1.11 192.168 8.1.12 192.168 8.1.3 192.168 8.1.2 Subnet Mas sk 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 Default Gateway N/A 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1 O Objectives Part 1: Bu and Con uild nfigure the Network Cable the network according to the topology diagram. e Config gure the netw work devices according to the Addressin Table. a t ng Part 2: Ex xamine the Switch MAC Address Tab S A ble the Use show commands to observ the proces of building t switch MA address ta s ve ss AC able. B Backgroun / Scenar nd rio The purpo of a Layer 2 LAN switc is to deliver Ethernet fra ose ch ames to host d devices on th local netwo The he ork. switch rec cords host MA addresses that are visible on the ne twork, and m AC s maps those MA addresses to its AC s own Ethernet switch po orts. This proc cess is called building the MAC address table. When a switch rec d n ceives a m amines the fra ame’s source and destinat tion MAC add dresses. The s source MAC address frame from a PC, it exa © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Publiic. d/or ed. ent Page 1 of 5 Lab - Using IOS CLI with Switch MAC Address Tables is recorded and mapped to the switch port from which...
Words: 1819 - Pages: 8
...subnet mask and default gateway. 2. The type of NIC that I have is A VIA Rhine II Fast Ethernet Adapter 3. The physical address is 00-11-2F-BF-C9-DA 4. The Subnet Mask is 255.255.255.0 1. A LAN is a Local Area Network. A local area network is a network that connects computers and other devices in a small area, usually in a single building or a group of buildings. 2. WAN is Wide Area Network A WAN is a computer network that spans a relatively large geographical area. 3. MAC ADDRESS stands for Media Access Control Address It is an ID code that's assigned to a network adapter or any device with built-in networking capability, such as a printer. 4. 802.11 G is used for transmission over short distances at up to 54-Mbps in the 2.4 GHz bands. 802.11 N The speed is 100 Mbps and so it is up to 4-5 times faster than 802.11g. 802.11n also offers a better operating distance than current networks. 5. Bluetooth is a short-range radio technology (or wireless technology) aimed at simplifying communications among Internet devices and between devices and the Internet. It also aims to simplify data synchronization between Internet devices and other computers. 6. Router is a device that forwards data packets along networks. Switch is a device that filters and forwards packets between LAN segments. The difference between a router and a switch is switches are not capable of joining multiple networks or sharing an internet connection. A network with only switches must instead designate...
Words: 520 - Pages: 3
...of network layer in every host and router in the network. Transport segment from sending to receiving host. On sending, Host 1 encapsulates segments into datagrams. On receiving, Host 2 delivers datagrams to transport layer. Protocols in every host, router. Router examines header fields in all IP datagrams passing through it. Moves packets from sending to receiving hosts. Routers: forwards datagrams from input links to output links, done by using destination IP address in datagram header, which indicates target network. (Network layer functions=forwarding and routing) Transport Layer: provides process-to-process communication (layer 4). Only resides on end systems. Network devices: hub, bridge/switch, router. End-System: computer. Encapsulation: (send) Forwarding (switching): transfer of packet from incoming link to outgoing link within a single router. Routing: involves all of a network’s routers whose collective interactions via routing protocols determine paths (routes) that packets take from source host to destination. Router: connects networks together, forwards packets, filters traffic, path selection, connects layer 1&2 technologies(UTP cable to fiber, Ethernet to WiFi/frame relay/ATM), (connects IP subnets/IP broadcast domains together), finds destination IP address in header, looks up IP address in forwarding table to find router’s output port, sends packet to right destination. Latency: delay for frame to reach destination, routers analyze packets through layer3, chooses...
Words: 2483 - Pages: 10
...network topologies and simulate their performance. This task is to build the logical topology shown below: [pic] 1. From the Packet Tracer device window (bottom left) select and place in to the main window the following devices: Qty 4 3560 L3 Switches Qty 1 2811 Router Qty 1 Internet cloud Qty 1 Wireless Access Point (generic) Qty 3 2960 L2 Access layer switches Qty 2 Laptops Qty 5 PCs Qty 4 Servers Qty 1 IP Phone Qty 1 Printer 2. click on the relevant device and change its name to that in the topology diagram 3. Drag and drop wiring from the menu – use crossover cables (black dashed) to connect the switches together and straight through cables (solid black) for all other connections. You can connect devices to any suitable port. 4. Configure DHCP Server The DHCP Server provides IP addresses to each network device that requests an IP address using dhcp. From the desktop menu configure the following IP addresses: IP Address: 192.168.1.103 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1 DNS: 192.168.1.102 From the Config menu select DHCP. Configure the serverpool with the correct DNS and Default Gateway as above. Set the start address IP address: 192.168.1.10 and Subnet Mask 255.255.255.0 Save the configuration and make sure DHCP is turned on. 5. For each PC goto the Desktop IP configuration window and click on DHCP. Each PC should...
Words: 852 - Pages: 4
...of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business. INFRASTRUCTURE When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ). There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the new switches can be just as effective these days. There are some cases where specific non-routable protocols must be used due to application specific requirement and bridging must be deployed. The problem with bridging is that any broadcast protocols...
Words: 3575 - Pages: 15
...Same as bridges, but with faster frame processing and multiple ports. To link two dissimilar networks using different protocols. Converts packets to match the requirements of their destination. Transmission Management Reads address and then transmits either to that address found in its forwarding table, or it floods the frame to all possible connections. Maintains a list of addresses and ports and reads a frame’s address and then uses the list to determine which port to send a frame out on. Switches can also be set up to check the frame for errors. The IP address of packets are checked and then transmitted based on the routing table or protocol of the router. Unpacks the data and then creates a new packet that meets the protocols of the destination of the transmission. Information Needed for Function Address portion of the frame. Depends on forwarding method. Address portion of the frame if using Cut-through, 64 bytes for collision free, entire frame for fully buffered. Entire frame. Destination IP address. The entire data packet. The protocols of the sender and...
Words: 738 - Pages: 3
...Data Communication Theory What is dotted decimal notation on IPv4 addresses? Answer: It is presentation form for the numerical data that consists of a string of decimal numbers each pair is separated by a dot. The common use is to write the numbers in the octet group based 10 (decimal) numbers separated by dots. In computer networking, Internet Protocol Version 4 addresses are commonly written using quad-dotted notation of four decimal integers, ranging from 0 to 255 each. Chapter 6- Explain the Peer-to Peer network and what are its advantages? Answer – In Peer to Peer network, network hosts don’t have a specific role. They provide specific services and also consume network services. We have hosts that will fulfill a variety of different roles, like one computer can have printer connected to it which is then shared on to the network. Another computer can have a large hard drive attached to it and everyone else is allowed to use the hard drive for data storage, modification etc. In Such network we have hosts that both provide and consume network services. In essence they function both as a Client and as a Server at the same time. The advantage of Peer to Peer network is the ease of installation. We can share our resources on the network and everyone can share the benefits. On the other hand is not very scalable. The Peer-to-peer network are useful only for a network with fewer computers and are suitable for applications that do not require a high level of...
Words: 1023 - Pages: 5
... University of Phoenix- Profressor Sims Wk 6 Assignment Router & Switch Conf. "Let’s go through the basic steps of setting up a Cisco router to provide Internet access to a small network. I’ll assume you have some basic IOS knowledge, including how to log on and how to save and clear configurations. I’ll also assume that you have a solid understanding of networking, including what Network Address Translation (NAT) is. I won’t cover items such as setting up Secure Shell (SSH) access and hardening access lists. You can expand into those areas as you feel comfortable and want to experiment more. What You’ll Need You need a Cisco router with at least two Ethernet interfaces. An 806, 836, 851, or 871 is ideal for a home or small office setup—in fact, that’s what those models are geared towards. You can buy an 851 for a few hundred dollars from various online retailers. However, a 2610 works just as well, and you might have one sitting in the equipment bin at your office that you can ask to borrow. Your router should have IOS 12.2 or later. This article is based on a Cisco 851W with IOS 12.4, including the IOS firewall feature set. You also need a Cisco console cable (sometimes called a rollover cable). One end has an eight-position, eight-conductor modular jack to connect to the router; the other end has a DB-9 serial connector. In recent years, the console cables that Cisco has shipped...
Words: 1763 - Pages: 8
...D Case Project 6-1 A router forwards data packets by performing "traffic direction" functions between two more separate networks and/or between different computers on the same network. You can use the ipconfig command to get host computer configuration information, including the IP address, mac address, your adapter info and router or switch info, subnet mask, and default gateway. the tracert command can be used to check the path to the destination IP address that you want to reach. The tracert command displays the series of IP routers that are used in delivering packets from your computer to the destination and how long it took on each hop. If the packets are unable to be delivered to the destination, the tracert command displays the last router that successfully forwarded your packets. To get more detailed information about throughput rates and to determine what the physical topology is you need to be able to access the equipment and telco rooms because there might be some hidden problems. Like the equipment may not be compatible causing errors on the network and the cables, ports on connectivity devices, and data jacks have to be labeled and according to TIA/EIA standards. Case Project 6-2 The telcom room is located on the 1st floor of the Connect Spree and there are 4 internal servers, Internet Service and 4 routers inside the telcom room. Black solid line shows the connection of 4 internal servers to routers and the connection of 4 routers with each other. Red solid...
Words: 968 - Pages: 4