Course Project Author Note This assignment is being submitted on September 5, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Course Project Assuming that the router (R1) connecting the NOC to the outside world is configured with an IP address of 154.78.0.1 is directly linked to router (R2) with IP address 154.78.0.244 complete the following: Explain the steps required to configure router R1 and R2 to use Frame relay your explanation should include
Words: 935 - Pages: 4
Routing protocols: Routing protocols are broken up into few different categories Distance Vector: DVRP use a distance to a remote network to find the best path. It is called hop when each time a packet of data goes through a router. The best is considered to be with the least number of hopes. The vector is the determination of direction to the remote network. Examples for distance vector routing protocols are RIP and IGRP. RIP (Routing information protocol): RIP is
Words: 969 - Pages: 4
1. What is an uplink port? Allows the connection of hub to hub or switch without having to use a special cable 2. Which data speed and maximum cable length is not used for Category 5e/6 cabling? Anything other than 100MHz/1000Mbps (Cat5e) and up to 250MHz, class E/1000Mbps, 10Gbps but at a distance less than 100 meters (Cat6) both up to 100 meters. (Page 59.) 3. What do the links lights on a hub or switch represent? That the transmit and receive pairs are properly aligned and the connected
Words: 1091 - Pages: 5
LAB 4-1 BASIC SECURITY CONFIGURATION MAY 29TH, 2013 DEVRY LAB 4-1: BASIC SECURITY CONFIGURATION TASK 2: PERFORM BASIC ROUTER CONFIGURATIONS STEP 1: CONFIGURE ROUTERS Router(config)#hostname R1R1(config)#no ip domain lookupR1(config)#banner motd #Keep Out.#R1(config)#int fa0/1R1(config-if)#ip address 192.168.10.1 255.255.255.0R1(config-if)#no shutdownR1(config-if)#int s0/0/0R1(config-if)#ip address 10.1.1.1 255.255.255.252R1(config-if)#clock rate 64000R1(config-if)#no shutdownR1(config-if)#exitR1(config)#router
Words: 2587 - Pages: 11
generates a ZBF firewall by default. Overview In this report, chapter 4 lab A is used as a base lab. In this lab a multi-router network is built and routers and hosts are configured with names, interface IP addresses, and access passwords. EIGRP dynamic routing protocol is also configured and Nmap port scanner is utilized to check for router vulnerabilities. Auto Secure is implemented to configure a basic CBAC firewall and verification of firewall functionality is
Words: 977 - Pages: 4
1. Cut-through frame processing by a switch allows the switch to discard frames that fail the FCS check. - False 2. When a switch receives an Ethernet frame to a destination MAC address which is not in the devices MAC address table the switch applies the following logic - Floods the Ethernet frame out all interfaces except the received interface 3. Which of the following correctly describes the collision domain design trade-offs? - Single collision domain requires all devices on a segment to
Words: 1118 - Pages: 5
Risk Management Computer Network Charles Watson PROJ/595 James Hiegel Table of Contents Project Scope…………………………………………………… Pages 1-9 WBS…………………………………………………………….. Page 10 Risk Management Plan…………………………………………. Pages 10-14 References………………………………………………………. Page 15 Project Scope Project Scope Statement Project Name | Computer Network | Project Number | | Project Manager | Charles Watson | Prioritization | | Owner(s) | Charles Watson | Statement of Work—Project Description
Words: 3738 - Pages: 15
WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections
Words: 18593 - Pages: 75
* Classless routing in a network. * Examples of classless routing protocols are RIPv2, OSPF, IS-IS, EIGRP and BGPv4. The following protocols support the VLSM (variable length subnet mask) and CIDR (Classless inter-domain routing protocol). Classless routing protocols send the subnet mask as well as the network address in the routing update. If I was working for an established or new company that needed a lot of hosts, I would choose classless because you can set the amount of hosts. Unlike classful
Words: 1410 - Pages: 6
List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI
Words: 1041 - Pages: 5