Free Essay

It 242

In:

Submitted By xtina08x
Words 968
Pages 4
Switches and Router
Christina Bennett
IT242

Switches and Router

One of the main reasons that Cisco is number one in the enterprise networking market place is their Internetwork Operating System (IOS).The IOS provides a similar function to Microsoft Windows or Linux: it controls and manages the hardware it is running on. Basically, the IOS provides the interface between you and the hardware, enabling you to execute commands to configure and manage your Cisco device. “Originally, the IOS was developed for Cisco routers, but over the last few years, Cisco has been porting the IOS to it so there platforms, including the Catalyst switches”. (Cisco.com)
There are actually many ways of accessing a Cisco device, including the following: console, auxiliary (only certain Cisco routers), telnet, web browser, and an SNMP management station .A console interface provides serial connection access to a router— with console access, you can enter commands in a text-based mode. In order to access your Cisco device from a remote station, however, you first need to create a basic configuration, including IP addressing. Therefore, to perform your initial configurations, you need access to the console port of your Cisco device. Before you can actually begin configuring your Cisco device, you first have to connect it to your network and set up a terminal connection to its console interface.
No two routers are setup in the same manner; however, the command modes they use are pretty much alike. The main mode you will see is known as user exec mode; this mode permits the ordinary user to observe the settings and configuration of the router, but does not allow them to make any modifications. The next mode is the privileged exec mode. This is the mode that is entered using the enable command at a user exec prompt. This command puts the router into a privileged user mode, permitting and administrator to change the settings of the router. Another mode known as Configuration mode can be utilized at boot time and permits a user to finish configuration should the router not have an operating system. Last but not least, setup mode can be utilized if no startup configuration exists.
Finding the best route for data to take across the network is one of the most valued and sophisticated functions performed by the router. To determine the best path, routers communicate with each other through routing protocols. Keep in mind that routing protocols are not the same as routable protocols such as TCP/IP, although routing protocols may piggyback on routable protocols.
1. RIP (routing information protocol) a district-vector routing protocol. RIP factors only the number of hops between nodded when determining the best path from one point to another. RIP prevent routing loops from continuing indefinably by limiting the number of hops to 15,
2. BGP (Border Gateway Protocol) communicates using BGP- specific messages that travel between routers over TCP sessions. IT can configure to follow policies that might, for example avoid a certain router or instructs a group of router to use one particular route.
3. OSPF (Open Short Path First) is a link state protocol used on the interior or border routers. It maintains a data base of the other routers’ links. This is great because if it learns of a failed link it can find a different path.
4. IS-IS (Intermediate System to Intermediate System) Unlike OSPF, however, IS-IS is designed for use on interior routers only. Also, it different that it supports two layer 3 protocols.
Switches
Switches are connective devices that subdivide a network into small logical pieces, or segments. Traditionally switches operate at the data link layer of the OSI model, while more modern switches can operate at Layer 3 or even 4.
In addition to improving bandwidth usage compared to lower-layer devices, switches can create VLANs (virtual local network), or logically separated network within the networks, by grouping a number of ports into a broadcast domain. It is valued for its flexibility. IT can include ports from more than one switch or segment. The VLANs can be created threw the CLI.
One of the best ideas for maintaining connectivity in a network is redundancy. Should one switch fail, having another route for data around the failed node ensures the network suffers no ill effects. To build redundancy and eliminate the creation of multiple broadcast packets, spanning tree protocol (STP) must be configured on the network switches. STP is defined in IEEE standard 802.1D and functions in the Data Link Layer. It prevents traffic looping by calculating paths that avoid potential loops and by artificially blocking the links that would complete the loop. In addition STP can adapt to change in the network. For instance, if a switch is removed, STP will recalculate the best loop-free data paths between the remaining switches.
Network administrators can use the command-line interface (CLI) to set up their Cisco switches. To access the CLI, the switch’s console port must be plugged into a computer terminal or modem with an RJ-45 rollover cable and the appropriate adapter. A terminal emulation key to configuring the MAC address table and port security
If there is a password configured on the switch, you will be prompted for it before this menu is displayed. To choose an option, just type the letter. There are four options from this menu:
■ M Use the menus to configure the switch.
■ K Use the IOS CLI to configure the switch, which takes you to User EXEC mode
■ I Use a menu to create a basic IP configuration on the switch (this appears only if the switch has no IP addressing configured on it).
■ P Assign a password to the console (this appears only if there is no console password configured).

References:
Cisco.com

Similar Documents

Free Essay

It-242

...Christy Williams University of Phoenix- Profressor Sims Wk 6 Assignment Router & Switch Conf. "Let’s go through the basic steps of setting up a Cisco router to provide Internet access to a small network. I’ll assume you have some basic IOS knowledge, including how to log on and how to save and clear configurations. I’ll also assume that you have a solid understanding of networking, including what Network Address Translation (NAT) is. I won’t cover items such as setting up Secure Shell (SSH) access and hardening access lists. You can expand into those areas as you feel comfortable and want to experiment more. What You’ll Need You need a Cisco router with at least two Ethernet interfaces. An 806, 836, 851, or 871 is ideal for a home or small office setup—in fact, that’s what those models are geared towards. You can buy an 851 for a few hundred dollars from various online retailers. However, a 2610 works just as well, and you might have one sitting in the equipment bin at your office that you can ask to borrow. Your router should have IOS 12.2 or later. This article is based on a Cisco 851W with IOS 12.4, including the IOS firewall feature set. You also need a Cisco console cable (sometimes called a rollover cable). One end has an eight-position, eight-conductor modular jack to connect to the router; the other end has a DB-9 serial connector. In recent years...

Words: 1763 - Pages: 8

Premium Essay

It/242

...Data signal is the physical data of the transmission that is usually in the binary code for signals and pulses from one point to the other point. Data is transformed signals of electromagnetic before the transmission to go across the network. Data signals and video signals are encoded by utilizing from an analog format. Sound is recorded in analog in its original form. With digital technology the video and data is used by being turned into numbers. Voice signals are not so tense into data since only the audio part is compressed and captured. Video signals though do require more bandwidth to receive and send since there is more information that travels with the same signal strength. PBX is a small network for telephones that is used to work within a company. There are several lines that are provided to an external phone company. PBX switches calls between enterprise users that are on local lines while all other users are allowed to share certain numbers of external phone lines. The main use of PBX is saving cost of the requirement for each user to have a line to the telephone company main office. The company owns PBX and is operated by the company as well rather than the telephone company. VOIP uses packet switched networks to pass digitized voice data from one point to the other where PBX provides several lines to an external phone company where calls can go in and out. References Difference Between PBX and VoIP. (). Retrieved from...

Words: 262 - Pages: 2

Premium Essay

It 242 Security

...university of phoenix | Final Project: WAN Design | IT/242 | | Willie Smith | 2/27/2011 | Axia College | Introduction Wylie K. Otae is an up and coming organization that requires a WAN so that it can communicate between sites. They have sites throughout the United States and one site overseas in Japan. The network needs all new equipment installed and each site needs communication devices that allow for conference meetings between sites. Implementing a WAN will ensure that the company can accomplish all of these requirements. The type of lines needed at each location is important and each type must be compatible with the next. The WAN should be a private network with dedicated links that only accessible to the devices of the company. Leased Lines The T1 leased line is the most common line used in LANs today and this type of line would be used between the two buildings in Austin. A T1 leased line is better for bandwidth for network traffic and there are types that are not as expensive. T1 leased lines also offers uninterrupted and reliable data transfer that is best for video and voice communication. Each site should use this type of line as it will give a boost to communication between sites. The distribution offices in Atlanta, Seattle, and Miami require constant communication as they are the ones receiving the orders. The company is currently using a T3 circuit which gives them internet access, also it is compatible with my recommendation. Each location...

Words: 1061 - Pages: 5

Free Essay

Ahsc 242

...Recreation and Leisure in Canada Assignment AHSC 242 Table of Contents Introduction..................................................................................................................................................3 Part 1: Understanding/Recognizing how free time is spent.........................................................................4 Trends and Patterns........................................................................................................................4 Work and Leisure Occurring Simultaneously.................................................................................4 Motivation of Leisure......................................................................................................................5 Influence on Leisure........................................................................................................................5 Defining Leisure – Response Theory (MacNeil)..............................................................................5 Part 2: The Role of Leisure in our Lives.........................................................................................................6 Moving Away from home and entering a Serious Relationship....................................................6 Escaping Reality...............................................................................................................................7 My Life without School......................

Words: 5261 - Pages: 22

Premium Essay

Cmis 242 Project 1

...HELPIDO.COM ----------------------------------------------------------------- Follow the link to get the tutorial http://helpido.com/cmis-242-project-1-design-and-implement-a-vehicle-class-along/ ----------------------------------------------------------------- CMIS 242 PROJECT 1 This project focuses on demonstrating your understanding of classes and objects. Before attempting this project, be sure you have completed all of the reading assignments listed in the syllabus to date, participated in the weekly conferences, and thoroughly understand the examples throughout the chapters. The project requirements include: 1. Design and implement a vehicle class along with 4 subclasses using the following guidelines: Create a lass named Vehicle and its four subclasses named Truck, Car, Bus, and Motorcycle. A Vehicle has a name, model, and make data fields. It also has methods for setting and getting the values of each of the fields along with a method to display the type of license needed to operate it. A constructor that sets the model and make fields to null is also included in the Vehicle class. You are welcome to add additional methods if you like. The types of licenses are: Class Licenses Car Regular Truck Regular Bus Commercial Motorcycle Moto 2. Finally, create a Java test class that creates a fleet of vehicles. In your test class you should at a minimum: a) Construct 100 instances of each kind of vehicle, b) assign a different name to each...

Words: 263 - Pages: 2

Premium Essay

It 242 Wan Development

...WAN Design Company Overview The plan under displays the main procedures involved in developing a WAN for Acme Production. The company’s six different buildings in six different places need to be networked jointly. There is a necessity of communication between all the distant places and the head office building. Two of the headquarters are situated in Atlanta, Georgia. In these two building located across the street from one another, one of these is the head office building and the other is the engineering building. Logical Network Setup and Locations Interconnection A LAN setup having routers and Ethernet wires will be the selection. This is a sensible selection since the speeds of the network will be significantly greater and consequently will lead to a reduced amount of expense. Other three places are the distribution offices that are situated in Chicago, Phoenix, and New York. Satellite communication will be the selected form of link with the head office building. The final division is the plant facility that is situated in China. For this, developing satellite as well will be utilized to interact to the headquarters network. On an overall note, all places must be interconnected that allows function flow between each other. This lets simple interaction to be achieved for specific requirements, for orders and manufacturing. Moreover, it reduces substandard interaction that happens in delivering messages. The network topology utilized for Acme’s WAN must be a star topology...

Words: 878 - Pages: 4

Premium Essay

It 242 Week 2

...Travis Luther IT242 Week 2 VoIP Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line. The technology was introduced in 1995, and has developed into an enormous enterprise since then. I will be presenting an overview of the technologies that brought VoIP to fruition, the methods of connecting, benefits, and drawbacks. IP Telephony allows organizations to reuse their existing network infrastructure. With IP Telephony, employees can use IP handsets or softphones anywhere on the corporate network. Generally only a single Ethernet port is required to provide both desktop and IP Telephony (voice) services. Power over Ethernet using the 802.3af standard or pre-standards based power can be used with great advantage throughout an IP Telephony environment to power other network appliances such as 802.11a/b/g wireless access points, IP video surveillance cameras and IP phones. IP Telephony systems also provide the advantage of lower cost moves/adds/changes administration allowing employees and departments to more easily move from location to location without the burdens of administration and service interruption. Because IP Telephony works with packet networks, the model of support used for IP Telephony can be the same as the one used for the desktop, thereby reducing and simplifying staffing requirements. Since the IP phone or softphone is an intelligent endpoint on the network...

Words: 1929 - Pages: 8

Free Essay

It 242 Checkpoint: Static or Dynamic

...IT 242/ Into to WAN June 19, 2014 Which one would you choose? When a business decides whether their IP router should be configured to be static or dynamic, it comes down to the size of the network, the size of the company, and whether or not the topologies are changing or consistent throughout the company. Therefore it is important to compare and contrast what each one is, and how and when it would be appropriate to use. A static routing configuration is a routing table configured by a network administrator. What this means is that a network administrator or individual in charge of the network configures the routing table in every router of the company’s topology by inputting every possible network address. Static routes to network destinations cannot be changed once set. This is great for smaller internetwork where it is important to track where things are being sent and by whom. A dynamic routing configuration is the exact opposite of a static routing configuration. With dynamic routing, routing tables are built and maintained automatically by the routers through constant communication. This is all done by a routing protocol. This configuration needs little maintenance once it is established so it is ideal for companies that require a larger network. In the end, the ideal choice will always be going with a dynamic routing configuration. A dynamic routing configuration requires less maintenance and less learned knowledge. A static routing configuration should only be...

Words: 278 - Pages: 2

Premium Essay

It 242 Ethernet or Token Ring

...Ethernet or Token Ring Checkpoint Keitha Hinkle IT 242 03/27/2014 LaTrea Shine Ethernet or Token Ring Checkpoint Sanguaro federal has mainframes for all of its banks and businesses, must the company use the Ethernet or token ring protocol. I feel this would be a good option because the bank and businesses are probably not all located in the same building. So if they are located in separate buildings it would be the best option. In a token ring LAN each station is connected to a center wiring concentrator. This is called a multi-station access unit using a UTP or an STP. The access method that is used is called Token. This type of method is a special data package that is generated by the first computer which connects to the token ring network and then passed from one station to another station around the ring. This type of device only communicates over the network when it has the token. XYZ technology consultation has offices on the second, third, and fourth floors of the office building it occupies. Most of the company uses the Ethernet or token ring protocol. Explain your choice. Why is this choice appropriate? I think for this situation I would suggest an Ethernet protocol. I think this would be a better choice because the company is all located in the same building just on different floors. This is the most common type and popular used LAN technology. This is due to its reliability and ease of installation as well as its cost. An Ethernet network can be connected...

Words: 330 - Pages: 2

Premium Essay

It 242 Week 2 Checkpoint

...Week 2 Checkpoint Alonzo Burger IT/242 Adam Moneypenny 4/4/2014 Week 2 Checkpoint The business world is constantly evolving and part of that evolution is the way it uses wide area networks. Business’s often employ several different types of data in order to stay current but also to maximize their profits. On a typical wide area network, three types of medium that often are used are voice, traditional data, and video. Because of the reliance on telephone calls, businesses have many options. A private branch exchange is used by many larger businesses that need more than one employee to have access to a phone call. This is simply a phone switch that is either bought or leased in which a company can control. This gives their employees an easy way to access a certain call from many levels of a facility, but also gives them the option of calling within the network. Voice over internet protocol is using the internet to send telephone calls. A traditional private branch exchange makes use of existing telephone systems while voice over internet protocol instead relies on internet service provider’s network. A private branch exchange can also have voice over internet protocol functionality. Traditional data and video are also things a company may need to use in order to conduct business. Video data is as it implies data that gets processed in the form of a video. Video files can be traditional data files for sending, but streaming services can also be used. A video stream is...

Words: 306 - Pages: 2

Free Essay

It 242 Week 4 Vlan

...VLAN Student Name IT 242 January 30, 2011 VLAN Virtual Local Area Network (VLAN) is one of the latest network technologies that has been created in the past several years. The technology for VLAN is growing rapidly as well as the costs of the equipment used to implement the secure network that is often considered expensive. Virtual Local Area Networks were born out of the need for a cost effective network that did not compromise the need for high security and performance so the VLAN met all the requirements for the special network (Regan, 2004). The VLAN offers a great deal of functionality for any network as it was created to separated the network into separate broadcast while still allowing each network to still function in the different locations. An example of this process is if a business has different departments such as Operations, Sales, and Human Resources. The VLANs are implements specifically for each department making it an individual network within the business. When implementing a VLAN, it is important to know that to create the VLAN there is a need for layer 2 switch. One common misconception regarding VLANs is that there is a need to install separate software in order to implement the VLAN within the network. The fact is VLANs need special hardware that is built into the switch, which implements a separate network of the main network. Depending on what the network’s security policies and infrastructure, VLANs assignment can be implemented using one...

Words: 688 - Pages: 3

Free Essay

It 242 Individual Voip Case Study

...Individual Assignment: VoIP Case Study IT-242 Instructor: For this assignment I found one of the markets leading VoIP, IP and legacy systems wholesaler distributer and integrator Metaswitch- http://www.metaswitch.com/. Metaswitch has the ability to bring together legacy internal communications systems alongside new VoIP technologies that allow huge amounts of business to be generated and grown upon for carriers and communication service providers. For this case study I chose a company that is based in the state of New Mexico Plateau Wireless- http://www.plateautel.com/index.asp , with the case study of their integration with Metadata software and technologies- http://www.metaswitch.com/sites/default/files/Metaswitch-Case-Study-ENMR-Final.pdf . The need for Plateau to grow into offering more services is the real reason for them to take their legacy PBX system and merge it and grow it into a hybrid system that is more application and software based with VoIP. Plateau services over 13,000 hard lines for clients as well as moving into wireless communications and being the first to bring FTTH to New Mexico residents (which they don’t have for my area =(). Plateau was sold on Metaswitchs technology which allowed a cheap way to setup the companies growing customer base with the seamless integration of the Metadata soft switch and its ability to adapt and grow to Plateaus Fiber, Wireless and landline needs. Of course being that the basis of the softswitch is for VoIP, standard...

Words: 379 - Pages: 2

Premium Essay

It/242 Week 2 Assignment - Voip

...The case study covers the Lakeville School District in Minnesota, and their transition to VOIP. The Lakeville School District comprised of 10,000 students and 1,500 staff members, as well as 2,000 phones in 18 different buildings (Hickey, 2006). With only one summer to complete the work, the project was a massive undertaking. The networking infrastructure of the buildings needed to be upgraded from legacy to fiber for most of the building as well as T1 lines in the rest (Hickey, 2006). This had to be completed before VoIP could be installed. Patrick Rateliff was quoted saying, “We wanted to consolidate everything into one phone system. (Hickey, 2006)” The switch to VoIP allowed the district to consolidate everything to one system, saving the district money and adding some much needed features. Rateliff said that the district was seeing “significant savings” after the leap to VoIP (Hickey, 2006). Even with the cost of instillation around $600,000, the consolidation of the phone lines and the new improved network allowed for a more efficiently ran district. Along with the money the district saved after the switch, new features came with the VoIP system. Unified messaging was added, which allows staff to read voice messages over e-mail or hear e-mails over the phone. This allowed teachers and administrators the ability to quickly check voicemails via the Internet, in any location. This promoted prompt responses, increasing the efficiency of the district greatly. Enhanced 911 features...

Words: 582 - Pages: 3

Free Essay

Acc 307 Week 3 Quiz 2

...purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2 – NEW 2015 Version STR ACC 307 WEEK 3 QUIZ 2 To purchase this tutorial visit here: http://mindsblow.us/question_des/ACC307WEEK3QUIZ2/242 contact us at: help@mindblows.us ACC 307 WEEK 3 QUIZ 2 ACC 307 Week 3 Quiz 2...

Words: 920 - Pages: 4

Premium Essay

Viceroyalty Of Spain Research Paper

...established in the 1500’s. I got this from the Latin America and Canada book. On page 241, it says “During the 1500’s two viceroyalties were established in Latin America…” The land(s) that Viceroyalty of Spain include Mexico and Latin America. I got this from the Latin America and Canada book.On page 242 On page 242 in the map. According the encyclopedia britannica it says”....upper and lower California, the area that is now the central and southwestern portion of the United States, and territory eastward along the Gulf of Mexico to Florida.” Three things that the Viceroyalty of Spain did was they held Inca and Aztecs people as slaves. The also had missions to convert people into christianity and had Encomiendas...

Words: 954 - Pages: 4