COMPLETE Project On Networking
COMPLETE Project On Networking
COMPLETE Project On Networking
networking written and submitted to the School of Engineering and Technology, Department of Computer Science and Engineering is my original work and interpretation drawn therein are based on material collected by ORDU HARMONY NDUDI with registration number 10setcse !0 and roll number 1001011"#
Date#
ACKNOWLEDGEMENT
I feel deeply indedted to Mr. Elems Ojadi, the trainer who delivered valuable lesson on PC Maintenance, his indepth knowled e about the subject helped me understand the subject in better way. !is method of teachin the minute details helped me a lot to ac"uire the insi ht into the subject. I am also rateful to Mr. E#e Odike, also my trainer for ivin best knowled e about computer networks. $he way he instilled knowled e of the subject was worthy and valuable. I am also thankful to %E&& Communication as a whole for their effort towards instillin networkin and hardware knowled e, that is the need of the day.
TA$%E OF CONTENT
'. Introduction((((((((((((((. ). *bstract(((((((((((((((( +. Introduction to networkin ((((((((( ,. Cate ories of network((((((((((.. -. IP address and M*C address(((((((( .. /etwork Medias(((((((((((((. 0. 1/2 2ervers((((((((((((((( 3. 1!CP servers((((((((((((((.. 4. 5irtual private networks((((((((((.. '6. 7outin (((((((((((((((((.. ''. E8chan er servers(((((((((((((.. '). O2I Model((((((((((((((((.. '+. 7outers(((((((((((((((((( ',. Conclusion((((((((((((((((( 7eferences(((((((
INTRODUCTION
$his project report pertains to 3weeks industrial trainin that I had underwent at %E&& communication as part of curriculum of de ree in 9achelor of technolo y in computer science en ineerin as re"uired by 2chool of En ineerin and technolo y, 2harda :niversity . I learnt a lot from professional mana ers and skilled en ineers. I had a reat learnin e8perience as trainee in this firm. I learnt a lot about system maintenance, *ssembly and troubleshootin , how different networks are controlled in the industry or any department with the help of networkin processes, under MC2E and CC/*. I have learnt about different type of servers like 1!CP 2erver, 1/2 2erver, /*$ 2erver. *lso I have learnt how to control the ;*/ and M*/ networks under MC2E <Microsoft Certified 2ystem En ineers= and how to control M*/ and >*/ networks under CC/* <CI2CO Certified 2ystem En ineers=.
ABSTRACT
Computer /etworkin is a very vast project in the present developin era of computer science. /ow a days, computers are used in a wider ran e. *ll the or ani#ations are usin multiple computers within their departments to perform their day to day work. Computer network allows the user to share data, share folders and files with other users connected in a network. Computer /etworkin has bound the world in a very small area with it wide networkin processes like ;*/, M*/, >*/.
NETWORKING
Introduction to networking
/etworkin is a practice of linkin of two or more computin devices such as PCs, printers, fa8es etc., with each other Connection between two devices is throu h physical media or lo ical media to share information, data and resources. /etworks are made with the hardware and software.
Models o Networking
Model means the connectivity of two computers. >e have many types of networkin models. <i= <ii= <iii= Client ? 2erver Model Peer to Peer Model <>ork roup Model= 1omain Model
!i"
Client #Ser$er Model In a Client server model we have one server and many clients. * Client can share
the resources of server, but a server cannot share the resources on clients. On the point of view of administrator it@s very easy to control the network because we combine with the server also at security point of view. It is very useful because it uses user level security in which users have to remember only one password to share the resources.
!iii" Do'(in Model It is a mi8ture of client server and peerBtoBpeer model. In this clients can share their resources as peerBtoBpeer but with the permission of the server as in client server model therefore it is commonly used model because in this security is more as we can put restriction on both server and clients.
C(tegories o network
/etworks can be cate ori#ed as per eo raphical area to be covered by the network. Computer network are divided into four cate ories includesC ;ocal *rea /etwork <;*/=, Campus *rea /etwork <C*/=, Metropolitan *rea /etwork <M*/= and >ide *rea /etwork <>*/=. Loc(l Are( Network !LAN" ;*/ is a computer network that is used to connect computers and work station to share data and resources such as printers or fa8es. ;*/ is restricted to a small area such as home, office or colle e. 1evices used in ;*/ are C !:9 and switch. Media for ;*/ is :$P cables. &i ure '.) shows how all work stations, server and printer are interconnected with the help of the network device.
I% Address Cl(sses
IP address is a +) bit address. It is divided into various classes namely Class *, Class 9, Class C, Class 1 and Class E. $CPDIP defines Class 1 for e8perimental purpose. $CP DIP address contains two addresses embedded within one IP addressE /etwork address and host address as shown in fi ure +.'
Class * consists of 3Bbit network I1 and ),Bbit host I1. Class 9 consists of '.B bit network I1 and '.Bbit of host I1. *nd Class C consists of ),Bbit of network I1 and 3Bbit of host I1.
D*n('ic I% Addresses
1ynamic IP addresses are assi ned to the devices that re"uire temporary connectivity to the network or nonBpermanent devices such as portable computer. $he most common protocol used for assi nin 1ynamic IP address is 1!CP also called 1ynamic !ost Confi uration Protocol. $he 1!CP rants IP address to the computer on lease basis.
St(tic I% Addresses
2tatic IP addresses are assi ned to the device on the network whose e8istence in the network remains for a lon er duration. $hese static IP addresses are semiBpermanent IP addresses which remain allocated to a specific device for lon er time e. . 2erver.
MAC Addressing
M*C address is a hardware address that is embedded in the /IC card. It is also known as hardware address or physical address. Every /IC card has a uni"ue M*C address
assi ned by IEEE. M*C address is used to identify the nodes at lower levels of O2I model. $he M*C address operates at the data link layer of the O2I model. M*C address is a ') di it he8adecimal number <,3 bit address=. It is made up of numbers from 6B4 or a letter from *B&. M*C address can be written in any one of the formatsC G G MMCMMCMMC22C22C22 MMCMMCMMC22C22C22
NETWORKING MEDIA
$o do networkin we need to use some type of media. $here are many types of media. <i= <ii= <iii= <iv= <iv= Coa8ial Cable &iber optic cable $wisted Pair of Cables MicroB wave 2atellite
Co(+i(l C(,le Coa8ial cable consists of an insulated copper conductor surrounded by a tube shaped copper braid outer copper tune and the inner conductor have the same a8is of curvature hence it called coa8ial cable. It is basically of two typesC <i= <ii= 9ase 9and Cable <7H ? -4= 9road 9and Cable <7H ? -3=
>e used 9ase 9and si nal cable in /etworkin of Computers, It is so called because it carries sin le fre"uency. Its speed is '6 Mbps and impedance is -6 I. >here as 9road 9and Cables carries multiple fre"uencies. Connector used for Coa8ial cable is 9/C<9ritish /ovel Connector= connector. *7Cnet uses 7HB.) coa8ial cable. It has an
impedance of 4+ I and has a comparatively lesser attenuation, hence yield distances. $hese cables are e8pensive and provide hi h propa ation factor.
reater
-i,er O&tic(l C(,le &iber optic cable consists of a very fine fiber made from two types of lass, one for the inner core and the other for the outer layer. !ere si nal is transmitted in the form of li ht. 1ifferent varieties of fiber optics is used dependin on the si#e of the network. 2in le mode fiber optics is used for networks spannin lon er distance. &iber Optics has lower propa ation factor than coa8ial cable. It is a costly but more secure transmission media. Twisted %(ir C(,le $here are two wires, which are twisted with each other to avoid EMI <Electro Ma netic Induction=.these cables are easy to terminate. !owever they have a sli htly hi her value of attenuation value and hence have limited distance coverin capacity. Connector used for $wisted Pair of Cable is <7e istered %ack= 7%B,- and 7%B''. $here are two types of twisted pair of cablesC 2$P <2hielded $wisted Pair=. In this an e8tra wire which is called shielded wire is wrapped over the inner cover which holds copper in pairs. $his protection is used to protect si nal from e8ternal noise. :$P <:nshielded $wisted Pair= In this type of wire no shielded cover is there for e8tra protection from noise. $here are different cate ories of :$P cablesC
Et/ernet C(,ling
$here are three types of Ethernet cablesC 2trai ht cable
Str(ig/t c(,le
It is used when we have to connect PC $O 2witch PC to !ub !ub to 7outer 2witch to 7outer
Crosso$er C(,le
It is used when we have to connectC PC to PC !ub to !ub 2witch to switch 7outer to 7outer PC to 7outer !ub to 2witch
Rollo$er C(,le
7ollover cable isn@t used to connect any Ethernet connections to ether, but 7ollover cable can be used to connect a host to a router console serial communication <com= port. /O$EC 2trai ht cable and Cross cables are used for data transfer but 7ollover cables are not used for data transfer. $here are two methods for manufacturin 7ollover cablesC
DNS SER0ER
1/2 stands for domain name system. 1/2 system is a standard technolo y for mana in the names of websites and other internet domains. 1/2 techni"ues allows you to type names into your web browser like computer networkin , about computer and allow your computer to automatically find that address on internet. 1/2 is the resolution mechanism used by >indow 2erver )66+ clients to find other computers and services runnin on those computers for computers in a window )66+ network infrastructure to talk to one another, one of the key in redients is the 1/2 server .!ost name alone do not communicate lobally but communicate locally, but if domain name is added alon with it then the host name can communicate lobally. 1/2 is use for name reservation i.e. to convert IP address to host name and host name to IP address or the function of 1/2 is to resolve host name such as www.yahoo.com to an IP address. :ser identify only user friendly name and all computers and technolo ies identify IP address and M*C address 1/2 is use to solve this problem because 1/2 is used to convert host name &J1/ <fully "ualified domain name= to IP address and IP address to host name .
)OST NAME
!ost name is a computer name and is also called is /et9IO2 <network basic InputD output system= name. /et9IO2 is actually an application layer protocol that can use the transport services of $CPD IP when used in routed network. * /et9IO2 name is '.B byte addresses that identify a /et9IO2 resource on the network.
DOMAIN NAME
1omain name is used to identifies the internet site one can identifies the location without havin to remember the IP address of every location e. . yahoo.com or mail.com
Do'(in N('es&(ce
1/2 operates in what is known as 1/2 namespace. $he 1/2 namespace is an or ani#ed, hierarchical division of 1/2 names. 1omain namespace enable users to easily locate the network services and resources. $he domain namespace include the root domain, the top level domain of the or ani#ation and or ani#e these domain in a hierarchical tree structure. /amespace works on the hierarchical tree structure of root domain. $here are total '+ root domain workin in the internet, they are *, 9, C, 1, E, &, H, !, I, %, F, ; and M. $here is one root domain, which acts as the startin point of the fully "ualified domain names. $his root domain is desi nated with a dot <.=. &i ..) shows the tree structure or domain namespace.
Tree structure or Do'(in N('es&(ce DNS ser$er *ny computer providin domain namespace is a 1/2 server. 1/2 server is used to convert host name &J1/ into IP address and IP address into host name &J1/. $o store the nameBtoBIPBaddresses mappin s so crucial to network communication, name server uses #one files.
DNS 2one
Kone is the part of 1/2 database that contain record of domain or multiple domain. If the domains represents lo ical division of the 1/2 namespace, #ones represents the physical separation of the 1/2 namespace. In other words information about records of the resources within 1/2 domain is stored in a #one files, and this #one files e8ist on hard drive of server. Kone files are divided into one of two basic typesC
-orw(rd looku& 3one. Provides hostBnameBtoBIPBaddress resolution Re$erse looku& 3one. Provides IPBaddressBtoBhostBname resolution
C/*ME can be used to assi n multiple names of a sin le IP address. &or e8ample, the server hostin the site www.abc.com is probably not named www, but a C/*ME record e8ist resolution of www to an IP address all the same. $he C/*ME record actually points not to an IP address, but to an e8istin * record in the #one.
D)C% 2E75E7
1!CP <1ynamic !ost Confi uration Protocol= is a protocol that allocates IP address to computer on a network. 1!CP centrali#ed the mana ement of IP address allocation and reduces human error associated with manual IP confi uration. 1!CP server supplies all the necessary networkin parameters. $wo thin s are always handed out as a part of 1!CP confi urationC IP address and subnet mask. &urther 1!CP will fre"uently confi ure clients with optional values, such as a default ateway, 1/2 server address, and the address of a >indow Internet /amin 2erver, if one is present. 2cenario showin 1!CP server IP addresses allocation.
D)C% Sco&e
In multinet confi uration, 1!CP super scope can be used to roup and activate individual scope ran es of IP addresses used on your network. In this way , a 1!CP server computer can activate and provide leases from more than one scope to clients on a sin le physical network.
E+clusion I% r(nge If you want to reserve some IP for any computer i.e. if we want that from the series of '4).'.3.6.) to '4).'.3.6.'66 if we want that a series of IP addresses must not be assi ned automatically then at can be done usin e8clusive IP ran e. I% Reser$(tion $here are some 1!CP clients that you want to be the 1!CP clients, but you will also want to make sure that they et same IP address every time. $his can be done by statically fillin the IP address. >e can reserve IP address with the help of M*C address for a particular computer.
:sin 5P/ server we can connect many private networks to internet services i.e the remote connection. >e can create a private network throu h public network, we can use firewall for security and data encryption in 5P/ server.
0%N co'&onents
<i= <ii= <iii= <iv= 0%N Ser$er 5P/ server, serve as the end points of a 5P/ connection. >hen confi urin a 5P/ server, you can allow access to just that server, or pass traffic throu h 5P/ server so that the remote user ain access the resources of the entire network. 0%N Client 5P/ clients establish connection to 5P/ server. $hey can also be routers that obtain the routerBtoBrouter secure connection. 5P/ client software is included in all the modern window operatin systems, includin >indow )66+ server. 7outerBto router 5P/ connection can be made from computers runnin server)66+ and >indows )666 runnin 7outin and 7emote *ccess. *dditionally, any client that support PP$P or ;)$P connections can be 5P/ clients of a window server )66+ system. 5P/ server 5P/ Clients >*/ Option 2ecurity Options
WAN O&tions $hese provide the physical mechanism for passin data back and forth. $hese connections typically include such similar network technolo ies such as $'or frame relay. In order for 5P/ connections to be successful, the 5P/ client and 5P/ server must be connected to each other usin either permanent >*/ connection or by dialin into an internet server provider <I2P=. Securit* O&tions 2ince a 5P/ uses a network that is enerally open to the public, it is important that the data passed over the connection remain secure. $o aid with secure communication routin and remote access supports such security measure as lo on and domain security, data encryption, smart cards, IP packet filterin and caller I1.
T*&es o 0%N
<i= <ii= PP$P <Point to Point $unnelin Protocol = ;)$P <;ayer ) $unnelin Protocol= accordin to CC/*.
%oint to %oint Tunneling %rotocol !%%T%" PP$P is Microsoft@s le acy protocol for supportin 5P/. It was developed in conjunction with other communications companies such as 7obotics as an e8tension to the PPP protocol. PP$P encapsulates IP or IPA packets inside of PPP data ram@s. $his means that you can remotely run pro rams that are dependent upon particular network protocols. One of the keys to remember about PP$P is that the protocol provides encryption capabilities, makin networks. L(*er Two Tunneling %rotocol !L5T%" ;)$P is a standard based encapsulation protocol with rou hly the same functionality as a PointBtoBPoint $unnelin Protocol <PP$P=. One of the key differences between >indow@s server )66+ implementation of ;)$Pand it cousin PP$P is that it much safer to send information over nonsecure
;)$Pis desi ned to run natively over IP networks only. $his implementation of ;)$P does not support native tunnelin over A.)-, frame relay, or *$M networks. ;ike PP$P, ;)$Pencapsulates PointBtoBPoint Protocol <PPP= frames, which then encapsulate IP or IPA protocols, allowin users to remotely run pro rams that are dependent on specific network protocols . 9ut unlike the PP$P protocol, ;)$P does not provide encryption of the data. &or data security ;)$Prelies on the services of another standardsB based protocol, IP2ec.
RO4TING
It is a process of transferrin information throu h an inter network i.e from one network to another. 7outin connect different networks havin I1 help in process of routin . $he dialBin properties also allow for specific IP address to be assi ned to a user. $his is the only way in >indow 2erver )66+ that you can assi n a specific IP to a user. $o assi n a specific IP to a user, check the bo8 ne8t to assi n * 2tatic IP *ddress and enter a valid IP in the space provided. 2tatic routin can also be specified as per user. 9y definin static routes, users can be limited to only specific parts of networks. In an internetwork a router must then about all the networks present in the for effort websites, there are hardware routers like CI2CO. Even win )66+ server computer confi ured as router. In simple words 7outer is a computer with two network cards. $hese two network cards, then, are attached to two different lo ical IP networks. $he routin table helps direct traffic that is passed throu h the router. /ow when there is a router, also there is a routin table, there is a need to confi ure the router in order for that router to pass alon traffic to the proper network. $here are two ways the routin table can be built and modifiedC either manually or automatically.
67879
T*&es o Routing
<i= <ii= 2tatic 7outin 1ynamic 7outin
St(tic Routing
In this routin information re"uired for routin is manually entered into the router by administrator.
Enable ;*/ routin Interface >*/ IP '0).'-.6.6 2/M )--.)--.6.6 H> )6.6.6.)
enable ;*/ routin Interface >*/ '6.6.6.6 IP '6.6.6.6 2/M )--.6.6.6 H> )6.6.6.' -ig 9; . scen(rio or LAN routing
sameC information about connection to other networks is shared from one router to another. It offers several advanta es over 7IP, especially si nificant in lar e networksC
E?C)ANGE SER0ER
E8chan e server is a mail server, we can send and receive mail from one user to another user. E8chan e server is the mail server of Microsoft.
E+c/(nge 0ersion
$able '6C E8chan e 2erver with different operatin systems >here 2P stands for 2ervice Pack. 2ervice Pack are the services which are loaded e8ternally to remove some bu s that come durin installation of server C1.
)(rdw(re Re@uire'ents
ProcessorC min. '++M!# 7ec. 0++M!# 7*MC min. )-.M9 7ec. -')M9
Ot/er Re@uire'ents
O2C )k or )k+ 2erver /$&2 partition 2tatic IP address *ctive 1irectory 1/2 installation with *1 #one II2 installed with *2P.net, 2M$P, //$P and www service
$his layer initiate, maintain and terminate sessions between different applications. 1ue to this layer multiple application software can be e8ecuted at the same time. Tr(ns&ort L(*er $ransport layer is responsible for connection oriented and connection less communication. $ransport layer also performs other functions like <i= <ii= Error checkin &low Control 9ufferin >indowin Multiple8in <iii= <iv= <v= <vi= Network L(*er $his layer performs function like lo ical addressin determination. Each networkin and path device has a physical address that is M*C 2e"uencin Positive *cknowled ement 7esponse
address. 9ut lo ical addressin is easier to communicate on lar e si#e network. ;o ical addressin defines network address and host address. $his type of addressin is used to simplify implementation of lar e network. 2ome e8amples of lo ical addressin areC B IP addresses, IPA addresses etc. /etwork layer has different routin protocols like 7IP, EIH7P, 9HP, and *7P etc. to perform the path determination for different routin fra mentation and protocol identification. D(t( Link L(*er $he functions of 1ata ;ink layer are divided into two sub layers ;o ical ;ink Control Media *ccess Control protocol. /etwork layer also perform other responsibilities like definin "uality of service,
<i=
;o ical ;ink Control defines the encapsulation that will be used by the /IC to delivered data to destination. 2ome e8amples of ;o ical ;ink Control are *7P* <Ethernet=, 36).'' wiBfi.
<ii=
Media *ccess Control defines methods to access the shared media and establish the identity with the help of M*C address. 2ome e8amples of Media *ccess Control are C2M*DC1, $oken Passin .
%/*sic(l L(*er Physical ;ayer is responsible to communicate bits over the media this layer deals with the standard defined for media and si nals. $his layer may also perform modulation and demodulation as re"uired.
RO4TERS
Router Arc/itecture (nd its Ke* Co'&onent
Processor IDO Controller Memory Controller 9IO2 7OM Incomplete IO2 /57*M 7*M
*:I ? *ttachment :nit Interface EP*9A ? Electronic Private *utomatic 9ranch P2$/ ? Public 2ervices $elephone /etwork
Mo*es o, Router
>hen we access router command prompt the router will display different modes. *ccordin to the modes, privile es and ri hts are assi ned to the user.
4ser 'ode
RouterC In this mode, we can display basic parameter and status of the router we can test connectivity and perform telnet to other devices. In this mode we are not able to chan e and save router confi uration.
%ri$ileged 'ode
RouterD In this mode, we can display all information, confi uration, perform administration task, debu in , testin and connectivity with other devices. >e are not able to perform here confi uration editin of the router.
$he command to enter in this mode is Lenable@. >e have to enter enable password or enable secret password to enter in this mode. Enable secret has more priority than enable password. If both passwords are confi ured then only enable secret will work.
Con,iguring /-sswor*
$here are five types of password available in a router
Console %(ssword
routerQconfi ure terminal router<confi =Qline console 6 router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it $o erase password do all steps with no command.
0t* %(ssword
routerNenable routerQconfi ure terminal router<confi =Qline vty 6 , router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it
Au+ili(r* %(ssword
routerQconfi ure terminal router<confi =Qline *u8 6 router<confi Bline=Qpassword MwordN router<confi Bline=Qlo in router<confi Bline=Qe8it
En(,le %(ssword
routerNenable routerQconfi ure terminal router<confi =Qenable password MwordN router<confi =Qe8it
M-n-ging Con,igur-tion
$here are two types of confi uration present in a router <i= <ii= 2tartup Confi uration 7unnin Confi uration
2tartup confi uration is stored in the /57*M. 2tartup confi uration is used to save settin s in a router. 2tartup confi uration is loaded at the time of bootin in to the Primary 7*M. 7unnin Confi uration is present in the Primary 7*M wherever we run a command for confi uration, this command is written in the runnin confi uration.
Con,igur-tion Inter,-ces
Interfaces confi uration is one of the most important part of the router confi uration. 9y default, all interfaces of Cisco router are in disabled mode. >e have to use different commands as our re"uirement to enable and confi ure the interface.
7outerQconfi ure terminal 7outer<confi =Qinterface MtypeN MnoN 7outer<confi Bif=Qip address MipN MmaskN 7outer<confi Bif=Qno shutdown 7outer<confi Bif=Qe8it
7outer<confi Bif=Qend
7outer does not have battery to save the clock settin . 2o that clock will reset to the
To dis&l(* clock
7outerQshow clock
7outer<confi =Qntp server MIP addressN 7outer<confi =Qe8it CCRNpin pool.ntp.or $o et ntp server ip from internet CCRNroute print
RO4TING
7outin is a process or techni"ue to identify the path from one network to another. 7outers don@t really care about hostsSthey only care about networks and the best path to each network. $o route the packet the router must know the followin thin sC 1estination network /ei hbour device from witch it can learn about remote /etworkin . Possible number of routers to reach the destination. 9est route to reach the destination. !ow to maintain T verify the routin information.
T1%ES O- RO4TING
2tatic routin . 1efault routin . 1ynamic routin .
STATIC RO4TING
In static routin an administrator specifies all the routes to reach the destination. 2tatic routin occurs when you manually add routes in each router@s routin table.9y default, 2tatic routes have an *dministrative 1istance <*1= of '
&eatures
$here is no overhead on the router CP:. $here is no bandwidth usa e between routers. It adds security, because the administrator can choose to allow routin access to certain networks only.
D1NAMIC RO4TING
1ynamic routin is when protocols are used to find networks and update routin table on routers. * routin protocol defines the set of rules used by router when it communicates routin information between nei hbor routers. In dynamic routin , we will enable a routin protocol on router. $his protocol will send its routin information to the nei hbor router. $he nei hbors will analy#e the information and write new routes to the routin table. $he routers will pass routin information receive from one router to other router also. If there is more than one path available then routes are compared and best path is selected. 2ome e8amples of dynamic protocol areC B 7IP, IH7P, EIH7P, O2P& $here are two type of routin protocols used in internetworksC
autonomous system is known as interior routin . $he protocol that are used to perform this type of routin are known as IHP<Interior Hateway Protocol=. $hese protocols areCB
7IPv' <7outin Information Protocol 5ersion '= 7IPv) <7outin Information Protocol 5ersion )= EIH7P <Enhanced Interior Hateway 7outin Protocol= O2P& <Open 2hortest Path &irst= I2BI2 <Intermediate 2ystem to Intermediate 2ystem=
Ad'inistr(ti$e Dist(nces $he *dministrative 1istance <*1= is used to rate the trustworthiness of routin
information received on a router from a nei hbor router. *n *dministrative 1istance is an inte er from 6 to )--, where 6 is the most trusted and )-- means no traffic will be passed via this route. If a router receives two updates listin he sane remote network, the first thin the router checks is the *1. If one of the advertised routes has lower *1 than the other, then the route with the lowest *1 will be placed in the routin table. If both advertised routes to the same network have the same *1, then routin protocol metrics <such as hop count or bandwidth of the lines= will be used to find the best path to the remote network. $he *dvertised route with the lowest metric will be placed in the routin table. 9ut if both advertised routes have the same *1 as well as the same metrics, then the routin protocol will loadBbalance in the remote network.
Route Source Connected interface 2tatic 7oute EIH7P IH7P O2P& 7IP E8ternal EIH7P :nknown )--
De (ult AD 6 ' 46 '66 ''6 ')6 '06 $his route will never be used
reachin them from the perspective of the advertin router. EIH7P has a ma8imum hop count of )--.
Bro(dc(st !'ultiE(ccess" 9roadcast <multiBaccess= networks such as Ethernet allow multiple devices to connect to <or access= the same network, as well as provide a broadcast ability in which a sin le packet is delivered to all nodes on the network. In O2P&, a 17 and a 917 must be elected for each broadcast multiBaccess network. NonE,ro(dc(st 'ultiE(ccess /onB9roadcast MultiB*ccess </9M*= networks are types such as &rame 7elay, A.)-, and *synchronous $ransfer Mode <*$M=. $hese networks allow for multiBaccess, but have no broadcast ability like Ethernet. 2o, /9M* networks re"uire special O2P& confi uration to function properly and nei hbor relationships must be defined. %ointEtoE&oint PointBtoBpoint refers to a type of network topolo y consistin of a direct
connection between two routers that provides a sin le communication path. $he pointBtoB
point connection can be physical, as in a serial cable directly connectin two routers, or it can be lo ical. %ointEtoE'ulti&oint PointBtoBmultipoint refers to a type of network topolo y consistin of a series of connections between a sin le interface on one router and multiple destination routers. *ll of the interfaces on all of the routers sharin the pointBtoBmultipoint connection belon to the same network. *s with pointBtoBpoint, no 17s or 917s are needed.
CONCL4SION
Computer /etworkin is a very vast project in the present developin era of electronics and communication. /ow a days, computers are used in a wider ran e. *ll the or ani#ations are usin multiple computers within their departments to perform their day to day work. Computer network allows the user to share data, share folders and files with other users connected in a network. Computer /etworkin has bound the world in a very small area with it wide networkin processes like ;*/, M*/, >*/.
A&&lic(tions
Communication &ield Industries Medical &ield 7esearch &ield
RE-RENCES
www. oole.com www.microsoft.com www.nythimes.com www.di itechBen ineers.com /etwork Essentials module ,BinB' MC2E study material Introduction to >indow 2erver)66+ CI2CO Cretified /etwork *ssociate &aruk !usain