StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Networks Tolerance Fault and Basic Router Commands - Essay Example

Cite this document
Summary
Generally speaking, the paper "Networks Tolerance Fault and Basic Router Commands" tries to analyze the network’s fault tolerance, the cabling, and how to configure the basic router commands and the basic router configuration in a networking environment…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Networks Tolerance Fault and Basic Router Commands
Read Text Preview

Extract of sample "Networks Tolerance Fault and Basic Router Commands"

Network’s Tolerance Fault Introduction In the world of today, networking or linking of different computing devices in order for them to share data has become the convenient way to people who want to share their files or send their e-mails from different parts of the country. Most networks are built hand in hand with both the computer hardware and computer software (Cook, 2003, p103). This paper tries to analyze the network’s fault tolerance, the cabling and how to configure the basic router commands and the basic router configuration in a networking environment. Portfolio 2 Activity 1 - Addressing Scheme (The packet tracer) No Subnet First host Last host Broadcast Subnet mask 1 192.168.10.32 192.168.10.33 192.168.10.62 192.168.10.63 255.255.2555.224 2 192.168.10.64 192.168.10.65 192.168.10.94 192.168.10.95 /27 3 192.168.10.96 192.168.10.97 192.168.10.126 192.168.10.127 255.255.2555.224 4 192.168.10.128 192.168.10.129 192.168.10.158 192.168.10.159 255.255.2555.224 5 192.168.10.160 192.168.10.161 192.168.10.190 192.168.10.191 255.255.2555.224 6 192.168.10.192 192.168.10.193 192.168.10.253 192.168.10.254 255.255.2555.224 Activity 2 – Cabling The link between the two routers (Vetinary and Rincewind) is a serial cable – one side has to be the DCE, meaning that it will provide the clock rate. Connect the DCE side (should be labelled as such) to Rincewind. Routers are specialised computers and as such, a crossover cable must be used for a direct computer to router connection (such as the one between Host 2 and Rincewind). Activity 3 - Basic router commands Command Function 1 logout Exit from the EXEC 2 ping Send echo messages 3 resume Resume an active network connection 4 show Show running system information 5 ssh Open a secure shell client connection 6 telnet Open a telnet connection 7 terminal Set terminal line parameters 8 traceroute Trace route to destination Activity 4 - Basic router configuration In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #. This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name.. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure. Portfolio 3 Activity 1 - Addressing Scheme Subnet First host Last host Broadcast Mask Router link 192.168.42.24 192.168.42.25 192.168.42.49 192.168.42.50 255.255.255.224 Officers 192.168.42.30 192.168.42.31 192.168.42.61 192.168.42.62 255.255.255.224 Canaries 192.168.42.50 192.168.42.51 192.168.42.101 192.168.42.102 255.255.255.224 Scavengers 192.168.42.70 192.168.42.71 192.168.42.141 192.168.42.142 255.255.255.224 Activity 2 – Basic configuration In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #. This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name.. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure. Basic router commands Command Function 1 logout Exit from the EXEC 2 ping Send echo messages 3 resume Resume an active network connection 4 show Show running system information 5 ssh Open a secure shell client connection 6 telnet Open a telnet connection 7 terminal Set terminal line parameters 8 traceroute Trace route to destination Portfolio 3 Router Operation Diagram A diagram showing the relationship between the different modes of operations that was used in the course of the labs How to improve the network’s fault tolerance A network’s fault tolerance is the setup of networks or configurations that helps to prevent the computer or may be the network devices from either failing whenever it was least expected or fails when an unexpected error or problems occurred. The user can make the computer more fault tolerant by a way of thinking how the computer or the devices of the network may seems to fail as well as, taking the required steps so that the faults can be prevented whenever they occur. For this case, the steps to be followed when improving the network’s fault tolerance, and they include. Power Failure The user should by all the time have his or her computer or the networks running on the Uninterruptible Power Supply (UPS). UPS provides the backup power source when there is a power outage (blackout), or a power surge. UPS provides additional time for the computer to shut down by providing the power to the computer from where it was stored. However, the user should also have the system messages that are sent to every network so as to let the administrators know when the power goes off or when computer shut down because of the failure of the power (Beasley, 2009, p 104). Power surge If there is no UPS which is connected on the computer or the UPS fails to provide the surge fortification, the surge protector may be connected to the network devices or the computer so as to help prevent those devices fro failing during the power surge. Data loss The user should all the time run backups on the computer. Running of the backups may be done daily or at least every month if only the relevant information is stored in them. The user should make sure that he/she creates a mirror of data on the alternate location. Device/Computer failure There should be other devices a part from the ones which are used daily. The computer devices which are available when there are failures can help in preventing the long down time. Unauthorized access When the computer devices are connected to the network, the user should make sure that the firewall are set up. A firewall is normally the software utility that can limit the accessing of the network on the computer by blocking or restricting the ports. Firewalls are extremely significant since it helps preventing un-authorized members from accessing to the company network or a network which is at home. There should be a frequently checking for the updates for the operating system of the computer. Use of passwords as well as, lock devices always protect the computers when they are not in use, and it also stores the computer and the network devices in the secure areas where they can be locked. Overload The user should make sure that there are some alternate computer or network devices which are setup, and can be used as an alternative access point, in addition to sharing the load, through the setup of the round robin Virus Make sure the viruses are updated daily. Viruses are extremely dangerous to the computers because they sometimes can make the whole computer crash down or slows the speed to which the computer performs. Fault Tolerant is essential in providing high levels of availability furthermore reliability in a connected network. When it is used with a network interface hardware which is redundant, Fault Tolerant may allow the user in maintaining the continual sessions when the hardware fails or change. The network interface hardware, which is redundant, may be required to use the feature. Reflection of what I have learned from the exercised carried out in the lab From the exercises that I have carried out in the lab I have learned a lot of things. The many things that I have learned some of them include; how I can address the schemes by calculating the subnet masks when I am provided by the subnet Internet Protocol (IP) address, how I can cable using the routers as well as, the hubs, some of the basic router commands, and the basic router configuration using router names and interfaces. It sometimes becomes easier to calculate the first and the second host when one is given the IP address to what should be located. The bits of every mask are denoted by zero and ones since the data is transferred into binary forms of bits (Elahi & Elahi, 2006, p 206). For the case, of cabling, here is what I learned from the example given in portfolio two of the addressing scheme exercise; the link between the two routers (Vetinary and Rincewind) is a serial cable – one side has to be the DCE, meaning that it will provide the clock rate. Connect the DCE side (should be labelled as such) to Rincewind. Routers are specialised computers, and as such, a crossover cable must be used for a direct computer to router connection (such as the one between Host 2 and Rincewind). I cannot forget learning about the basic router commands and the basic router configurations. The basic router commands where some commands like the telnet functions in opening the telnet connection, the” ssh” command, its function is to open the secure shell client connection, and the terminal command functions as it sets the terminal line parameters. There are many more commands that i learned during the group work. However, in regard to the basic router configuration, I also gained some knowledge. This was particularly much interesting in that I started liking or becoming so much interested with the networking part of the practical that was being done in the lab. This is what I learned; In order to configure routers one needs to be in the router global configuration mode. For this case, the prompt is normally written as Router (config) #. This can be achieved by typing “enable” to get into privilege mode, and then typing “configure terminal” to enter the global configuration mode. However, when one needs to move back to the previous mode, he/she can be achieved by typing exit. The router names should always be configured first as they can be achieved by using the hostname command which is Router (config) # hostname name. Where name is the name of the device Vetinary or Rincewind depending on which router one is configuring. The interfaces should be the next to be configured. This can be accomplished by entering interface configuration mode and using the “IP address” command followed by the address and subnet mask that one wishes to configure. Conclusion The paper analyzed different network fault tolerance that normally occurs and how they can be improved. The paper also analyzed some of the basic router configurations and commands. List of References Barnett, D., Groth, D., & McBee, J. (2004), cabling the complete guide to network wiring (3rd Ed.). New York: Sybex. Beasley, J. S. (2009), Networking (2nd ed.). London: Prentice Hall. Cook, J. (2003), Networking. London: IBM International Technical Support Organization. Elahi, A., & Elahi, M. (2006). Data, network, and Internet communications technology. London: Thomson Delmar Learning. Espejo, R. (2008), should social networking web sites be banned. New York: Greenhaven Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networking Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/systems-science/1396446-networking
(Networking Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/systems-science/1396446-networking.
“Networking Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/systems-science/1396446-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networks Tolerance Fault and Basic Router Commands

Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc Networks

MANET is defined as 'Mobile Ad Hoc Network (MANET) refers to a type of mobile network in which each node has the ability to act as a router, permitting adaptable multi-hop communications' [3].... However, AODV does not maintain the database for routing information in the router.... Table-driven protocols attempt to synchronize routing information with the routing table for each wireless router.... This term paper "Impact of Mobility on Enactment of Routing Protocols Associated with Ad Hoc networks" discusses the details associated with attacks incorporated with AODV....
35 Pages (8750 words) Term Paper

Project Paper: How to Use Linux Operating Systems as a Network Security Device or Component

Security has evolved as the basic requirement for overcoming the challenges of inherent insecurity owned by global networking infrastructure (Anitha, 2011).... There are large and small networks that allow people to retrieve and distribute information across the network.... Linux with its exceptional features have been viewed as an appropriate option for securing networks (Burghate & Mookhey, 2005).... This essay stresses that the growing network traffic and the increasing threat from intruders' ability to gain unauthorized access to information travelling over the network and potential threat of malicious substances have swayed the immediate attention of the concerned entities to secure their networks against such attacks....
11 Pages (2750 words) Essay

Aircraft fuel system

Supervisory engine management was developed along with the advent of computer technology with a view to reduce the cognitive load of pilots and to extend the engine life (Nagabhushana and Sudha 187).... A typical supervisory electronic engine control (EEC) unit consists of a.... ... ... er which obtains information on the various engine operating parameters and acts upon a hydro-mechanical fuel control system within a limited authority whereby limiting actions, such as TGT limiting, torque limiting in turboprop engines and combustor pressure limiting during The most optimum engine operation can be realized by supervisory engine management since it enables the pilot to select the most appropriate thrust setting quickly and accurately....
7 Pages (1750 words) Coursework

Local Area Networking Technology - Primary School

From the paper "Local Area Networking Technology - Primary School" it is clear that regarding security effectiveness, the security for files, programs and private information will be highly guaranteed using LAN technology as compared to using external hardware devices.... ... ... ... Programs as maintained up to date thus ensure that viruses' infections and hacking threats are eliminated....
16 Pages (4000 words) Coursework

Server Virtualization

In theory, the virtualizer may be co-located with the clients or the servers, but the natural location of the virtualizer is in the network on a programmable router, located along the network path between client and server.... In most computer networks, the clients and servers are not directly connected, but the messages between them are routed through a series of network routers or switches....
9 Pages (2250 words) Term Paper

Network and Communication Security Protocols

The plastic fan plant in China is also equipped with T1 that is terminating directly on the router.... The connection is terminating on an external CSU / DSU with a router on the backbone.... This research paper "Network and Communication Security Protocols" focuses on potential and advanced persistent threats along with their impact on different governmental sectors of the country....
31 Pages (7750 words) Research Paper

Statutory Interpretation and Alternative Dispute Resolution

"Statutory Interpretation and Alternative Dispute Resolution" paper examines the history of the internet and the rise of internet usage over the last 20 years and explains how the internet differs from traditional media in allowing subordinate groups that are not traditionally heard to be heard.... ....
14 Pages (3500 words) Assignment

The Network Requirement Analysis for Epping Hospital

The most advanced concept of a virtual operating theatre is based on two basic principles, namely simulation and virtual operations (BROWN, 2012).... .... ... ... The paper 'Virtual Operating Theatre Simulations - the Network Requirement Analysis for Epping Hospital' is an actual variant of case study on health sciences & medicine....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us