2. RCS Global Limited is an emerging in software
business solution & IT infrastructure. With the motto
of “Provide Quality Solution at the Right Price at the
Right time”.
The company is redefining the concepts of IT
services and consulting.
RCS Global is the sister concern of ‘RAMA Group’
founded in 1992.
3. Product Realization - Excellent team work & services.
Business Process Consulting – Total satisfaction of client.
IT Implementation – Focus on core business.
Database Design – Store huge DB i.e. secure & robust.
Business Intelligent – Expertise Troubleshoot.
Offshore Development Centre – preparing efficient &
. reliable team.
6. Straight Cable- Switch to router
Switch to PC or server
Hub to PC or server
Cross Cable- Switch to switch
Switch to hub
Hub to hub
Router to router
PC to PC
Router to PC
7. IP is an address of a Computer on a network.
task of delivering datagrams from the source host to the destination host
solely based on the addresses.
Two IP version-IPv4 and IPv6
IPv4(Internet Protocol version 4)for 32 bits
IPv6(Internet Protocol version6)for 128 bits
Type of IP Address
Static IP Address (Automatically assign)
Dynamic IP Address (Manually assign)
8. There are five classes available in IP range
Class A- 1.0.0.1 to 126.255.255.254
Class B- 128.1.0.1 to 191.255.255.254
Class C- 192.1.0.1 to 223.255.255.254
Class D- 224.1.0.1 to 239.255.255.254
Class E- 240.1.0.1 to 254.255.255.254
Range 127.0.0.1 is reserved for loopback
9. Class A- assign large number of hosts
Class B- assign large to medium network
Class C- used in small LAN configuration
Class D- reserved for multicasting purposes
Class E- for research and developing centre
10.
11. With the rapid growth of the internet & the ever-
increasing demand for new addresses, the standard
address class structure has been expanded by
borrowing bits from the Host portion to allow for
more Networks.
There are default standard subnet masks for Class A,
B and C addresses:
12. The PING (Packet Internet Groper) command
verifies OSI Layer 3 (Network Layer) connectivity.
The subnet mask is the same for all users on a
specific network.
Internet routing devices traditionally have been called
gateways
A network gateway is an internetworking system capable of joining
together two networks that use different base protocols.
13. A choke point of control and monitoring .
Interconnects networks with differing trust.
Imposes restrictions on network services.
only authorized traffic is allowed
Improve network security & reduce risks to hosts
14. Characterized by protocol level it controls in
Packet filtering (filter incoming & outgoing data)
Circuit gateways (large network filter)
Application gateways (Need separate proxies for each service)
Combination of above is dynamic packet filter
15. Internet communication is a accomplished by exchange
of individual ‘packets’ of data.
Each packet is transmitted by its source machine
toward its destination machine.
Connection is actually comprised
Of individual packets travelling
b/w two machine.
If ‘agree’ it means connect or it will
be resend back to the machine.
16.
17. Firewall cannot prevent Virus and Trojans
from the accessing the internet.
Mostly virus and trojan are received via e-mail
direct downloading ,etc
Firewall not really protect the system from hackers
(or any ultra surf)
Hard to upgrade
Take up physical space
18.
19.
20. Multi Protocol Label Switching is arranged between
Layer 2 and Layer 3
Versatile solution:-speed ,QOS ,traffic management
Security management.
21. Mechanisms to manage traffic flows of various
granularities (Flow Management)
Is independent of Layer-2 and Layer-3 protocols
Maps IP-addresses to fixed length labels
Supports ATM, Frame-Relay and Ethernet
23. • Short fixed length entity
20-bits label value
Each label head contain four fields
Label Format
24. • Resides at the edge of an MPLS network and assigns and
removes the labels from the packets.
• Support multiple ports connected to dissimilar networks (such as
frame relay, ATM, and Ethernet).
25. • Is a high speed router in the core on an MPLS network.
• ATM switches can be used as LSRs without changing their
hardware. Label switching is equivalent to VP/VC switching.
26.
27. • An application layer protocol for the distribution of label
binding information to LSRs.
• It is used to map FECs to labels, which, in turn, create LSPs.
• LDP sessions are established between LDP peers in the
MPLS network (not necessarily adjacent).
28. • In MPLS, traffic engineering is inherently provided using explicitly
routed paths.
• The LSPs are created independently, specifying different paths that
are based on user-defined policies. However, this may require
extensive operator intervention.
• RSVP-TE and CR-LDP are two possible approaches to supply
dynamic traffic engineering and QoS in MPLS.
29. • Improves packet-forwarding performance in the network
• Supports QoS and CoS for service differentiation
• Supports network scalability
• Integrates IP and ATM in the network
• Builds interoperable networks
30. Unknown knowledge of the technology
Miscommunication of networks still occur
Near replacement of MPLS technology has to be put
in place of old technology
Hardware problems
Better security needs to be implemented so hackers
cannot get into technology