CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
This ppt contains what is dhcp, it's need, advantages, disadvantages, IP address assignment process and types, DHCP architecture and lastly some differences.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
This ppt contains what is dhcp, it's need, advantages, disadvantages, IP address assignment process and types, DHCP architecture and lastly some differences.
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
The proclaim of this topic is to remind the Loopback addresses in networking. This presentation update the knowledge of network users including to testing the standalone machine (i.e. End user machine) and Network Layer devices (Such as Router , Switches).
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKINGMarvin Bronoso
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
After this learning module the learners will be able to . . .
○ Apply the DOS commands in computer networking
○ Check network connectivity using PING command.
○ Checking the default gateway and IP address
Konfigurasi Server Gateway dengan fitur PROXY, WEBSERVER dan DHCPWalid Umar
Panduan diatas dikhusukan untuk siswa dan guru TKJ yang hendak mempraktekkan tentang panduan untuk membangun sebuah server gateway dengan fitur proxy, webserver dan dhcp
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
1. The university of Faisalabad
Practical file of data communication and networks
Last Working of whole semester
Submitted by :
“Saad ur Rehman”
Submitted to :
“Mam Sana Hafeez”
Department :
“Computer science”
Reg. No:
“ BSCS-FA18-094”
2. LAB Manual #1
IP Config:
Displays all current TCP/IP network configuration values and
refreshes Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS) settings.
IP Config/all:
Displays all current TCP/IP network configuration values and
refreshes Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS) settings.
3. Ping <IP>:
The ping command is a Command Prompt command used to test the
ability of the source computer to reach a specified destination
computer. The ping command operates by sending Internet Control
Message Protocol (ICMP) Echo Request messages to the destination
computer and waiting for a response.
4. Arp -a:
Using the arp command allows you to display and modify the
Address Resolution Protocol (ARP) cache. Each time a computer's
TCP/IP stack uses ARP to determine the Media Access Control
(MAC) address for an IP address, it records the mapping in the ARP
cache so that future ARP lookups go faster.
Netstat-a:
The netstat command generates displays that show network status
and protocol statistics. You can display the status of TCP and UDP
endpoints in table format, routing table information, and interface
information.
7. Net View:
To view computers on your network: Open a command
prompt.
Tracert <hostname>:
Traceroute is a network diagnostic tool used to track in real-time
the pathway taken by a packet on an IP network from source to
destination, reporting the IP addresses of all the routers it pinged in
between. Traceroute also records the time taken for each hop the
packet makes during its route to the destination.
8. Netstat -r:
The network statistics ( netstat ) command is a networking
tool used for troubleshooting and configuration, that can also serve
as a monitoring tool for connections over the network.
Nslookup:
9. nslookup (from name server lookup) is a network
administration command-line tool for querying the Domain Name
System (DNS) to obtain domain name or IP address mapping, or
other DNS records.
Nbtstat -n:
Nbtstat is a Windows command-line tool that displays NetBIOS
over TCP/IP statistics.
LAB Manual #2
IP Addressing Scheme & VLSM
Task 1: For The IP address 192.168.0.1 find the network mask,
broadcast address number of hosts, IP address of first and last
host.
The network mask:
10. Netmask is 255.255.255.0 = 24
Broadcast address number of hosts:
Broadcast Address is 192.168.0.255
24 number of hosts in decimal
IP address of first and last host:
Network address will be 192.168.0.0
First IP address of network will be 192.168.0.1
Last IP address 192.168.15.254
Introduction to Subnetting
Task 1: For The following IPs find the first two and last two
Subnets and give their Pc range and Broadcast address.
1. 10.0.0.0 for 1025 subnets.
2. 212.31.30.0 for 21 subnets.
3. 190.38.0.0 for 645 subnets.
1:
10.0.0.0 for 1025 subnets
2^11=2048-2=2046 (valid host)
255.0.0.0
11111111.00000000.00000000.00000000
11111111.11111111.11100000.00000000
255.255.224.0
256-224=32 (intervals)
11. First two bits:
10.0.0.0=>10.0.31.255
10.0.32.0=>10.0.63.255
Last two bits:
10.255.255.255=>10.255.224.0
10.255.223.255=>10.255.192.0
Broadcast address:
10.255.255.255
2:
212.31.30.0 for 21 subnets
2^5=32-2=30(valid host)
255.255.255.0
11111111.11111111.11111111.00000000
11111111.11111111.11111111.11111000
255.255.255.248
256-248=8 (intervals)
First two bits:
212.31.30.0=>212.31.30.7
212.31.30.8=>212.31.30.15
212.31.30.16=>212.31.30.23
Last two bits:
212.31.30.240=>212.31.30.247
212.31.30.248=>212.31.30.255
12. Broadcast address:
212.255.255.255
3:
190.38.0.0 for 645 subnets
2^10=1024-2=1022(valid host)
255.255.0.0
11111111.11111111.00000000.00000000
11111111.11111111.11111111.11000000
255.255.255.192
256-192=64(intervals)
First two bits:
190.38.0.64=>190.38.0.127
190.38.0.128=>190.38.0.191
Last two bits:
190.38.255.192=>190.38.255.255
190.38.255.128=>190.38.255.191
Broadcast address:
190.255.255.255
13. Task2: Implement first two subnets created in Task (1-2) in
Packet Tracer
10.0.0.0:
212.31.30.0:
14. 190.38.0.0:
LAB Manual #3
Introduction to Networks and Networking Configuration
Given an IP address of 198.133.219.0/24, with 4 bits borrowed for
subnets, fill in the following
information in the table below.
(Hint: fill in the subnet number, then the host address. Address
information will be easy to compute with
the subnet number filled in first)
Maximum number of usable subnets: 15
15. Number of usable hosts per subnet: 16
IP Address: Subnet mask:
# Subnet First host
address
Last host
address
Broadcast
0 198.138.219.
0
198.138.219.
1
198.138.219.1
4
198.138.219.1
5
Task 1: Configure Cisco Router Global Configuration Settings.
Step 1: Physically connect devices.
Step 2: Connect host computer to router through
HyperTerminal.
16. Step 3: Configure global configuration hostname setting.
What two commands may be used to leave the privileged exec
mode? Enter or end command What shortcut command can be used
to enter the privileged exec mode? Enable
Examine the different configuration modes that can be entered with
the command configure? Write down the list of configuration modes
and description:
Modes of router –
17. user
execution
mode login router>
use logout
commnad
privilege
mode
use enable
command in
user mode router#
use disable
command to
enter user
mode
global
configuration
mode
use configure
terminal
command router(config)#
use exit
command to
enter into
privilege mode
Interface
mode
use interface
command and
specify an
interface in
global
configuration
mode
router(config-
if)#
use exit
command to
enter into
global
configuration
mode or use
end command
to enter into
privilege
mode.
ROMMON
mode
press
ctrl+break key
while boot
process or use
ROMMON 1>
use continue
command
19. Ctrl-Z, Ctrl-C, and the "end" and "exit" commands
What shortcut command can be used to enter the global
configuration mode?
To enter global configuration mode, enter the configure command.
Global configuration From privileged EXEC mode, enter the
configure command.
How can the hostname be removed?
You can only change hostname by command with the set-
hostname argument followed by the new hostname.
Step 4: Configure the MOTD banner.
Create a suitable MOTD banner. Only system administrators of the
ABC Company are authorized access, unauthorized access will be
prosecuted, and all connection information will be logged.
MOTD banner: When users connect to the router, the
"Message Of The Day (MOTD)" banner is presented.
Login banner: The login banner is displayed right before the
authentication prompt.
Exec banner: The Exec banner appears before the user sees
the exec prompt.
Incoming banner: These banners are displayed for users who
connect through reverse telnet.
20. Task 2: Configure Cisco router password access.
Step 1: Configure the privileged exec password.
Step 2: Configure the console password.
What is the command to remove the console password? No
Password
Step 3: Configure the virtual line password.
Issue the command exit. What is the router prompt? What is the
mode? Router1(config-line)# exit
21.
22. Task 3: Configure Cisco Router Interfaces.
Write down your subnet number and mask: 198.138.219.0
The first IP address will be used to configure the host computer
LAN. Write down the first IP Address: 198.138.219.1
The last IP address will be used to configure the router fa0/0
interface. Write down the last IP Address: 198.138.219.14
Step 1: Configure the router fa0/0 interface.
Write a short description for the connections on Router1: Fa0/0 ->
Step 2: Configure the router Fa0/1 interface.
Write a short description for the connections on Router1: Fa0/1 ->
23. Step 3: Configure the host computer.
IP Address: The first host address 198.168.1.1
Subnet Mask: The subnet mask 255.0.0.0
Default Gateway: Router’s IP Address 198.168.1.2
24. Step 4: Verify network connectivity.
Task 4: Save the Router Configuration File.