This website uses cookies to ensure you have the best experience. Learn more

Network Administration Essay

1394 words - 6 pages

a. It is advisable to use Link State Routing protocol when dealing with a big network of fifty (50) routers or more. Link state offers numerous advantages over its counterpart routing protocol as it has been modelled to overcome the shortcomings of the Distance-vector protocol.
JUSTIFICATION
• One of the modifications is that link-state multicasts routing updates to the network. By so doing, only routers that are affected by the change in the network topology will receive the update. It supports VLSM
• Convergence time of the network topology is reduced because of multicasting and flooding. Flooding is done only when there is a trigger in the network that will require an update to take ...view middle of the document...

Triggered updates reduce convergence time and allow the network to converge faster while periodic updates increase convergence time and the network takes a longer time to converge
• Due to the algorithm used for the Link State, the convergence time is much faster than in Distance Vector protocol. This is because each router computes its own cost to a particular destination. Distance Vector protocol the router does not have an entire view of the network, it relies on the distance of the destination network and direction of the packet to be forwarded
• Link State protocol only multicasts updates to the affected routers while the Distance Vector protocol broadcasts all updates within the network domain

b. Routing Information Protocol does not support VLSM. Instead it supports Classful Routing whereby the subnet mask is not included in the routing updates. This is because the mask can easily be identified by the number in the first octet of the IP address. For example an IP address of 10.0.0.1 can be easily identified as a Class A address because of the number 10 in the first octet that is used by Class A for private address.

To rectify this problem RIPv2 can be used. RIPv2 supports VLSM therefore subnets will be advertised in the routing updates and the routing table. Unlike RIPv1, version two multicasts update information instead of sending out broadcasts .RIPv2 is still suitable for a small network with only a few changes in the configurations. A few new commands are introduced to cater for VLSM; inclusion of the subnetted network address, disabled automatic summarization and static redistribution. The commands are as follows:

Router (config) # config t
Router (config) # router rip
Router (config) # version 2
Router (config) # network 10.0.0.0
Router (config) # network 172.16.0.0
Router (config) #passive-interface default
Router (config) #passive-interface s0/0/0
Router (config) # no auto-summary
Router (config) # redistribute static
Router (config) #end


TASK3

a. VLAN – a virtual LAN is a switched network that is a logically segmented network. Inter- VLAN communication takes place in machines that are within a single broadcast domain. The broadcast domain could be located anywhere within a building, it could be in different floors and the machines will still communicate with each other. The machines are not required to be in a single physical location. The broadcast domain machines need to share a similar subnet mask or be in the same subnet for communication to take place. The host computers are configured with an IP address and VLAN ID configurations. The VLAN ID sets the host computer to belong to that VLAN and therefore receive and send data within it. The default VLAN for all devices is VLAN 1. Different VLANs must be created apart from the default one. VLAN membership at the access layer can be achieved in to ways;

• Static-automatic VLAN connection when connected to particular port using port based membership. Manually...

Find Another Essay On network administration

Evolution of Government Essay

1517 words - 7 pages skills toward managing collaborative networks. Skills Necessary for Managing Public Administration Networks Unlike, traditional hierarchical government structures, the goal of network structures is to create opportunities and transform the existing structure to solve problems. Network structures use creative and innovative ideas to improve a situation and ultimately create positive change. Unlike public managers in traditional hierarchical

Network Administrator Essay

1025 words - 4 pages I have decided to pursue the career of a network system administrator or IT professional. Over the last ten years or so computers have become fundamental parts of everyday life, used for a variety of reasons at home, in the workplace, and at schools. Of course every computer user runs into obstacles from time to time, whether it is the blue screen of death, the forgotten password, or the loss of important data. The explosive use of computers has

Attitude and Perception of Selected De La Salle Lipa Marketing Students in Networking

953 words - 4 pages More than 73 years had passed when network marketing was originated and being discovered and has proved by the time being the home-based business opportunities and a successful distribution model. It is now being used by several groups of companies as their way to anyone who aims to have achievements by the future. It is not surprising that network marketing has reputed as the fastest growing industries of all time. It was truly a success and an

E. Miller floor Washington School TCS

2415 words - 10 pages prohibited on the administration LAN. Exceptions to this ACL can be made on an individual basis. Applications such as E-Mail and Directory services will be allowed to pass freely since they pose no risk. A user ID and Password Policy will be published and strictly enforced on all computers in the District. All computers in the District network will have full access to the Internet. All ACLs will be controlled at the district office and exceptions to

Local Area Networks (LANs)

1520 words - 6 pages advantages of a Client-Server Network are better performance and Network security administration is easier to maintain. Disadvantages include users not being able to directly share resources on the workstations and network failure due to server failure. Advantages of a Peer-to-Peer Network include flexibility to share resources from any workstation and ability to distribute network applications throughout the network for better performance

Investing in the Future: Why the Medical Field Should Invest in Wireless Networks

1264 words - 6 pages security problem for the company’s network because most wireless networks are set up without security, and anyone with a wireless device can access the company’s network. Therefore, U.S. Food and Drug Administration Department (FDA) has a guideline for radio frequency wireless technology in medical devices to avoid unauthorized access [13]. This guideline will have significant applications in medical fields to protect secure data and it can be a reference for setting security policy.

Networks and Modern Communications

3036 words - 12 pages computers on the network will be equal. This is the most common form of computer network for home use. It is the cheapest and easiest to build, but it has a few flaws. The biggest is the computer user controls the security. This isn't a problem for those using a peer-to-peer network at home, but for business this can be a huge problem. This network is limited to ten computers and there is also no central administration. This means each only ten

Network Troubleshooting

814 words - 4 pages Knowing how to troubleshoot a network may be the most vital skill in the field of Information Technology and Network Administration. These positions fall into two very different categories; configuration and troubleshooting. Configuration tasks prepare for the expected and require detailed knowledge of system software, but are normally predictable. Once a system is properly configured there is rarely any reason to change it. In contrast

Careers in Computer Science

716 words - 3 pages of a college or other program in computer science, network administration, Web technology or a related field is usually required. • Certification or training provided by software vendors may be required by some employers. • Minimum 1- 2 years of experience with a team member position or higher position. Computer Network Technician Supervisor Main Duties • Computer network technicians perform some or all of the following duties

Mobile and Wireless Communication: Mobile Ad Hoc Networks

2437 words - 10 pages themselves dynamically when we don’t have the fixed infrastructure or a centralized administration. Application of Mobile Ad Hoc Network • Sensor Field- Check remotely regarding the sensing the earth activities • Rescue operation- Helps in disaster recovery, commando operations and earthquakes • War fields- Helps in automated military communication in the battle field • Entertainment- Robots, multi-user games • Geo location services- Help to

network security

667 words - 3 pages Unauthorized Network and system access – An attacker needs access before being able to perform any attacks. An attacker can be a disgruntled employee, an employee that has become a victim if social engineering or a competitor. Access can be achieved by gaining control of resources or by connecting equipment to the network. The risks posed by unauthorized network access are: unauthorized join or network expansion, VLAN join, VLAN tagging or

Similar Essays

Multiple User Network Administration Security Essay

8379 words - 34 pages MULTIPLE USER NETWORK ADMINISTRATION SECURITY Introduction This report explores the industry standard concepts and best practices including:         Authentication         Access control         Encryption         Data confidentiality         Data integrity         Auditing         Non-repudiation Authentication is the ability to verify the identity of a user, host or system process. Access control

Computer Network Management Essay

1391 words - 6 pages localization, fault correction, testing, and trouble administration. Performance management provides preventative maintenance, capacity planning, and statistical analysis. Security management controls all network security information, to provide prevention, detection, containment and recovery, and security Administration. Accounting management collects the information about the clients’ usage of the services to keep track of billing. Tariffs, pricing

Workplace Systems Support Essay

637 words - 3 pages A network administrator is a person who maintains and troubleshoots computer systems. Depending on the size of a company and the complexity of the technology in use, a network administrator's job could be part time or full time. Some tasks a network administrator encounters include installing or upgrading system software, managing user accounts, as well as supervising disk space.The function of a network administrator in a big corporation may be

Network Operating Systems (Nos) Essay

1006 words - 5 pages system allows for the ability to include all the components of the network and allow several users to share files with one another through the network regardless of their physical location [1]. There are two main types of network operating systems, and there are several different operating systems to choose from, each one working differently. A network operating system usually contains a menu-based administration interface. From this interface, the