Different Type Of Interfaces Computer Science Essay

Laboratory device that works as bed two device is the layer-2 switch that operates on informations link bed and physical bed of the OSI theoretical account.

Bridges are besides layer-2 devices but with limited power and ports as comparison to layer-2 switches.

Layer-3 devices:

Laboratory device that works as layer-3 device is router besides known as layer-3 switch that operates on web bed, informations link bed and physical bed of the OSI protocol stack.

B ) .

Different type of Interfaces:

Figure: Different Type of Interfaces [ 1 ]Interfaces can be categorized into LAN and WAN interfaces:

LAN interfaces:

LAN connectivity is provided through interfaces like Ethernet interface ( i.e. E0, E1 ) , Fast Ethernet interface ( i.e. FE0, FE1 ) , Fiber Distributed Data Interface ( FDDI ) ( i.

e. F0, F1 ) , or Token Ring interface ( i.e. T0, T1 ) . [ 1 ]

Pale interfaces:

WAN connectivity is provided through interfaces like synchronal consecutive interface and asynchronous consecutive interface ( i.e.

s0, s1 ) .And ISDN connectivity is provided through ISDN ( Integrated Services Digital Network ) interface ( i.e.

BR0, BR1 ) . [ 1 ]

C ) .

Two of the redundancy features that bearer degree devices have are extra power supplies and endorse up processors. Corresponding device samples in our research lab that carry these characteristics are as follows:

Shasta 5000

Pass 7440

Pass 8600

[ 2 ]

QUESTION SET 2:

a ) .

Three media that support IEEE 802.3 criterions are as follows:Twisted Pair overseas telegram ( i.

e. 10/100 BASE-T )Coaxial overseas telegram ( i.e. 10 BASE 2 )Fiber ocular overseas telegram ( i.e. 10 BASE-F )Yes, you can happen all of the above mentioned media that support IEEE 802.

3 criterions in the DALHOUSIE internetworking research lab.

B ) .

Straight Through Ethernet Cable:

The most common type of overseas telegram used in the research lab is straight through Ethernet overseas telegram that is used to link following devices:Host/Work station to exchange or hubRouter to exchange or hubThe one of the chief grounds for its popularity is that it is simple to make and implement over Ethernet.

We merely have to do one to one wire connexions. Merely pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2 to 2, 3 to 3, and 6 to 6 and you are good to travel.

It uses RJ-45 connections to link devices that ‘s why besides known as RJ-45 heterosexual through overseas telegram. [ 3 ]

degree Celsius ) .

Figure: Pin Assignments and Wiring for an RJ-45 Straight-Through Cable [ 4 ]

Hub/Switch Host

Figure: Pin out for Ethernet RJ-45 Straight-Through Cable [ 4 ]

vitamin D ) .

10BaseT overseas telegram utilizations two braces of shielded/unshielded distorted brace wires to convey at 10Mbps. It has sum of four wires doing two braces one brace known as transmit brace ( TD+ and TD- ) to direct informations and other brace known as receive brace ( RD+ and RD- ) to have informations. [ 5 ]CAT 5 overseas telegram usually uses four brace of unshielded distorted brace wires to convey at 10Mbps. [ 6 ]

vitamin E ) .

Difference between Rolled and Crossover overseas telegram: Rolled overseas telegram provides consecutive connexion between two devices.

It is used to link a PC/computer ‘s COM ( Console Serial Communication ) Port through DB9 connection to a router ‘s or exchange ‘s console port utilizing RJ45 connection to let terminal communications i.e. console overseas telegram, the sky bluish colour overseas telegram in the lab. On the other manus, crossing over overseas telegram is used to link PC/Computer to the router ‘s Ethernet port to let web communications. One other obvious difference between cross over and rolled overseas telegram is the pin out connexions both overseas telegrams have different pin out connexions. [ 7 ]

degree Fahrenheit ) .

Example of crossing over overseas telegram in the research lab is the blue overseas telegram that uses Smart consecutive RS232 connexion for newer WIG T2 connexions or the dark Grey overseas telegram for older WIG T1 connexions that besides uses consecutive connections in order to do router to router or exchange to exchange connexions in the research lab. The blue overseas telegram that is used to link hub to a switch utilizing RJ45 connections is another illustration of cross over overseas telegram.

g ) .

The Cisco uses the undermentioned strategy to tag port Numberss on routers:

Type of interface Router number/Slot figure /Port figure

For illustration for consecutive interface it ‘d be like this Int consecutive 0/0/0. The first 0 is the router itself, and so the 2nd 0 is the slot figure and eventually the port figure. [ 8 ]

H ) .

Different Types of Optical Connections:

LC type connection

Degree centigrades: UsersAli UsmanDesktopLC.

JPGFigure: LC type connection [ 9 ]

MTRJ type connection

Degree centigrades: UsersAli UsmanDesktopmtrj.jpgFigure: MTRJ type connection [ 10 ]

SC type connection

Degree centigrades: UsersAli UsmanDesktopsc-pc-fiber-optic-connector.jpgFigure: SC type connection [ 11 ]

FDDI type connection

Degree centigrades: UsersAli UsmanDesktop800px-FDDI-optical-fiber-connector-hdr-0a.jpgFigure: FDDI type connection [ 12 ]Connector types used in Gbit interfaces of Cisco 3550 switches are RJ-45 connections and SC fiber connections.

[ 13 ]

QUESTION SET 3:

a ) .

Enable watchword bid does n’t code the watchword set by user. This watchword can be viewed by typing bid show running-configuration on a router. On the other manus, Enable secret bid encrypts the watchword and when show running-configuration bid is entered watchword appears in encrypted signifier. Another bid used to code watchword is service password-encryption bid. This bid will automatically code all the router watchwords. [ 14 ]

B ) .

Line console is used to put watchword in user manner for console connexion.

When a user tries to entree router through a console port, he ‘ll be asked to come in the console watchword in user manner in order to entree the router.Vty line is used to put a Telnet watchword on the router. In order to entree router through Telnet user have to supply this watchword. [ 14 ]

degree Celsius ) .

Show accountant s bid can be used to look into types of overseas telegrams that are connected to the router without ocular checking of interfaces. [ 15 ]

vitamin D ) .

Show interface ( i.e.

s0/0/0 ) , Show ip interface and Show ip interface brief any of these bids can be used to look into whether interfaces are up or down. [ 15 ]

vitamin E ) .

Running-configuration is the current running constellation of the router and is stored in the DRAM, whereas startup-configuration is the constellation that will be loaded when router starts up and is stored in the NVRAM of the router. [ 16 ]

degree Fahrenheit ) .

The other bid to salvage running or current constellation to router NVRAM is Wr. [ 2 ]

g ) .

Yes, there are several ways to salvage router constellation on your computing machine or someplace else which are as follows:You can copy router constellation to a TFTP waiter by utilizing bid transcript running-configuration tftp that can be retrieved subsequently by utilizing bid transcript tftp running-configuration. Other options are as follows:

Copy running-configuration file transfer protocol

Copy running-configuration hypertext transfer protocol

Copy running-configuration hypertext transfer protocol [ 17 ]