Network Infrastructure: Ethernet Ports and Serial Around the Router Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The lab referred to as the second network infrastructure lab lays its focus on the concept of a router, and more so, on its basic configuration. This lab aims at comprehending the concepts of Ethernet ports and serial around the router. It is said to cover areas such as file sharing, which is done via File Transfer Protocol and the Trivial File Transfer Protocol, the Telnet and also the Cisco Discovery Protocol.

The Registered Jack

The Registered Jack – 45 (RJ-45) is the UTP Ethernet network cable that is mainly recommended to connect a personal computer with the aid of the console. Its features are telephone-like and hold up to eight wires hence making its wire connector wider than any other Ethernet connectors. This has made it the most suitable cable for connecting the PC to a local area network (LAN) because of its high speed in the connection. This cable has been recommended and favored over the other connectors due to its strong network that guarantees a strong connection to the success of the communication for the appropriate sockets.

Its maintenance is also lower compared to other cables as it is smaller with sufficient power. Its connectivity is also not limited as it has both male and female connectors. The connection is said to increase when other cables have been connected resulting in voltage area and a current that is relatively low. Recent research has indicated that the RJ-45 registered jack is commonly used in telecommunications firms hence being termed as the ever-present Ethernet connector. RJ-45 is, therefore, a vital part of the Ethernet and failure to integrate it in the connection can cause some adverse consequences. It can result to failure of PCs connection due to lack of the hard-line required to make the connection complete.

The Registered Jack

HyperTerminal

The functionality of the terminal evaluation and communication relies on a program known as HyperTerminal. The program uses the Windows 98 version and is offered as part of Microsoft operating systems enabling the usage of resources of any other PC by creating a link between the operating systems. HyperTerminal program has been defined as an application used to connect a computer to Telnet sites, online services, servers and bulletin board systems (remote systems).

The program has been configured to institute a console connection using a router. After connecting the consoler cable to the modem or router on the adjacent end of the terminal, one then connects the RJ-45 console serial cable to the terminal. Once the connection has been done, a Run option is selected from the start menu of the windows and in the run dialog box, the word hypertrm.exe is typed and click the enter button.

The HyperTerminal loads and its splash screen will appear. The program uses some router modes which include the Privileged Mode, Specific Configuration Mode, the Global Configuration Mode and the User Exec Mode. Some modes require one to have a password while some don’t. The User Exec or the Privileged Mode’s password is set either during the router initial configuration or at a later stage. The Global Configuration Mode which configures the access lists, routing protocols and the interface further does not require any password to access. It is entered in the Privileged Mode.

Interface serial

Interface serial shows details such as line protocol, encapsulation, serial 0 and the internet address are highlighted in the command show.

  • EXEC mode – Upon the establishment of a connection by the router, this basic EXEC mode is applied. The EXEC mode has been set as a default in the router once it connects to the computer.
  • Privileged mode – it uses the ‘enable’ command. It also has the capability of executing all the show commands from its mode.
  • Global configuration mode – it uses the ‘configure terminal command’ or the ‘config t command’. It has been established to achieve the highest level of access to the router during configuration.
  • Ensures that the interface hardware is presently active.
  • It further points out the hardware type in use.
  • It determines the Internet address and subnet mask.

Ethernet 0

The line protocol, internet address, ARP type, encapsulation and the Queuing Strategy helps to display detailed information of the command show interface fast Ethernet 0.

  • Helps the interface to achieve Maximum Transmission Unit.
  • The interface’s bandwidth in kilobits is calculated per second.
  • The delay of the interface is calculated by microseconds.

Routing

Routing helps to acquire information about neighboring network devices. Routing is defined as a means of choosing network paths used to send network traffics. Use of packet switching technology enables routing in electronic data. The passage process of the logical addresses packets which begin from the source to the last stage through the intermediate node is aided by certain devices. These devices include bridges, firewalls, gateways, switches and routers. Computers can also be used in the transition stage even though they are meant for general purposes. This leads to their performance being limited because they are not specialized.

The routing tables are used to store routes records and information forwarded in routing to be used for a range of network destinations. Information about neighboring devices can therefore be gotten through Routing. During routing, one does not regard its memory as the routing tables are stored here and thus acts as a very vital determinant to achieve efficient routing. One can choose to use algorithms on routing if it’s a single network path at a time and if there are many paths being used, a multipath is preferred. The basic step is therefore to point out the most appropriate path to be used as this is not an easy task.

Use of Metrics as a means to determine and assess the path to be used has highly been recommended and is commonly used. A metric is a tool used as a standard measure to determine optimal paths during routing. The data of the route relies on the type of the routing algorithms that has been chosen. The routing algorithms therefore play a key role as it initializes the routing tables. Routers are in constant communication with each other and use various messages to preserve the routing tables. The communication between the routers include analyzing updates from other routers, the ability to put up a detailed picture on a network typology and sending notifications to each other regarding the condition of the sender link.

A Telnet network

A Telnet network plays a key role as it serves as a connector to remote computers, also known as hosts, over a TCP/IP networks. To be able to connect to a telnet server such as a remote host, one nee to use a software called the telnet client software. The client automatically becomes an embedded terminal when the client connects to the remote host. The client is able to get contact with the computer remote host after this connection.

Operating systems such as Windows 95, 2000 and XP have in most cases in built telnet clients commands as telnet clients are present in most of the operating systems. The process protocol of incorporating the telnet clients in the command lines of the operating systems requires the particular command lines and then one enters the telnet host. The remote computer then replaces the telnet host that one want to be connected with.

To have access to a distant computer by following the terminal of a remote computer, one requires to follow the specific provided network protocol. The protocol enables the distant computer to function online by use of an interface which, is taken to be part of the local system of the user. Telnet has been preferred for various reasons, the key reason being that it does not limit one when logging as a regular user of the computer to view all the programs and data that has been installed and stored respectively. The protocol used is also important as it can be applied in technical support usage.

Telnet works in a simple manner. It uses software, also known as the telnet client which has already been installed in the computer and creates a link with a distant computer. The telnet client uses a command to send a request to the remote host which in turn replies by asking one to type a username and a password. If the request is accepted by the remote host, then the client connects with the host making the computer in use a virtual terminal. This allows one to have a full access to the host’s computer. It has been argued that with the command of the password and username, one needs to have a set up account on the distant host before sending a request. In some instances, the computers which have been installed with Telnet may allow restricted access by guests.

The Trivial File Transfer Protocol

The transfer of files with functions such as those of FTP basic for (TFTP SERVER, 2008) uses the Trivial File Transfer Protocol (TFTP). The Trivial File Transfer Protocol requires a very minimal memory to be implemented and very vital when using computers that lacks any storage devices when booting its routers. When transferring minimal amounts of data or information, the transfer protocol is mostly preferred. The information is transferred between the operating system images or the IP Phone firmware and other network hosts.

The Trivial File Transfer Protocol is also used when loading a basic kernel during the initial stages of installation of various installation systems that depends on the network. The communication process in this protocol relies on port 69 and the protocol is unable to list content directory as it does not possess the encryption mechanisms of authentication.

The mail, netascii and the octet are the transfer modes supported by this protocol. The mail transfer mode has been considered obsolete and is hardly used. On the other hand, the netascii and the octet match up to the ASCI and also the image modes. This protocol lacks privacy and its security is wanting. It is not advisable to use it over open internet network but rather on private local networks. The size of the file is not limited when the server and the client are in favor of the block number wrap around. The UDP is hence used by the protocol when supplying its own session support and transport. The Trivial File Transfer Protocol can be able to access the remote server to be able to read and write files from the server.

The Trivial File Transfer Protocol however has its disadvantages. One of the disadvantages is that it does not have a direct visibility and validation. This acts as a hindrance when accessing the available files and directories.

Router configuration files by use of restore users are managed by theTrivial File Transfer Protocol. The files are very important incase the router or the switch fails completely. Back up of configuration data is very important when one needs to refer to them in future or even for purposes of documentation. This process of configuration requires one to copy the router configuration by using a copy of running-config TFTP or the copy startup-config command to a TFTP server so as to restore the configurations. The router configuration therefore running in the DRAM and configuration kept in the NVRAM is backed up by the process. The running-config command verifies the existing configuration in DRAM. After the existing configuration in DRAM has been verified, then it is copied to the NVRAM. Finally, it is copied to a TFTP server.

Conclusion

In conclusion, the lab is used to understand how to deal with Ethernet Ports and familiarizing oneself with Cisco Discovery Protocol. In addition, the router configuration has been made easy with the use of network lab.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 19). Network Infrastructure: Ethernet Ports and Serial Around the Router. https://ivypanda.com/essays/network-infrastructure-ethernet-ports-and-serial-around-the-router/

Work Cited

"Network Infrastructure: Ethernet Ports and Serial Around the Router." IvyPanda, 19 Mar. 2022, ivypanda.com/essays/network-infrastructure-ethernet-ports-and-serial-around-the-router/.

References

IvyPanda. (2022) 'Network Infrastructure: Ethernet Ports and Serial Around the Router'. 19 March.

References

IvyPanda. 2022. "Network Infrastructure: Ethernet Ports and Serial Around the Router." March 19, 2022. https://ivypanda.com/essays/network-infrastructure-ethernet-ports-and-serial-around-the-router/.

1. IvyPanda. "Network Infrastructure: Ethernet Ports and Serial Around the Router." March 19, 2022. https://ivypanda.com/essays/network-infrastructure-ethernet-ports-and-serial-around-the-router/.


Bibliography


IvyPanda. "Network Infrastructure: Ethernet Ports and Serial Around the Router." March 19, 2022. https://ivypanda.com/essays/network-infrastructure-ethernet-ports-and-serial-around-the-router/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1