0% found this document useful (0 votes)
13 views6 pages

Routing and Switching

The document discusses various networking concepts, including the differences between dynamic IP and static IP addressing, as well as the structure and management of IP addresses and subnets. It also covers application layer services such as remote access, file transfer, and email services, highlighting their importance in network communication. Additionally, it explains routing protocols, including distance vector and link state protocols, and the role of ARP in mapping IP addresses to MAC addresses.

Uploaded by

salotjashan004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
13 views6 pages

Routing and Switching

The document discusses various networking concepts, including the differences between dynamic IP and static IP addressing, as well as the structure and management of IP addresses and subnets. It also covers application layer services such as remote access, file transfer, and email services, highlighting their importance in network communication. Additionally, it explains routing protocols, including distance vector and link state protocols, and the role of ARP in mapping IP addresses to MAC addresses.

Uploaded by

salotjashan004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
Qy: Ligt aro IP ‘the differences between dyn amit TP and Holic F Addu ssi yg > ; , sai. “EP Alcliu S5Ing Wo Dy vamnic TP nda shmg Sette IP Mews > fin FP addeysy thad is 2 Pm AP addeuss 16 audomatically “por configwad By ‘i ° Se ty 8 Change oi “ ae servion 9 can & device 9 suyrai'ns comely. ENAnat Outi Tire * m 2 ASSY9nId Manaally by Ty > Assiansg Automatically by DneP ae cdatmenhal, —7 Ht Fomains wa the Sarno Oph’) Changeo manuel Du Chonge 5 Whenevey the advice Suecommucts oy atiey o lease tHme expijes, I+ 15 Usually fyee oy includg) ~? Lt OP Her suquire s cxpitionco In novmat ntervut Serure. Pagment from 5? 7? TIS eas 4 to manag, NO > FF Sugwiaes mana Orbigunedion is nodid. Configuration ard mmeragerey —? T+ ts more Seculu because DE Is less Secure Siree thy ‘the addres Charges sug lasy faduss is Treg 2 easies making tt hardin or pkleckeys 10 teach [Fanget . dy target . —pIt may Cause minoy dissuptins when the FP Charges especially for sumote Grvections, VD Explain the Vesupus flealels Por PVE cables ¢ Foam 3 7 Tb IS mere Kadiable Ly Sewices that Suquise Constant Vaile bitty, ns Ths uses & Lad bit crobloss, upresented In hoxadocimag Ard divided into cig groups of W bits each Sepamata by Cobys Examfie: 8001 ; Adbg 7 $5a3 t DOC 0000 + Brae 403)0 5 ]35y Freeds of Gn Tiyg Adds ss. Each Tpys Address on Hs type Coniasy, breakdown is: 1D Glo bao Ro eating Prefix) The gobag, Footing Prelre vs thy first fast of an APY, addy o roe . Saably tee Rast uy Be TH ig AS519 md by Internet er uDhwit eg OF Intern. Seay ic € ProvicunsC1PS ) ang 4 i : Supresenls tha fa DagaM Jan +o which the Adduss 4 P. nis networla o can be diviclod my Piedds che fending Agea st, Mupticast). Tho 05) Comma yy ‘ ongs. Q) Subnet LO _ Y Subned T «The Sublet 10 cms ater tho global Kourting profi x ang) faMtows organizations 4o divide theiy assigntd IPVE netuony i into Sub-netogahs, This fietd is TapicaMy Vs bits long in a Standard 14 pouPix is Wry elu foo Managmy Tuclo/p Aratic and hierarchy within erganizetion. for instance, in 4 tre FV6 Addruss ool: dbs: B35a3/00 fs “184, the pat eae / 4 19 TW Subnet 710. 5) Inierkae £0 tye Trrierice FP is the last 4 bs of the ZUG adler 55 cd ig vsed to [dentify a Unis Iwieefece on a Susnot Tris enswus that eath device within a subref Can be distin or Prom pins. Tho interlace ID can be gentray te) auobm ality, using divice’s MAC address throug h Ae EDT -64 yathag/ or Wo Can fe manvally asia ned b3 the Ywetwola admin, Stan. ecause of its length, the Mterface TD provices a huge addsuss SAC], Virthebl CDimingtiy the Problem & cdawss SHUMAIS “that existed in Tey? : Se ae] OM UW cas} Nodsse Ficogs In mutticas! adduss , tho Shucuty ablwes Stosd with the Pull x Additionad field ex Thad indicesle s oF thy Lt b addnrars FROONIG within Hud formed WIS Such ag fy Flogs fiela CUbsjs) whet Tho mutdicast preup US PesrmarUny oo temPporahy, and thy Secope Piedd Cubsts) WD Taonhty Explain fro Services Providod 69 Application (agen) FIP 2 SMTY apPplicedion layer protocas ? O Network, Virtued Terminad CNMUT) Te application layer provides q service wns 4 vsey can log in tO a Sumote syslein and vse tas rf eae Coun Phy sce Commcted +o 1 This fk Wade possib) e by CPT ing a Standard “ Vi yfund teymineD so thet differen} System wits de rent hoedwary md Softwasy Can Communicate Casi'ly, AY Common eFompie of S This Is TELIVET, Which albus Somol oe leqtn de anothun Gmpdey oven a nstwcrh, a file Transo, Access, and Managment CETAM) ove oF the immportanl Sevice Is file - Sueded Commniaitey” TY application tapn alos sees to tounstea files blw omputers eaCcess Se mole Biles, and Nara fhm. This working and dbeting files on anarnunr S DSCd Protocel fox This Service ic ee 3) Mail Services” Includes svadirg , stem . The mesh widely The application layer gad vidos ebocteon Serviles that enables vseas to Send, Spceive Slozye emails ACESS Vatworks Thye Services farm Pounddion of Gmynunicetion OUWt Ie leg nay. hy eq. smtP i WO fo send emails, while poPS and INDP ar vsed fo suleteve 2 message emils Prom mail Sens “> Birectory Services This SCYVICE Proving s information about Vedons { Nworle, 58 Sour ceg cue y aS email addiusses, pointe, , OF VSS. Tt wegh ¢ We a Phore Ueectry but for sand orto objedis. A 9°29 example 1s LONE, “Which helps 7, , Sean ching and Organizing information unth ip a Ne) Worx lo. 4 3) Romole Access Seovices '. x —_ aa y This applicetion lagun Enables Swmote access yo ApPlicethin, OY sUSoUNCES OH Onothen ComPucton. T's moans a Useg Sitting OM Ono System tan vse tho Softwesy , Piles oy seven the desatop of aynothen system Own the netwo7y | co EFAN PIES - Includes Pomote “Desatop Projoce | fox grapnico9 amare acless ang TELWET foz Commer ) Was access QuD Distinguish Distance Vectox s,0ud) i Y 4nd lin Stage Pousing Protocols 2 Ans: Distance Vector Routing Protacols > Distance Vectoy *0uding Profecats Work, by having Fah moder Shar: tS ertity Sout p. fable unnw’ rts immediad e Ye rg hbour s. The Jexyn distence Veedey” Comey Frw tye idva thet thy Swudey tens ths Noy lous s Hy distance ard try dixechion 4p Sach each VEH netrays ndwor. Thise Prolocols follows — thy n — Fxg aQporiti, te Gobi. Lede the besy Pd Path. hy ae Spo ry whlerwd and Consurre less bardandth Sino Updeze Oe Sed ory Jo MUghboring Pvudeys the chun e Slowly Wham tw W4Wwo7l Chan 57 bth may lead -fo hashes \o00S O>7 aways « A Common Chawnple “nN thi tye< © RI > 4 Link, Stale Rouatng Protocol + Lh Giale swuting Prooeels worl wfexently Trstecd of Sending thsi ertige Jroudiing lable to Wighbeis, Sach frock Ondy Vadvodice ny Slede of its Moeclly cormocted Wnkdé Yo all Howlers In te nglwork using & Process Cally.) flooding with this information, evehy Drouken builds q Com pleje map of ths vyplwoyta jopelagg The Dihsloa Sho9 Yes p toh WNyst spr) Vgovitheris the, Used to Cablebale the bs} Path to ee Ae Stincdton. ‘Distance Vector Roding lin Yee Routing DT vse $ GeQlman- ford eSyorithy 7 Tt ses Oifastzats to calcubote the best path, Shogtest peel +o Comhye : Shoriest Path. EAM Souler cresw HS entize -7€ach mruky shows 115 only hadirg fable with its rashbers. the sete of 415 cen tinh, wt all reorders. 2 Owergs Slewlg, Which can lea) 5 Conwongi s qui claly because to Femporady Frouding loops. CMe OBS have o Complere . View of tho network —7 REP (Roding ynformadton Pass) > Opp Copen Sheetest pestn SORE Airs) rs-35. 5D DiS C455, Which lagen 1S VS€d Addowss Ay Solution Protece! ow does 1 wee} Pins: The fddsoss Rasolidion footecol CARP) is Commenication freteces sea for mapping a anv wn logics FP addsuss Cloves 3) 1G as Cornes porary phy sicao MAC adVUss withtr oa ta muavetd . sinre dete fyramys at tro Data Wb lager puqurse & mh ogduss fox acticd dibivay, ARY acts ees 6 vridgy blo ndwoots 2 ty Pech thle lager. whrnewee Oo deve wordt to Send date to qrofterdsite on ey 7” Asan Wa Se Whhwoeh Hee FAL di Merete bh Feafherd 5 FAC aidnese Bien ay 10 culeloa 9 heute Vysrd ly nef 7 PR weak ad tele bine Vayu pl fhe 5 Pinded tid Inivecas tpl dhe (ehoewhi layen, SPU We Segue becage Whtle Af addimes Vsed Poy Voglea? cam punteedian etiead dasa Ayan smyss WENN supa © MP\e Pdawens Hew ARP Woolas et ase IAP Rois ut sunen ct died Yanvws My EP addsucs of carafhe, dire PINE Addsucy, jb sends er ORP Fugusst or the lpreD nssuscxh but nol Us ats 15 4 boadias} ‘miesega es duvice With The meadching IP Galsuss Su sponds with on pee euPly pty Supty Covdois thy MDC Addo ss A suquesped dsvite. vo Delis no doquegl » Tho Duply ts sent as a Vnices y Dgesy jo ‘Tha Puoquoslt ra dsvice, 2 Caschley eonce the MAC Peddyes 16 Fanown, the Sender Sees the “8 yo THE eno ping Vs WS ARP Cache Guvids Ae Supecding NRO pracess Toy faeum. St IDA

You might also like