Network Documentation

Permanent URI for this collection


Recent Submissions

Now showing 1 - 4 of 4
  • Item
    ( 2021-08-18) asma
  • Item
    Default & Static Routes and Routing Information Protocol
    (University of Khartoum, 2016) محمد حماد خوجلى ; Hamad, Mohammed
    When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers, a router is always configured with some default route. A default route tells the router where to forward a packet if there is no route found for specific destination, in case there are multiple path existing to reach the same destination, router can make decision based on the metrics used in IP routing protocols : ■ Hop count - A simple metric that counts the number of routers a packet must traverse ■ Bandwidth - Influences path selection by preferring the path with the highest bandwidth ■ Load - Considers the traffic utilization of a certain link ■ Delay - Considers the time a packet takes to traverse a path ■ Reliability - Assesses the probability of a link failure, calculated from the interface error count or previous link failures ■ Cost - A value determined either by the IOS or by the network administrator to indicate preference for a route. Cost can represent a metric, a combination of metrics or a policy. Routes can be statically configured or dynamically learnt. One route can be configured to be preferred over others.
  • Item
    Switch port security
    (University of Khartoum, 2016) ali, Ali Jbraldar mohamed
    National Security Telecommunications and Information Systems Security Committee (NSTISSC) Network security is the protection of information and systems and hardware that use, store, and transmit that information. Network security encompasses those steps that are taken to ensure the confidentiality, integrity, and availability of data or resour
  • Item
    Access Control List
    (University of Khartoum, 2016) Abdul Rahim, Tasneem Omer
    1- an access control list refers to rules that are applied to port numbers or IP addresses that are available on a host or other layer 3 devices. On some types of proprietary computer hardware (in particular routers and switches), 2- Access Control List (ACL) are filters that enable you to control which routing updates or packets are permitted or denied in or out of a network.