CLICK HERE TO DOWNLOAD PPT ON DHCP,NIS And Setting Up Router
DHCP,NIS And Setting Up Router Presentation Transcript
1.DHCP,NIS & Setting Up Router
2.DHCP
DHCP stands for dynamic host configuration protocol.
It dynamically assign network settings for a system.
We can assign Dynamically following settings:-
Dynamically assign IP addresses to devices and systems
Netmask
host name
domain name
name servers
Gateway
DHCP stands for dynamic host configuration protocol.
It dynamically assign network settings for a system.
We can assign Dynamically following settings:-
Dynamically assign IP addresses to devices and systems
Netmask
host name
domain name
name servers
Gateway
3.Process How DHCP Works
A client configured for DHCP will send out a broadcast request to the DHCP server requesting an address.
The DHCP server will then issue a "lease" and assign it to that client.
DHCP reduces the amount of time required to configure clients and allows one to move a computer to various networks and be configured with the appropriate IP address, gateway and subnet mask.
DHCP servers may assign a "static" IP address to specified hardware
A client configured for DHCP will send out a broadcast request to the DHCP server requesting an address.
The DHCP server will then issue a "lease" and assign it to that client.
DHCP reduces the amount of time required to configure clients and allows one to move a computer to various networks and be configured with the appropriate IP address, gateway and subnet mask.
DHCP servers may assign a "static" IP address to specified hardware
4.Commands which are used to set up DHCP on systems:
dhclient or dhcpd :-Dynamic Host Configuration Protocol Client
dhclient or dhcpd :-Dynamic Host Configuration Protocol Client
5.NIS
Network Information Services (NIS) enables you to create user accounts that can be shared across all systems on your network. The user account is created only on the NIS server. NIS clients download the necessary username and password data from the NIS server to verify each user login.
Configuration file is /etc/exports
6.if NIS server is set up in a single system and configured to hold user accounts and their passwords and access information. Then any user on that network can login to his/her account that is set up in the NIS server from any system (with NIS client running) on that configured network.
This gives a look and feel that the user is logged into his/her own system. But actually its the account on the NIS server that is mounted on the local system on user login .
Network Information Services (NIS) enables you to create user accounts that can be shared across all systems on your network. The user account is created only on the NIS server. NIS clients download the necessary username and password data from the NIS server to verify each user login.
Configuration file is /etc/exports
6.if NIS server is set up in a single system and configured to hold user accounts and their passwords and access information. Then any user on that network can login to his/her account that is set up in the NIS server from any system (with NIS client running) on that configured network.
This gives a look and feel that the user is logged into his/her own system. But actually its the account on the NIS server that is mounted on the local system on user login .
7.NIS ADVANTAGE:-
An advantage of NIS is that users need to change their passwords on the NIS server only, instead of every system on the network. This makes NIS popular in computer training labs, distributed software development projects or any other situation where groups of people have to share many different computers.
An advantage of NIS is that users need to change their passwords on the NIS server only, instead of every system on the network. This makes NIS popular in computer training labs, distributed software development projects or any other situation where groups of people have to share many different computers.
8. NIS DISADVANTAGE:-
The disadvantages are that NIS doesn't encrypt the username and password information sent to the clients with each login and that all users have access to the encrypted passwords stored on the NIS server.
The disadvantages are that NIS doesn't encrypt the username and password information sent to the clients with each login and that all users have access to the encrypted passwords stored on the NIS server.
9.Routers
A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs
A router is a device or, in some cases, software in a computer, that determines the next network point to which a data packet should be forwarded toward its destination.
A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.
A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs
A router is a device or, in some cases, software in a computer, that determines the next network point to which a data packet should be forwarded toward its destination.
A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.
10.How Routers Work
As packets are passed from routers to routers, Data Link layer source and destination addresses are replaced with new IP addresses.
Enables a router to route a packet from a source to destination network
Only packets with known network addresses will be passed - hence reduce traffic
Routers can listen to a network and identify its busiest part
Will select the most cost effective path for transmitting packets
As packets are passed from routers to routers, Data Link layer source and destination addresses are replaced with new IP addresses.
Enables a router to route a packet from a source to destination network
Only packets with known network addresses will be passed - hence reduce traffic
Routers can listen to a network and identify its busiest part
Will select the most cost effective path for transmitting packets
11.How Routing Table is formed
Routing table is formed based on communications between routers using “Routing Protocols”
Routing Protocols ? Routable Protocol
Routing Protocols collect data about current network status and contribute to selection of the best path
Routing table is formed based on communications between routers using “Routing Protocols”
Routing Protocols ? Routable Protocol
Routing Protocols collect data about current network status and contribute to selection of the best path
12.Routing Protocol Example -
RIP (Routing Information Protocol)
OSPF - Open Shortest Path First
RIP (Routing Information Protocol)
OSPF - Open Shortest Path First
13.Static and Dynamic Routers
0 comments