Network Configuration: Routers and Switches

Router R1 Configuration

Hostname and Enable Secret

hostname R1

enable secret cisco

IP Domain Name

ip domain-name reprobe.cl

Crypto Key

crypto key generate rsa

2048

Username and Password

username alumno password alumno

Line VTY Configuration

line vty 0 4

transport input ssh

login local

exit

SSH Configuration

ip ssh version 2

ip ssh authentication-retries 2

ip ssh time-out 60

Interface Configuration

FastEthernet 0/0.15

interface FastEthernet 0/0.15

encapsulation dot1Q 15

ip address 172.16.0.1 255.255.192.0

!

FastEthernet 0/

Read More

Network Configuration for Three Routers and Three Switches

Hostname: R1

Enable Secret

enable secret cisco

IP Domain Name

ip domain-name reprobe.cl

Crypto Key

crypto key generate rsa
2048

Username and Password

username alumno password alumno

Line VTY Configuration

line vty 0 4
transport input ssh
login local
exit

SSH Configuration

ip ssh version 2
ip ssh authentication-retries 2
ip ssh time-out 60

Interface Configuration

FastEthernet 0/0.15

encapsulation dot1Q 15
ip address 172.16.0.1 255.255.192.0

FastEthernet 0/0.30

encapsulation dot1Q 30
ip address 172.16.96.1 255.255.240.0

FastEthernet

Read More

Data Structures and Algorithms in C: Implementations and Explanations

1) Implementing a Linear Queue in C

#include<stdio.h>
int q[10], ch, size, front=-1, rear=-1, item, i;
void enqueue()
{
if(rear == size – 1)
printf(“Queue Overflow “);
else
{
if(front== – 1)
front = 0;
printf(“Insert the element in queue : “);
scanf(“%d”, &item);
q[rear++] = item;
}
}
void dequeue()
{
if(front== -1 || front>rear)
{
 printf(“Queue Underflow “);
}
else
{
printf(“Element deleted from queue is : %d “, q[front]);
front++;
 }
}
void display()
{
if(front== -1 || front>rear)
{
 printf(“Queue is empty

Read More

Exploring Tree Algorithms: Traversal, Search, and Height Calculation

public ArrayList<>> simplePaths(Vertex v1,Vertex v2) {
ArrayList<>>paths = new ArrayList<>>();
ArrayListpathCurr = new ArrayList();
TreeMap visits = new TreeMap();
Iterator itr = adjacencyMap.KeySet().Iterator();
while (itr.HasNext())
visits.Put (itr.Next(), false);
simplePaths(paths,(ArrayList) pathCurr.Clone(),(TreeMap) visits.Clone(),v1,v2);
return paths; }
private void simplePaths(ArrayList<>> paths, ArrayList pathCurr, TreeMap visits, Vertex current, Vertex

Read More

Circuit Switching vs. Packet Switching: Understanding Network Concepts

Circuit Switching

Circuit switching establishes a dedicated communication channel between two stations. Resources like bandwidth and switching network capacity are reserved exclusively for this connection. Once established, the transmission is transparent, as if the devices were directly connected. Circuit switching involves three phases:

  1. Circuit Establishment
  2. Data Transfer
  3. Circuit Disconnection

Key Points about Circuit Switching

  • Operates at the physical layer.
  • Requires prior resource reservation before
Read More

Computer Networks and Communications

Circuit Switching

Circuit switching establishes a dedicated communications channel between two stations. Resources are reserved for transmission, and the switching network is for the circuit’s exclusive use during the connection. The transmission is transparent because, once connected, it seems as if the devices are directly connected. Phases:

  1. Establishment of the circuit
  2. Data Transfer
  3. Disconnecting the circuit

Four Points to Highlight in Circuit Switching

  • Circuit switching occurs at the physical level.
Read More