Preview

It320 Unit 5 Hw

Satisfactory Essays
Open Document
Open Document
444 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It320 Unit 5 Hw
1. When a router is first powered on, it completes a four-step initialization process: 1. Preforming a power-on self test (POST) 2. Loading a bootstrap program 3. Loading an IOS 4. Loading a configuration file

The last three of these steps require the router to copy the files into RAM. Normally, most routers load an IOS image that is stored in flash memory and an initial configuration stored in NVRAM.

2. Routers use the following logic, in order, to attempt to load an IOS:
1. Load a limited-function IOS if the configuration register’s last hex digit is set to 0 or 1.
2. Load an IOS based on the configuration of boot system commands in the startup-configuration file.
3. Load the first file in flash as the IOS.
4. Use TFTP broadcasts to find a TFTP server and download an IOS from that server.
5. Load a limited-function IOS from ROM.

In Step 1, the configuration register is a16-bit number that Cisco routers store in a hidden area of NVRAM. It can be set in a couple of ways and can be seen using the show version command. The most commonly used way to set its value is to use the config-register global configuration command. Routers use the 4 low-order bits of the configuration register as the boot field, which tells the router what to do in the first of the preceding five decision steps. If the value of the field is set to 0, the router loads the ROMMON (ROM Monitor), which is used for password recovery. If the value is set to1, the router loads the Boot ROM or RX Boot, which can be used to copy a new IOS into flash. If the value is set to anything between 2 and F, the router proceeds to Step 2.

In Step 2, the router looks in the startup-config file for any boot system commands and loads the IOS file listed. If multiple commands are configured, the router tries each of them sequentially. If no boot system commands exist or all fail, the router proceeds to Step 3.

In Step 3, the router loads the first IOS listed in flash memory.

In Step 4,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    To set it up you will need to use the program that is provided which will immediately run when the router is first hooked up to your computer. You may need to give your router a password; if you already have a password you will type it in. You can leave everything set on default if you want and your router will work properly. However if you need to, you can configure the router by opening a browser and typing in 192.68.1.1 or whatever your routers host IP is set to, my router is set to default which is the…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. In the source window right click on the device and select add source and add the written verilog code as shown in figure 3 and figure 4.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    8. Which Cisco IOS show command aids in the troubleshooting of routing protocols by displaying information on which protocol(s) is enabled and as well as passive interfaces?…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Uni5Lab5

    • 1370 Words
    • 4 Pages

    The IP Adrress 10.162.108.48, the subnet 255.255.252.0, and the gateway or router 10.162.110.1 address. This comes from step2 above.…

    • 1370 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Module 6 Cisco Commands

    • 228 Words
    • 1 Page

    Global command that sets the password that this router expects to use when authenticating the router with the listed hostname.…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Week 3 iLab

    • 1035 Words
    • 6 Pages

    The Dallas, Chicago, and ISP Routers’ FastEthernet and Serial interfaces used for the lab have been correctly configured and enabled. Unused interfaces have been shutdown. The RIP routing tables are complete for all routers and hosts. No ACLs have been applied to any of the routers. Below is the initial running-config file in ISP router.…

    • 1035 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Of course there are many ways this could be displayed but as long as the steps outlined are maintained in this order the OSI layers are explained very…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Switches and Routers

    • 376 Words
    • 2 Pages

    Switches and routers are key components to operating any network. Switches can break up a large area network into smaller segments. This will free up congestion and provide more bandwidth to each port, which will increase network performance. The first step is to plug into a power source, connect the console port to a computer or modem with UTP cabling and an RJ-45 cable, and use the command line interface (CLI) to configure and manage the switch in user exec mode and privilege exec mode. In most cases, the switch will perform a power on self-test. The manual will indicate the particulars of any failure. One must configure a password because the switch arrives without one. This provides security through the console settings menu and the password configuration option while one may also incorporate an encrypted password option. Entering global configuration through the command line option will change passwords, also. To change the IP configuration, one would choose the [I] key and choose the IP address option and set the Subnet mask and Default gateway. Creating a VLAN requires switching to Global Configuration mode and using vlan vlan# name name_of_vlan command. To add more VLAN ports, go to the Interface Configuration Mode…

    • 376 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Type set at the boot# prompt and record the current value of the configuration register (set by the "ios-conf" variable):…

    • 677 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A- ROMMON which is not IOS does not accept IOS commands, it cannot route IP packets. ROMMON software is stored in a ROM chip instead of flash. Another OS is called the boot ROM IOS, or (RX-boot mode). Related to ROMMON the boot ROM software is in the chip set as well. This means it can be loaded even if there is no working IOS in flash memory. Boot Rom is an IOS image, meaning it can be loaded into new flash when the image cannot be loaded because of other issues. IOS operating environment gives the router the ability to use all of its features and can be configured for normal purposes.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    New204

    • 1115 Words
    • 5 Pages

    | It lets the user configure changes on the router while the user mode doesn’t provide that function.…

    • 1115 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    informative speech

    • 911 Words
    • 4 Pages

    Transition to first main point: First, I am going to start off by giving you background information on the iPhone.…

    • 911 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    THUMB Tutorial

    • 7539 Words
    • 27 Pages

    For the Thumb mode (the one in this document) only 16 registers are available. Of those 16, only 8 are available for any use. Those registers are called low registers, and are all-purpose, meaning the processor doesn’t have any designed use for them. Those are called R0 to R7 respectively, and are the ones you will normally use on most programs.…

    • 7539 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    it linux boot process

    • 828 Words
    • 4 Pages

    It looks for boot loader in floppy, cd-rom, or hard drive. You can press a key (typically F12 of F2, but it depends on your system) during the BIOS startup to change the boot sequence.…

    • 828 Words
    • 4 Pages
    Good Essays