Вы находитесь на странице: 1из 63

CHAPTER 1 INTRODUCTION

1.1 Telecommunications:
Telecommunications is a general term for a vast array of technologies that send information over distances. Mobile phones, land lines, satellite phones and voice over Internet protocol (VoIP) are all telephony technologies -- just one field of telecommunications. Radio, television and networks are a few more examples of telecommunication. While most people associate telecommunications with modern technologies, the strict definition of the term encompasses primitive and even ancient forms of telecommunication. Among these is the use of smoke signals as a kind of visual telegraph. Puffs of smoke were timereleased by smothering a fire with a blanket, then quickly removing and replacing the blanket. Widely used by the American Indians, smoke signals could communicate short messages over long distances, assuming a clear line of sight.

1.2 Internet protocol:


The Internet Protocol (IP) is the principal communications protocol used for

relaying datagrams (also known as network packets) across aninternetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. For this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram source and destination. Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-

Joginpally BR Engineering College

Page 1

oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP. The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the internet. Its successor is Internet Protocol Version 6(IPv6), which is increasing in use.

1.3 Routing information protocol:


The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process. RIP implements the split horizon, route poisoning and hold down mechanisms to prevent incorrect routing information from being propagated. These are some of the stability features of RIP. It is also possible to use the so called RMTI[1] (Routing Information Protocol with Metricbased Topology Investigation) algorithm to cope with the count-to-infinity problem. With its help, it is possible to detect every possible loop with a very small computation effort. Originally each RIP router transmitted full updates every 30 seconds. In the early deployments, routing tables were small enough that the traffic was not significant. As networks grew in size, however, it became evident there could be a massive traffic burst every 30 seconds, even if the routers had been initialized at random times. It was thought, as a result of random initialization, the routing updates would spread out in time, but this was not true in practice. Sally Floyd and Van Jacobson showed in 1994[2] that, without slight randomization of the update timer, the timers synchronized over time. In most current networking environments, RIP is not the preferred choice for routing as its time to converge and scalability are poor compared toEIGRP, OSPF, or IS-IS (the latter two being link-state routing protocols), and (without RMTI) a hop limit severely limits the size of network it can be used in. However, it is easy to configure, because RIP does not require any parameters on a router unlike other protocols (see here for an animation of basic RIP simulation visualizing RIP configuration and exchanging of Request and Response to discover new routes). Joginpally BR Engineering College Page 2

RIP uses the User Datagram Protocol (UDP) as its transport protocol, and is assigned the reserved port number 520.[3]

1.4 Router:
A router is an electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. It is also called as a layer three switch. Each data packet contains address information that a router can use to determine if the source and destination are on the same network or on another. They work on the logical addresses known as IP (internet protocol) addresses. When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks. Routers generally forward data in the form of packets. The main function of router is routing and forwarding the data packets.

Figure 1.1 Wireless Router

1.5 Router backup: Backup hardwares configuration is the one important routine for network engineers so that when the hardware break down you can recover the failed system within an acceptable time. To backup the configuration, one effective way is to use TFTP to backup and restore configuration between remote hosts.In the example below, Ill show how to backup and restore configurations between TFTP server and Ciscos router .The TFTP Server will use Cisco TFTP Server software.

Joginpally BR Engineering College

Page 3

CHAPTER-2 GENERAL THEORY


2.1 Open system interconnection:
The international standard organization introduced the OSI model for standardization in 1984 in order to provide a reference model to guide product implementers so that products will consistently work with other products of different vendors to interoperate in networks. OSI stands for open system interconnection The OSI layer shows WHAT needs to be done to send data from an application on one computer through a network to an application in another computer but not HOW it should be done. The main idea in OSI is that the process of communication between two end points in a communication network can be divided into layers, with each layer adding its own set of special, related functions. The basic definitions that have to be known before having a detail study about OSI system are as follows:

System: A system is one or more autonomous computers and their associated software,
peripherals and users, which are capable of information processing and/or transfer.

Subsystem: A logically independent smaller unit of a system. A succession of subsystems


makes up a system.

Layer: A layer is composed of subsystems of the same rank of all the interconnect systems. Entity: The functions in a layer are performed by hardware subsystems and/or software
packages. These are known as entities. Entities in the same layer but not in the same subsystem are known as peer entities. Peer entities communicate using peer protocols. Data exchange between peer entities is in the form of protocol data units (PDU). Data exchange between entities of adjacent layers is in the form of interface data units (IDU). Service data unit (SDU) is a unit

of data that has been passed down from an OSI layer to a lower layer and that has not yet been encapsulated into a PDU by the lower layer. It is a set of data that is sent by a user of the service of a given layer, and is transmitted semantically unchanged to peer service user.

Joginpally BR Engineering College

Page 4

2.1.1 OSI reference model and its layers:


OSI reference model propose a general layered concept, with provision for adding or deleting layers as demanded by factors like service complexity, technology options etc. OSI model is a 7 layered model. These seven layers can be divided into two categories: upper layers and lower layers. The upper layers deal with application issues and generally are implemented only in software. The lower layers deal with data transport issues. These are implemented in hardware and software. The seven layers are as described below.

Application layer (layer 7) Presentation layer (layer 6) Session layer (layer 5) Transport layer (layer 4) Network layer (layer 3) Data link layer (layer 2) Physical layer (layer 1)

OSI MODEL:

Physical layer:
This layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. The data is in the form of bits. This layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, and physical connectors.

Data link layer:


The data link layer deals with error detections and automatic recovery procedures required when a message is lost or corrupted. It provides functional and procedural means to establish, maintain, and release data link connections. Another important function performed by data link layer is the data flow control, traffic regulation mechanism. The data is in the form of frames.

Joginpally BR Engineering College

Page 5

Figure 2.1 OSI model

Network layer:
The data is in the form of packets. This layer is concerned with transmission of packets from the source node to destination node. It deals with routing and switching considerations that are required in establishing a network connection. It assures a certain quality of service to the upper layers. Since an end to end connection may involve routing through a number of different networks, internetworking is an important function of network layer. Addressing schemes, network capabilities, protocol differences, accounting and billing are all issues to be handled in internetworking. Network congestion which may occur due to many messages on a particular route is also tackled by the network layer.

Joginpally BR Engineering College

Page 6

Transport layer:
This layer is first end to end layer in OSI architecture. It provides reliable data transfer services to the upper layers. It establishes, maintains and terminates virtual circuits. It makes sure that the data is delivered error free and in the correct sequence. It also provides acknowledgement of the successful data transmission. Data is in the form of segments.

Session layer:
This layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between local and remote applications. It provides error reporting for application and presentation layers. Synchronization is provided by this layer.

Presentation layer:
This layer defines coding and conversion functions. It ensures that information sent from application layer of one system is readable by the application layer of another system. Data compression, encryption, translation functions are supported in this layer. This layer is also sometimes called as syntax layer. These are the basic seven layers present in the Open System Interconnect developed by International Standard Organisation.

Application layer:
This layer provides network services directly to applications. This layer is the closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. Application layer functions typically include identifying

communication partners, determining resource availability, and synchronizing communication.

2.2 Protocols:
The OSI model provides a conceptual frame work for communication between computers, but the model itself is not a method of communication. Actual communication is made possible by using communication protocols. In context of data networking a protocol is a set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers.

Joginpally BR Engineering College

Page 7

2.2.1 Types of protocols:


In general two types of protocols are present they are routed protocols and routing protocols.

Routed protocols:
A routed protocol is a network layer protocol that is used to move traffic between networks. IP, IPX, and AppleTalk are all examples of these protocols. Routed protocols allow the host on one network to communicate with a host on another network, with routers forwarding traffic between the source and destination networks. They are characterized by logical addressing (such as an IP or IPX address) that only identifies a source or destination host but also the network (or subnet) on which they reside.

Routing protocols:
These protocols serve a different purpose. Instead of being used to send data between source and destination hosts, a routing protocol is used by routers to exchange routing information with one another. Routing information includes defining the route, updating the routing table etc. examples of routing protocols is RIP, EIGRP, OSPF etc

A wide variety of protocols exist some of they include:

Lan protocols:
They operate at physical and data link layers of the OSI model and define communication over the various LAN media. E.g.: FDDI (fiber distributed data interface), Ethernet, token ring etc. examples of data link layer protocols are SDLC (synchronous data link control), HDLC (high level data link control) etc.

Wan protocols:
They operate at the lowest three layers of the OSI model and define communication over the wide area media. SDLC and HDLC are few examples of these type of protocols.

Joginpally BR Engineering College

Page 8

Routing protocols:
These are network layer protocols that are responsible for exchanging information between routers so that the routers can select the proper path for network traffic. E.g.: RIP (router information protocol), OSPF (open shortest path first) etc.

Routed protocols:
A routed protocol is a network layer protocol that is used to move traffic between networks. IP, IPX, and AppleTalk are all examples of these protocols.

Transport layer protocols:


TCP (transfer control protocol), this is a connection oriented protocol it is reliable. UDP (user datagram protocol) this is a connectionless protocol. It is less reliable. Etc.

Session layer protocols:


Examples of this layer protocols are NFS (network file system) it allows a user on a client computer to access files over a network. Zone information protocols (ZIP) etc.

Presentation layer protocol:


ASCII (American standard code for information interchange), MPEG (moving pictures experts group), JPEG ( joint photographic experts group).these protocols help in data conversion and coding.

Application layer protocols:


FTP (file transfer protocol), SMTP (simple mail transfer protocol), HTTP (hyper text transfer protocol) etc. All these protocols help in providing services to the users through various applications.These are the different protocols present in various layers of OSI reference model.

2.3 IP addresses:
An internet protocol address (IP ADDRESS) is a numerical label that is assigned to any device participating in a computer network that uses the internet protocol for communication between nodes. An IP address serves two principal functions host or network interfacing identification and location addressing. There are two types of internet protocol versions that are being widely used IPV4 and IPV6.

Joginpally BR Engineering College

Page 9

Internet protocol version 4:


It is the fourth revised version in the development of the internet protocol and it is the first version of the protocol to be widely deployed. IPV4 is connectionless protocol for use on packet switched link layer network (Ethernet). It is 32 bit addresses, which limits the address space to 2^32 possible unique addresses. There are two types of IP addresses private IP addresses and public addresses.

Public IP addresses:
These IPs are allocated to general public and can be used only by the persons who purchase these IPs. These are unique and are not accessible by everyone and are publicly registered in the network information system.

private IP addresses:
These IPs are not registered and can be used extensively available for the public use i.e. any one can access these IPs. Almost all the LAN IPs are private IPs.

Classification of IP addresses: Class A:


The range of these IPs is 0.0.0.0 to 127.255.255.255.255. All the IPs in this range except 10.0.0.0 network are used for private IPs while 10.0.0.0 network is allocated as public IP. As we know that these are 32 bit addressing the first 8 bits represent network bits and the remaining 21 bits represent host bits. Class A IPs are mostly used for large networks.

Class B:
The range of these IPs is from 128.0.0.0 to 191.255.255.255.255. All the IPs in this range except from 172.16.0.0 to 172.32.0.0 are used for private use while 172.16.0.0 172.32.0.0 are used in public IP addressing. The first two octets i.e. the first 16 address bits represent network bits while the other two octets represent host bits. These IPs are generally allocated to a medium sized network.

Class C:
The range of these IPs is from 192.0.0.0 to 223.255.255.255. all the IPs in this range are used for private IP addressing except the IPs in the range 192.168.0.0 to 192.168.255.0 which are

Joginpally BR Engineering College

Page 10

used for public addressing. The first three octets represent network bits while the last octet represents host bits. These IPs are used for small to medium networks. Class D: The range of these IPs is from 224.0.0.0 to 239.255.255.255. these IPs are known as multicast IP addresses . Multicasting is the process of sending packets from one device to many other devices without any packet duplication. Class E: The range of these IPs is from 240.0.0.0 to 254.255.255.255. These IPs are used for experimental purposes only and cannot be assigned for general users.

LIMITATIONS OF IPV4:

Addressing space:
The IPv4 address is 32 bit, which allows to allocate 2^32 address.IPv4 present two level addressing hierarchy i.e. network number and host number. Each network interface is identified with one or more unique addresses. Two level addressing hierarchy is convenient but wasteful of the address space.

Auto configuration and mobility:


New technologies (mobile equipment, wireless network) are emerging and its use is quickly becoming common. IPV4 did not foresee its use. There is no automatic way of automatically configure this kind of equipment.

Support and real time applications:


Services such as the transmission of real time audio and video are becoming common nowadays. IPV4 does not provide for ways of managing and reserving bandwidth, which is a drawback to the user of real time services with IPV4.

Security:
No security at the network layer.

Rapid growth:
Growth of TCP/IP usage into new areas will result in a rapid growth in the demand for unique IP addresses.

Proliferation:
Joginpally BR Engineering College Page 11

Networks are proliferating rapidly.

INTERNET PROTOCOL VERSION 6:


IPV6 is an improved version of the current and most widely used internet protocol, IPV4. Generally the message sent via an IP is broken up into packets, which may travel via a number of different routes to their final destination and are reassembled into their original form. IPV6 is also known as IPNG (IP Next Generation). IPV6 includes the following enhancements over IPV4: Expanded address space Improved option mechanism Address auto configuration Increased addressing flexibility Support for resource allocation Security capabilities It is a hexadecimal addressing system i.e. 128 bit addressing

In most regards, IPv6 is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed internet-layer addresses, such as FTP etc.IPV6 specifies a new packet format designed to minimize packet header processing by routers because the headers of IPV4 packets and IPV6 packets are significantly different, the two protocols are not interoperable. IPV6 is still in infant stage i.e. not completely used. It takes sometime for the penetration of IPV6 in the market.

2.4 SUBNETTING: concept of subnetting:


A subnetwork or subnet, is a logically visible subdivision of an IP network. Subnetting is the process of designating some high order bits from the host part and grouping them with the network mask to form the subnet mask. This divides a network into smaller subnets. In precise it is a sub network in a network. Joginpally BR Engineering College Page 12

The default subnet mask of class A IP addresses is 255.0.0.0 so it can handle 2^24 host i.e. 16,777,216 hosts. The default subnet mask of class B IP addresses is 255.255.0.0 so it can handle2^16 hosts i.e. 65,536 hosts. The default subnet mask of class C is 255.255.255.0 so it can handle 2^8 hosts i.e. 256 hosts. In brief subnetting can be defined as conversion of network bits into host bits.There are two types of subnet masks fixed length subnet mask and variable length subnet mask.

Fixed length subnet mask:


FLSM follows a network wide rule that each network is assigned a fixed number of subnets irrespective of their requirement and demand. In this type of subnetting there is a chance of wastage of IP addresses if there are no much hosts present in the network. If there is an increased demand for IPs in a network, through FLSM more subnets other than what they were allocated cannot be provided. For equal distribution of IPs FLSM is used. To overcome this problem variable length subnet mask was introduced.

Variable length subnet mask:


VLSM is a means of allocating IP addressing resources to subnets according to their individual need rather than some general network-wide rule. This is a technique used to allow more efficient assignment of IP addresses. To conserve address space, making it possible to define subnets of varying sizes variable length subnet masking was introduced. Through this technique subnets can be provided as required and there is no wastage or deficit of IPs. For unequal distribution of IPs VLSM is used. Number of network bits, number of host bits and the number of masks can be calculated using the formula: 2^h=required number of hosts. Thus this topic on IP addresses can be summarised as IP addresses are very useful in identifying a device on a network and in providing extensive connectivity and enormous data exchange between remote devices on a network.

2.5 ROUTERS
A router is an electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same Joginpally BR Engineering College Page 13

network or if the data packet must be transferred from one network to another. When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks and such table is called as routing table. A router is a networking device whose software and hardware are customized to the tasks of routing and forwarding information. A router has two or more network interfaces, which may be different types of network (such as copper cables, fiber or wireless) or different network standards. Each network interface is a specialised device that converts electric signals from one form to another. Routers connect two or more logical subnets each having a different network addresses. The subnets in the router do not necessarily map one to one to the physical interfaces of the router. The term layer 3 switching is often used interchangeably with the term routing. The term switching is generally used to refer to data forwarding between two network devices with the same network address. This is also called layer 2 switching or LAN switching.

2.5.1 OPERATION:
Conceptually, a router operates in two operational planes Control plane: where a router builds a table (routing table) as how a packet should be forwarded through which interface, by using either statically configured statements (called static routes) or by exchanging information with other routers in the network through a dynamical routing protocol.

Forwarding plane: where the router actually forwards traffic (called packets) from ingress
(incoming) interfaces to an egress (outgoing) interface that is appropriate for the destination address that the packet carries with it, by following rules derived from the routing table that has been built in the control plane.

Joginpally BR Engineering College

Page 14

2.5.2 TYPES OF ROUTERS: Customer edge router: In short these routers are known as CE routers. These routers are
located at the customer premises that interface to a service provider router i.e. it provides Ethernet interface between customers LAN and the service provider.

Provider edge router: In short these routers are known PE routers. These are located at the
service providers network and are connected to CE router directly.

P router: A P router is a provider router is a label switch router. These routers have no
knowledge of the customer prefixes; they just label the switch packets. Based on the way they are connected there are two types of routers. Wired router and wireless router.

2.5.3 Functions of a router:


It performs packet switching i.e. logical addressing It does packet filtering i.e. access control. It helps in internetwork communication It performs path selection.

Significance of mac address:


MAC stands for Media Access Control. MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment. These addresses are often assigned by the manufacturer of the network interface card and are stored in its hardware, the cards ROM or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturers registered identification number. It may also be known as an Ethernet hardware address (EHA) or physical address.

2.5.4 INTERFACES OF A ROUTER:


The interfaces on a router provide network connectivity to the router. Console and auxiliary ports are used for managing the router. Routers also have ports for LAN and WAN connectivity.

Joginpally BR Engineering College

Page 15

The LAN interfaces usually include Ethernet, fast Ethernet, fiber distributed data interface (FDDI) or token ring. The auxiliary port is used to provide LAN connectivity. One can use a converter to attach LAN to the router. Synchronous and asynchronous serial interfaces are used for WAN connectivity. ISDN (Integrated Services Digital Network) interfaces are used to provide ISDN connectivity. Using ISDN, one can transmit both video and data.

Ethernet interface:
Ethernet is one of the earliest LAN technologies. An Ethernet LAN typically uses special grades of twisted pair cabling. Ethernet networks can also use coaxial cable, but this cable medium is becoming less common. The most commonly installed Ethernet systems are called 10BaseT. The router provides the interfaces for twisted pair cables. A converter can be attached to the AUI port of a router to connect to a 10base2, 10baseT, or 10base5 LAN interface. Ethernet and Token Ring use MAC addressing (physical addressing). The Ethernet interfaces on the router are E0, E1, E2, and so on. E stands for Ethernet, and the number that follows represents the port number. These interfaces provide connectivity to an Ethernet LAN. In a non-modular Cisco router, the Ethernet ports are named as above, but in modular routers they are named as E0/1, where E stands for Ethernet, 0 stands for slot number, and 1 stands for port number in the slot. Similarly another Ethernet interface called as Fast Ethernet is available. It is denoted as fa and numbered similar to the Ethernet interface.

Token ring interface:


Token Ring is the second most widely used LAN technology after Ethernet, where all computers are connected in a logical ring topology. Physically, each host attaches to an MSAU (Multistation Access Unit) in a star configuration. MSAUs can be chained together to maintain the logical ring topology. An empty frame called a token is passed around the network. A device on the network can transmit data only when the empty token reaches the device. This eliminates collisions on a Token Ring network. Token ring uses MAC addresses like any other technology. The Token Ring interfaces on a non-modular router are To0, To1, To2 and so on. To stands for Token Ring and the number following To signifies the port number. In a modular router, To will be followed by the slot number/port number. Joginpally BR Engineering College Page 16

Fiber distributed data interface:


Fiber Distributed Data Interface (FDDI) is a LAN technology that uses fiber optic cable. FDDI is a ring topology that uses four-bit symbols rather than eight-bit octets in its frames. The 48-bit MAC addresses have 12 four-bit symbols for FDDI. FDDI is very fast and provides a data transfer rate of 100 Mbps and uses a token-passing mechanism to prevent collisions. FDDI uses two rings with their tokens moving in opposite directions to provide redundancy to the network. Usually only one ring is active at a given time. If one ring breaks, the other ring is used and the network does not experience downtime. FDDI interfaces on a nonmodular Cisco router are F0, F1, F2 and so on. F stands for FDDI and the number following F signifies the port number. In a modular router, a slot number/port number will follow F.

Integrated services digital network interface:


Integrated Services Digital Network (ISDN) is a set of ITU-T (Telecommunication Standardization Sector of the International Telecommunications Union) standards for digital transmission over ordinary telephone copper wire as well as over other media. ISDN provides the integration of both analog or voice data together with digital data over the same network. ISDN has two levels of service: Basic Rate Interface (BRI) Primary Rate Interface (PRI)

The BRI interfaces for ISDN on a non-modular router are BRI0, BRI1, and so on, with the number following BRI signifying the port number. In a modular router, BRI is followed by the slot number/port number.

Synchronous and asynchronous interfaces:


Synchronous transmission signals occur at the same clock rate and all clocks are based on a single reference clock. Since asynchronous transmission is a character-by-character transmission type, each character is delimited by a start and stop bit, therefore clocks are not needed in this type of transmission. Synchronous communication requires a response at the end of each exchange of Frames, while asynchronous communications do not require responses. Support for the Synchronous Serial interface is supplied on the Multiport Communications Interface (CSC-MCI) and the Serial Port Communications Interface (CSC-SCI) Joginpally BR Engineering College Page 17

network interface cards. The Asynchronous Serial interface is provided by a number of methods, including RJ-11, RJ-45, and 50-pin Telco connectors Some ports can function both as Synchronous Serial interfaces and Asynchronous Serial interfaces. Such ports are called Async/Sync ports. The Async/Sync ports support Telco and RJ11 connectors.

2.5.5 MEMORIES IN ROUTER:


The various types of memories present in a router are DRAM, EPROM, NVRAM and FLASH memories.

DRAM:
DRAM stands for Dynamic Random Access Memory. It has two types of memories. Primary, main or processor memory, which is reserved for the CPU to execute IOS software and to hold the running configuration and routing tables. Shared, packet or I/O memory which buffers data transmitted or received by the routers network interfaces.

EPROM:
EPROM stands for Erasable Programmable Read Only Memory is usually referred to as a boot ROM. EPROM is generally programmed at some point during the latter stages of manufacture, and cannot generally be changed by the users. EPROM is generally loaded with two crucial firmware components. The first is a boot loader which takes over should the device fail to find a valid bootable image in flash memory, and provides alternate boot options. If even this failsafe should fail, the second firmware application installed on the EPROM is used, the ROM monitor. ROM monitor has a user interface and includes options for troubleshooting failures of the ROM chips.

NVRAM:
NVRAM stands for Non Volatile Random Access Memory. It stores important configuration information used by the IOS during boot and by some programs during start up, which is stored in the starting configuration file. NVRAM also the functionality provided by the

Joginpally BR Engineering College

Page 18

software configuration register, which allows a device to be booted and selection from multiple IOS images that may available in flash memory. It is sometimes called as shared memory.

Flash memory:
Flash memory is the most diverse of each of these types and it comes in many forms, however, its primary use is to store a bootable IOS image from which a device can start. Most devices have onboard flash memory from which the device boots, however some equipment particularly higher end hardware components also have the capability to boot from an image stored on a flash memory, which ids removable.

2.5.6 DESIRABLE PROPERTIES OF ROUTERS:


Correctness and simplicity: The packets are to be correctly delivered. Simpler Routing algorithm, it is better. Robustness: Ability of the network to deliver packets via some route even in the face of failures. Stability: The algorithm should converge to equilibrium fast in the face of changing conditions in the network. Fairness and optimality: obvious requirements, but conflicting. Efficiency: Minimum overhead while designing a routing protocol it is necessary to take into account the following design parameters: Performance Criteria: Number of hops, Cost, Delay, Throughput, etc Decision Time: Per packet basis (Datagram) or per session (Virtual-circuit) basis Decision Place: Each node (distributed), Central node (centralized), Originated node (source) Network Information Source: None, Local, Adjacent node, Nodes along route, All nodes Network Information Update Timing: Continuous, Periodic, Major load change, Topology change To summarize the topic about routers, in brief Routers are the layer three switches belong to the network layer of OSI reference model. They play vital role in exchange of data packets even between remote devices in a network. Router has various interfaces that help the user to connect them to various networks. They also have a bunch of memories which help in efficient and effective working of a router. Joginpally BR Engineering College Page 19

2.6 ROUTING
Introduction of routing: Routing is the act of moving information across an inter-network from a source to a destination. Along the way, at least one intermediate node typically is encountered. Its also referred to as the process of choosing a path over which to send the packets. Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer. The primary difference between the two is that bridging occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways. The routing algorithm is the part of the network layer software responsible for deciding which output line an incoming packet should be transmitted on, i.e. what should be the next intermediate node for the packet Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement; such as path bandwidth, reliability, delay, current load on that path etc; that is used by routing algorithms to determine the optimal path to a destination. To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information. Route information varies depending on the routing algorithm used. Routing algorithms fill routing tables with a variety of information. Mainly Destination/Next hop associations tell a router that a particular destination can be reached optimally by sending the packet to a particular node representing the "next hop" on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop. Some of the routing algorithm allows a router to have multiple next hop for a single destination depending upon best with regard to different metrics. For example, lets say router R2 is be best next hop for destination D, if path length is considered as the metric; while Router R3 is the best for the same destination if delay is considered as the metric for making the routing decision.

Joginpally BR Engineering College

Page 20

2.6.1 TYPES OF ROUTING:


Depending upon the way the data packets are routed between the routers in a network and the way in which the routing table is updated, routing is mainly classified into two types, static routing and dynamic routing.

Static routing:
Static routing is the term used to refer to a manual method that is used to set up routing between networks. The network administrator configures static routes in a router by entering routes directly into the routing table of a router. Static routing is a hard coded path in the router that specifies how the router will get to a certain subnet by using certain path. A static route to every network must be configured on every router for full connectivity. This provides a granular level of Control over routing, but quickly becomes impractical on large networks.

Dynamic routing:
Dynamic routing is typically used in larger networks to ease the administrative and operational overhead of using only static routes. Dynamic routing has evolved to meet the demands of changing network requirements. It is an adaptive routing that describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change. A dynamic routing table is created, maintained, and updated by a routing protocol running on the router.

2.6.2 TYPES OF DYNAMIC ROUTING PROTOCOLS:


There are two types of dynamic routing protocols: Interior gateway routing protocols and exterior routing protocols.

Exterior routing protocols:


To get from place to place outside your network i.e. on the internet you must use an Exterior Gateway Protocol. Exterior Gateway Protocols handle routing outside an Autonomous System and get you from your network, through your Internet provider's network and onto any other network. BGP is used by companies with more than one Internet provider to allow them to Joginpally BR Engineering College Page 21

have redundancy and load balancing of their data transported to and from the internet. These protocols are used to connect between routers of different service providers. Examples of a EGP: Border gateway protocol (BGP).

Interior gateway routing protocols:


Interior Gateway Protocols (IGPs) handle routing within an Autonomous System (one routing domain). In plain English, IGP's figure out how to get from place to place between the routers you own. The dynamic keep track of paths used to move data from one end system to another inside a network or set of networks that you administrate (all of the networks you manage combined are usually just one Autonomous System). IGP's are how you get all the networks communicating with each other. These protocols are used to connect the routers of the same service provider. Examples of IGRP: Routing Information Protocol (RIP), Extended Interior Gateway Protocol (EIGRP), Open Shortest Path First (OSPF) etc. In brief this unit dealt with introduction of routing information protocols and their advantages and disadvantages.

2.7 ROUTING INFORMATION PROTOCOL


The Routing Information Protocol (RIP) provides the standard IGP protocol for local area networks, and provides great network stability, guaranteeing that if one network connection goes down the network can quickly adapt to send packets through another connection. In short this protocol is called as RIP. RIP is Distance vector routing protocol type. Before discussing about RIP it is important to know certain basic definitions.

Metric:
Metric is a property of a route in computer networking consisting of any value used by routing algorithms to determine whether one route should perform better than another (the route with the lowest metric is the preferred route). The routing table stores only the best possible routes, while link state or topological databases may store all other information as well. For example RIP uses hop count (number of hops) to determine the best possible route. So in simple language metric is a measure or a unit followed by the routing protocol. A Metric can include: Number of hops (hop count) Page 22

Joginpally BR Engineering College

Speed of the path Packet loss (router congestion/conditions) Latency (delay) Path reliability Path bandwidth Cost Load etc.

2.7.1 RIP:
RIP is also called as Routing by rumour .RIP is a dynamic routing protocol used in local and wide area networks. As we know it is classified as an interior gateway protocol (IGP). It uses the distance vector routing algorithm. The protocol has since been extended several times, resulting in RIP Version 2. Both versions are still in use today, however, they are considered to have been made technically obsolete by more advanced techniques such as Open Shortest Path First (OSPF) etc. RIP has also been adapted for use in IPV6 networks, a standard known as RIPng (RIP next generation) protocol was also introduced.

History of RIP:
The Routing Information Protocol (RIP) was written by C. Hedrick from Rutgers University in June 1988, and has since become the most common internet routing protocol for routing within networks. RIP is based on the computer program "routed", which was widely distributed with the Unix 4.3 Berkeley Software Distribution (BSD) operating system, and became the actual standard for routing in research labs supported by vendors of network gateways. All RIP routing protocols are based on a distance vector algorithm called the BellmanFord algorithm, after Bellman's development of the equation used as the basis of dynamic programming, and Ford's early work in the area. Software based on these algorithms was used as early as 1969 on the Advanced Research Projects Agency Network (ARPANET), but the main protocol development was done by the Xerox network research and development division. The earliest RIP protocol was the PUP protocol, which used the Gateway Information Protocol to exchange routing information, and was invented by a team that included R. M. Metcalfe, who later developed the Ethernet physical layer network protocol. The PUP protocol was later Joginpally BR Engineering College Page 23

upgraded to support the Xerox Network Systems (XNS) architecture, and named "Routing Information Protocol", usually just called RIP.

2.7.2 Technical details & working:


RIP is a distance-vector routing protocol, which employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process. What makes RIP work is a routing database that stores information on the fastest route from computer to computer, an update process that enables each router to tell other routers which route is the fastest from its point of view, and an update algorithm that enables each router to update its database with the fastest route communicated from neighbouring routers: Database: Each RIP router on a given network keeps a database that stores the following information for every computer in that network. IP Address: The Internet Protocol address of the computer. Gateway: The best gateway to send a message addressed to that IP address. Distance: The number of routers between this router and the router that can send the message directly to that IP address. Route change flag: A flag that indicates that this information has changed, used by other routers to
update their own databases.

Timers: Various timers are also used to help in proper functioning of the protocol.

2.7.3 ALGORITHM
The RIP algorithm works like this: Update: At regular intervals each router sends an update message describing its routing database to all the other routers that it is directly connected to. Some routers will send this message as Joginpally BR Engineering College Page 24

often as every 30 seconds, so that the network will always have up-to-date information to quickly adapt to changes as computers and routers come on and off the network. Propagation: When a router X finds that a router Y has a shorter and faster path to a router Z, then it will update its own routing database to indicate that fact. Any faster path is quickly propagated to neighbouring routers through the update process, until it is spread across the entire RIP network.

2.7.4 VERSIONS:
There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng.

1) RIP Version 1:
The original specification of RIP uses class full routing. The periodic routing updates do not carry subnet information, lacking support for VLSM. This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks. The RIP version 1 works when there is only 16 hop counts (015).If there are more than 16 hops between two routers it fails to send data packets to the destination address.

2) RIP Version 2:
Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was developed in 1993 and last standardized in 1998. It included the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature allows fine-grained interoperability adjustments. In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1 which uses broadcast. Unicast addressing is still allowed for special applications. Joginpally BR Engineering College Page 25

3) RIPng:
RIPng (RIP next generation), defined in is an extension of RIPv2 for support of IPV6 the next generation Internet Protocol. The main differences between RIPv2 and RIPng are: Support of IPv6 networking. While RIPv2 supports RIPv1 updates authentication, RIPng does not. IPv6 routers were, at the time, supposed to use IPsec for authentication. RIPv2 allows attaching arbitrary tags to routes, RIPng does not; RIPv2 encodes the next-hop into each route entries, RIPng requires specific encoding of the next hop for a set of route entries

Joginpally BR Engineering College

Page 26

CHAPTER-3 BLOCK DIAGRAM AND DESCRIPTION

3.1 GENERAL NETWORK TOPOLOGY:


A network topology shows all the network elements that are connected in a network. It is as shown in below.

Figure 3.1 Network topology

The basic building blocks those are required in construction and maintenance of a network is called as the network elements. The various network elements are: Joginpally BR Engineering College Repeaters Hubs Switches Page 27

Bridges Routers Gateway etc

3.2 Repeater:

Figure 3.2 Repeater

A repeater regenerates a signal from one port to another to which they are connected. These are operated in physical layer. Hence these devices are also called as layer one devices. It does not filter or interpret anything instead; it merely repeats a input signal the primary purpose of a repeater is to enable the network to expand beyond the distance limitations of the transmission medium. There are various multiple port repeaters available e.g.16 port, 8 ports etc. it suppresses noise and helps inefficient transmission of data. They dont requRire any addressing information. They are inexpensive and simple. The disadvantage is that they only support broadcasting and also passes electrical storms generated by huge amount of computers.

3.3 Hub:

Figure 3.3 Hub

A hub is a small, simple, inexpensive device that joins multiple computers together. Many network hubs available today support the Ethernet standard. Other type including USB Joginpally BR Engineering College Page 28

hub also exist, but Ethernet is the type traditionally used in home networking.A hub is a layer one device. It does not read any of the data passing through them and are not aware of their source or destination. A hub simply receives the incoming packets and broadcasts these packets out to all devices on the network. It is generally a rectangular box made of plastic or fiber that receives power from an ordinary wall outlet. A hub remains very popular in small networks for its low cost. 3.4 BRIDGES:

Figure 3.4 Bridges A bridge is a layer two device. It has only two ports and all its decisions are made on basis of MAC addresses or layer two addresses but do not depend on logical addressing. It is used for managing traffic. Basically there are two types of bridges. A bridge called as translating bridge connects two different LAN segments such as token rings, Ethernets etc. and the other type of bridge known as transparent bridges move data between two similar LAN segments. The successor of the bridge is the switch.

3.5 SWITCHES:
A switch is a layer two device that forwards traffic based on media access control (MAC) layer i.e. Ethernet or token ring addresses. It is a multiport bridge and a successor of bridge. It is used to interconnect a number of Ethernet local area networks to form a large Ethernet network. The purpose of the switch is to forward the packets only to the desired destination segment of the network whenever possible minimising the traffic on the network. The disadvantage is that the switch cannot connect different LAN segments like Ethernets; token rings etc. There are three distinct features of switch they are:

Joginpally BR Engineering College

Page 29

Figure 3.5 switch

Address learning: layer two switches remember the source hardware address of each frame
received on an interface, and they enter this information into a Mac database called as forward/filter table.

Forward filter decisions: when a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port.

Loop avoidance: if multiple connections between switches are created for redundancy
purposes network loops can occur. Spanning tree protocol is used to stop network loops while still permitting redundancy

3.6 ROUTERS:
A router is electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. It is also called as a layer three switch. Each data packet contains address information that a router can use to determine if the source and destination are on the same network or on another. They work on the logical addresses known as IP (internet protocol) addresses

. Figure 3.6 Router

Joginpally BR Engineering College

Page 30

When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks. Routers generally forward data in the form of packets. The main function of router is routing and forwarding the data packets.

3.7 GATEWAY:
A gateway can translate information between different network data formats or network architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. Most gateways operate at the application layer, but can operate at the network or session layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the required level and repackage the information and work its way back toward the hardware layer of the OSI model

Figure 3.7 Router (wired) Joginpally BR Engineering College Page 31

Figure 3.8 Gateway (wired):

Figure 3.9 Gateway(wireless):

These are the various network elements that are most commonly used in a network for establishing a efficient connectivity required for effective data exchange between different devices in different networks.

Joginpally BR Engineering College

Page 32

CHAPTER4 DESIGN METHODOLOGY

4.1 ROUTER COMMANDS


In general there are two types of modes in a router they are privileged mode and user mode. The following are few commands that help in configuring a router.

Enable

To get to privileged mode

Config t

To get to configuration tab

hostname

To assign a name to the router

Interface

It interfaces serial/Ethernet ports

No shut

Activates interfaces

IP address

Assigns IP address

Wr mem

To Save the data

Joginpally BR Engineering College

Page 33

Encapsulation ppp

Brings all routers on a network to point to point protocol as a default protocol

Router rip

To configure protocol

and implement RIP

Router eigrp

To configure and implement EIGRP protocol

Router ospf

To configure and implement OSPF protocol

show ip route

Shows the ip routes

^z

Returns

directly

to

config

tab

to

privileged mode

network

Assigns a network

Show run

It shows the complete status of router

Joginpally BR Engineering College

Page 34

Ping

to connect the other routers and end devices

Table 1 Router commands These are few router commands which are most regularly used. Using these commands one can configure a router in a network and also can implement required routing protocol. In the forthcoming units we shall learn about implementation of routing protocols especially implementation of Interior gateway routing protocols i.e. RIP, EIGRP, and OSPF.

4.2 SIMULATOR:
The simulator used to implement the Interior Gateway Routing Protocols is CISCO PACKET TRACER 5.1. Using this simulator Static routing, RIP, EIGRP and OSPF are implemented. Here is a brief introduction about the simulator, which helps to understand how to use it before working with it. This simulator allows using different types of routers, switches, connectors and end devices. We can also develop different network topologies using this simulator.

4.2.1 CISCO PACKET TRACER 5.1: Protocol Improvements:


Packet Tracer 5.1 models protocols not included in earlier versions. These protocols include models of IPv6 Routing, IPv6 and IPv4 Dual Stack, IPv6 ND, IPv6 Routing Protocols, DHCPv6, NATv6, Multi-Area OSPF, Redistribution, RSTP, SSH, Multilayer Switching, and EtherChannel. Also, a model of the Cisco Catalyst 3560-24PS Multilayer Switch has been added.

Joginpally BR Engineering College

Page 35

Extendable Architecture: GUI Improvements:


Packet Tracer 5.1 retains the logical topology as the primary workspace but adds additional physical representations of devices, Real-time and Simulation modes, and a wide variety of views and windows. The GUI supports multiple languages so the application may be locally translated. New features included in Packet Tracer 5.1 are the following: Multiuser, ACL Filters, user profile, improved print functuality, the ability to toggle toolbars in the main interface, Desktop tab for the Server including IP Configuration and Command Prompt dialogs, and various Activity Wizard improvements including additional locking items, the ability to import/export activity instructions, assign point values and component categories to assessment items, lock the user profile, toggle the Dynamic Percentage Feedback, and the ability to test an activity without restarting from beginning.

Representation and Visualization Tools:


An Event List, a form of global network sniffer, is included in Packet Tracer 5.1. This allows the display of the majority of simulated PDUs as events. For detailed protocol analysis, these events may be played in a continuous animation mode, forward, backward or in a stepped through process. Powerful OSI Layer view and PDU view, and more sophisticated custom PDUs, are also supported

Annotation and Authoring Capabilities:


Packet Tracer 5.1 improves upon the Activity Wizard of versions 3.2 and 4.0. It also includes templates, or "design patterns," for four different types of problem-solving activities: concept builders (network modeling problems), skill builders (pre-lab and post-lab implementation and practice activities), design problems, and troubleshooting problems. Packet Tracer 5.1 is a standalone, medium-fidelity, simulation-based learning environment for networking novices to design, configure, and troubleshoot computer networks at Joginpally BR Engineering College Page 36

a CCNA-level of complexity. Packet Tracer supports student and instructor creation of simulations, visualizations, and animations of networking phenomena. Like any simulation, Packet Tracer 5.1 relies on a simplified model of networking devices and protocols. Real computer networks remain the benchmark for understanding network behavior and developing networking skills. Packet Tracer was created to help address the "digital divide" in networking education, where many students and teachers lack access to equipment, bandwidth, and interactive modes of learning networking. We invite you to use the help files and tutorials to learn about the major features of the program, which include the items in the following table

Item

Description LAN: Ethernet (including CSMA/CD*), 802.11 wireless* Switching: VLANs, 802.1q, trunking, VTP, DTP, STP*, RSTP, multilayer switching, Etherchannel TCP/IP: HTTP, DHCP, DHCPv6, Telnet, SSH, TFTP, DNS, TCP*, UDP, IP, IPv6, ICMP, ICMPv6, ARP, IPv6 ND

Protocol

Routing: static, default, RIPv1, RIPv2, EIGRP, single-area OSPF, multi-area OSPF, inter-VLAN routing Other: ACLs (standard, extended, and named), CDP, NAT (static, dynamic, and overload), NATv6 WAN: HDLC, PPP, and Frame Relay* * indicates substantial modeling limitations imposed

Network topology creation Devices: generic, real, and modular Logical Workspace Routers, switches, hosts, hubs, bridges, wireless access points, wireless routers, clouds, and DSL/cable modems Device interconnection through a variety of networking media

Joginpally BR Engineering College

Page 37

Multiuser remote networks

Hierarchy of device, wiring closet, building, city, and intercity views Physical Workspace Loading of user-created graphics Wireless association management

Realtime protocol updates Realtime Mode Medium-fidelity Cisco IOS CLI configuration of routers and switches

Packet animation Simulation Mode Global event list (packet sniffer) OSI Model, Detailed PDU, and Device Table Views User-defined multiple packet scenarios

Extensive file-saving options Activity Wizard for authoring automatically scored practice activities and formative assessment Challenge Mode allowing users to make device algorithm decisions on packets Easily translated GUI Extensive textual and graphical annotation features External Joginpally BR Engineering College Applications (ExApps) through Inter-process Page 38

Local Authoring and Sharing

Communication (IPC)

Table 2 Features of Program More details can be available in the help tab of the simulator. The work space looks as shown below

4.2.2 DESCRIPTION OF WORK SPACE


When you open Packet Tracer 5.1, by default you will be presented with the following interface: This initial interface contains ten components. If you are unsure of what a particular interface item does, move your mouse over the item and a help balloon will explain the item. One can drag the required device from the network component box to the workspace and simulate the require network This bar provides the File, Edit, Options, View, Tools, Extensions, and Help menus. You will find basic commands such 1 Menu Bar as Open, Save, Print, and Preferences in these menus. You will also be able to access the Activity Wizard from the Extensions menu.

Joginpally BR Engineering College

Page 39

Figure 4.1 Work Space

Main Tool Bar 2

This bar provides shortcut icons to the File and Edit menu commands. This bar also provides buttons for Zoom, the drawing Palette, and the Device Template Manager. On the right, you will also find the Network Information button, which you can use to enter a description for the current network (or any text you wish to include).

Joginpally BR Engineering College

Page 40

This bar provides access to these commonly used workspace 3 Common Bar Tools tools: Select, Move Layout, Place Note, Delete, Inspect, Add Simple PDU, and Add Complex PDU. See "Workspace Basics" for more information.

You can toggle between the Physical Workspace and the Logical Workspace with the tabs on this bar. In Logical Workspace, this bar also allows you to navigate through levels Logical/Physical 4 Workspace Navigation Bar and of a cluster, create a new New Cluster, Move Object, Set Tiled Background, and Viewport. In Physical Workspace, this bar allows you to navigate through physical locations, create a New City, create a New

Building, create a New Closet, Move Object, apply Grid to the background, Set Background, and go to the Working Closet.

Workspace

This area is where you will create your network, watch simulations, and view many kinds of information and statistics.

You can toggle between Realtime Mode and Simulation Mode with the tabs on this bar. This bar also provides buttons to 6 Realtime/Simulation Bar Power Cycle Devices as well as the Play Control buttons and the Event List toggle button in Simulation Mode. Also, it contains a clock that displays the relative Time in Realtime Mode and Simulation Mode.

Joginpally BR Engineering College

Page 41

This box is where you choose devices and connections to put NetworkComponent 7 Box into the workspace. It contains the Device-Type Selection Box and the Device-Specific Selection Box.

Device-Type Selection Box

This box contains the type of devices and connections available in Packet Tracer 5.1. The Device-Specific Selection Box will change depending on which type of device you choose.

Device-Specific Selection Box

This box is where you choose specifically which devices you want to put in your network and which connections to make.

10

User

Created

This window manages the packets you put in the network during simulation scenarios. See the "Simulation Mode" section for more details.

Packet Window*

Table 3 Components of work space

4.2.3 IMPLEMENTATION OF ROUTING PROTOCOLS


The following algorithm gives a clear idea on how to implement various routing protocols using the simulator.

Algorithm:
1) Open the simulator 2) Create the required network topology by dragging the required number of routers, switches, end devices and other connecting devices from the network component box to the work space. 3) Initialise the router 4) Configure the router with required routing protocol like STATIC, RIP, EIGRP etc 5) Execute by pinging the routers and the end devices and observe the success rate. Joginpally BR Engineering College Page 42

Implementation of routing protocols having three routers, three switches and nine end devices three for each router

CONFIGURING THE ROUTERS:


Consider the three routers with their default names as router0, router1, router2.

Commands at Router0:
router0>enable router0#config t router0(config)#hostname HYD HYD(config)#interface serial0/0 HYD(config-if)#ip address 192.168.15.1 255.255.255.0 HYD(config-if)#no shut HYD(config-if)#interface fastethernet0/0 HYD(config-if)#ip address 192.168.9.1 255.255.255.0 HYD(config-if)#no shut HYD(config-if)#^z HYD#wr mem

By using the above commands router0 is named as HYD and its serial and fast Ethernet interfaces are assigned with some IP addresses.

Commands at router1:
router1>enable router1#config t router(config)#hostname GOA GOA(config)#interface serial0/0 GOA(config-if)#ip address 192.168.15.2 255.255.255.0 GOA(config-if)#no shut GOA(config-if)#interface serial0/1 GOA(config-if)#ip address 192.168.16.1 255.255.255.0 GOA(config-if)#no shut GOA(config-if)#interface fastethernet0/0 GOA(config-if)#ip address 192.168.8.1 255.255.255.0 Joginpally BR Engineering College Page 43

GOA(config-if)#no shut GOA(config-if)#^z GOA#wr mem Thus router1 is named as GOA and serial interfaces and fast Ethernet interfaces are assigned corresponding ip addresses.

Commands at router2:
router2>enable router2#config t router2(config)#hostname DELHI DELHI(config)#interface serial0/0 DELHI(config-if)#ip address 192.168.16.2 255.255.255.0 DELHI(config-if)#no shut DELHI(config-if)#interface fastethernet0/0 DELHI(config-if)#ip address 192.168.7.1 255.255.255.0 DELHI(config-if)#no shut DELHI(config-if)#^z DELHI#wr mem Router2 is named as DELHI. Its serial interface and fast Ethernet interface are assigned the shown IP addresses.

Assigning IP addresses to end devices:


End devices used are PCs. Let the IPs to the PCs be assigned as below: HYD: PC0: 192.168.9.2 PC1: 192.168.9.3 PC2: 192.168.9.4 GOA: PC3: 192.168.8.2 PC4: 192.168.8.3 PC5: 192.168.8.4 DELHI: - PC6:192.168.7.2 PC7: 192.168.7.3 PC8: 192.168.7.4

Joginpally BR Engineering College

Page 44

IMPLEMENTATION OF RIP
After assigning the IP addresses to the routers we can also configure RIP instead of static routing. The following are the routing commands to be given in the command line interface of respective routers for RIP routing.

RIP at HYD router:


HYD>enable HYD#config t HYD(config)#router rip HYD(config)#network 192.168.8.0. HYD(config)#network 192.168.7.0

RIP at GOA router:


GOA>enable GOA#config t GOA(config)#router rip GOA(config)#network 192.168.9.0 GOA(config)#network 192.168.7.0

RIP at DELHI router:


DELHI>enable DELHI#config t DELHI(config)#router rip DELHI(config)#network 192.168.9.0 DELHI(config)#network 192.168.8.0 Thus by the above commands one can configure RIP routing in the various routers. After saving these commands one can ping with other routers in the network. The commands such as NO IP ADDRESS, NO IP ROUTE, NO NETWORK etc assigned ip addresses, networks and routes can be annulled. One can even ping from the end devices i.e. from PCs to other PCs in the network, PCs to the routers etc. To ping from end devices one has to enter the PING command followed by the IP address in the command prompt available in the desktop option. Joginpally BR Engineering College Page 45

Following figure shows the network topology configured by the above programs.

HYD
ROUTER `

GOA
ROUTER

DELHI
ROUTER

Switch 1

Switch 2

Switch 3

PC 2 PC O PC 1 PC3 PC 4 PC 5 PC 6 PC 7 PC 8

Fig 4.2 Network Topology block Routers are connected to switches through fast Ethernet port. Routers are connected to each other through serial ports. The IP addresses are assigned to the routers, networks and PCs as configured in the program

Joginpally BR Engineering College

Page 46

4.3 Router backup: How to backup and restore router configuration via TFTP
Introduction Backup hardwares configuration is the one important routine for network engineers so that when the hardware break down you can recover the failed system within an acceptable time. To backup the configuration, one effective way is to use TFTP to backup and restore configuration between remote hosts. In the example below, Ill show how to backup and restore configurations between TFTP Server and Ciscos router. The TFTP Server will use Cisco TFTP Server software.

Configure TFTP Server


1. Download Cisco TFTP Server from cisco.com or old version at here. Run setup file to install the software on the computer that will be a TFTP Server (the computer that connected to Cisco router on Ethernet port).

2. After installed, youll see Cisco TFTP Server shortcut on desktop.

3. Open Cisco TFTP Server. Youll see the window as below that means you have finished setup TFTP Server. You must leave this window open to send/receive configuration with

Joginpally BR Engineering College

Page 47

Router.

Figure 4.3 Cisco TFTP server

Joginpally BR Engineering College

Page 48

4. You can customize TFTP Server root directory (the directory to keep configuration files) by click View -> Options on menu bar.

Figure 4.4 Cisco TFTP server root directory

Backup running configuration from a router to the TFTP Server


1. Connect cable from the router to the TFTP Server. Assign IP on both and ensure that you can ping each other. In this example, the TFTP Server has IP address 192.168.11.10 and the router is 192.168.11.1 2. Connect to the router.

3. Type copy running-config tftp: (without quote).

Joginpally BR Engineering College

Page 49

4. Enter the IP address of the remote host (the TFTP Server). In this example, it is 192.168.11.10 5. Enter the destination filename to save the configuration to. Or you can enter to accept the value in the bracket[]. 6. Youll see the file that has been created and the status on TFTP Server is updated.

Figure 4.5 status on TFTP server

Joginpally BR Engineering College

Page 50

Figure 4.6 configuration of wordpad

Restore startup configuration from a file on TFTP Server


1. Connect cable from the router to the TFTP Server. Assign IP on both and ensure that you can ping each other. In this example, the TFTP Server has IP address 192.168.11.10 and the router is 192.168.11.1 2. Connect to the router. 3. Enter the IP address of the remote host (the TFTP Server) Joginpally BR Engineering College Page 51

4. Enter the source filename for restore to startup configuration. 5. The destination is startup-config. 6. Now the configuration file has been restored to startup-configuration.

The example above shows only one common way to backup and restore the configurations but there are other ways like FTP, HTTP, etc so that you can try which way will suit you best.

Joginpally BR Engineering College

Page 52

CHAPTER 5 RESULT ANALYSIS

Figure 5.1 Network building Routers are connected to switches through fast Ethernet port. Routers are connected to each other through serial ports. The IP addresses are assigned to the routers, networks and PCs as configured in the program

Output: 1.sh run(ip configurations): HYD router:


HYD#sh run Building configuration... Current configuration : 601 bytes version 12.2 no service password-encryption hostname HYD Joginpally BR Engineering College Page 53

ip ssh version 1 interface FastEthernet0/0 ip address 192.168.9.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.15.1 255.255.255.0 interface Serial3/0 no ip address clock rate 64000 interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip network 192.168.7.0 network 192.168.8.0 ip classless line con 0 line vty 0 4 login end

Joginpally BR Engineering College

Page 54

GOA router:
GOA#sh run Building configuration... Current configuration : 643 bytes version 12.2 no service password-encryption hostname GOA ip ssh version 1 interface FastEthernet0/0 ip address 192.168.8.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.15.2 255.255.255.0 clock rate 64000 interface Serial3/0 ip address 192.168.16.1 255.255.255.0 clock rate 64000 interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip Joginpally BR Engineering College Page 55

network 192.168.7.0 network 192.168.9.0 ip classless line con 0 line vty 0 4 login end

DELHI router:
DELHI#sh run Building configuration...

Current configuration : 603 bytes version 12.2 no service password-encryption hostname DELHI ip ssh version 1 interface FastEthernet0/0 ip address 192.168.7.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.16.2 255.255.255.0 interface Serial3/0 no ip address clock rate 64000 Joginpally BR Engineering College Page 56

interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip network 192.168.8.0 network 192.168.9.0 ip classless line con 0 line vty 0 4 login end

2.show ip route(routing tables):


HYD router: HYD#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

C C

192.168.9.0/24 is directly connected, FastEthernet0/0 192.168.15.0/24 is directly connected, Serial2/0

GOA router: Joginpally BR Engineering College Page 57

GOA#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

C C C

192.168.8.0/24 is directly connected, FastEthernet0/0 192.168.15.0/24 is directly connected, Serial2/0 192.168.16.0/24 is directly connected, Serial3/0

DELHI router: DELHI#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route

Gateway of last resort is not set

C C

192.168.7.0/24 is directly connected, FastEthernet0/0 192.168.16.0/24 is directly connected, Serial2/0

Joginpally BR Engineering College

Page 58

ADVANTAGES AND DISADVANTAGES

Advantages of RIP:
RIP has a number of advantages. 1) it is an exceedingly simple protocol to implement. Simplicity usually means inexpensive to develop and low in computational overhead. 2) RIP has the advantage of being widely implemented and supported. 3) Historically, RIP has been the most popular routing protocol for use in TCP/IP internetworks, largely due to its incorporation in Berkeley Software Distribution (BSD) 4.2 UNIX. Few (if any) router manufacturers have failed to implement RIP in their products. 5)simple configuration 6)SVC routing 6)RIP on demand

Disadvantages of RIP:
1)RIP also suffers from some serious shortcomings. Designed in a simpler time for simpler networks, RIP has begun to show its age as corporate networks have increased in size. 2)Results in network congestions. 3)Time consuming when considered with other types of protocols 4)Convergence is slow 5)Most RIP networks are flat. There is no concept of areas or boundaries in RIP networks Cannot handle VLSM 6) As the maximum number of hops is limited to 15 hops, a hop count of 16 is considered infinite. 7)slower convergence in large networks 8)no acknowledgement of routing updates 9)difficult to troubleshoot.

Joginpally BR Engineering College

Page 59

CONCLUSION
Thus by using various types of routing protocols, connections can be established across different network elements in the network connected through routers, switches etc. Interior routing protocols both STATIC and DYNAMIC (EIGRP, OSPF) are also can be implemented in the routers across the network topology for successful connectivity.

Joginpally BR Engineering College

Page 60

FUTURE SCOPE
The current RIP protocols run on IPv4 networks, meaning that the IP address contains four standard fields. The future of the RIP protocol will hinge on its ability to adapt to IPv6 networks, the standard on which the Internet will depend in the future.

Ccna,Ccnp,Mcitp,Linuxwww.aryantech.in Ethical Hacking Training in Pune. 100% Job Guarantee. 6 Months Course

Protocollwww.Omgeo.com/ProtoColl Full-Featured Collateral Management Service Solution for Investors!

Ethical Hacking Trainingwww.innobuzz.in Become an Ethical Hacker & protect yourself from malicious hackers!

Citrix Training in Punewww.itechpune.com XenApp, XenServer, XenDesktop Certification CCA , CCAA, CCEE, CCI

Joginpally BR Engineering College

Page 61

REFERENCES
[1] I.S. BAGAD ,COMPUTER NETWORKS 1st editon,technical publishers,2009 [2] ANDREW S TANENBAUM,COMPUTER NETWORKS ,4th edition, [3]TYAGARAJAN VISWANADAN,TELECOMMUNICATIONS SWITCHING SYSTEMS

WEB SITES: [1] Computer networks & Transmission Media: http://books.google.co.in/books/about/Computer_Networks.html

[2]Wikipedia [3] www.CISCO.com [4] network tutorials .info (iv) webopedia (v) communications.howstuffworks.com (vi) techtarget.com (vii) cisconetacad.net (viii) reportimages.com

Joginpally BR Engineering College

Page 62

Joginpally BR Engineering College

Page 63

Вам также может понравиться