Академический Документы
Профессиональный Документы
Культура Документы
1.1 Telecommunications:
Telecommunications is a general term for a vast array of technologies that send information over distances. Mobile phones, land lines, satellite phones and voice over Internet protocol (VoIP) are all telephony technologies -- just one field of telecommunications. Radio, television and networks are a few more examples of telecommunication. While most people associate telecommunications with modern technologies, the strict definition of the term encompasses primitive and even ancient forms of telecommunication. Among these is the use of smoke signals as a kind of visual telegraph. Puffs of smoke were timereleased by smothering a fire with a blanket, then quickly removing and replacing the blanket. Widely used by the American Indians, smoke signals could communicate short messages over long distances, assuming a clear line of sight.
relaying datagrams (also known as network packets) across aninternetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet. IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. For this purpose, IP defines datagram structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram source and destination. Historically, IP was the connectionless datagram service in the original Transmission Control Program introduced by Vint Cerf and Bob Kahn in 1974, the other being the connection-
Page 1
oriented Transmission Control Protocol (TCP). The Internet Protocol Suite is therefore often referred to as TCP/IP. The first major version of IP, Internet Protocol Version 4 (IPv4), is the dominant protocol of the internet. Its successor is Internet Protocol Version 6(IPv6), which is increasing in use.
RIP uses the User Datagram Protocol (UDP) as its transport protocol, and is assigned the reserved port number 520.[3]
1.4 Router:
A router is an electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. It is also called as a layer three switch. Each data packet contains address information that a router can use to determine if the source and destination are on the same network or on another. They work on the logical addresses known as IP (internet protocol) addresses. When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks. Routers generally forward data in the form of packets. The main function of router is routing and forwarding the data packets.
1.5 Router backup: Backup hardwares configuration is the one important routine for network engineers so that when the hardware break down you can recover the failed system within an acceptable time. To backup the configuration, one effective way is to use TFTP to backup and restore configuration between remote hosts.In the example below, Ill show how to backup and restore configurations between TFTP server and Ciscos router .The TFTP Server will use Cisco TFTP Server software.
Page 3
System: A system is one or more autonomous computers and their associated software,
peripherals and users, which are capable of information processing and/or transfer.
Layer: A layer is composed of subsystems of the same rank of all the interconnect systems. Entity: The functions in a layer are performed by hardware subsystems and/or software
packages. These are known as entities. Entities in the same layer but not in the same subsystem are known as peer entities. Peer entities communicate using peer protocols. Data exchange between peer entities is in the form of protocol data units (PDU). Data exchange between entities of adjacent layers is in the form of interface data units (IDU). Service data unit (SDU) is a unit
of data that has been passed down from an OSI layer to a lower layer and that has not yet been encapsulated into a PDU by the lower layer. It is a set of data that is sent by a user of the service of a given layer, and is transmitted semantically unchanged to peer service user.
Page 4
Application layer (layer 7) Presentation layer (layer 6) Session layer (layer 5) Transport layer (layer 4) Network layer (layer 3) Data link layer (layer 2) Physical layer (layer 1)
OSI MODEL:
Physical layer:
This layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between communicating network systems. The data is in the form of bits. This layer specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, and physical connectors.
Page 5
Network layer:
The data is in the form of packets. This layer is concerned with transmission of packets from the source node to destination node. It deals with routing and switching considerations that are required in establishing a network connection. It assures a certain quality of service to the upper layers. Since an end to end connection may involve routing through a number of different networks, internetworking is an important function of network layer. Addressing schemes, network capabilities, protocol differences, accounting and billing are all issues to be handled in internetworking. Network congestion which may occur due to many messages on a particular route is also tackled by the network layer.
Page 6
Transport layer:
This layer is first end to end layer in OSI architecture. It provides reliable data transfer services to the upper layers. It establishes, maintains and terminates virtual circuits. It makes sure that the data is delivered error free and in the correct sequence. It also provides acknowledgement of the successful data transmission. Data is in the form of segments.
Session layer:
This layer controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between local and remote applications. It provides error reporting for application and presentation layers. Synchronization is provided by this layer.
Presentation layer:
This layer defines coding and conversion functions. It ensures that information sent from application layer of one system is readable by the application layer of another system. Data compression, encryption, translation functions are supported in this layer. This layer is also sometimes called as syntax layer. These are the basic seven layers present in the Open System Interconnect developed by International Standard Organisation.
Application layer:
This layer provides network services directly to applications. This layer is the closest to the end user, which means that both the OSI application layer and the user interact directly with the software application. Application layer functions typically include identifying
2.2 Protocols:
The OSI model provides a conceptual frame work for communication between computers, but the model itself is not a method of communication. Actual communication is made possible by using communication protocols. In context of data networking a protocol is a set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers.
Page 7
Routed protocols:
A routed protocol is a network layer protocol that is used to move traffic between networks. IP, IPX, and AppleTalk are all examples of these protocols. Routed protocols allow the host on one network to communicate with a host on another network, with routers forwarding traffic between the source and destination networks. They are characterized by logical addressing (such as an IP or IPX address) that only identifies a source or destination host but also the network (or subnet) on which they reside.
Routing protocols:
These protocols serve a different purpose. Instead of being used to send data between source and destination hosts, a routing protocol is used by routers to exchange routing information with one another. Routing information includes defining the route, updating the routing table etc. examples of routing protocols is RIP, EIGRP, OSPF etc
Lan protocols:
They operate at physical and data link layers of the OSI model and define communication over the various LAN media. E.g.: FDDI (fiber distributed data interface), Ethernet, token ring etc. examples of data link layer protocols are SDLC (synchronous data link control), HDLC (high level data link control) etc.
Wan protocols:
They operate at the lowest three layers of the OSI model and define communication over the wide area media. SDLC and HDLC are few examples of these type of protocols.
Page 8
Routing protocols:
These are network layer protocols that are responsible for exchanging information between routers so that the routers can select the proper path for network traffic. E.g.: RIP (router information protocol), OSPF (open shortest path first) etc.
Routed protocols:
A routed protocol is a network layer protocol that is used to move traffic between networks. IP, IPX, and AppleTalk are all examples of these protocols.
2.3 IP addresses:
An internet protocol address (IP ADDRESS) is a numerical label that is assigned to any device participating in a computer network that uses the internet protocol for communication between nodes. An IP address serves two principal functions host or network interfacing identification and location addressing. There are two types of internet protocol versions that are being widely used IPV4 and IPV6.
Page 9
Public IP addresses:
These IPs are allocated to general public and can be used only by the persons who purchase these IPs. These are unique and are not accessible by everyone and are publicly registered in the network information system.
private IP addresses:
These IPs are not registered and can be used extensively available for the public use i.e. any one can access these IPs. Almost all the LAN IPs are private IPs.
Class B:
The range of these IPs is from 128.0.0.0 to 191.255.255.255.255. All the IPs in this range except from 172.16.0.0 to 172.32.0.0 are used for private use while 172.16.0.0 172.32.0.0 are used in public IP addressing. The first two octets i.e. the first 16 address bits represent network bits while the other two octets represent host bits. These IPs are generally allocated to a medium sized network.
Class C:
The range of these IPs is from 192.0.0.0 to 223.255.255.255. all the IPs in this range are used for private IP addressing except the IPs in the range 192.168.0.0 to 192.168.255.0 which are
Page 10
used for public addressing. The first three octets represent network bits while the last octet represents host bits. These IPs are used for small to medium networks. Class D: The range of these IPs is from 224.0.0.0 to 239.255.255.255. these IPs are known as multicast IP addresses . Multicasting is the process of sending packets from one device to many other devices without any packet duplication. Class E: The range of these IPs is from 240.0.0.0 to 254.255.255.255. These IPs are used for experimental purposes only and cannot be assigned for general users.
LIMITATIONS OF IPV4:
Addressing space:
The IPv4 address is 32 bit, which allows to allocate 2^32 address.IPv4 present two level addressing hierarchy i.e. network number and host number. Each network interface is identified with one or more unique addresses. Two level addressing hierarchy is convenient but wasteful of the address space.
Security:
No security at the network layer.
Rapid growth:
Growth of TCP/IP usage into new areas will result in a rapid growth in the demand for unique IP addresses.
Proliferation:
Joginpally BR Engineering College Page 11
In most regards, IPv6 is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate over IPv6; exceptions are application protocols that embed internet-layer addresses, such as FTP etc.IPV6 specifies a new packet format designed to minimize packet header processing by routers because the headers of IPV4 packets and IPV6 packets are significantly different, the two protocols are not interoperable. IPV6 is still in infant stage i.e. not completely used. It takes sometime for the penetration of IPV6 in the market.
The default subnet mask of class A IP addresses is 255.0.0.0 so it can handle 2^24 host i.e. 16,777,216 hosts. The default subnet mask of class B IP addresses is 255.255.0.0 so it can handle2^16 hosts i.e. 65,536 hosts. The default subnet mask of class C is 255.255.255.0 so it can handle 2^8 hosts i.e. 256 hosts. In brief subnetting can be defined as conversion of network bits into host bits.There are two types of subnet masks fixed length subnet mask and variable length subnet mask.
2.5 ROUTERS
A router is an electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. Each data packet contains address information that a router can use to determine if the source and destination are on the same Joginpally BR Engineering College Page 13
network or if the data packet must be transferred from one network to another. When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks and such table is called as routing table. A router is a networking device whose software and hardware are customized to the tasks of routing and forwarding information. A router has two or more network interfaces, which may be different types of network (such as copper cables, fiber or wireless) or different network standards. Each network interface is a specialised device that converts electric signals from one form to another. Routers connect two or more logical subnets each having a different network addresses. The subnets in the router do not necessarily map one to one to the physical interfaces of the router. The term layer 3 switching is often used interchangeably with the term routing. The term switching is generally used to refer to data forwarding between two network devices with the same network address. This is also called layer 2 switching or LAN switching.
2.5.1 OPERATION:
Conceptually, a router operates in two operational planes Control plane: where a router builds a table (routing table) as how a packet should be forwarded through which interface, by using either statically configured statements (called static routes) or by exchanging information with other routers in the network through a dynamical routing protocol.
Forwarding plane: where the router actually forwards traffic (called packets) from ingress
(incoming) interfaces to an egress (outgoing) interface that is appropriate for the destination address that the packet carries with it, by following rules derived from the routing table that has been built in the control plane.
Page 14
2.5.2 TYPES OF ROUTERS: Customer edge router: In short these routers are known as CE routers. These routers are
located at the customer premises that interface to a service provider router i.e. it provides Ethernet interface between customers LAN and the service provider.
Provider edge router: In short these routers are known PE routers. These are located at the
service providers network and are connected to CE router directly.
P router: A P router is a provider router is a label switch router. These routers have no
knowledge of the customer prefixes; they just label the switch packets. Based on the way they are connected there are two types of routers. Wired router and wireless router.
Page 15
The LAN interfaces usually include Ethernet, fast Ethernet, fiber distributed data interface (FDDI) or token ring. The auxiliary port is used to provide LAN connectivity. One can use a converter to attach LAN to the router. Synchronous and asynchronous serial interfaces are used for WAN connectivity. ISDN (Integrated Services Digital Network) interfaces are used to provide ISDN connectivity. Using ISDN, one can transmit both video and data.
Ethernet interface:
Ethernet is one of the earliest LAN technologies. An Ethernet LAN typically uses special grades of twisted pair cabling. Ethernet networks can also use coaxial cable, but this cable medium is becoming less common. The most commonly installed Ethernet systems are called 10BaseT. The router provides the interfaces for twisted pair cables. A converter can be attached to the AUI port of a router to connect to a 10base2, 10baseT, or 10base5 LAN interface. Ethernet and Token Ring use MAC addressing (physical addressing). The Ethernet interfaces on the router are E0, E1, E2, and so on. E stands for Ethernet, and the number that follows represents the port number. These interfaces provide connectivity to an Ethernet LAN. In a non-modular Cisco router, the Ethernet ports are named as above, but in modular routers they are named as E0/1, where E stands for Ethernet, 0 stands for slot number, and 1 stands for port number in the slot. Similarly another Ethernet interface called as Fast Ethernet is available. It is denoted as fa and numbered similar to the Ethernet interface.
The BRI interfaces for ISDN on a non-modular router are BRI0, BRI1, and so on, with the number following BRI signifying the port number. In a modular router, BRI is followed by the slot number/port number.
network interface cards. The Asynchronous Serial interface is provided by a number of methods, including RJ-11, RJ-45, and 50-pin Telco connectors Some ports can function both as Synchronous Serial interfaces and Asynchronous Serial interfaces. Such ports are called Async/Sync ports. The Async/Sync ports support Telco and RJ11 connectors.
DRAM:
DRAM stands for Dynamic Random Access Memory. It has two types of memories. Primary, main or processor memory, which is reserved for the CPU to execute IOS software and to hold the running configuration and routing tables. Shared, packet or I/O memory which buffers data transmitted or received by the routers network interfaces.
EPROM:
EPROM stands for Erasable Programmable Read Only Memory is usually referred to as a boot ROM. EPROM is generally programmed at some point during the latter stages of manufacture, and cannot generally be changed by the users. EPROM is generally loaded with two crucial firmware components. The first is a boot loader which takes over should the device fail to find a valid bootable image in flash memory, and provides alternate boot options. If even this failsafe should fail, the second firmware application installed on the EPROM is used, the ROM monitor. ROM monitor has a user interface and includes options for troubleshooting failures of the ROM chips.
NVRAM:
NVRAM stands for Non Volatile Random Access Memory. It stores important configuration information used by the IOS during boot and by some programs during start up, which is stored in the starting configuration file. NVRAM also the functionality provided by the
Page 18
software configuration register, which allows a device to be booted and selection from multiple IOS images that may available in flash memory. It is sometimes called as shared memory.
Flash memory:
Flash memory is the most diverse of each of these types and it comes in many forms, however, its primary use is to store a bootable IOS image from which a device can start. Most devices have onboard flash memory from which the device boots, however some equipment particularly higher end hardware components also have the capability to boot from an image stored on a flash memory, which ids removable.
2.6 ROUTING
Introduction of routing: Routing is the act of moving information across an inter-network from a source to a destination. Along the way, at least one intermediate node typically is encountered. Its also referred to as the process of choosing a path over which to send the packets. Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer. The primary difference between the two is that bridging occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways. The routing algorithm is the part of the network layer software responsible for deciding which output line an incoming packet should be transmitted on, i.e. what should be the next intermediate node for the packet Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement; such as path bandwidth, reliability, delay, current load on that path etc; that is used by routing algorithms to determine the optimal path to a destination. To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information. Route information varies depending on the routing algorithm used. Routing algorithms fill routing tables with a variety of information. Mainly Destination/Next hop associations tell a router that a particular destination can be reached optimally by sending the packet to a particular node representing the "next hop" on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop. Some of the routing algorithm allows a router to have multiple next hop for a single destination depending upon best with regard to different metrics. For example, lets say router R2 is be best next hop for destination D, if path length is considered as the metric; while Router R3 is the best for the same destination if delay is considered as the metric for making the routing decision.
Page 20
Static routing:
Static routing is the term used to refer to a manual method that is used to set up routing between networks. The network administrator configures static routes in a router by entering routes directly into the routing table of a router. Static routing is a hard coded path in the router that specifies how the router will get to a certain subnet by using certain path. A static route to every network must be configured on every router for full connectivity. This provides a granular level of Control over routing, but quickly becomes impractical on large networks.
Dynamic routing:
Dynamic routing is typically used in larger networks to ease the administrative and operational overhead of using only static routes. Dynamic routing has evolved to meet the demands of changing network requirements. It is an adaptive routing that describes the capability of a system, through which routes are characterized by their destination, to alter the path that the route takes through the system in response to a change in conditions. The adaptation is intended to allow as many routes as possible to remain valid (that is, have destinations that can be reached) in response to the change. A dynamic routing table is created, maintained, and updated by a routing protocol running on the router.
have redundancy and load balancing of their data transported to and from the internet. These protocols are used to connect between routers of different service providers. Examples of a EGP: Border gateway protocol (BGP).
Metric:
Metric is a property of a route in computer networking consisting of any value used by routing algorithms to determine whether one route should perform better than another (the route with the lowest metric is the preferred route). The routing table stores only the best possible routes, while link state or topological databases may store all other information as well. For example RIP uses hop count (number of hops) to determine the best possible route. So in simple language metric is a measure or a unit followed by the routing protocol. A Metric can include: Number of hops (hop count) Page 22
Speed of the path Packet loss (router congestion/conditions) Latency (delay) Path reliability Path bandwidth Cost Load etc.
2.7.1 RIP:
RIP is also called as Routing by rumour .RIP is a dynamic routing protocol used in local and wide area networks. As we know it is classified as an interior gateway protocol (IGP). It uses the distance vector routing algorithm. The protocol has since been extended several times, resulting in RIP Version 2. Both versions are still in use today, however, they are considered to have been made technically obsolete by more advanced techniques such as Open Shortest Path First (OSPF) etc. RIP has also been adapted for use in IPV6 networks, a standard known as RIPng (RIP next generation) protocol was also introduced.
History of RIP:
The Routing Information Protocol (RIP) was written by C. Hedrick from Rutgers University in June 1988, and has since become the most common internet routing protocol for routing within networks. RIP is based on the computer program "routed", which was widely distributed with the Unix 4.3 Berkeley Software Distribution (BSD) operating system, and became the actual standard for routing in research labs supported by vendors of network gateways. All RIP routing protocols are based on a distance vector algorithm called the BellmanFord algorithm, after Bellman's development of the equation used as the basis of dynamic programming, and Ford's early work in the area. Software based on these algorithms was used as early as 1969 on the Advanced Research Projects Agency Network (ARPANET), but the main protocol development was done by the Xerox network research and development division. The earliest RIP protocol was the PUP protocol, which used the Gateway Information Protocol to exchange routing information, and was invented by a team that included R. M. Metcalfe, who later developed the Ethernet physical layer network protocol. The PUP protocol was later Joginpally BR Engineering College Page 23
upgraded to support the Xerox Network Systems (XNS) architecture, and named "Routing Information Protocol", usually just called RIP.
Timers: Various timers are also used to help in proper functioning of the protocol.
2.7.3 ALGORITHM
The RIP algorithm works like this: Update: At regular intervals each router sends an update message describing its routing database to all the other routers that it is directly connected to. Some routers will send this message as Joginpally BR Engineering College Page 24
often as every 30 seconds, so that the network will always have up-to-date information to quickly adapt to changes as computers and routers come on and off the network. Propagation: When a router X finds that a router Y has a shorter and faster path to a router Z, then it will update its own routing database to indicate that fact. Any faster path is quickly propagated to neighbouring routers through the update process, until it is spread across the entire RIP network.
2.7.4 VERSIONS:
There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng.
1) RIP Version 1:
The original specification of RIP uses class full routing. The periodic routing updates do not carry subnet information, lacking support for VLSM. This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks. The RIP version 1 works when there is only 16 hop counts (015).If there are more than 16 hops between two routers it fails to send data packets to the destination address.
2) RIP Version 2:
Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was developed in 1993 and last standardized in 1998. It included the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature allows fine-grained interoperability adjustments. In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1 which uses broadcast. Unicast addressing is still allowed for special applications. Joginpally BR Engineering College Page 25
3) RIPng:
RIPng (RIP next generation), defined in is an extension of RIPv2 for support of IPV6 the next generation Internet Protocol. The main differences between RIPv2 and RIPng are: Support of IPv6 networking. While RIPv2 supports RIPv1 updates authentication, RIPng does not. IPv6 routers were, at the time, supposed to use IPsec for authentication. RIPv2 allows attaching arbitrary tags to routes, RIPng does not; RIPv2 encodes the next-hop into each route entries, RIPng requires specific encoding of the next hop for a set of route entries
Page 26
The basic building blocks those are required in construction and maintenance of a network is called as the network elements. The various network elements are: Joginpally BR Engineering College Repeaters Hubs Switches Page 27
3.2 Repeater:
A repeater regenerates a signal from one port to another to which they are connected. These are operated in physical layer. Hence these devices are also called as layer one devices. It does not filter or interpret anything instead; it merely repeats a input signal the primary purpose of a repeater is to enable the network to expand beyond the distance limitations of the transmission medium. There are various multiple port repeaters available e.g.16 port, 8 ports etc. it suppresses noise and helps inefficient transmission of data. They dont requRire any addressing information. They are inexpensive and simple. The disadvantage is that they only support broadcasting and also passes electrical storms generated by huge amount of computers.
3.3 Hub:
A hub is a small, simple, inexpensive device that joins multiple computers together. Many network hubs available today support the Ethernet standard. Other type including USB Joginpally BR Engineering College Page 28
hub also exist, but Ethernet is the type traditionally used in home networking.A hub is a layer one device. It does not read any of the data passing through them and are not aware of their source or destination. A hub simply receives the incoming packets and broadcasts these packets out to all devices on the network. It is generally a rectangular box made of plastic or fiber that receives power from an ordinary wall outlet. A hub remains very popular in small networks for its low cost. 3.4 BRIDGES:
Figure 3.4 Bridges A bridge is a layer two device. It has only two ports and all its decisions are made on basis of MAC addresses or layer two addresses but do not depend on logical addressing. It is used for managing traffic. Basically there are two types of bridges. A bridge called as translating bridge connects two different LAN segments such as token rings, Ethernets etc. and the other type of bridge known as transparent bridges move data between two similar LAN segments. The successor of the bridge is the switch.
3.5 SWITCHES:
A switch is a layer two device that forwards traffic based on media access control (MAC) layer i.e. Ethernet or token ring addresses. It is a multiport bridge and a successor of bridge. It is used to interconnect a number of Ethernet local area networks to form a large Ethernet network. The purpose of the switch is to forward the packets only to the desired destination segment of the network whenever possible minimising the traffic on the network. The disadvantage is that the switch cannot connect different LAN segments like Ethernets; token rings etc. There are three distinct features of switch they are:
Page 29
Address learning: layer two switches remember the source hardware address of each frame
received on an interface, and they enter this information into a Mac database called as forward/filter table.
Forward filter decisions: when a frame is received on an interface, the switch looks at the
destination hardware address and finds the exit interface in the MAC database. The frame is only forwarded out the specified destination port.
Loop avoidance: if multiple connections between switches are created for redundancy
purposes network loops can occur. Spanning tree protocol is used to stop network loops while still permitting redundancy
3.6 ROUTERS:
A router is electronic device that interconnects two or more computer networks and selectively interchanges packets of data between them. It is also called as a layer three switch. Each data packet contains address information that a router can use to determine if the source and destination are on the same network or on another. They work on the logical addresses known as IP (internet protocol) addresses
Page 30
When multiple routers are used in large collection of interconnected networks, the routers exchange information about target system addresses, so that each router can build up a table showing the preferred paths between any two systems on the interconnected networks. Routers generally forward data in the form of packets. The main function of router is routing and forwarding the data packets.
3.7 GATEWAY:
A gateway can translate information between different network data formats or network architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. Most gateways operate at the application layer, but can operate at the network or session layer of the OSI model. Gateways will start at the lower level and strip information until it gets to the required level and repackage the information and work its way back toward the hardware layer of the OSI model
These are the various network elements that are most commonly used in a network for establishing a efficient connectivity required for effective data exchange between different devices in different networks.
Page 32
Enable
Config t
hostname
Interface
No shut
Activates interfaces
IP address
Assigns IP address
Wr mem
Page 33
Encapsulation ppp
Router rip
To configure protocol
Router eigrp
Router ospf
show ip route
^z
Returns
directly
to
config
tab
to
privileged mode
network
Assigns a network
Show run
Page 34
Ping
Table 1 Router commands These are few router commands which are most regularly used. Using these commands one can configure a router in a network and also can implement required routing protocol. In the forthcoming units we shall learn about implementation of routing protocols especially implementation of Interior gateway routing protocols i.e. RIP, EIGRP, and OSPF.
4.2 SIMULATOR:
The simulator used to implement the Interior Gateway Routing Protocols is CISCO PACKET TRACER 5.1. Using this simulator Static routing, RIP, EIGRP and OSPF are implemented. Here is a brief introduction about the simulator, which helps to understand how to use it before working with it. This simulator allows using different types of routers, switches, connectors and end devices. We can also develop different network topologies using this simulator.
Page 35
a CCNA-level of complexity. Packet Tracer supports student and instructor creation of simulations, visualizations, and animations of networking phenomena. Like any simulation, Packet Tracer 5.1 relies on a simplified model of networking devices and protocols. Real computer networks remain the benchmark for understanding network behavior and developing networking skills. Packet Tracer was created to help address the "digital divide" in networking education, where many students and teachers lack access to equipment, bandwidth, and interactive modes of learning networking. We invite you to use the help files and tutorials to learn about the major features of the program, which include the items in the following table
Item
Description LAN: Ethernet (including CSMA/CD*), 802.11 wireless* Switching: VLANs, 802.1q, trunking, VTP, DTP, STP*, RSTP, multilayer switching, Etherchannel TCP/IP: HTTP, DHCP, DHCPv6, Telnet, SSH, TFTP, DNS, TCP*, UDP, IP, IPv6, ICMP, ICMPv6, ARP, IPv6 ND
Protocol
Routing: static, default, RIPv1, RIPv2, EIGRP, single-area OSPF, multi-area OSPF, inter-VLAN routing Other: ACLs (standard, extended, and named), CDP, NAT (static, dynamic, and overload), NATv6 WAN: HDLC, PPP, and Frame Relay* * indicates substantial modeling limitations imposed
Network topology creation Devices: generic, real, and modular Logical Workspace Routers, switches, hosts, hubs, bridges, wireless access points, wireless routers, clouds, and DSL/cable modems Device interconnection through a variety of networking media
Page 37
Hierarchy of device, wiring closet, building, city, and intercity views Physical Workspace Loading of user-created graphics Wireless association management
Realtime protocol updates Realtime Mode Medium-fidelity Cisco IOS CLI configuration of routers and switches
Packet animation Simulation Mode Global event list (packet sniffer) OSI Model, Detailed PDU, and Device Table Views User-defined multiple packet scenarios
Extensive file-saving options Activity Wizard for authoring automatically scored practice activities and formative assessment Challenge Mode allowing users to make device algorithm decisions on packets Easily translated GUI Extensive textual and graphical annotation features External Joginpally BR Engineering College Applications (ExApps) through Inter-process Page 38
Communication (IPC)
Table 2 Features of Program More details can be available in the help tab of the simulator. The work space looks as shown below
Page 39
This bar provides shortcut icons to the File and Edit menu commands. This bar also provides buttons for Zoom, the drawing Palette, and the Device Template Manager. On the right, you will also find the Network Information button, which you can use to enter a description for the current network (or any text you wish to include).
Page 40
This bar provides access to these commonly used workspace 3 Common Bar Tools tools: Select, Move Layout, Place Note, Delete, Inspect, Add Simple PDU, and Add Complex PDU. See "Workspace Basics" for more information.
You can toggle between the Physical Workspace and the Logical Workspace with the tabs on this bar. In Logical Workspace, this bar also allows you to navigate through levels Logical/Physical 4 Workspace Navigation Bar and of a cluster, create a new New Cluster, Move Object, Set Tiled Background, and Viewport. In Physical Workspace, this bar allows you to navigate through physical locations, create a New City, create a New
Building, create a New Closet, Move Object, apply Grid to the background, Set Background, and go to the Working Closet.
Workspace
This area is where you will create your network, watch simulations, and view many kinds of information and statistics.
You can toggle between Realtime Mode and Simulation Mode with the tabs on this bar. This bar also provides buttons to 6 Realtime/Simulation Bar Power Cycle Devices as well as the Play Control buttons and the Event List toggle button in Simulation Mode. Also, it contains a clock that displays the relative Time in Realtime Mode and Simulation Mode.
Page 41
This box is where you choose devices and connections to put NetworkComponent 7 Box into the workspace. It contains the Device-Type Selection Box and the Device-Specific Selection Box.
This box contains the type of devices and connections available in Packet Tracer 5.1. The Device-Specific Selection Box will change depending on which type of device you choose.
This box is where you choose specifically which devices you want to put in your network and which connections to make.
10
User
Created
This window manages the packets you put in the network during simulation scenarios. See the "Simulation Mode" section for more details.
Packet Window*
Algorithm:
1) Open the simulator 2) Create the required network topology by dragging the required number of routers, switches, end devices and other connecting devices from the network component box to the work space. 3) Initialise the router 4) Configure the router with required routing protocol like STATIC, RIP, EIGRP etc 5) Execute by pinging the routers and the end devices and observe the success rate. Joginpally BR Engineering College Page 42
Implementation of routing protocols having three routers, three switches and nine end devices three for each router
Commands at Router0:
router0>enable router0#config t router0(config)#hostname HYD HYD(config)#interface serial0/0 HYD(config-if)#ip address 192.168.15.1 255.255.255.0 HYD(config-if)#no shut HYD(config-if)#interface fastethernet0/0 HYD(config-if)#ip address 192.168.9.1 255.255.255.0 HYD(config-if)#no shut HYD(config-if)#^z HYD#wr mem
By using the above commands router0 is named as HYD and its serial and fast Ethernet interfaces are assigned with some IP addresses.
Commands at router1:
router1>enable router1#config t router(config)#hostname GOA GOA(config)#interface serial0/0 GOA(config-if)#ip address 192.168.15.2 255.255.255.0 GOA(config-if)#no shut GOA(config-if)#interface serial0/1 GOA(config-if)#ip address 192.168.16.1 255.255.255.0 GOA(config-if)#no shut GOA(config-if)#interface fastethernet0/0 GOA(config-if)#ip address 192.168.8.1 255.255.255.0 Joginpally BR Engineering College Page 43
GOA(config-if)#no shut GOA(config-if)#^z GOA#wr mem Thus router1 is named as GOA and serial interfaces and fast Ethernet interfaces are assigned corresponding ip addresses.
Commands at router2:
router2>enable router2#config t router2(config)#hostname DELHI DELHI(config)#interface serial0/0 DELHI(config-if)#ip address 192.168.16.2 255.255.255.0 DELHI(config-if)#no shut DELHI(config-if)#interface fastethernet0/0 DELHI(config-if)#ip address 192.168.7.1 255.255.255.0 DELHI(config-if)#no shut DELHI(config-if)#^z DELHI#wr mem Router2 is named as DELHI. Its serial interface and fast Ethernet interface are assigned the shown IP addresses.
Page 44
IMPLEMENTATION OF RIP
After assigning the IP addresses to the routers we can also configure RIP instead of static routing. The following are the routing commands to be given in the command line interface of respective routers for RIP routing.
Following figure shows the network topology configured by the above programs.
HYD
ROUTER `
GOA
ROUTER
DELHI
ROUTER
Switch 1
Switch 2
Switch 3
PC 2 PC O PC 1 PC3 PC 4 PC 5 PC 6 PC 7 PC 8
Fig 4.2 Network Topology block Routers are connected to switches through fast Ethernet port. Routers are connected to each other through serial ports. The IP addresses are assigned to the routers, networks and PCs as configured in the program
Page 46
4.3 Router backup: How to backup and restore router configuration via TFTP
Introduction Backup hardwares configuration is the one important routine for network engineers so that when the hardware break down you can recover the failed system within an acceptable time. To backup the configuration, one effective way is to use TFTP to backup and restore configuration between remote hosts. In the example below, Ill show how to backup and restore configurations between TFTP Server and Ciscos router. The TFTP Server will use Cisco TFTP Server software.
3. Open Cisco TFTP Server. Youll see the window as below that means you have finished setup TFTP Server. You must leave this window open to send/receive configuration with
Page 47
Router.
Page 48
4. You can customize TFTP Server root directory (the directory to keep configuration files) by click View -> Options on menu bar.
Page 49
4. Enter the IP address of the remote host (the TFTP Server). In this example, it is 192.168.11.10 5. Enter the destination filename to save the configuration to. Or you can enter to accept the value in the bracket[]. 6. Youll see the file that has been created and the status on TFTP Server is updated.
Page 50
4. Enter the source filename for restore to startup configuration. 5. The destination is startup-config. 6. Now the configuration file has been restored to startup-configuration.
The example above shows only one common way to backup and restore the configurations but there are other ways like FTP, HTTP, etc so that you can try which way will suit you best.
Page 52
Figure 5.1 Network building Routers are connected to switches through fast Ethernet port. Routers are connected to each other through serial ports. The IP addresses are assigned to the routers, networks and PCs as configured in the program
ip ssh version 1 interface FastEthernet0/0 ip address 192.168.9.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.15.1 255.255.255.0 interface Serial3/0 no ip address clock rate 64000 interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip network 192.168.7.0 network 192.168.8.0 ip classless line con 0 line vty 0 4 login end
Page 54
GOA router:
GOA#sh run Building configuration... Current configuration : 643 bytes version 12.2 no service password-encryption hostname GOA ip ssh version 1 interface FastEthernet0/0 ip address 192.168.8.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.15.2 255.255.255.0 clock rate 64000 interface Serial3/0 ip address 192.168.16.1 255.255.255.0 clock rate 64000 interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip Joginpally BR Engineering College Page 55
network 192.168.7.0 network 192.168.9.0 ip classless line con 0 line vty 0 4 login end
DELHI router:
DELHI#sh run Building configuration...
Current configuration : 603 bytes version 12.2 no service password-encryption hostname DELHI ip ssh version 1 interface FastEthernet0/0 ip address 192.168.7.1 255.255.255.0 duplex auto speed auto interface FastEthernet1/0 no ip address duplex auto speed auto shutdown interface Serial2/0 ip address 192.168.16.2 255.255.255.0 interface Serial3/0 no ip address clock rate 64000 Joginpally BR Engineering College Page 56
interface FastEthernet4/0 no ip address shutdown interface FastEthernet5/0 no ip address shutdown router rip network 192.168.8.0 network 192.168.9.0 ip classless line con 0 line vty 0 4 login end
C C
GOA#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route
C C C
192.168.8.0/24 is directly connected, FastEthernet0/0 192.168.15.0/24 is directly connected, Serial2/0 192.168.16.0/24 is directly connected, Serial3/0
DELHI router: DELHI#sh ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route
C C
Page 58
Advantages of RIP:
RIP has a number of advantages. 1) it is an exceedingly simple protocol to implement. Simplicity usually means inexpensive to develop and low in computational overhead. 2) RIP has the advantage of being widely implemented and supported. 3) Historically, RIP has been the most popular routing protocol for use in TCP/IP internetworks, largely due to its incorporation in Berkeley Software Distribution (BSD) 4.2 UNIX. Few (if any) router manufacturers have failed to implement RIP in their products. 5)simple configuration 6)SVC routing 6)RIP on demand
Disadvantages of RIP:
1)RIP also suffers from some serious shortcomings. Designed in a simpler time for simpler networks, RIP has begun to show its age as corporate networks have increased in size. 2)Results in network congestions. 3)Time consuming when considered with other types of protocols 4)Convergence is slow 5)Most RIP networks are flat. There is no concept of areas or boundaries in RIP networks Cannot handle VLSM 6) As the maximum number of hops is limited to 15 hops, a hop count of 16 is considered infinite. 7)slower convergence in large networks 8)no acknowledgement of routing updates 9)difficult to troubleshoot.
Page 59
CONCLUSION
Thus by using various types of routing protocols, connections can be established across different network elements in the network connected through routers, switches etc. Interior routing protocols both STATIC and DYNAMIC (EIGRP, OSPF) are also can be implemented in the routers across the network topology for successful connectivity.
Page 60
FUTURE SCOPE
The current RIP protocols run on IPv4 networks, meaning that the IP address contains four standard fields. The future of the RIP protocol will hinge on its ability to adapt to IPv6 networks, the standard on which the Internet will depend in the future.
Ccna,Ccnp,Mcitp,Linuxwww.aryantech.in Ethical Hacking Training in Pune. 100% Job Guarantee. 6 Months Course
Ethical Hacking Trainingwww.innobuzz.in Become an Ethical Hacker & protect yourself from malicious hackers!
Citrix Training in Punewww.itechpune.com XenApp, XenServer, XenDesktop Certification CCA , CCAA, CCEE, CCI
Page 61
REFERENCES
[1] I.S. BAGAD ,COMPUTER NETWORKS 1st editon,technical publishers,2009 [2] ANDREW S TANENBAUM,COMPUTER NETWORKS ,4th edition, [3]TYAGARAJAN VISWANADAN,TELECOMMUNICATIONS SWITCHING SYSTEMS
[2]Wikipedia [3] www.CISCO.com [4] network tutorials .info (iv) webopedia (v) communications.howstuffworks.com (vi) techtarget.com (vii) cisconetacad.net (viii) reportimages.com
Page 62
Page 63