Академический Документы
Профессиональный Документы
Культура Документы
MAJOR PROJECT
REPORT FILE
ON
CORPORATE INETERNETWORK
IN
PARTIAL FULFILMENT OF
BACHELOR OF TECHNOLOGY(B.Tech.)
FROM
RAJASTHAN TECHNICAL UNIVERSITY, KOTA
ACADEMIC SESSION: 2010
Submitted To: Submitted By:
Mr. Naveen Hemrajani Saurabh Sharma
Head of Department, B.Tech. Final. Year
Computer Engineering, Computer Engineering,
GVSET GVSET
1
CERTIFICATE Of MAJOR PROJECT
SUBMITTED TO:
Mr. Naveen Hemrajani .
ACKNOWLEDGEMENT
2
I feel proud myself to acknowledgement the invaluable help rendered to our by so many people
while completing our work.
Project also provide an opportunity to the student to explore many dimensions of the
latest technology, also he get an opportunity to provide new dimensions to the present
technology so that it can be future improved.
I would like to thank Mr. Naveen Hemrajani, HOD. Computer Science Engineering, for
his invaluable guidance and advice for boosting us for creating creative thinking and helping us
to be having practical approach while we also learn during the development of major project on
“CORPORATE INTERNETWORK” . The gratitude that these people provided to us present
this report was immense, right from searching the topic till the final stage they have been helping
hand to me. I sincerely give our thanks to them.
Saurabh Sharma.
PREFACE
3
After the completion of studies , most of the engineering students will have to serve for public of
private sector industries. Laboratories and workshop based training and class room have their
own limitations. In the open economic era of fast modernization and tough competition technical
institute to produce pass out as near as job function possible.
Major Project for student is one major step in this direction. Major project can create awareness
of industries approach and culture. It bridges the gap between theory and practical and
explanation.
The major project report was experience full itself that we will relish for rest of our life. On the
basis of the information that we have collected and the guidance provided we have prepared a
comprehensive project report. We wish to thank our guide for us giving best suggestion,
information and help to complete this report.
Saurabh Sharma.
INDEX:
4
Certificate of Major Project………………………………………………………………2
Acknowledgement………………………………………………………………………..3
Preface……………………………………………………………………………………4
INDEX…………………………………………………………………………………....5
CORPORATE INTERNETWORK……………………………………………………...6
1). Synopsis …………………………………………………………………………...8
2.) Corporate Network Topology………………………………………………………...16
3). Technologies Used…………………………………………………………………...18
4.) Introduction to Computer Networking……………………………………………....28
5.) Coding………………………………………………………………………………..49
Conclusion……………………………………………………………………………….115
Bibliography…………………. …………………………………………………………117
5
CORPORATE
INTERNETWORK
6
PROJECT NAME: CORPORATE INTERNETWORK.
BRIEF OVERVIEW: This is a project in which ,we have implemented a computer network
within an organization or enterprise so that various end systems and devices able to communicate
with each other following some access controls. We have tried to designed a fault tolerant
network as far as possible.
RESOURCES REQUIRED:
1. SAURABH SHARMA
B.Tech. Final Year Computer Engineering,
GVSET.
2. SUBHASH YADAV
B.Tech. Final Year Computer Engineering,
GVSET.
3. ABHISHEK BHARATDWAJ
B.Tech. Final Year Computer Engineering,
GVSET.
7
Synopsis
8
SYNOPSIS
1.0 Corporate Internetwork:
Corporate Network is a project that connects various end systems of an organization to each
other. After the interconnectivity the various end system can communicate to each other.
Together with that configuration of any internetwork devices is done from any remote host
within the organization.
Networking devices do various kinds of jobs like transferring the data , providing
connectivity to different networks devices, transferring data in form of packets and
frames from one device to another. These are central connection for all the networks
equipments and handles a data type known as frame or packet. Actually frame and
packet contain the source and destination address together with a data.
9
2.0 Functional Description:
10
2.2 Interface Description:
A detailed description of each subsystem is presented. Section 3.1 is repeated for each of
n subsystems.
11
3.1.3. Subsystem n components:
3.1.3.1.1 Modems.
3.1.3.1.2 Switches.
3.1.3.1.3 Servers.
3.1.3.1.4 Routers.
3.1.3.1.5 Computers.
Special performance required for the subsystem is specified. The subsystem can
perform to the best for 2 years. After that its up gradation is required du to
technology changes.
12
3.1.5. Design Constraints:
Any design constraints that will impact the subsystem are noted. Together with
that system is made flexible that it can be redesigned as per technology changes.
A diagrammatic model for each subsystem s presented. Section 32 is repeated for each of
n subsystems.
13
4.0 System Modeling and Simulation results:
If system modeling and simulation and/or prototyping is conducted, these are specified here.
The system modeling approach (including tools and/or mathematical model) is described.
It uses various concepts regarding graphs theory and transportation in setting up the
topology of the network.
The results of any system simulation are presented with specific emphasis on data
throughput, timing, performance, and/or behavior.
14
5.0 Project Issues:
The result of system level cost estimates are presented. The cost depends upon the
components, man power and the time required for the construction.
5.0 Appendices:
******************************
15
Corporate Network
Topology:
16
Corporate Network Topology:
17
Technologies Used:
18
NETWORKING DEVICES
Networking devices do various kinds of jobs like transferring the data to signals,
providing connectivity to different network devices, transferring the data in form of
packets or frames form one device to other. These are the central connections for all the
network equipments and handles a data type known as frame or packet. Actually frames/
packet contain data and the destination address of where it is going. When a frame is
received, it is amplified and then transmitted on to port of destination PC. But different
networking components do this job in diff form at diff layers.
A Network Interface Card (NIC) is a circuit board that plugs into both clients and
servers and controls the exchange of data between them (A specific software
“driver” must be installed depending on the make of the NIC. A physical
transmission medium, such as twisted pair or coaxial cable interconnects all
network interface cards to network hubs or switches. Ethernet and Token Ring are
common network interface cards. Today’s cards supports 10baseT and 100baseT
with automatic recognition.
SWITCH
Hubs are capable of joining more than two PC but having some demerits like if
two PC would want to communicate at a time then there would be a collision and
the both PC would have to send the data once again. This shortcoming of Hub is
overcome by Switches. Switches are intelligent devices which work on the Layer2
of the OSI model. Basically a switch keeps a record of MAC addresses of all the
devices connected to it. Using this information, it builds a MAC address table. So
when a frame is received, it knows exactly which port to send it to, which
increases the network response time.
1. At the time of initializing the switch the MAC address table is yet to be built
up. When a frame is send by some of the PC, it recognises the source MAC
address and updates the MAC address table.
2. If the destination is available in the MAC table then forward to the
corresponding PC.
3. If the destination MAC address is not present in the table then forwards in all
the port available expect the incoming one. The designated PC will respond
for the data and it will send the acknowledge for the data received. This
acknowledged data will be examined by the switch and the MAC address
table would be up dated accordingly.
19
If two PC simultaneously transmit there data packets and both are connected to a
SWITCH, then collision will not occur, so we can say, it creates a multiple
collision domain.
The switch supports broadcast. Hence we can call switches create single broadcast
domain and multiple collision domains.
A 100/1000Mbps switch will allocate a full 100/1000 Mbps to each of its ports.
So regardless of the no of PC’s transmitting user will always have access to max
amt of bandwidth. They are usually Full-Duplex in nature.
ROUTER
For interconnecting two LAN or two or more different networks anther device
known as router is used. Its main job is to route (sends) packets to other networks
and to do the routing ( establishing paths between networks ) it uses the IP
address. A router is typically connected to at least two networks, commonly two
LAN’s or WAN’s or a LAN and its ISP’s network. Routers are located at
gateways, the places where two or more networks connect. Routers to determine
the best path for forwarding the packet are using forwarding tables.
It is a layer 3 device i.e it operates at network layer of OSI model. The working principle of the router is totally different
from a switch. Router makes a table known as routing table, which contains all the IP address in the network, the
information for IP address router obtains directly ( all configured IP address on it ) or indirectly ( from neighbor routers ).
When a packet is received it compares the destination IP address of the packet with the available IP addresses in its
Routing table. If the IP address is not available in the routing table then it simply discard the packet instead of flooding in
all the ports like a switch.(Detailed Information about router in chap )
20
NVRAM- It is used to store the router’s startup configuration file. It
does not lose data when power is switched off. So the contents of startup
configuration files are maintained even when we switch off or restart the
router.
All Cisco routers have a console port that provides an EIA/TIA-232 asynchronous serial
connection. Console port can be connected to computers serial connection to gain terminal
access to router.
Most routers also have an auxiliary port that is very similar to console port but, are typically
used for modem connection for remote router management.
1) Through console port: - The console port is used for configuring a router
locally with the help of a PC or a Laptop. The console port of the router is
21
connected to the serial i.e COM port of the router. The detailed configuration
is given in the section.
2) Through the AUX port: - The aux (auxiliary) port is accessed from a modem
located faraway from a router through the PSTN (Public Switched Telephone
Network) and the configuration is done.
3) Through Telnet:- Line vty (virtual terminal) 0 to 4 are used for the
configuring the router by telnet.
We use HyperTerminal Program to open a console session and log into the
router locally. This console connection allows to connect to and to
communicate with router without having to connect to the network to which it
belongs. Now, the PC becomes the console that allows entering commands
and communicating directly with the router. To set up a console session, we
use the workstation’s Windows HyperTerminal (terminal emulation) program.
Now first of all we configure the COM port settings, then log into the router to
interact with the IOS command line interface (CLI). These are the com port
settings:
9600
8
N
1
On/off
The Following steps are adopted to access a router through the console port
with a Windows based PC.
22
COM 1 Setting
23
Hyper terminal Screen
After connecting the router that will boot and after booting the following procedures will
be adopted.
Router> enable
Now automatically prompt asking for password will appear on the screen like this:
Password:
Now write password over here. This is done to secure access to router. After this
Router#
Will appear on the screen this shows that we are in privileged mode and now we try to enter in
configuration mode.
ROUTING PROTOCOLS
RIP TIMERS
The routing-update timer controls the time between routing updates. Default is
usually 30 seconds, plus a small random delay to prevent all RIP routers from
sending updates simultaneously.
25
The route-timeout timer controls when a route is no longer available. The default
is usually 180 seconds. If a router has not seen the route in an update during this
specified interval, it is dropped from the router's announcements. The route is
maintained long enough for the router to advertise the route as down (hop count
of 16).
The route-flush timer controls how long before a route is completely flushed from
the routing table. The default setting is usually 120 seconds.
router> enable
Password:
router# conf t
router(config)#interface ethernet 0
router (config-if)# ip address 192.168.42.1
router(config-if)# interface ethernet 1
router(config-if)# ip address 192.168.43.1
router(config-if)# exit
router(config)# router rip
router(config-router)# network 192.168.42.0
router(config-router)# network 192.168.43.0
router(config-router)# exit
router(config-router)# ^z
router#
The example above assumes that the interfaces that will be running RIP have IP
addresses on them that fall within the 192.168.42.0, and 192.168.43.0 class C
ranges.
IGRP
26
IGRP sends its routing table to its neighbors every 90 seconds. IGRP's default
update period of 90 seconds is a benefit compared to RIP, which can consume
excessive bandwidth when sending updates every 30 seconds. IGRP uses an
invalid timer to mark a route as invalid after 270 seconds (three times the update
timer). As with RIP, IGRP uses a flush timer to remove a route from the routing
table; the default flush timer is set to 630 seconds (seven times the update period
and more than 10 minutes).
If a network goes down or the metric for the network increases, the route is placed
in holddown. The router accepts no new changes for the route until the holddown
timer expires. This setup prevents routing loops in the network. The default
holddown timer is 280 seconds (three times the update timer plus 10 seconds).
27
Introduction to
Computer
Networking:
28
INTRODUCTION TO COMPUTER NETWORKS:
1). Introduction: A network is basically all of the components (software and hardware)
involved in connecting computers. It is used to share data between two or more computers.
Among all of the essentials for human existence, the need to interact with others ranks just below
our need to sustain life. Communication is almost as important to us as our reliance on air, water,
food, and shelter.
The methods that we use to share ideas and information are constantly changing and evolving.
Whereas the human network was once limited to face-to-face conversations, media
breakthroughs continue to extend the reach of our communications. From the printing press to
television, each new development has improved and enhanced our communication.
As with every advance in communication technology, the creation and interconnection of robust
data networks is having a profound effect.
Early data networks were limited to exchanging character-based information between connected
computer systems. Current networks have evolved to carry voice, video streams, text, and
graphics between many different types of devices. Previously separate and distinct
communication forms have converged onto a common platform. This platform provides access
to a wide range of alternative and new communication methods that enable people to interact
directly with each other almost instantaneously.
The immediate nature of communications over the Internet encourages the formation of global
communities. These communities foster social interaction that is independent of location or time
zone
29
2). Communication Over The Network:
The standardization of the various elements of the network enables equipment and devices
created by different companies to work together. Experts in various technologies can contribute
their best ideas on how to develop an efficient network, without regard to the brand or
manufacturer of the equipment.
30
3). The Element of Computer Network:
The diagram shows elements of a typical network, including devices, media, and services, tied
together by rules, that work together to send messages. We use the word messages as a term that
encompasses web pages, e-mail, instant messages, telephone calls, and other forms of
communication enabled by the Internet. In this course, we will learn about a variety of messages,
devices, media, and services that allow the communication of those messages. We will also learn
about the rules, or protocols, that tie these network elements together.
Networking is a very graphically oriented subject, and icons are commonly used to represent
networking devices. These include various types of computers (a PC and laptop icon are shown),
servers, and IP phones. On local area networks these devices are typically connected by LAN
media (wired or wireless).
Switch - the most common device for interconnecting local area networks
Firewall -provides security to networks
Router - helps direct messages as they travel across a network
Wireless Router - a specific type of router often found in home networks
Cloud - used to summarize a group of networking devices, the details of which may be
unimportant to the discussion at hand
Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line
31
For a network to function, the devices must be interconnected. Network connections can be
wired or wireless. In wired connections, the medium is either copper, which carries electrical
signals, or optical fiber, which carries light signals. In wireless connections, the medium is the
Earth's atmosphere, or space, and the signals are microwaves. Copper medium includes cables,
such as twisted pair telephone wire, coaxial cable, or most commonly, what is known as
Category 5 Unshielded Twisted Pair (UTP) cable. Optical fibers, thin strands of glass or plastic
that carry light signals, are another form of networking media. Wireless media may include the
home wireless connection between a wireless router and a computer with a wireless network
card, the terrestrial wireless connection between two ground stations, or the communication
between devices on earth and satellites. In a typical journey across the Internet, a message may
travel across a variety of media.
32
4). Converged networks:
Technology advances are enabling us to consolidate these disparate networks onto one platform -
a platform defined as a converged network. The flow of voice, video, and data traveling over the
same network eliminates the need to create and maintain separate networks. On a converged
network there are still many points of contact and many specialized devices - for example,
personal computers, phones, TVs, personal assistants, and retail point-of-sale registers - but only
one common network infrastructure.
The pace at which the development of exciting new converged network applications is occurring
can be attributed to the rapid expansion of the Internet. This expansion has created a wider
audience and a larger consumer base for whatever message, product or service can be delivered.
The underlying mechanics and processes that drive this explosive growth have resulted in a
network architecture that is both resilient and scalable. As the supporting technology platform for
living, learning, working, and playing in the human network, the network architecture of the
Internet must adapt to constantly changing requirements for a high quality of service and security
33
5). The Network Architecture:
Networks must support a wide range of applications and services, as well as operate over many
different types of physical infrastructures. The term network architecture, in this context, refers
to both the technologies that support the infrastructure and the programmed services and
protocols that move the messages across that infrastructure. As the Internet, and networks in
general, evolve, we are discovering that there are four basic characteristics that the underlying
architectures need to address in order to meet user expectations: fault tolerance, scalability,
quality of service, and security.
Fault Tolerance
The expectation that the Internet is always available to the millions of users who rely on it
requires a network architecture that is designed and built to be fault tolerant. A fault tolerant
network is one that limits the impact of a hardware or software failure and can recover quickly
when such a failure occurs. These networks depend on redundant links, or paths, between the
source and destination of a message. If one link or path fails, processes ensure that messages can
be instantly routed over a different link transparent to the users on either end. Both the physical
infrastructures and the logical processes that direct the messages through the network are
designed to accommodate this redundancy. This is a basic premise of the architecture of current
networks.
Fault Tolerance
34
Scalability
A scalable network can expand quickly to support new users and applications without impacting
the performance of the service being delivered to existing users. Thousands of new users and
service providers connect to the Internet each week. The ability of the network to support these
new interconnections depends on a hierarchical layered design for the underlying physical
infrastructure and logical architecture. The operation at each layer enables users or service
providers to be inserted without causing disruption to the entire network. Technology
developments are constantly increasing the message carrying capabilities and performance of the
physical infrastructure components at every layer. These developments, along with new methods
to identify and locate individual users within an internetwork, are enabling the Internet to keep
pace with user demand.
Scalability
35
Quality of Service (QoS)
The Internet is currently providing an acceptable level of fault tolerance and scalability for its
users. But new applications available to users over internetworks create higher expectations for
the quality of the delivered services. Voice and live video transmissions require a level of
consistent quality and uninterrupted delivery that was not necessary for traditional computer
applications. Quality of these services is measured against the quality of experiencing the same
audio or video presentation in person. Traditional voice and video networks are designed to
support a single type of transmission, and are therefore able to produce an acceptable level of
quality. New requirements to support this quality of service over a converged network are
changing the way network architectures are designed and implemented.
36
Security
The Internet has evolved from a tightly controlled internetwork of educational and government
organizations to a widely accessible means for transmission of business and personal
communications. As a result, the security requirements of the network have changed. The
security and privacy expectations that result from the use of internetworks to exchange
confidential and business critical information exceed what the current architecture can deliver.
Rapid expansion in communication areas that were not served by traditional data networks is
increasing the need to embed security into the network architecture. As a result, much effort is
being devoted to this area of research and development. In the meantime, many tools and
procedures are being implemented to combat inherent security flaws in the network architecture.
Security
37
6). Separating Host to Common Groups:
One of the major roles of the Network layer is to provide a mechanism for addressing hosts. As
the number of hosts on the network grows, more planning is required to manage and address the
network.
Dividing Networks
Rather than having all hosts everywhere connected to one vast global network, it is more
practical and manageable to group hosts into specific networks. Historically, IP-based networks
have their roots as one large network. As this single network grew, so did the issues related to its
growth. To alleviate these issues, the large network was separated into smaller networks that
were interconnected. These smaller networks are often called subnetworks or subnets.
Network and subnet are terms often used interchangeably to refer to any network system made
possible by the shared common communication protocols of the TCP/IP model.
Similarly, as our networks grow, they may become too large to manage as a single network. At
that point, we need to divide our network. When we plan the division of the network, we need to
group together those hosts with common factors into the same network.
As shown in the figure, networks can be grouped based on factors that include:
Geographic location
Purpose
Ownership
38
Grouping Hosts for Specific Purposes
Users who have similar tasks typically use common software, common tools, and have common
traffic patterns. We can often reduce the traffic required by the use of specific software and tools
by placing the resources to support them in the network with the users.
The volume of network data traffic generated by different applications can vary significantly.
Dividing networks based on usage facilitates the effective allocation of network resources as
well as authorized access to those resources. Network professionals need to balance the number
of hosts on a network with the amount of traffic generated by the users. For example, consider a
business that employs graphic designers who use the network to share very large multimedia
files. These files consume most of the available bandwidth for most of the working day. The
business also employs salespersons who only logged in once a day to record their sales
transactions, which generates minimal network traffic. In this scenario, the best use of network
resources would be to create several small networks to which a few designers had access and one
larger network that all the salespersons used.
Geographic Location
39
Grouping Hosts for Ownership
Using an organizational (company, department) basis for creating networks assists in controlling
access to the devices and data as well as the administration of the networks. In one large
network, it is much more difficult to define and limit the responsibility for the network
personnel. Dividing hosts into separate networks provides a boundary for security enforcement
and management of each network.
Purpose:
40
Grouping Hosts for Ownership
Using an organizational (company, department) basis for creating networks assists in controlling
access to the devices and data as well as the administration of the networks. In one large
network, it is much more difficult to define and limit the responsibility for the network
personnel. Dividing hosts into separate networks provides a boundary for security enforcement
and management of each network.
Ownership
If the host at the specified address receives the Echo request, it responds with an ICMP Echo
Reply datagram. For each packet sent, ping measures the time required for the reply.
As each response is received, ping provides a display of the time between the ping being sent and
the response received. This is a measure of the network performance. Ping has a timeout value
for the response. If a response is not received within that timeout, ping gives up and provides a
message indicating that a response was not received.
After all the requests are sent, the ping utility provides an output with the summary of the
responses. This output includes the success rate and average round-trip time to the destination.
There are some special testing and verification cases for which we can use ping. One case is for
testing the internal configuration of IP on the local host. To perform this test, we ping the special
reserve address of local loopback (127.0.0.1), as shown in the figure.
A response from 127.0.0.1 indicates that IP is properly installed on the host. This response
comes from the Network layer. This response is not, however, an indication that the addresses,
42
masks, or gateways are properly configured. Nor does it indicate anything about the status of the
lower layer of the network stack. This simply tests IP down through the Network layer of the IP
protocol. If we get an error message, it is an indication that TCP/IP is not operational on the host.
We can also use ping to test the host ability to communicate on the local network. This is
generally done by pinging the IP address of the gateway of the host, as shown in the figure. A
ping to the gateway indicates that the host and the router's interface serving as that gateway are
both operational on the local network.
For this test, the gateway address is most often used, because the router is normally always
operational. If the gateway address does not respond, you can try the IP address of another host
that you are confident is operational in the local network.
If either the gateway or another host responds, then the local hosts can successfully communicate
over the local network. If the gateway does not respond but another host does, this could indicate
a problem with the router's interface serving as the gateway.
One possibility is that we have the wrong address for the gateway. Another possibility is that the
router interface may be fully operational but have security applied to it that prevents it from
processing or responding to ping requests. It is also possible that other hosts may have the same
security restriction applied.
We can also use ping to test the ability of the local IP host to communicate across an
internetwork. The local host can ping an operational host of a remote network, as shown in the
figure.
43
If this ping is successful, you will have verified the operation of a large piece of the
internetwork. It means that we have verified our host's communication on the local network, the
operation of the router serving as our gateway, and all other routers that might be in the path
between our network and the network of the remote host.
Additionally, you have verified the same functionality of the remote host. If, for any reason, the
remote host could not use its local network to communicate outside its network, then it would
not have responded.
Many network administrators limit or prohibit the entry of ICMP datagrams into the corporate
network. Therefore, the lack of a ping response could be due to security restrictions and not
because of non-operational elements of the networks.
44
To meet user requirements, a LAN needs to be planned and designed. Planning ensures that all
requirements, cost factors and deployment options are given due consideration.
When selecting a device for a particular LAN, there are a number of factors that need to be
considered. These factors include, but are not limited to:
Cost
Speed and Types of Ports/Interfaces
Expandability
Manageability
Additional Features and Services
45
Although there are many factors that must be considered when selecting a switch, the next topic
will explore two: cost and interface characteristics.
Cost
The cost of a switch is determined by its capacity and features. The switch capacity includes the
number and types of ports available and the switching speed. Other factors that impact the cost
are its network management capabilities, embedded security technologies, and optional advanced
switching technologies.
Using a simple "cost per port" calculation, it may appear initially that the best option is to deploy
one large switch at a central location. However, this apparent cost savings may be offset by the
expense from the longer cable lengths required to connect every device on the LAN to one
switch. This option should be compared with the cost of deploying a number of smaller switches
connected by a few long cables to a central switch.
Another cost consideration is how much to invest in redundancy. The operation of the entire
physical network is affected if there are problems with a single central switch.
Redundanc
y can be provided in a number of ways. We can provide a secondary central switch to operate
concurrently with the primary central switch. We can also provide additional cabling to provide
multiple interconnections between the switches. The goal of redundant systems is to allow the
physical network to continue its operation even if one device fails.
Speed and Types of Ports/Interfaces
46
The need for speed is ever-present in a LAN environment. Newer computers with built-in
10/100/1000 Mbps NICs are available. Choosing Layer 2 devices that can accommodate
increased speeds allows the network to evolve without replacing the central devices.
When selecting a switch, choosing the number and type of ports is a critical decision. Ask
yourself these questions: Would you purchase a switch with:
Just enough ports for today's needs?
A mixture of UTP speeds?
Both UTP and fiber ports?
Consider carefully how many UTP ports will be needed and how many fiber ports will be
needed. Likewise, consider how many ports will need 1 Gbps capability and how many ports
only require 10/100 Mbps bandwidths. Also, consider how soon more ports will be needed.
47
When selecting a router, we need to match the characteristics of the router to its purpose. Similar
to the switch, cost and interface types and speeds must be considered as well. Additional factors
for choosing a router include:
Expandability
Media
Operating System Features
Expandability
Networking devices, such as routers and switches, come in both fixed and modular physical
configurations. Fixed configurations have a specific number and type of ports or interfaces.
Modular devices have expansion slots that provide the flexibility to add new modules as
requirements evolve. Most modular devices come with a basic number of fixed ports as well as
expansion slots. Since routers can be used for connecting different numbers and types of
networks, care must be taken to select the appropriate modules and interfaces for the specific
media.
Depending on the version of the operating system, the router can support certain features and
services such as:
Security
Quality of Service (QoS)
Voice over IP (VoIP)
Routing multiple Layer 3 protocols
Special services such as Network Address Translation (NAT) and Dynamic Host Configuration
Protocol (DHCP)
For the selection of devices, the budget is an important consideration. Routers can be expensive
based on interfaces and features needed. Additional modules, such as fiber-optics, can increase
the costs. The media used to connect to the router should be supported without needing to
purchase additional modules. This can keep costs to a minimum.
48
Coding
Router0:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
49
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
50
Processor board ID FTX0947Z18E
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
191K bytes of NVRAM.
31360K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
51
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
52
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip address 202.203.207.2 255.255.255.0
Router(config-if)#no shut
Router1:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
53
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
54
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
55
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router# config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip address 202.203.208.2 255.255.255.0
Router(config-if)#no shut
56
Router(config-if)#int fa0/0
Router(config-if)#ip address 202.203.211.1 255.255.255.0
Router(config-if)#no shut
57
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.3(8r)T8, RELEASE
SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
58
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
59
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip address 202.203.204.2 255.255.255.0
Router(config-if)#no shut
60
Router(config-router)#network 202.203.204.0
Router3:
31360K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.3(8r)T8, RELEASE
SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
61
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
62
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip address 202.203.201.2 255.255.255.0
Router(config-if)#no shut
Router4:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
63
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
64
Router(config)#int s0/2/1
%Invalid interface type and number
Router(config)#ip address 202.203.218.1 255.255.255.0
^
% Invalid input detected at '^' marker.
Router(config)#int s0/0/1
Router(config-if)#ip address 202.203.216.2 255.255.255.0
Router(config-if)#no shut
65
Router(config-router)#network 202.203.222.0
Router(config-router)#network 202.203.221.0
Router(config-router)#exit
Router(config)#
Router5:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
66
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip address 202.203.215.2 255.255.255.0
Router(config-if)#no shut
67
%LINK-5-CHANGED: Interface Serial0/0/1, changed state to up
Router(config-if)#clock rate 9600
Router(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1, changed state to up
Router(config-if)#int fa0/0
Router(config-if)#ip address 202.203.219.1 255.255.255.0
Router(config-if)#no shut
R0:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
68
170 West Tasman Drive
San Jose, California 95134-1706
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.1(3r)T2, RELEASE
SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
69
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
70
8 Low-speed serial(sync/async) network interface(s)
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(15)T1,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
71
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1, changed state to up
R0 con0 is now available
Press RETURN to get started.
R1:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
A summary of U.S. laws governing Cisco cryptographic products may be found at:
72
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.1(3r)T2, RELEASE
SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
73
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Image text-base: 0x400A925C, data-base: 0x4372CE20
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
74
Router(config)#hostname R1
R1(config)#int s0/1/0
R1(config-if)#ip address 202.202.201.2 255.255.255.0
R1(config-if)#no shut
R2:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
75
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
76
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.1(3r)T2, RELEASE
SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
A summary of U.S. laws governing Cisco cryptographic products may be found at:
77
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R2
R2(config)#int s0/1/0
R2(config-if)#ip address 202.202.207.2 255.255.255.0
R2(config-if)#no shut
78
%LINK-5-CHANGED: Interface Serial0/1/1, changed state to down
R2(config-if)#int s0/0/0
R2(config-if)#ip address 202.202.209.2 255.255.255.0
R2(config-if)#no shut
R3:
Router#en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R3
R3(config)#int s0/1/1
R3(config-if)#ip address 202.202.200.2 255.255.255.0
R3(config-if)#no shut
79
%LINK-5-CHANGED: Interface Serial0/1/1, changed state to up
R3(config-if)#int s0/1/0
R3(config-if)#ip address 202.202.202.1 255.255.255.0
R3(config-if)#no shut
R5:
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
Processor board ID JAD05190MTZ (4292891495)
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
80
8 Low-speed serial(sync/async) network interface(s)
239K bytes of non-volatile configuration memory.
62720K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(15)T1,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Router>en
Router#hostname R5
^
% Invalid input detected at '^' marker.
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#R5
^
% Invalid input detected at '^' marker.
Router(config)#hostname R5
R5(config)#int s0/0/0
R5(config-if)#ip address 202.202.200.1 255.255.255.0
R5(config-if)#no shut
81
R5(config-if)#clock rate 9600
R5(config-if)#no shut
R5(config-if)#
R5 con0 is now available
Press RETURN to get started.
R5>
R5>System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
A summary of U.S. laws governing Cisco cryptographic products may be found at:
82
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R1
R1(config)#int s0/0/0
R1(config-if)#ip address 202.202.200.1 255.255.255.0
R1(config-if)#no shut
83
R1(config-if)#
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
%LINK-5-CHANGED: Interface Serial0/0/1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/1, changed state to up
R1 con0 is now available
Press RETURN to get started.
R1>en
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#int s0/1/0
R1(config-if)#ip address 202.202.212.2 255.255.255.0
R1(config-if)#no shut
84
R1(config-if)#int s 1/0/0
R1(config-if)#ip address 202.202.218.2 255.255.255.0
R1(config-if)#no shut
R1(config-if)#int s 1/0/1
R1(config-if)#ip address 202.202.219.2 255.255.255.0
R1(config-if)#no shut
R1(config-if)#
R6:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
85
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Continue with configuration dialog? [yes/no]: System Bootstrap, Version 12.1(3r)T2, RELEASE
SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
86
Cisco IOS Software, 2800 Software (C2800NM-ADVIPSERVICESK9-M), Version 12.4(15)T1,
RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 06:21 by pt_rel_team
Image text-base: 0x400A925C, data-base: 0x4372CE20
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
87
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R6
R6(config)#int s0/1/1
R6(config-if)#ip address 202.202.211.1 255.255.255.0
R6(config-if)#no shut
R7:
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
cisco 2811 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory
88
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
89
Press RETURN to get started!
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/1/0
Router(config-if)#ip address 202.202.206.2 255.255.255.0
Router(config-if)#no shut
90
R10:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
91
export@cisco.com.
92
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
93
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int s0/0/0
Router(config-if)#ip add
Router(config-if)#ip address 202.204.202.2 255.255.255.0
Router(config-if)#no shut
Router(config-if)#no shut
R11:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
94
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
95
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
96
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R11
R11(config)#int s0/0/0
R11(config-if)#ip address 202.204.213.2 255.255.255.0
R11(config-if)#no shut
97
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
R11(config-if)#clock rate 9600
R11(config-if)#
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
R11(config-if)#router eigrp 1
R11(config-router)#net
R11(config-router)#network 202.204.211.0
R11(config-router)#network 202.204.203.0
R11(config-router)#exit
R11(config)#int fa0/0
R11(config-if)#ip address 202.204.211.1 255.255.255.0
R11(config-if)#no shut
R12:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
98
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
99
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
100
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
Processor board ID FTX0947Z18E
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
2 Low-speed serial(sync/async) network interface(s)
191K bytes of NVRAM.
31360K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R12
R12(config)#int s0/0/0
R12(config-if)#ip address 202.204.204.2 255.255.255.0
R12(config-if)#no shut
101
R12(config-router)#network 202.204.204.0
R12(config-router)#network 202.204.204.0
%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 202.204.204.1 (Serial0/0/0) is up: new adjacency
R12(config-router)#network 202.204.212.0
R12(config-router)#exit
R12(config)#
R13:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
102
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
103
170 West Tasman Drive
San Jose, California 95134-1706
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
104
Continue with configuration dialog? [yes/no]: no
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R13
R13(config)#int s0/0/0
R13(config-if)#ip address 202.204.205.2 255.255.255.0
R13(config-if)#no shut
R14:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
105
Restricted Rights Legend
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
106
31360K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
107
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R14
R14(config)#int s0/0/0
R14(config-if)#ip address 202.204.206.2 255.255.255.0
108
R14(config-if)#no shut
R15:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
109
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
110
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
111
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
Processor board ID FTX0947Z18E
M860 processor: part number 0, mask 49
2 FastEthernet/IEEE 802.3 interface(s)
2 Low-speed serial(sync/async) network interface(s)
191K bytes of NVRAM.
31360K bytes of ATA CompactFlash (Read/Write)
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R15
R15(config)#int s0/0/0
R15(config-if)#ip address 202.204.207.2 255.255.255.0
R15(config-if)#no shut
112
R15(config-router)#network 202.204.207.0
R15(config-router)#network 202.204.215.0
R15(config-router)#exit
R15(config)#
R16:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
113
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
114
Cisco IOS Software, 1841 Software (C1841-ADVIPSERVICESK9-M), Version 12.4(15)T1, RELEASE
SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 18-Jul-07 04:52 by pt_team
Image text-base: 0x60080608, data-base: 0x6270CD50
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
115
Press RETURN to get started!
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R16
R16(config)#int s0/0/0
R16(config-if)#ip address 202.204.208.2 255.255.255.0
R16(config-if)#no shut
R17:
System Bootstrap, Version 12.3(8r)T8, RELEASE SOFTWARE (fc1)
Cisco 1841 (revision 5.0) with 114688K/16384K bytes of memory.
116
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
117
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to administratively down
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to administratively down
%LINK-5-CHANGED: Interface Vlan1, changed state to administratively down
Press RETURN to get started!
118
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname R17
R17(config)#int s0/0/0
R17(config-if)#ip address 202.204.209.2 255.255.255.0
R17(config-if)#no shut
119
R17(config-if)#int fa0/0
R17(config-if)#ip address 202.204.217.1 255.255.255.0
R17(config-if)#no shut
R17(config-router)#network 202.204.209.0
R17(config-router)#
%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 202.204.209.1 (Serial0/0/0) is up: new adjacency
R17(config-router)#network 202.204.217.0
R17(config-router)#exit
R17(config)#
****************************
120
Conclusion:
Conclusion:
Data networks support the way we live, learn, work, and play. They provide the platform for the services
that enable us to connect - both locally and globally - with our families, friends, work, and interests. This
platform supports using text, graphics, video, and speech.
Data networks and human networks use similar procedures to ensure that their communication gets to the
destination accurately and on time. Agreements on language, content, form, and medium that humans
often implicitly use are mirrored in the data network.
121
The factors that ensure the delivery of our messages and information across a data network are the
networking media that connect the networking devices and the agreements and standards that govern its
operation. As the demand grows for more people and devices to communicate in a mobile world, data
network technologies will have to adapt and develop.
Converged networks, which carry all communications types (data, voice, and video) on one infrastructure,
provide an opportunity to reduce costs and offer users feature-rich services and content. However, the
design and management of converged networks requires extensive networking knowledge and skills if all
services are to be delivered as expected to users.
Different types of communications flowing across our data networks need to be prioritized so that the
time-sensitive and important data have the first use of limited network resources.
Integrating security into data networks is essential if our private, personal, and business communications
are not going to be intercepted, stolen, or damaged.
122
References:
References:
The main source of reference to me, during my Major Project Report are the teachers in my
college. They were the only source of information based on which I formulated my Major
Project Report and came to know the various lacunas existing in my mind regarding the subject.
Also the presence of Cisco website cannot be ignored.
123
Book References:
1): Todd Lammle CCSI, Cisco Certified Network Associate Study Guide.6th Edition, ND:
Wiley-India,2008.
2): Tanenbaum, A. Computer Networks 4th Edition, NJ: Prentice Hall,2003.
Website References:
1): www.cisco.netacad.net
124