Sie sind auf Seite 1von 86

Routing

& Switching
Protocol
MINT-708
LAB MANUAL
Submitted by:- Nehal Sharma
1282695

Submitted to : Dr. Mike MacGregor


Second reader: Shahnawaz Mir

Abstract

Inter-networking is an essential element of data communication networks. The


existence of networking begins from home and it covers huge enterprises all
across the globe. It could be simple or complex at times, depending on the
structure of the network. It is one of the basic ingredients of a healthy
communication system. It helps an organization, in one part of the world to
exchange information with an organization in another part of the word. In order
to share the data or to operate various other operations the concept of Internetworking has played a revolutionary role. The impact it has on the working of
institutions and common person is beyond imagination. And, the leaders working
in this industry believes that inter-networking has huge potential.

The information shared in this manual is very simple yet very challenging for
network engineers. It will help the reader in understanding the topics with much
more clarity. It will assist a reader to analyze the theoretical and practical
concepts of LAN/WAN. The basic knowledge of routing and switching protocols in
this manual will indulge the reader to explore these topics from root level to the
expert level. My entire approach was to create an environment, where a reader
finds it nourishing for his/her brain and transforms him/her to handle the real
world Inter-networks.

Table of content

LAB 1: Basic Knowledge ................................................................................................................................ 5


1 (a) Prelab for Basic Knowledge .............................................................................................................. 8
1(b) LAB EXERCISE:- ............................................................................................................................... 9
Network Address Translation ..................................................................................................................... 11
2 (a) Prelab for NAT/PAT ......................................................................................................................... 12
2(b) Network Diagram :- ..................................................................................................................... 15
2 (c) NAT/PAT IP Addressing Schema.............................................................................................. 17
2(d) LAB EXERCISE:- .................................................................................................................... 18
Virtual-Lan and Spanning Tree Protocol ..................................................................................................... 21
3 (a) Prelab For VLAN and STP ................................................................................................................ 22
3(b) Network diagram:-....................................................................................................................... 23
3(c) VLAN & STP IP Addressing Schema:- ........................................................................................ 26
3(d) LAB EXERCISE:- .................................................................................................................... 27
Static routing ............................................................................................................................................... 30
4 (a) Prelab for Static Routing and Route Aggregation ........................................................................... 31
4(b) Network Diagram:- ...................................................................................................................... 33
4(c) Static Routing IP ADDRESSING SCHEMA .................................................................................. 35
4(d) LAB EXERCISE:- .................................................................................................................... 36
Routing Information Protocol ..................................................................................................................... 39
5a) Prelab for Routing Internet Protocol ................................................................................................ 40
5(b) Network diagram ......................................................................................................................... 42
5(c) Routing Internet Protocol IP ADDRESSING SCHEMA ............................................................... 44
5(d) LAB EXERCISE:- .................................................................................................................... 45
Open Short Path First .................................................................................................................................. 48
6a) Prelab for Open Shortest Path First .................................................................................................. 49
6(b) Network Diagram ........................................................................................................................ 50
6(c) Open Shortest Path First IP ADDRESSING SCHEMA ................................................................. 52
6(d) LAB EXERCISE:- .................................................................................................................... 53
Integrated Intermediate System-Intermediate System (IS-IS) ................................................................... 55
2

7a) Prelab Integrated system Integrated system.................................................................................... 57


7(b) Network Diagram ........................................................................................................................ 58
7(c) Open Shortest Path First IP Addressing Schema...................................................................... 60
7(d) LAB EXERCISE:- .................................................................................................................... 61
Border Gateway Protocol............................................................................................................................ 64
8a) Prelab Border Gateway Protocol ...................................................................................................... 65
8(b) Network Diagram ........................................................................................................................ 67
8(c) Border Gateway Protocol IP ADDRESSING SCHEMA................................................................ 69
8(d) LAB EXERCISE:- .................................................................................................................... 70
IP Multicasting ............................................................................................................................................ 73
9a) Prelab IP Multicasting ....................................................................................................................... 74
9(b) Network Diagram ........................................................................................................................ 75
9(c)IP MULTICASTING

IP ADDRESSING SCHEMA ......................................................................... 77

9(d) LAB EXERCISE:- .................................................................................................................... 78


IPV6 Addressing .......................................................................................................................................... 80
10a) Prelab IPv6 Addressing ................................................................................................................... 81
10(b) Network Diagram ...................................................................................................................... 83
10(c) LAB EXERCISE:- ....................................................................................................................... 85

Lab-1
Basic Knowledge

LAB 1: Basic Knowledge


Internetworking is one of the most important part of the technology so it require
lots of effort to understand and implement it. It is like a backbone for both
Internet and Ethernet. In Internetworking there are lots of devices a person need
to deal with, such as switches, routers, firewalls etc. blend with the routing
protocols.
Router: - A router is a major networking device which is used to send data packets
along networks. It could be connected to a LAN/WAN or to an ISP. It is connected
at gateways, where two or more networks connect. It follows certain rules on
how data should flow from a network or to a network and that set of rules is
known as protocols.
Switch: - It is a device which works on layer 2 or 3 sometimes of OSI reference
model. They have a capability of joining different system together. They inspect
data packets when they are received and after determining the source and
destination of a packet, the packet is forwarded.
There are many more devices but they run on a set of rules and that is routing
protocols:1.) Routing Internet Protocol
2.) Open Short Path First
3.) Border Gateway Protocol
4.) Integrated system to integrated system
5.) IP Multicast
6.) Spanning Tree protocol
And, so on and so forth.
Now, lets talk about the physical layer. In order to establish a physical connection
we need wires or fiber cable. In networking there are two basic standards of UTP
or STP wires:a.) Crossover cable: - Different cables with different standard come in the
market like cat 5, 6 or 7 etc. Crossover cable is used for connecting two
5

same devices like switch to a switch. Wire has two ends clamped with RJ45
connector. But color combination of wires is also important .there are two
types of color combination one is 568 A and other is 568 B
568A
Wire
1
2
3
4
5
6
7
8

568B
color
Green white
Green
Orange white
Blue
Blue white
Orange
Brown white
Brown

Wire
1
2
3
4
5
6
7
8

Color
Orange white
Orange
Green white
Blue
Blue white
Green
Brown white
Brown

Now, for a crossover cable one end of cable should be 568 A and other should be
568 B.
b.) Straight through cable: - Straight cable is used for connecting two different
devices like switch to a router. Wire has two ends clamped with RJ45
connector. But color combination of wires is also important. So, for a
crossover cable one end of cable should be 568 A and other should be 568A
too.
There are other cables as well like serial cable as they are used on serial ports
on routers. One end is DTE and other is DCE.
Console Cable is basically a rollover cable which is used to connect computer
terminal to a router console port. The ports are same in console cable so it can
connect two serial devices with the same cable.
Console server is a device which is used for accessing system consoles like
router or a switch. It allows user to access the network by using the
applications like telnet, ssh etc.

Auxiliary port is a synchronous serial port with Rj-45 connector on the other
side. It is used for connecting to the external modem. If the regular
connectivity fails it is used to troubleshoot or access routers.

1 (a) Prelab for Basic Knowledge


Q1.) Why the concept of subnetting is required in networking?
Q2.)Why the command IP subnet-zero is important?
Q3.) Write down the CIDR value and its class of following:a.) /11
b.) /29
c.) /16
Q4.) Network address is given as 172.16.0.0 and subnet mask is 255.255.248.0
(/21). Find the following:a.) Number of subnets
b.) Number of host/subnet
c.) Number of valid subnet
Q5.) Which command is used on a cisco router to clear the old configurations out
of a router?
Q6.) Define three kinds of modes in CLI
Q7.) Ipv9 addressing is used for which purpose?
Q8.) The following protocol number is assigned to:a.) 2
b.) 6
c.) 17
d.) 45
Q9.) If you need to connect host to switch which cable would you use crossover
or straight cable?

1(b) LAB EXERCISE:-


On any cisco router: Write the commands to copy flash from a TFTP server
After copying the flash on your system, delete the flash from cisco router.
When the router comes in rommon mode, copy the flash back on it and
write the commands used on router.
After copying flash on router set a password
Release the router and telnet again
When the router ask for password don`t put the password that you set on
the contrary try to recover or set a new password.
Configure any two ports with IP address
Now, erase the NVRAM and reload

On any Alcatel router: Configure the cards


Configure interfaces with any IP address
Check the flash file

Delete primary config file (NOT PRIMARY-IMAGE)

After the successful completion of above mentioned tasks document the


following:-

On any cisco & Alcatel router:Write all the commands categorically which were used to perform all the steps in
both the routers

Lab-2
Network Address Translation
(NAT) & Port Address
Translation (PAT)

10

Network Address Translation


Network Address Translation was introduced so that the depletion of public IP
addresses can be controlled and it can be achieved by using a large number of
private IP addresses represented by a few Public IP addresses. The objective of
NAT was to replace the IP address within a packet.
The working of NAT is very simple. Suppose if a packet is going from a private IP
address to the outside cloud, when passes through the router (with NAT
configured on it ) the private IP address will be changed with a public IP address.
Now, when the packet is received in response to the send packet it has public IP
address but when it pass through the router with NAT it will change the public IP
address into Private IP address and send it to the destination. Nat has a capability
of hiding the real address on both sides.
In NAT devices everything is divided into two parts one is called inside which is a
private IP addresses ISP and other is called outside which has internet facing
service provider or can say the internet cloud. The address is categorize into four
sections and that is
a.) Inside Local (IL): it is the IP Address which is assigned to the host on inside
network.
b.) Inside Global (IG): it is IP address assigned by NIC or service provider which
represent inside local IP address to the outside networks.
c.) Outside Global (OG): it is the IP address which is assigned to the host on
outside network by host`s owner. These are routable global address.
d.) Outside Local (OL): It is the IP address of an outside host as it looks in the
inside network.it is from a private address space.
There are three different kind of NAT: Static, Dynamic and PAT
In Static Network Address Translation, the local hosts on a private network are
allowed to be accessed over internet using the public IP addresses.
In Dynamic Network translation Address, it uses a pool of public IP addresses and
assigns the address to private hosts on first come first serve basis.
11

In Port Address Translation, often termed as NAT overload, multiple private IP


addresses are mapped on a single public IP address but using different ports.

2 (a) Prelab for NAT/PAT


Q1.) Suppose there are few translations which are active on router?
a.) Debug ip nat
b.) Sh ip nat translations
c.) Clear ip nat translations *
d.) Show ip nat statistics

Q2.) NAT configuration when summarized needs to be viewed. Which command


should a user use?
a.) Show ip nat statistics
b.) Show ip nat translations
c.) Show ip pool overload
d.) Show ip nat summary
Q3.)In a NAT environment there is an interface which is connected with internet
which command would a user uses.
a.) Ip nat inside
b.) Ip inside local
c.) Ip outside global
d.) Ip nat outside
Q4.) On Servers which are connected to internal networks. Can NAT perform TCP
Load-balancing?
Q5.) On a cisco router with a 3 MB DRAM how many Nat translations can run?
Q6.) Port Address translation (PAT) works with:a.) Multiple addresses
12

b.) Global IP addresses


c.) Both a & b
d.) Neither a & b

Q7.) If a router in NAT is not translating then there is a need of troubleshooting,


where should a user start from?
Q8.) All inside hosts are translated to a single IP Address along with overloading. It
is a feature of:a.) STATIC NAT
b.) DYNAMIC NAT
c.) PAT
d.) NONE OF THESE
Q.9) In a cisco router, NAT can be applied to sub interfaces or not.

13

14

2(b) Network Diagram :-

15

Draw a well labeled Network diagram with ip address on the


interfaces

16

2 (c) NAT/PAT IP Addressing Schema

ROUTER

IP ADDRESSING

Private IP Addressing

1X.0.0.0/24

Public IP Addressing Range

192.168.0.0/24

Where X is the Rack number

17

2(d) LAB EXERCISE:-

1.) Providing IP address to all the routers:Give IP addresses to routers R1, R2, R3 and R4 according to IP
addressing schema.
Apply static routing in these routers so that they can communicate with
each other.
2.) Implement Static Network Address Translation on router
Apply static NAT on router on router R3 and R4
Ping from Host B to R3 and finally from host B to Web Server
After the implementation of static NAT take the output by using
command:Sh ip nat translation on both R4 and R3.
3.) Implementation of Dynamic NAT on R4.
Remove static routing from Router R4
Implement Dynamic NAT on router R4
Ping from Web Server to Host B
After the implementation of Dynamic NAT take the output by using
command:Sh ip nat translation on R4 .
Sh ip nat statistics on R4 .
4.) Configure Web Server
Configure web server using the windows web development tool like
Wamp server.
Use the public IP Address of web server on Host B to open a web link
from web server
5.) Implement PAT on router R4
Implement Port Address Translation on router R4
Ping from Web Server to Host B
After the implementation of Port Address Translation take the output by
using command:Sh ip nat translation on R4.
18

After the successful completion of above mentioned tasks document the


following:1. Show run of all the routers
2. Ping from webserver to Host B after implementing static and dynamic NAT
and after PAT
3. Verify static NAT------Sh ip nat translation on R3 and R4 after Static NAT
4. Verify dynamic NAT--Sh ip nat translation and sh ip nat stat on R4 after
Dynamic NAT
5. Screenshot of webpage on HOST B after the implementation of Dynamic
NAT
6. Verify PAT -- Sh ip nat translation after the implemention of PAT

19

Lab-3
Virtual LAN (VLAN) & Spanning
Tree Protocol (STP)

20

Virtual-Lan and Spanning Tree Protocol

VLAN is a single broadcast domain. All devices connected to VLAN receive


broadcast which is being sent by any other VLAN member. It allows a network
manager to logically segment a LAN into various broadcast domains. As we know
this a logical segmentation and it has nothing to do with physical segment so, it is
not mandatory that the systems should be together physically. The user can be on
different floor of a building or it could be there indifferent building they can still
belong to same VLAN. VLAN can be established without much use of a router
bridging software can be used to include or exclude systems to become a part of
broadcast domain. There is different type of connections in a VLAN one of them is
trunking. In trunking, all the devices are connected to a single trunk line including
all the systems should be VLAN-aware. In this technique all frames on a trunk
must have a special header attached with them. These frames are known as
tagged frames. The deployment of VLAN can be done in two ways:a.) End- to- end VLAN:- It is also known as campus wide VLAN, span the entire
switch fabric of a network. A user can move anywhere in the building but
he VLAN membership will remain the same. So, it is clear that every each
VLAN must be made available at the access layer in every switch block.
b.) Local VLAN:- it is a VLAN where a user need less of a local but they want
more of a remote access to the core resources.
Spanning tree protocol is a preventive method to avoid loops as parallel switch in
a network are unaware of each other. STP was developed to diminish the
possibility of bridging loops so that the redundant switches and switch paths
could be used for their benefits but not for collision or deadlock.
In STP in order to avoid loops there should exist a common frame of existence.
And, that reference point is known as Root Bridge. An election occurs among all
the switches and a root bridge is elected. Every switch has a unique ID which
helps the switch while introducing itself to other switches. Election of designated
ports and root ports also took place in STP.
21

3 (a) Prelab For VLAN and STP


Q1.) In case of VLAN, a Flat network is used in reference to physical design or
something else. Describe briefly.
Q2.) What do you think according to you are the advantages of VLAN.
Q3.) By default, all ports of switch are member of VLAN1. Is it possible to change
it.
Q4.) Is static VLAN is more Secure than Dynamic VLAN. Why?
Q5.) The maximum VLAN number varies from 1 to______?
Q6.)In STP, there is a feature called portfast. Where it is used.
a.) A core-layer switch port.
b.) An access-layer switch port connected to hub
c.) An access-layer switch port connected to a PC
d.) A distribution-layer switch port connected to an access layer switch
Q7.) In STP, in order to change the path cost of an interface to a value of 10
a.) spanning-tree cost 10
b.) spanning-tree port-cost 10
c.) spanning-tree 10
d.) spanning-tree path-cost 10
Q8.)For IEEE 802.1.Q, what is the default time for hello.
a.) 1 second
b.) 30 seconds
c.) 60 seconds
d.) 2 second
Q9.) On a network where should a root bridge be placed in STP?

22

3(b) Network diagram:-

23

Scenario 2:

24

Draw a well labeled Network diagram with ip address on the


interfaces

25

3(c) VLAN & STP IP Addressing Schema:-

VLAN and Spanning Tree Protocol IP Addressing Schema

VLAN1X IP Addressing Range


VLAN2X IP Addressing Range

1X.0.0.0/24
2X.0.0.0/24

Where X is the Rack number

26

3(d) LAB EXERCISE:-


Scenario 1: Do not use router for inter-VLAN from step 1 to step 3.
Scenario 2: Use router for inter-VLAN routing while considering all the switches as
layer 2 switches from step 1 to step 5.
1.) Configure VLAN 1X and 2X
Provide IP addresses to routers R1 according to IP addressing schema.
Create VLAN 1X with both SW2 and SW4
Create VLAN 2X with both SW2 and SW4
Name the VLAN 1X as Sales
Name the VLAN 2X as Finance
Note the output by command :- show VLAN brief
2.) Ping program
Ping from VLAN 1X from SW2 to VLAN 2X SW4
Note if it was successful or not.
Ping from VLAN 1X from SW2 to VLAN 1X SW4
Note if it was successful or not.
3.) Configure VLAN trunking
Configure the trunking on all the switches.
Note the output by command:-sh ip interface trunk and sh interface
<interface name> of interfaces on which trunking is done.
4.) Ping program
Ping from VLAN 1X from SW2 to VLAN 2X SW4
Note if it was successful or not.
Ping from VLAN 1X from SW2 to VLAN 1X SW4
Note if it was successful or not.
5.) Configure Spanning Tree Protocol
while configuring STP make sure that:SW1 is primary root for VLAN 2X
SW3 is primary root for VLAN 1X
Change the default forward delay in VLAN 1X to 8 seconds
Change the default forward delay in VLAN 2X to 5 seconds
27

After the successful completion of above mentioned tasks document the


following:Show run of all the switches and a router
Sh vlan brief of all the switches and a router
Sh ip interface trunk on all the switches i.e. SW1, SW2 and SW3
Sh ip interface <connected interface name> switchport on all the switches
highlighting that trunking is enabled
5. Sh spanning-tree vlan 1X on all switches and also highlight the changed
forward delay time.
6. Sh spanning-tree vlan 2X on all switches and also highlight the changed
forward delay time
1.
2.
3.
4.

28

Lab-4
Static Routing (CIDR) & Route
Aggregation

29

Static routing
In the routing protocols, let`s discuss few key points about static routing. It is
basically a routing protocol in which routing is done manually, in other words in
static routing the routes are added manually in a routing table according to the
need of a particular network. It is a way to configure routing tables in any given
internetwork so that the packets sent from one router can be forwarded to the
any host or to any other network. When a packet is send from source the router
will look In its route table and the two entities which are very important in routing
table are :a.) Destination Address: Each router can reach across to one or many routers in
same or different network and this is the address of a particular network reached
by a router.
b.) Pointer to the destination: this is nothing but a pointer which provides to the
information of the destination network if it is directly connected or if it is not the
destination network then it will provide the information of next router via which
the packet will reach its destination. It is also called the Next-Hop Router.
The routing depend any of these few entities which are host address, subnet or a
group of subnets, major network number or a supernet and finally default
address. Now, there is something called floating routes. Floating route appears in
the routing table under a special situation, where a preferred route is failed.
Pros and Cons of Static Routing:
The advantage of having a static routing environment is that, it can provide higher
security. As the network admin has full control over the flow of IP datagrams
The disadvantage is that if the network is really large then it is going to be quite a
tough job for a network admin to add the required routes manually in each and
every router required in a network. The chances of confusion are more while
doing it manually.

30

4 (a) Prelab for Static Routing and Route Aggregation


Q1.) What is the purpose of static routing command ip cef ?
Q2.)What do you mean by floating static routes?
Q3.) Which command will be used in static routing for default routing?
a.) Ip route 192.168.0.0 255.255.255.252 10.0.0.1
b.) Ip route 192.168.0.1 255.255.255.252 172.16.0.0
c.) Ip route 0.0.0.0 0.0.0.0 192.168.0.1
d.) Ip route 0.0.0.0 255.255.255.0 10.0.0.1
Q4.) In order to calculate the best route from a protocol which parameter should
be set correctly on a serial interface?
a.) Load
b.) Delay
c.) Scalability
d.) Bandwidth
Q5.) What is administrative distance?
Q6.) Which command is used in static routing to see the routes available on a
particular router?
Q7.) What is route aggregation and why it is useful in static routing?
Q8.)What does a routing table include in static routing:a.) Destination address
b.) Source address
c.) Next hop address
d.) None of the above

31

Q9.) What is the route summarization of the entire following route:a.) 172.16.8.0/24
b.) 172.16.16.0/24
c.) 172.16.64.0/24
d.) 172.16.128.0/24

32

4(b) Network Diagram:-

33

Draw a well labeled Network diagram with ip address on the


interfaces

34

4(c) Static Routing IP ADDRESSING SCHEMA

Router

IP Addressing

Internal IP Addressing Range 172.16.X.0/24


Loopback on R1 IP range

1X.0.0.0/24

Loopback on R4 IP range

3X.0.0.0/24

Loopback on R2 IP range

2X.0.0.0/24

Where X is the Rack number

35

4(d) LAB EXERCISE:-


1.) Providing IP address to all the routers:Give IP addresses to routers ALCATEL, R1, R2, R3, R4 and SW1 according
to IP addressing schema.
2.) Configure Static Routing
Configure static routing on all the routers with one route to each
destination
Ping from R1 loopback 0 to SW1 loopback0
Ping from SW1 loopback0 to R2 loopback1
Ping from R2 loopback2 to R4 loopback0
Ping from R1 loopback2 to R4 loopback 3
3.) Track the route of few IP addresses
Trace route from R1 loopback0 to Sw1 loopback0
Trace route from R2 loopback to R4 loopback0
Trace route from R1 loopback2 to R4 loopback3
4.) Configure float route (on router R4)
Break the link which is connected directly to ALCATEL Router
Configure an additional float route to reach all loopback on Router R1
Trace route R1 loopback1
Ping from R4 loopback2 to R1 loopback0
5.) Route Aggregation on Alcatel
Keep in mind that the link from ALCATEL to R4 is still down
In router R1, aggregate network.
In router R2, aggregate network.

36

After the successful completion of above mentioned tasks document the


following:1. Show run of all the routers (for Alcatel, it should be sh admin displayconfig).
2. Sh ip route of all the routers (for Alcatel, it should be sh router route-table)
3. Different ping program and trace route mentioned in step 2, 3 and 4.

37

Lab-5
Routing Information Protocol

38

Routing Information Protocol


Routing information protocol belongs to distance vector algorithmic class.
Basically, it was designed for smaller networks which have same kind of data links.
RIP process its updates over the user datagram protocol (UDP) over the port
number 520. RIP is preferred over the smaller networks because it carries very
little overhead when it comes to performance measures such as bandwidth,
memory consumption and processor load etc. As of now, there are three versions
of RIP:(i)
(ii)
(iii)

RIP V1
RIP V2
RIPng-----this is RIP next generation

There are few limitations to Routing Information Protocol as the diameter of the
network cannot exceed than 15 hops. And, as we know UDP process the updates
in RIP has a maximum packet size of 512 bytes so it is able to accommodate only
25 prefixes.
RIP v2 has few new features that the previous version. Firstly, every route entry
carries their subnet masks. And, the updates of the routing information are
authenticated. Also, along with each route entry next-hop address id also carried.
Updates regarding the multicast routes are also a key feature in RIP v2. It actually
allows the use of variable length subnet mask which makes it a classless routing
protocol.
RIP v1 uses broadcast wherein RIPV2 uses multicast.
There are four kinds of RIP timers:(a) Update timer---------by default it is 30 seconds
(b) Invalid timer----------by default it is 180 seconds
(c) Holddown timer-----by default it is 180 seconds
(d) Flush timer------------by default it is 240 seconds

39

5a) Prelab for Routing Internet Protocol


Q1.) In RIP, what is the purpose of Passive interface command?
Q2.) What does a response message contains in RIP?
Q3.) Why a small variable is added to update timer upon reset:a.) To avoid traffic
b.) To avoid route table synchronization
c.) To increase the length of route table
d.) To change the route table
Q4.) What is the administrative distance of RIP?
a.) 100
b.) 150
c.) 300
d.) 120
Q5.) Which command is used in RIP to summarize the traffic from and to the
router?
a.) Ip rip triggered
b.) Ip rip summary
c.) Debug Ip rip events
d.) Neighbor <ip-address>
Q6.) A route entry is marked as unreachable after how many updates are missed?
a.) 6
b.) 2
c.) 9
d.) 12

40

Q7.) Mention the environment during which RIP response is sent?


Q8.) In RIP metric is a hop count and it lies between:
a.) 1 to 100
b.) 1 to 64999
c.) 1 to 16
d.) 1 to 4096
Q9.) Is it possible for RIP v2 to send multicast messages to RIP v1. If not then what
does it send?

41

5(b) Network diagram

42

Draw a well labeled Network diagram with ip address on the


interfaces

43

5(c) Routing Internet Protocol IP ADDRESSING SCHEMA

Router

IP Addressing

Internal IP Addressing Range 10.0.0.0/24


Loopback on R1 IP range

192.168.X.0/24

Loopback on R3 IP range

172.16.X.0/24

Where X is the Rack number

44

5(d) LAB EXERCISE:-


1.) Providing IP address to all the routers:Give IP addresses to routers Alcatel, R1, R2, R3 and R4 according to IP
addressing schema.
2.) Configuring RIP
Configure RIP version 2 on all the routers and a switch
Verify if all the interfaces are up by using the command:sh ip interface brief
3.) R1 reaches R3 loopback0 from interface on R4 but we want it to go
through interface on R2
Verify the above mentioned query by using the command on R1:debug ip rip
Highlight the portion that verifies the above mentioned query.
Also, do run the command sh ip rip database and sh ip route on R1 to
verify the above mentioned query.
4.) R1 should not receive anything from R2 and R2 should not be sending
anything to R1
Name the command used here
Verify the above said query by using the command on R2:- sh ip
protocols
5.) Implementation of MD5 authentication
Implement Md5 authentication between R3 and R4
Key-string on R3 and R4 should be mint708
Now, change the key-string on R3 from mint708 to mint719
Verify the result by using the command on both R3 & R4 :- debug ip rip
events and verify the result by highlighting it.
Remove the old key and change the key-id on R3
Verify the result by using the command on both R3 :- debug ip rip
events and verify the result by highlighting it.

45

After the successful completion of above mentioned tasks document the


following:1. Show run of all the routers (for Alcatel, it should be sh admin displayconfig).
2. Sh ip route of all the routers (for Alcatel, it should be sh router routetable).
3. Sh ip protocols on all the routers.
4. Sh ip rip database on cisco routers and sh router rip database for Alcatel
router.
5. Verification outputs from Step 3, 4 and 5.

46

Lab-6
Open Shortest Path First (OSPF)

47

Open Short Path First


Open Short Path First (OSPF) is an interior gateway protocol with a link state
based algorithm which means the link is used to decide, that the information will
be routed on which path. It can be used both for small and larger networks using
a single area or multiple areas depending on the network it can be hierarchically
designed.
OSPF protocol helps in the authentication of updating different routes and when
the routes are derived externally it helps in tagging them as well. In OSPF the load
is also shared over fully meshed links. It has a very high convergence speed
moreover; its response to topology change is also very fast with a minimum
overhead.
The information is shared between different routers in OSPF with the help of
neighbors that is the only reason why adjacencies are formed. The very first event
that happens in OSPF is establishment of router adjacency in a two way state
along with the hello packets comes the router`s router-ID. Next thing is to elect a
designated router and along with a Designated Router (DR) a backup designated
router (BDR) is also elected. After this different routes in the network are
discovered. Based on the information of routes in the network an appropriate
network is selected and finally routing information is maintained in the routing
table.
There is one entity called Link State Advertisement (LSA) and this is send by a
router over all the adjacencies. It helps in discovering the router`s link, it`s states
or maybe it`s interfaces. Due the different information of link states OSPF has
different LSA types. When a router receive an LSA from another router, the router
save the information in link state database and sends a copy of LSA to other
routers. In this way all routers prepare a similar link state database.
There are Area Border Routers (ABR) in which at least one router interface should
belong to backbone that is Area 0 and one to no backbone area and
Autonomous System Boundary Router (ASBR) is a router which helps in
redistributing other routing protocols in OSPF.
48

6a) Prelab for Open Shortest Path First


Q1.) Why equal cost load-balancing is done in OSPF v2?
a.) To use a single path efficiently
b.) To use multiple path efficiently
c.) To use for increasing routes
d.) For redistribution
Q2.) Adjacencies in OSPF v2 is:a.) Physical point to point link
b.) Physical point to multipoint link
c.) Virtual point to point link
d.) Virtual point to multipoint link
Q3.) Name the network types which are defined by OSPF?
Q4.) What is the difference between stub network and transit network?
Q5.) What is the command for MD5 authentication in OSPF?
Q6.)What is the significance of totally stub area in OSPF and write its command?
Q7.) How does route summarization work in OSPF v2
Q 8.) What could be the reason for OSPF not working on a network?
Q9.) What is the command for vital link in OSPF v2?

49

6(b) Network Diagram

50

Draw a well labeled Network diagram with ip address on the


interfaces

51

6(c) Open Shortest Path First IP ADDRESSING SCHEMA

ROUTER
Internal IP Addressing Range
R1 loopback IP Range
R2 loopback IP Range
R4 loopback IP Range
R6 loopback IP Range
R8 loopback IP Range

IP ADDRESSING
10.0.0.0/24
192.168.X.0/24
172.16.X.0/24
172.18.X.0/24
172.17.X.0/24
172.19.X.0/24

Where X is the Rack number

52

6(d) LAB EXERCISE:1.) Providing IP address to all the routers:Give IP addresses to routers R1, R2, R3, R4, R5, R6, R7 and R8 according
to IP addressing schema.
2.) Configure OSPF
Configure OSPF in area 0 as it is the backbone
Create loopback 6 and loopback 7 in area0 with router R4
Configure OSPF in area 1
Create loopback 0, Create loopback 1 and Create loopback 2 in area 1
with router R1
Create loopback 3, Create loopback 4 and Create loopback 5 in area 1
with router R2
configure OSPF in area 2
Create loopback 8 and Create loopback 9 in area 2 with router R6
3.) Configure RIP
Configure RIP on router R5, R7 and R8
4.) Redistribution Rip into OSPF
In router R5 redistribute Rip network into the Ospf network.
Also, in router R5 redistribute Ospf network into the Rip network.
After the successful completion of above mentioned tasks document the
following:1. Show run of all the routers (for Alcatel, it should be sh admin displayconfig).
2. Sh ip route of all the routers (for Alcatel, it should be sh router routetable).
3. Show ospf neighbor of all the routers from R1 to R6 (for Alcatel, it should
be router ospf neighbor).
4. Sh ip ospf database of all the routers from R1 to R6 (for Alcatel, it should
be sh router ospf database)
5. Show ip ospf database-sumary of all the cisco routers(R1,R2,R4,R5,R6)
6. Sh ip rip database on router R5 and R7

53

Lab-7
Integrated IS-IS

54

Integrated Intermediate System-Intermediate System (IS-IS)


IS-IS is a link state protocol which allows to have a fast convergence with huge
scalability. There great feature includes it is less prone to routing loops and over
the top it can actually support a larger networks. In IS-IS hello packets are send by
routers running on IS-IS to find the neighbors and after finding those neighbor
constitute adjacencies with them. They packet match find neighbors based on the
authentication, IS type and MTU size. It has 2 level of hierarchy with L1 and L2.
L1 routers support intra-area routing and level 1 routers knows its own area
topology very well. In order to find the nearest L1/L2 router, level 1 router
inspects the attached bit in level 1 LSP. Also, the closet L1/L2 router is used to exit
the area.
L2 routers support the inter-area routing and it has neighbors in other areas as
well. It has information of addresses which are reachable by every level 2 router.
Level 2 has an advantage of exchanging routing information and data packets
precisely with the routers which is outside its own area
L1/L2 routers have the advantage of having a neighbor in any area. It has to
maintain two link state database one for intra area routing (L1) and other for
Inter-area routing (L2)
The process of updating is very important when it is concerned about
constructing L1 and L2 link-state databases.L1 LSP are only flooded in the area in
which they are originally formed but L2 LSP are flooded in all its L2 adjacencies. As
far as LSP is concerned it has three attributes remaining lifetime, a sequence
number and a checksum.
IS-IS is also very efficient because of its classless behavior and hierarchical routing.
It is very scalable and it has fast convergence. The new information is rapidly
flooded all over the network.
IS-IS has the capability of providing address summarization between areas. Linkstate databases find a shortest path tree with the help of SPF algorithm. And, a

55

designated router is chosen to represent broadcast networks and it comes with


authentication feature.

56

7a) Prelab Integrated system Integrated system


Q1.) Name the three net formats?
Q2.) Hello packet is sent to find neighbors which then form adjacency. What is the
hello packet transmitting interval?
a.) 80 seconds
b.) 50 seconds
c.) 30 seconds
d.) 10seconds
Q3.) If the AID1s are different:a.) Two L1 routers form adjacency
b.) Two L2 routers form adjacency
c.) Both L1/L2 routers form adjacency
d.) None of the above
Q4.) What is the default priority of ISIS at level L1 and L2 and is it possible to
change it. If no why and if yes then how
Q5.) What are the various decision processes took place to calculate the shortest
path in ISIS?
Q6.) What is the purpose of summarizing the routes in ISIS?
Q7.) Mention the command in ISIS which allows L2 to leak its routes in L1 in ISIS
protocol.
Q8.) Describe the function of a system ID in ISIS.
Q9.)In ISIS there are by default metric styles.name them along with their
maximum values.

57

7(b) Network Diagram

58

Draw a well labeled Network diagram with ip address on the


interfaces

59

7(c) Open Shortest Path First IP Addressing Schema

Router

IP Addressing

Internal IP Addressing Range


R4 loopback IP range
R2 loopback IP range

10.0.0.0/24
172.17.X.0/24
172.16.X.0/24

Where X is the Rack number

60

7(d) LAB EXERCISE:1.) Providing IP address to all the routers:Give IP addresses to routers R1, R2, R3, R4, R5, R6, R7 and ALCATEL
according to IP addressing schema.
Configure loopback 0, loopback 1 and loopback 2 on router R6 in area 2.
Configure loopback 0, loopback 1 and loopback 2 on router R4 in area 1.
2.) Configure ISIS
Configure ISIS in router R5 and R6 as a part of area 2 with appropriate
levels.
Router R6 has three loopback addresses configure ISIS on that as well.
Configure ISIS in router ALCATEL and R1 as a part of area 0 with
appropriate levels.
Configure ISIS in router R2, R3 and R4 as a part of area 1 with
appropriate levels.
Router R4 has three loopback addresses configure ISIS on that as well.
Run the command of show ip route on all the routers and save this
output.
3.) Md5 Authentication
Apply Md5 authentication on router R2.
The key-string should be MINT708
The key chain should be ISIS
Verify authentication after the above steps is done, run the command
on router R2:-sh ip isis events and note the output of authentication
failure message.
Now, apply Md5 authentication on Router Alcatel, R1 and R5 with the
same above mentioned key-string and key chain
4.) Route summarization
Do route summarization on router R6
Also, Route summarization should be done router R4.
After the router summarization, note the change in router R2, R5, R1
and Alcatel by using the command of show ip route and compare it
with the output taken in step 2.
61

After the successful completion of above mentioned tasks document the


following:1. Show run of all the routers (for Alcatel, it should be sh admin displayconfig).
2. Sh ip route of all the routers (for Alcatel, it should be sh router routetable).
3. Show isis topology of all the routers (for Alcatel, it should be show router
isis topology).
4. Sh ip isis database of all the routers (for Alcatel, it should be sh router isis
database)
5. Show ip isis hostname on all cisco routers and show router isis hostname
on Alcatel router.
6. Compare Sh ip route of all the routers (for Alcatel, it should be sh router
route-table) which has changed the number of routes after route
summarization.
7. Verification output from step 3.

62

Lab-8
BORDER GATEWAY PROTOCOL

63

Border Gateway Protocol


Border Gateway Protocol is an interior gateway protocol with an autonomous
system. It is widely used for network backbone. It learns multiple paths with the
help of internal and external BGP speakers. After that it picks the best path and
put all the information in the forwarding table. There are various neighbor states
as well namely idle when neighbor is not responding. Active when it is attempting
to connect. Connect when the TCP session is established. Open sent when open
message is sent. Open confirm when a response is received and lastly established
when the adjacency is establishes with the neighbors.
Now BGP is of two types one is eBGP or external BGP and iBGP or internal BGP. In
eBGP, it is established where the BGP speaker is in different autonomous system.
But for that it should be directly connected to each other and do not run IGP in
between eBGP peers. iBGP is nothing but BGP peer within the same AS. It is not
mandatory for these routers to be connected directly. iBGP peers need is required
to be fully meshed as they originate connected networks. But as a matter of fact,
they do not pass on prefixes learned from other iBGP peers.
The BGP routing information database has three parts.
1.) Adj-RIB-IN:- It stores the unprocessed routing information which has been
learned from the updates which are being received from peers. The route
entries in this segment are often termed as feasible routes.
2.) Loc-RIB:- It contains the routes that the BGP speaker has selected by
applying its local routing policies to the routes which are present there in
Adj-RIB-IN.
3.) Adj-RIB-Out:- It contains the routes that the BGP speaker advertise to its
peers.
There a concept of route dampening which says that route flap are major
contributors to instability on internet because the route is fluctuating if its valid
this second next second it is not. So, route dampening is a phenomenon to stop
unstable routes from being forwarded into the network. Although it will not stop
router from accepting unstable routes but will not forward them any further.
64

8a) Prelab Border Gateway Protocol


Q1.)What is the command to change the default keep alive and holdtime intervals
for a neighbor?
Q2.) In BGP all the messages are unicast tone neighbor over TCP with the help of
four message types. Name them.
Q3.) After how much time the peer declare its neighbor down in BGP?
a.) 240 seconds
b.) 360 seconds
c.) 180 seconds
d.) 60 seconds
Q4.) What is one basic difference between EBGP and IBGP?
Q5.)What do you understand by the term next-hop self?
Q6.) What is administrative weight and is it communicated to other routers?
Q7.) What is the maximum suppress time for route-dampening?
a.) 15 seconds or half life
b.) 30 seconds or two times half life
c.) 45 seconds or three times half life
d.) 60 seconds or four times half life
Q8.)Why IBGP and IGP synchronization is important:a.) To make more loops within AS
b.) To prevent BGP routing loops within an AS
c.) To create infinite loops in the neighbor AS
d.) None of the above

65

Q9.) Confederation in BGP is a way of:a.) Control large number of OSPF peers
b.) Control small number of RIP peers
c.) Control large number of IBGP peers.
d.) Create small number of IGP peers

66

8(b) Network Diagram

67

Draw a well labeled Network diagram with ip address on the


interfaces

68

8(c) Border Gateway Protocol IP ADDRESSING SCHEMA

ROUTER

IP ADDRESSING

Internal IP Addressing Range


loopback IP Addressing Range on
all routers

172.16.X.0/24
192.168.X.0/24

Where X is the Rack number

69

8(d) LAB EXERCISE:1.) Providing IP address to all the routers:Give IP addresses to routers ALCATEL, R2, R3, R4, R5, R6, R7 and R8
according to IP addressing schema.
Configure loopback 0 on every router in AS X20.
Configure loopback 0 on every router in AS X10.
Configure loopback 0 on every router in AS X100.
2.) Configure BGP in Different AS
In AS X20 configure ebgp and ibgp appropriately
In AS X10 configure ebgp and ibgp appropriately.
Every router should have a loopback0 configured with it
Verify it using command sh ip route and sh ip bgp summary
3.) Redistribute OSPF
In AS X20 configure OSPF on all the routers
Redistribute OSPF in as X20 through the Ebgp routers.
In AS X10 configure OSPF on all the routers
Redistribute OSPF in as X10 through the Ebgp routers.
In AS X100 configure OSPF on all the routers
Redistribute OSPF in as X100 through the routers R7 and R8.
Redistribute BGP in as X100 through the routers R7 and R8.
Verify using show ip bgp and show ip bgp summary

After the successful completion of above mentioned tasks document the


following:1. Show run of all the routers (for Alcatel, it should be sh admin displayconfig).
2. Sh ip route of all the routers (for Alcatel, it should be sh router routetable).
3. Show ip bgp summary of all the routers (for Alcatel, it should be show
router bgp summary).
4. Sh ip bgp of all the routers (for Alcatel, it should be sh router bgp routes)
5. also on ALCATEL run the command show ip bgp path and show ip bgp
group
70

Ping for verification


From R1 ping loopback0 of R8
From R2 ping loopback0 of R6
From R3 ping loopback0 of R8
From R4 ping loopback0 of R2
From R5 ping loopback0 of R8
From R6 ping loopback0 of R1

71

Lab-9
IP MULTICASTING

72

IP Multicasting
IP Addressing is categorizing into three genres one is unicast, second is broadcast
and finally third is multicast. If a data is supposed to be transmitted to a single
receiver then the unicast addressing is used. If a data packet needs to reach all
the systems in the subnetwork then, broadcast address is used. But, if a datagram
is supposed to travel to a set of system which forms a group which is called
multicast group then, multicast address is used.
Unicasting and Broadcasting of data packets can be done by using class A, class B
and Class C addresses. But, the multicasting of datagrams can be done using only
Class D address which is ranged between 224.0.0.0 and 239.255.255.255.
In multicast packets the originator of the traffic does not hold any burden on itself
as the packets are duplicated via all the routers which are using Protocol
Independent Multicast. So, minimum bandwidth is required to move the
multicast packets across a huge multicast network without adding burden on
either source or receiver.
There is another entity which is called Protocol Independent Multicast, from its
name only it is clear that IP routing is independent of protocol. In this multicast
forwarding function is executed using unicast routing information. But routing
updates are neither received nor send between by PIM. There are two PIM modes
a.) PIM Sparse Mode
b.) PIM Dense Mode
Internet Group Management Protocol (IGMP) is basically a phenomena which join
all the client or receiver multicast groups. It helps sending out the request to all
multicast enabled routers to combine and form an actual multicast group. After
IGMP finish its work of asking groups to join, the real work of sending multicast
data to its destination is done by PIM.
Also, Rendezvous Point (RP) is a router which is selected to be root router of a
centralized multicast tree. RP has great ability to let different multicast sources to
use the same multicast tree.
73

9a) Prelab IP Multicasting


Q1.) What is the class of addresses that falls in range of IP multicast address?
a.) Class A
b.) Class B
c.) Class C
d.) Class D
Q2.) What is IP address 224.0.1.40 is reserved for?
a.) Cisco-RP-Discovery
b.) PIM routers
c.) All routers on the subnet
d.) CBT routers
Q3.) Under what conditions IGMP is implemented?
Q4.) In IGMP host has a fixed response time and that is:a.) 20 seconds
b.) 15 seconds
c.) 10 seconds
d.) 60 seconds
Q5.)What are the two types of CGMP packets?
Q6.) What are the shortcomings of TTL scoping?
Q7.) What is BSR?
Q8.) What are the criteria to select a DR in PIM?
Q9.)What is the command used of enable mapping of IP multicast address?

74


9(b) Network Diagram

75

Draw a well labeled Network diagram with ip address on the


interfaces

76

9(c)IP MULTICASTING IP ADDRESSING SCHEMA

ROUTER
Internal IP addressing Range
Server IP Addressing Range
Terminal IP Addressing Range

IP ADDRESSING
172.16.X.0/24
10.0.0.0/24
192.168.X.0/24

Where X is the Rack number

77

9(d) LAB EXERCISE:1.) Providing IP address to all the routers:Give IP addresses to routers R1, R2, R3 and R4 according to IP
addressing schema.
Verify the connectivity by using command Show ip interface brief
command.
2.) Configure IP multicasting
Select one rendezvous point (RP) and give that RP to all the routers.
Configure Protocol independent multicast (PIM)
Configure Sparse mode for multicasting on all routers.
Configure default route among routers
Configure cisco group management protocol on routers appropriately.
Verify enabled multicasting by using command:- show ip multicast
interface <interface>
3.) On server side
Install VLC Player and stream a video for streaming on terminal\
4.) On Terminal side
Install VLC player and receive a stream of video from the server.
After the successful completion of above mentioned tasks document the
following:1. Show run of all the routers.
2. Sh ip mroute of all the routers.
3. Use wireshark on both server and terminal side to capture the multicast
packets.
4. Take a screenshot on both server and terminal side.
5. Show ip igmp groups command on all routers.
6. Verified output of step2

78

Lab-10
IP ADRESSING VERSION 6
(IP v6)

79

IPV6 Addressing
The Internet Protocol Version 6 was introduces because of the depletion of all the
IP v4 addresses. In today`s date internet is the most required and desired piece of
technology which everyone wants to own. This is 128 bit address was introduced
in order to increase the scalability and add security to the networks. Also, It is
very easy to implement and moreover, it is available in abundance.
It has eight 16 bit pieces combined together to form IPv6 address. Address
compaction is very much possible in IPv6 addresses. For example:Ipv6 address before compaction: -- ABCD:0000:0000:0000:0001:0011:1001:1110
IPV6 address after compaction: -- ABCD::1:11:1001:1110
Below is the conversion chart from binary to decimal to hexadecimal
BINARY
DEC
HEXA
BINARY
DEC
0
0000
0
8
1000
1
0001
1
9
1001
2
0010
2
10
1010
3
0011
3
11
1011
4
0100
4
12
1100
5
0101
5
13
1101
6
0110
6
14
1110
7
0111
7
15
1111
There are few address type allocations done in IPv6 address

HEXA
8
9
A
B
C
D
E
F

a.) 1/128 with prefix 0000 001 is reserved for NSAP allocation
b.) 1/128 with prefix 0000 010 is reserved for IPX allocation
c.) 1/8 with prefix 001 is reserved for global unicast address(Aggregatable)
d.) /1024 with prefix 1111 1110 10 is reserved for NSAP link-local unicast
address
e.) 1/256 with prefix 1111 1111 is reserved for multicast addresses

80

10a) Prelab IPv6 Addressing


Q1.) IPV6 addressing is?
a.) 128 bits
b.) 256 bits
c.) 1096 nits
d.) 512 bits
Q2.) If the first digit of ipv6 address is FE8 what is the address type?
a.) Site-local
b.) Multicast
c.) Link-local
d.) Loopback
Q3.) What is self-loopback address as 127.0.0.1 in IPV4?
a.) 1:1:1:1:1:1:1:1
b.) 2:2:2:2:2:2:2:2
c.) 0:0:0:0:0:0:0:0
d.) 0:0:0:0:0:0:0:1
Q4.) What is the IPV6 multicast address used by RIPng?
Q5.) Is metric count is same in RIPng as in Rip v1 and Rip v2?
Q6.) What is the debugging command for RIPng events?
Q7.) OSPFv3 has a header value of
a.) 90
b.) 120
c.) 89
d.) 59
Q8.) Name the message type in OSPFv3?

81

Q9.) In OSPF v3 interface type specified in the type 3 field of router LSA is?
a.) Point to Point connection
b.) Virtual link
c.) Connection to a transit network
d.) Reserved

82


10(b) Network Diagram

83

Draw a well labeled Network diagram with ip address on the


interfaces

84

10(c) LAB EXERCISE:-


1.) Providing IP v6 address to all the routers:Give IP v6 addresses to routers R1, R2 and R3.
Choose /64 ipv6 addresses for the interfaces on all the three routers
Connect a loopback to every router with a valid IPv6 address.
2.) Configure RIPng
Configure RIPng on all the three routers
Verify it by using command on all the routers: show ipv6 route and
show ipv6 rip
3.) Configure OSPF v3
Configure OSPF v3 on all the three routers but no need to remove RIPng
Verify it by using command on all the routers: show ipv6 route and
show ipv6 ospf
After the successful completion of above mentioned tasks document the
following:1. Show run of all the routers.
2. Verified output on step 2 and step 3
3. Show ipv6 protocols on all routers and show ipv6 interface <interface>
after implementing RIPng.
4. Show ipv6 protocols on all routers and show ipv6 interface <interface>
after implementing OSPF v3.
5. Show ipv6 ospf neighbor on all routers after implementing OSPF v3.

85

Das könnte Ihnen auch gefallen