Beruflich Dokumente
Kultur Dokumente
Report
on
Industrial Training
CCNA, KIT EDUCATION
Submitted for the partial fulfillment of
Bachelor of technology
In
C.S.E
Submitted By :YUVRAJ CHOUDHARY (CS110044)
4th year , C.S.E
Acknowledgement
I take this opportunity to express my profound gratitude and deep regards to my guide
(NISHANT SIR/KIT EDUCATION) for his exemplary guidance, monitoring and constant
encouragement throughout the course of this thesis. The blessing, help and guidance
given by him time to time shall carry me a long way in the journey of life on which I am
about to embark.
I also take this opportunity to express a deep sense of gratitude to Masuma Khan KIT
EDUCATION for cordial support, valuable information and guidance, which helped me
in completing this task through various stages.
Lastly, I thank almighty, my parents, brother and teachers for their constant
encouragement without which this assignment would not be possible.
Abstract
Routing protocols determine the best routes to transfer data from one node to another and specify
how routers communicate between each other in order to complete this task. There are different
classes of routing protocols, two of which are Exterior Gateway Protocol (EGP) and Interior Gateway
Routing (IGR). A routing protocol can be dynamic or static, as well as distance-vector or link-state. In
this project, we will focus on Routing Information Protocol (RIP), Open Shortest Path First (OSPF),
and Enhanced Interior Gateway Routing Protocol (EIGRP). All three protocols are dynamic IGPs,
meaning that these protocols route packets within one Autonomous System (AS). RIP is a distancevector protocol; EIGRP is an enhanced distance vector protocol developed by Cisco and OSPF is a
link-state routing protocol. Detailed descriptions of these routing protocols are provided later in this
report. We will study characteristics such as convergence time and routing traffic sent within small
and large topologies. Using OPNET, we will obtain simulation results for the specified routing
protocols and compare performance in order to determine the best routing protocol for a given
network topology.
Vision- India is a young country. By 2025, 65% of the Indian population will be under the age of 40. The growth rate
of Indian economy is one of the fastest in the world and very soon India will be ached of many developed western
countries.
India is growing but its manpower is not growing too much the growth rate. There is still huge shortage of skilled
manpower which may mar the prospectus of Indian growth story. To sustain this growth rate and reaching to this elite
club of developed countries, India would require a skilled manpower similar to the western developed counties which
is essential as industry itself.
INTRODUCTION
A JOURNEY TOWARDS CISCO-CERTIFIED NETWORK ASSOCIATION (CCNA)
Candidates have the option of gaining the certification by passing two tests (ICNDI 640-822 and ICND2 640-816), or
one single test (CCNA 640-802); the two-test option has the advantage of allowing the candidate to focus on
certain subjects.
The certification is valid for three years; at the time a CCNA holder must either re-take the CCNA or ICND exam, or
take and pass an exam for one of the Professional (e.g., CCNP) or Specialist level; certifications (excluding the sales
specialist exam), or pass the CCIE written exam.
These exams are known by their corresponding numbers. When the curriculum of the exam changes the exam
number also changes. The current exam number for CCNA is 640-802 (from 15 Aug 2007). New ICND Part 1 (640822 ICND1) and ICND Part 2 (640-816 ICND2) are available from 15 Aug 2007. Part 1 by itself will give you a CCENT.
These exams are conducted by authorized test centers at a cost of $125 USD each for the ICND1 or ICND2 exams
and $150 USD for the full CCNA exam..
Cisco Systems, Inc is a multinational corporation with more than 63,000 employees and annual revenue of US$35
billion as of 2007. Headquartered in San Jose, California, it designs and sells networking and communications
technology and services under five brands, namely Cisco, Linksys, WebEx, IronPort, and Scientific Atlanta.
CCNA was launched by CISCO SYSTEMS. It stands for CISCO CERTIFIED NETWORK ASSOCIATE. CISCO has 37%
market shares in internetworking devices. Hence, when we study and complete CCNA certification you are
recognized internationally. CCNA is recognized all over the world and prepares you for carrier that spans all over
the globe.
Computer
Computer
JON
LIN
HUB
The Basic LAN (Figure 1b)
JON starts with converting name to its corresponding IP address using Name resolution technique; generally it
involves the DNS or WINS.
Here is the output cut how resolution process going on, when JON sends the data to LINs computer.
Time
Source
Destination
16.145236
10.0.0.2 10.0.0.255
Protocol
NBNS
Info
Name Query NB
LIN <00>
To overcome the LAN traffic congestion, a large network is segmented into some bunch of smaller networks which
is called segmentation. Segmentation is done using Switches. A Switch has multiple collision domains and single
broadcast domains, or a Router, which has multiple collision domains as well as multiple broadcast domains. The
figure below, fig. 1c, displays a network that is segmented using a switch. It now separates the collision domain
which is not done by HUB in figure 1b.
Switch
Broadcast storms
Less Bandwidth
Multicasting
A bundle of name resolution and address alteration traffic like ARP or IPX.
In the above discussion we have dealt with how to minimize the LAN congestion. Now its time to minimize the
broadcast storming occurring at WAN links or, better to say, splitting the broadcast domain. The broadcast domain
can be split by the router, because routers have the following advantage:
Router can filter the data packets depending upon the Layer 3 (i.e. Network Layer) information (i.e. IP
address)
The functions which are done by the router in an internetwork are mentioned below
Packet switching
Packet filtering
Path selection
Internetwork communication
Remember that routers are really switches but better to say that they are actually layer 3 switches. Router will
forward data packets or frames depending upon the IP address, which is called packet switching.
Lets conclude about collision domain and broadcast domain
Collision: The effect of two nodes sending transmissions simultaneously in Ethernet. When they meet on the
physical media, the frames from each node collide and are damaged.
Collision Domain: The network area in Ethernet over which frames that have collided will be detected. Collisions
are propagated by HUBS and Repeaters, but not by LAN switches, routers or bridges.
Broadcast: A data frame or packet that is transmitted to every node on the local network segment. Broadcasts are
known by their broadcast address, which is a destination network and host address with all the bits turned ON.
Broadcast Domain: A group of devices receiving broadcast frames initiating from any device within the group.
Because routers dont forward broadcast frames, broadcast domains are not forwarded from one broadcast to
another.
The Open System Interconnection (OSI) reference model describes how information from a software application in
one computer moves through a network medium to a software application in another computer. The OSI
reference model is a conceptual model composed of seven layers, each specifying particular network functions.
The model was developed by the International Organization for Standardization (ISO) in 1984, and it is now
considered the primary architectural model for inter-computer communications.
Application
Application
Presentation
Session
Transport
Network
Data Transport
Data link
Physical
Protocols:
The OSI model provides a conceptual framework for communication between computers, but the model itself is
not a method of communication. Actual communication is made possible by using communication protocols. In the
context of data networking, a protocol is a formal set of rules and conventions that governs how computers
exchange information over a network medium.
Physical Layer:
The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating
maintaining, and deactivating the physical link between communicating network systems. Physical layer
specifications define characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum
transmission distances, and physical connectors.
The Logical Link Control (LLC) sublayer of the data link layer manages communications between devices over a
single link of a network. LLC is defined in the IEEE 802.2 specification and supports both connectionless and
connection-oriented services used by higher-layer protocols. IEE 802.2 defines a number of fields in data link layer
frames that enable multiple high-layer protocols to share a single physical data link. The Media Access Control
(MAC) sublayer of the data link layer manages protocol access to the physical network medium.
Mac Addresses:
Media Access Control (MAC) addresses consist of a subset of data layer addresses. MAC addresses identify
network entities in LANs that implement the IEEE MAC addresses of the data link layer. As with most data-link
addresses, MAC addresses are unique for each LAN interface.
LLC
sublayer
Data-link
addresses
MAC
sublayer
MAC
addresses
Mac addresses are 46 bits in length and are expressed as 12 hexadecimal digits. The first 6 hexadecimal digits,
which are administrated by the IEEE, identify the manufacturer or vendor and thus comprise the Organizationally
Unique Identifier (OUI). The last 6 hexadecimal digits comprise the interface serial number, or another value
administered by the specific vendor.
Mapping Addresses:
Because internetworks generally use network addresses to route traffic around the network, there is a need to
map network addresses to MAC addresses. Different protocol suites use different methods for determining the
MAC address of a device. The following three methods are used most often. Address Resolution Protocol (ARP)
maps network addresses to MAC addresses. Address Resolution Protocol (ARP) is the method used I the TCP / IP
suite. When a network device needs to send data to another device on the same network, it knows the source and
destination network addresses for the data transfer.
Network Layer:
The network layer defines the network address, which differs from the MAC address. Some network layer
implementations, such as the Internet Protocol (IP), define network addresses in a way that route section can be
determined systematically by comparing the source network address with the destination network address and
applying the subnet mask. Because this layer defines the logical network layout, routers can use this layer to
determine how to forward packets.
Transport Layer:
The transport layer accepts data from the session layer and segments the data for transport across the network.
Generally, the transport layer is responsible for making sure that the data us delivered error-free and in the proper
sequence. Flow control generally occurs at the transport layer. Flow control manages data transmission between
devices so that the transmitting device does not send more data than the receiving device can process.
Flow Control:
Flow control is a function that prevents network congestion by ensuring that transmitting devices do not
overwhelm receiving devices with data. A high-speed computer, for example, may generate traffic faster than the
network can transfer it, or faster than the destination device can receive and process it. The three commonly used
methods for handling network congestion are buffering, transmitting source-quench message, and windowing.
Buffering is used by network devices to temporarily store bursts of excess data in memory until they can be
processed. Occasional data bursts are easily handled by buffering. Excess data brusts can exhaust memory,
however, forcing the device to discard any additional datagrams that arrive.
Session Layer:
The session layer establishes, manages, and terminates communication sessions. Communication sessions consist
of service requests and service responses that occur between applications located in different network devices.
These requests and responses are coordinated by protocols implemented at the session layer.
Presentation Layer:
The presentation layer provides a variety of coding and conversion functions that are applied to application layer
data. These functions ensure that information sent from the application layer of one system would be readable by
the application layer of another system. Some examples of presentation layer coding and conversion schemes
include common data representation formats, conversion of character representation formats, common data
compression schemes, and common data encryption schemes.
Application Layer:
The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and
the user interact directly with the software application.
This layer interacts with software applications that implement a communicating component. Such application
programs fall outside the scope of the OSI model. Application layer functions typically include identifying
communication partners, determining resource availability, and synchronizing communication.
Data Encapsulation:
The sending and receiving of data from a source device to the destination device is possible with the help of
networking protocols by using data encapsulation. The data is encapsulated with protocol information at each
layer of the OSI reference model when a host transmits data to another device across a network.
The encapsulation and de-encapsulation of header control information on each layer of the OSI reference model is
as follows:
ENCAPSULATION
The data encapsulation process is defined as below:
IP Header Encapsulation:
Each segment is then handed to the Network layer for logical addressing and routing through a routed protocol,
for example, IP, IPX, Apple Talk and DECNET etc. the Network-layer protocol adds a header to the segment handed
rd
th
down to the Data link layer. Remember that the 3 and 4 layers work together to rebuild a data stream on a
destination host.
The Data Link layer receives the packets from the Network layer and placing them on the network medium such as
cable or wireless media. The Data Link layer encapsulates each packet in a frame, and the MAC header carries the
source Mac address and destination Mac address.
De-Encapsulation:
On destination side, the receiving devices will synchronize on the digital signal and extract the 1s and 0s from the
digital signal. At this point the devices build the frames, run a Cyclic Redundancy Check (CRC), and then check their
output against the output in the Frame Check Sequence (FCS) field of the data frame. If the information matches
then the packed is pulled from the frame, and the frame is discarded. This process is known as de-encapsulation
ETHERNET CABLING
Ethernet cabling is an important discussion, especially if you are planning on taking the Cisco exams. Three types of
Ethernet cables are available:
Straight-through cable
Crossover cable
Rolled cable
In case of straight through cable the 8 wires of cat 5 or cat 6 are connected with Rj45 connectrors serially means 1
to 8.
The straight through cable is used to connect
Means we can say straight through cable is used to connect different devices, the only exception is that, if routers
Ethernet port is directly connected with computer Ethernet port. Four wires are used in straight through cable to
connect Ethernet devices.
Switch to Switch
Hub to Hub
Hub to Switch
Computer to Computer
The same wires (like 1.2.3.6.) are used in this cable as in the straight through cable; we just connect different pins
together
Although rolled over cable isnt used to connect any Ethernet connections together, you can use a rolled over
Ethernet cable to connect a host to a router console serial communication port.
If you have a Cisco Router or Switch, you would use this cable to connect your PC running HyperTerminal to the
Cisco hardware.
Straight Though Cable Pin Out for T568A:
Rj45 Pin #
Wire Color
Wire Diagram
10Base-T Signal
(T568B)
(T568B)
100Base-TX Signal
1000Base-T Signal
White/Orange
Transmit+
BI_DA+
Orange
Transmit-
BI_DA-
White/Green
Receive+
BI_DB+
Blue
Unused
BI_DC+
White/Blue
Unused
BI_DC-
Green
Receive-
BI_DB-
White/Brown
Unused
BI_DD+
Brown
Unused
BI_DD-
Rj45 Pin#
Wire Color
Diagram End
Rj45 Pin #
#1
(END 2)
(END1)
Wire Color
Diagram End
#2
White/Orange
White/Green
Orange
Green
White/Green
White/Orange
Blue
White/Brown
White/Blue
Brown
Green
Orange
White/Brown
Blue
Brown
White/Blue
ROUTERS PORT
The first thing that youll notice when you pull a Cisco 2500 series router out of the box is obviously its physical
elements. A Cisco 2501 includes not only Ethernet and serial ports, but also console and auxiliary ports. In this
section well look at the purpose of each, their physical characteristics and how devices are attached and cabled.
Note that hardware ports are numbered nominally starting at 0. Therefore on a system with only one Ethernet
port, that port is referred to as Ethernet 0.
Layer
Description
Layer 4:
Application Layer
through this window that all exchange of meaningful
information occurs between communication users.
Examples include Telnet and SMTP.
Layer 3:
Layer 2:
Internet Layer
IP and ICMP.
Layer 1:
Field Name
Size (bytes)
Description
Source Port
Source Port: The 16-but port number of the process that originated
the TCP segment on the source device. This will normally be an
ephemeral (client) port number for a request sent by a client to a
server, or a well-known/registered (server) port number for a reply
from a server to a client.
Destination Port
Destination Port: The 16-bit port number of the process that is the
ultimate intended recipient of the message on the destination
device. This will usually be a well-known / registered (server) port
number for a client request, or an ephemeral (client) port number for
a server reply.
Sequence Number
Acknowledgement
Number
Data Offset
1/2
Data Offset: Specifies the number of 32-bit words of data in the TCP
header. In other words, this value times four equals the number of
(4 bits)
bytes in the header, which must always be a multiple of four. It is
called a data offset since it indicates by how many 32-bit words the
start of the data is offset from the beginning of the TCP segment.
Reserved
3/4
(6 bits)
Control Bits
3/4
(6 bits)
Control Bits: As mentioned, TCP does not use a separate format for
control messages instead certain hits are sent to indicate the
communication of control information.
Window
Checksum
Urgent Pointer
Urgent Pointer: Used in conjunction with the URG control bit for
priority data transfer. This field contains the sequence number of the
last byte of urgent data. See the priority data transfer topic for
details.
Options
Variable
Subfield
Size
Name
(bytes)
Description
Option-Kind
Option-Kind:
Specifies
the
option type.
Option-Length
Option-Data
Variable
Padding
Variable
Data
Variable
IP TERMINOLOGY
INTRODUCTION
Internet Protocol (IP) Technology was developed in the 1970s to support some of the first research computer
networks. Today, IP has become a worldwide standard for home and business networking as well. Our network
routers, Web browsers, email programs, instant messaging software all rely on IP or other network protocols
layered on top of IP.
32
IPv4 uses 32-bit (four type) addresses, which limits the address space to 4,294,967,296 (2 ) possible unique
addresses. However, some are reserved for special purposes such as private networks (~ 18 million addresses) or
multicast addresses (~ 16 million addresses). This reduces the number of addresses that can be allocated as public
Internet addresses.
IP DEFINITION
Internet Protocol is a unique ID which distinguishes one computer from all the other in the world when connected
to the internet. The IP is a series of numbers which is called your IP address. IP was first standardized in September
1981. if a device wants to communicate using TCP/P, it needs an IP address. The specification required that each
system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.
IP RANGE
Class
Valid Network
Numbers
1.0.0.0 to 126.0.0.0
2 2 (126)
2 -2
(164,777,214)
Purpose
Few large
organizations
14
128.0.0.0 to
191.255.0.0
2 (16,384)
192.0.0.0 to
223.255.255.0
2 (2097152)
21
16
2 -2 (65,534)
2 2 (254)
Medium-size
organizations
Relatively small
organzations
ZERO ADDRESSES
Au with the loopback range, the address range from 0.0.0.0 through 0.255.255.255 should not be considered part
of the normal Class A range. 0.x.x.x addresses serve no particular function in IP, but nodes attempting to use them
will be unable to communicate properly on the Internet.
IP LOOPBACK ADDRESS
127.0.0.1 is the loopback address in IP. Loopback is test mechanism of network adapters. Messages sent to
127.0.0.1 do not get delivered to the network. Instead, the adapter intercepts all loopback messages and returns
them to the sending application.
Each class B network address has 16-bit network prefix, with the two highest order bits set to 1-0 and a 14-bit
network number, followed by a 16-bits host number. Class B networks are now referred to as /16s since they
have a 16-bit network prefix.
Leftmost bits
Start address
Finish address
Purpose
1110
224.0.0.0
239.255.255.255 Multicast
1111
240.0.0.0
255.255.255.255 Experimental
SUBNET MASK
A subnet allows the flow of network traffic between hosts to be segregated based on a network configuration. By
organizing hosts into logical groups, subnetting can improve network security and performance.
Perhaps the most recognizable aspect of subnetting is the subnet mask. Like IP addresses, a subnet mask contains
four bytes (32bits) and is often written using the same dotted-decimal notation.
PUBLIC ADDRESS
Public IP addresses are IP addresses that are visible to the public. Because these IP addresses are public, they allow
other people to know about and access your computer, like a Web server. In some cases, you do not want people
to access your computer or you want to restrict certain individuals from accessing your computer or server.
PRIVATE ADDRESSES
The IP standard defines specific address ranges within Class A, Class B and Class C reserved for use by private
networks (intranets). The table below lists these reserved ranges of the IP address space.
Class
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
Nodes are effectively free to use addresses in the private ranges I they are not connected to the Internet, or if they
reside behind firewalls or other gateways that use Networks Address Translation (NAT).
BROADCAST ADDRESS
In computer networking, a broadcast address is an IP address that allowa information to be sent to all machines on
a given subnet rather than a specific machine. That exact notation can vary by operating system.
Generally, the broadcast address is found by taking the bit complement of the subnet mask and then OR-ing it
bitwise with the IP address.
Example: to broadcast a packet to an entire class B subnet using a private IP address space, the broadcast address
would be 172.16.255.255.
routers The classfull system of allocating IP addresses can be very wasteful; anyone who could reasonably show
a need for more that 254 host addresses was given a Class B address Block of 65533 host addresses.
Notation
To convert an IP dotted-quad address to binary, take each decimal number of the dotted-quad and look up the
binary equivalent in the Binary Convrsion Table below. You will have a 32-bit binary numbers as the result.
Subnetting
Subnetting, as this process is more commonly called, is a remarkably logical and mathematical process.
Understanding the mathematics of subnetting helps you develop and implement efficient subnetting schemes that
make better use of available address spaces. That is the explicit goal of subnetting to use an address space more
efficiently.
A class A, B, or C TCP/IP network can be further divided, or subnetted, by a system administrator. This becomes
necessary as you reconcile the logical address scheme of the Internet (abstract world of IP addresses and subnets)
with the physical networks in use by the real world.
Example
Step 1: Router R1 needs 20 network addresses. So,
5
2 = 32-2 (2 is subtract form 32 because in FLSM all 0s and all 1s are not consider) = 30
Step 2: Now borrow 5 bit from the host part of the IP address.
172.16.00000 000.00000000
Step 3: So the subnet mask is change, now new subnet mask is
255.255. (128+64+32+26+8) 000.00000000
255.255.248.0
Step 4: After calculating subnet mask, the first network address is
Put 1 at the rightmost bit of the network part, like
172.16.00001 000.00000000
IP is 172.168.8.0/21
.
.
.
172.16.16.0 / 21
Step1:
2 = 64
Step2:
Step3:
nd
nd
172.168.00000000.01000000 / 26
Requirement of R1 is 28 hosts.
5
2 = 32
172.168.00000000.010 00000
So, network address for r1 is 172.168.0.64 / 27
Step5:
rd
Repeat step 3 for calculate 3 network address and step 4 for calculate network
address between two routers.
Wildcard Masks
You will often come across Wildcard masks, particularly if you work with OSPF and / or Cisco routers. The use of
wildcard masks is most prevalent when building Access Control Lists (ACLs) on Cisco routers. ACLs are filters and
make use of wildcard masks to define the scope of the address filter. Although ACL wildcard masks are used with
other protocols, we will concentrate on IP here.
The Routing
Routing is a process by which router consider the best path to the destined device amongst to the laded physical
circuit to reach the remote site. The election of the best path depends on various parameters and metrics, like
bandwidth, time delay, HOP count, congestion and many more. The whole result after the election of a best path
that is also known as route is captured or stored under the router memory in a form of Table, i.e. known as
Routing Table.
If your network has no routers, then it should be apparent that you are not routing. Routers route traffic to all the
networks in your internet work. To be able to route packets, a route must know , at a minimum, the following:
Destination Address
The router learns about remote networks from neighbour routers or from an administrator. The router then builds
a routing table (a map of the internetwork) that describes how to find the remote networks. If a network is directly
connected, then the router already knows how to get to it.
PATH DETERMINATION
Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of
measurement, such as path bandwidth, that is used by routing algorithms to determine the optimal path to a
destination. To aid the process of path determination, routing algorithms initialize and maintain routing tables,
which contain route information. Route information varies depending on the routing algorithm used.
Routing algorithms fill routing tables with a variety of information. Destination/next hop association tell a router
that a particular destination can be reached optimally by sending the packet to a particular router representing the
next hop on the way to the final destination.
Routing Metrics
Routing tables contain information used by switching software to select the best route. But how, specifically, are
routing tables built? What is the specific nature of the information that they contain? How do routing algorithms
determine that one route is preferable to others?
Routing algorithms have used many different metrics to determine the best route. Sophisticated routing
algorithms can base route selection on multiple metrics, combining them in a single (hybrid) metric. All the
following metrics have been used:
Path Length
Path length is the most common routing metric. Some routing protocols allow network administrators to assign
arbitrary costs to each network link. In this case, path length is the sum of the costs associated with each link
traversed.
Reliability
Reliability in the context of routing algorithms, refers to dependability (usually described in terms of the bit-error
rate) of each network link. Some network links might go down more often than others. After a network fails,
certain network links might be repaired more easily or more quickly than other links.
Delay
Delay , Routing delay refers to the length of time required to move a packet from source to destination through
the internetwork. Delay depends on many factors, including the bandwidth of intermediate network links, the port
queues at each router along the way, network congestion on all intermediate network links, the physical distance
to be traveled.
Bandwidth
Bandwidth refers to the available traffic capacity of a link; all other things being equal, a 10Mbps Ethernet link
would be preferable to a 64-kbps leased line. Although bandwidth is a rating of the maximum attainable
throughput on a link, routes through links with greater bandwidth do not necessarily provide better routes than
routes through slower links.
Load
Load refers to the degree to which a network resource, such as a router, is busy. Load can be calculated in a variety
of ways, including CPU utilization and packets processed per second. Monitoring these parameters on a continual
basis can be resource-intensive itself.
Communication cost another important metric, especially because some companies may not care about
performance as much as they care about operating expenditures.
Configuring IP routing
Once you create an internetwork by connect LANs and WANs to a router, you will need to configure the router
with the IP addresses. And after that to route the data packets you have to configure IP routing properly using 1 of
3 methods.
Router
Network address
Interface
Address
R1
192.168.10.0
F0/1
192.168.10.1
R1
192.168.20.0
F0/0
192.168.20.1
R1
172.16.0.0
S0/0
172.16.0.1
R1
172.17.0.0
S0/1
172.17.0.1
R2
172.18.0.0
FO/0
172.18.0.1
R2
172.17.0.0
S0/0 [DCE]
172.17.0.2
R3
172.16.0.0
S0/0 [DCE]
172.16.0.2
R3
172.19.0.0
F0/0
172.19.0.1
871W
192.168.20.0
Vlan1
192.168.20.2
871W
192.168.30.0
Dot11radio0
192.168.30.1
1242AP
192.168.10.0
BVI1
192.168.10.2
R1 Configuration
For the router R1 we have to configure total 4 interfaces with IP address along with the host name for each router
to identify easily. When we start configuring a router with IP address and host name why not configure the banner
and password for the same? It better to adapt the habit to configure a full, it will help you alter on.
R2 Configuration
Now we are ready to configure the next router that is R2. we have to configure router R2 in the same way as we
configured Router R1, only difference is, in router R2 we will not give the same IP addresses as well as the same
Hostname and password along with Banner and description.
Static Routing
Static Routing is not really a protocol, simply the process of manually entering routes into the routing table via a
configuration file that is loaded when the routig device starts up. As an alternative, these routes can be entered by
a network administrator who configures the routes. Since these routes dont change after they are configured
(unless a human changes them) they are called static routes.
You can use cheaper router due to less processor overhead than that of dynamic routing, where the
processors overhead is maximum. The processor overhead is less because all the routes are configured
manually by the network administrator, so router need not bother about finding or establishing route.
The cost for ISP link is saved, because in case of static routing, router doesnt take unnecessary WAN link
bandwidth for route convergence (convergence means, upgrading, finding or establishing a route in the
Routing Table of a router.).
It adds security because the administrator can choose to allow routing access to certain networks only.
The administrator have some sound knowledge about the network topology to configure a router for
static routing, because administrator is only liable to give the route information to the router to deliver
data packets from or to a Network.
At the time of Network expansion, the new networks information or route should provided to the entire
routers routing table by hand by administrator.
Its not a handy for the large network, because maintaining would be a full-time job in time.
NET MASK:
The subnet masks which is used by the destination network.
NEXT-HOP ADDRESS:
The address of the next HOP router that will receive the packet and forward the same to the destine network. This
is a router interface thats on a directly connected network. Before going to configure the static route check the
next HOP using the PING command and the PING utility must successes. If you configure wrong HOP address or the
router interface to that router is down, the static route will show UP in the routers configuration but not in the
routing table.
EXITINTERFACE:
It is used in place of the next-hop address if you want, and shows up a directly connected route.
ADMINISTRATICE _DISTANCE:
It is a number which represents the weight of a routing process or you may say that the priority of routing
algorithm. Like Static Route has the AD of 1 and directly connected route has AD0 by default. According to the AD
the router will judge which routing methods is to be use to determine and creating the routing table.
PERMANENT:
If the interface is logically down or the Next HOP router cant be communicated by the source router, then the
entry for the route automatically will be discarded. To preserve the route at any circumstances we can use the
[permanent].
DEFAULT ROUTING:
A default route, also known as the gateway of last resort, is the network route used by a outer when no other
known route exists for a given IP packets destination address. All the packets for destinations not known by the
routers routing table are sent to the default route. This route generally leads to another router, which treats the
packet the same way. If the route is known, the packet will get forwarded to the known route. If not, the packet is
forwarded to the default-route of that router which generally leads to another router. And so on. Each router
traversal adds a one-hop distance to the route.
The default route in IPv4 (in CIDR notation) is 0.0.0.0 / 0, often clled the quad-zero routes. Since the subnet mask
given is /0, it effectively specifies no network, and is the shortest match possible. A route lookup that doesnt
match anything will naturally fall back onto this route. Similarly, in IPv6 the default address is given by ::/0.
DYNAMIC ROUTING:
Dynamic routing protocols are software applications that dynamically discover network destinations and how to
get to them. A router will learn routes to all directly connected networks first. It will then learn routes from other
routers that run the same routing protocol. The router will then sort through its list of routes and select one or
more best routes for each network destination it knows or has learned.
ROUTING PROTOCOL:
A routing protocol is used by a router to dynamically find al, the networks in the internetwork and to ensure that
the all the routers have the same routing table. Basically a routing protocol determines the path of a packet
through an internetwork. Examples of routing protocols are IGRP, BGP, RIP, OSPF etc.
ROUTED PROTOCOL:
When all routers know about the internetwork paths a routed protocol can be used to send user data packets
through the established path. Routed protocols are assigned to an interface and determine the method of packet
delivery. Examples of routed protocols are IPv4 and IPv6 and IPX etc.
ADMINISTRATIVE DISTANCE:
The administrative distance is used to judge the level of reliability of converged routing information election the
best route to a neighbouring or remote router. An administrative distance is represented by numeric from 0 to
255, where the 0 is the most trusted and 255 means no traffic can pass through it. If a router receives two updates
listing the same remote network, the first thing the router checks it the AD. If one of advertise route contained
with lower AD than other, the route with lower AD will placed in the routing table.
ROUTING PROTOCOLS:
The routing protocols can be divided in to three subsequent groups, they are described.
DISTANCE VECTOR:
The distance is the main parameter for the distance vector routing protocols, means the best path for the remote
network is only be judging by the Distance. Each time when a packet passes through a router is called a HOP, and
this HOP is counted as the metric for the best route election or selection.
LINK STATE:
In link state protocols, also called shortest-path-first protocols, each router creates three separate tables. One of
these table get track of directly attached neighbour information, one determines the physical orientation
(topology) of the entire internetwork, and the last one is used as the Routing Table.
HYBRID:
Hybrid protocols used both aspects of Link-state as well as Distance Vector algorithm. EIGRP is an example of
Hybrid routing protocol.
DTE:
Data Terminal Equipment: any device located at the user end of a user-network interface serving as destination, a
source or both. DTE includes devices such as multiplexers, routers, protocols translators and computers. The
connection to a data network is made through data communication equipment (DCE) such as a modem, using the
clocking signals generated by that device.
DCE:
Data Communication Equipment ( as defined by the EIA) or data circuit-terminating equipment (as defined by the
ITU-T): The mechanism and links of a communications network that make up the network portion of the user-tonetwork interface, such a modems. The DCE supplies the physical connection to the network, forwards traffic, and
provides a clocking signal to synchronize data transmission between DTE and DCE devices.
ROUTING UPDATES:
RIP sends routing-update message at regular intervals and when the network topology changes. When a router
receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route.
RIP TIMERS:
RIP uses numerous timers to regulate it performance. These include a routing update timer, a route time out
timer, and a route-flush timer. The routing-update timer clocks the interval between periodic routing updates.
HOLDDOWN TIMER:
This sets the amount of time during which routing information is suppressed. Routes will enter into the holddown
state when an update packet is received that indicated the route is unreachable. The default is 180 seconds.
RIPv1
RIPv2
1. Distance Vector
1. Distance Vector
3. Classfull
3. Classless
4. Broadcast based
6. No authentication
SPLIT HORIZON:
Split horizon is another solution to stop the routing kloop. This mechanism reduces erroneous routing information
and routing overhead in a distance-vector network by enforcing the rule that routing information cannot be sent
back in the direction from which it was received.
ROUTE POISONING:
Another way to stop routing loops caused by fickle updates is route poisoning. For example, when NetC goes
down, R5 initiates route poisoning by advertising NetC as 16, or reachable (sometimes referred to as infinite).
This poisoning of the route to NetC keeps R3 from being susceptible to incorrect updates about the route to NetC.
HOLD DOWNS:
A holddown is prevented by regular update messages from reinstating a route that is going up and down. This is
called flapping. When a serial link is losing connectivity and then coming back up this happens. The entire network
could be brought down by that one flapping interference if there was no way to stabilize this.
TEL NET:
While the initial configuration of your Cisco router using the console port and a rollover cable may be necessary,
you will eventually want to access routers on your network using telnet sessions. Since telnet is an IP-based
application, your routers will need to be configured with atleast one valid and reachable IP address to use this
method. Also remember that in order to connect to a router using telnet, that router will need a virtual terminal
(vty) password configured.
Cisco2501#telnet 192.168.1.45
Trying 192.168.1.45Open
[Connection to accra closed by foreign host]
Cisco2501#
such as the operating system version and IP address. CDO can also be used for On Demand Routing (ODR) which is
a method of including routing information in CDP announcements so that dynamic routing protocols do not need
to be used in simple networks.
Cisco Discovery Protocol CDP) is primarily used to obtain protocol address of neighbouring devices and discover
the platform of those devices. CDP can also be used to show information about the interfaces your router uses.
CDP runs on all media that supports Subnetwork Access Protocol (SNAP), including local-area network (LAN),
Frame Relay, and Asynchronous Transfer Mode (ATM) physical media. CDP runs over the data link layer only.
FEATURE
DEFAULT VALUE
Enabled
60 seconds
CDP holdtime
180 seconds
Router_2#sh cdp
Global CDP information:
Router modes
Modes in routers
1. User Mode or Console Mode
2. Priveledge mode or enable mode
3. Global configuration
sign of mode
router>
router#
router(config)#
User mode :- It allow an administrator to perform very few commands. One can only
verify statistics in user mode. One cannot see or change the router configuration.
Global configuration :- It allows user to change those router configuration that effects
the entire router.
Setting banner
Config# banner motd #
Message#
Ctrl z
Setting password
Setting enable password
Config# enable password talvinder
Ctrl z
Setting enable(secret) password
Config#enable secret talvinder
Ctrl z
Removing password
Config# No enable password
Ctrl z
Or
Config# No enable secret
Ctrl z
REFERENCES
1.www.cisco.com
2.www.quizlet.com
3.www.cram.org