Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
1.1 INTRODUCTION
A computer network or networking is interconnection of various computer systems
located at different places. In computer network two or more computers are linked
together with a medium and data communication devices for the purpose of
communication data and sharing resources. The computer that provides resources to other
computers on a network is known as server. In the network the individual computers,
which access shared network resources, are known as nodes.
Two devices are said to be networked when a process in one device is able to exchange
information with a process in another device. Networks may be classified by various
characteristics, such as the media used to transmit signals, the communications protocols
used to organize network traffic, network scale, network topology and organizational
scope. The best-known computer network is the Internet.
Communication protocols define the rules and data formats for exchanging information in
a computer network. Well-known communications protocols include Ethernet, a hardware
and link layer standard that is widely used for local area networks, and the Internet
protocol suite (TCP/IP), which defines a set of protocols for communication between
multiple networks, for host-to-host data transfer, and for application-specific data
transmission formats. Protocols provide the basis for network programming.
1.2 NECESSITY
Information and communication are two of the most important strategic issues for the
success of every enterprise. While today nearly every organization uses a substantial
number of computers and communication tools (like telephone or fax), they are often still
isolated. While managers today are able to use applications like wordprocessors or
spreadsheets, not very many of them use computer-based tools to communicate with other
departments or information retrieval programs.
To overcome these obstacles in an effective usage of information technology, computer
networks are necessary. They are a new kind (one might call it paradigm) of organization
of computer systems produced by the need to merge computers and communications. At
the same time they are the means to converge the two areas; the unnecessary distinction
1
between tools to process and store information and tools to collect and transport
information can disappear. Computer networks can manage to put down the barriers
between information held on several (not only computer) systems. Only with the help of
computer networks can a borderless communication and information environment be
built.
Computer networks allow the user to access remote programs and remote databases either
of the same organization or from other enterprises or public sources. Computer networks
provide communication possibilities faster than other facilities. Because of these optimal
information and communication possibilities, computer networks may increase the
organizational learning rate,
advantage in competition.
Besides this major reason why any organization should not fail to have a computer
network, there are other reasons as well which are cost reduction by sharing hard- and
software resources, high reliability by having multiple sources of supply, cost reduction
by downsizing to microcomputer-based networks instead of using mainframes and greater
flexibility because of possibility to connect devices from various vendors. Because of the
importance of this technology, decisions of purchase, structure, and operation of computer
networks cannot be left to technical staff. Management as well has a critical need for
understanding the technology of computer networks.
1.3 OBJECTIVE
Right from the day of computer automation, a computer has developed computer in each
department. For example, the task can be to keep of track off inventories, monitor
productivity and maintain accounts. Initially, this computer in different department works
as an isolation from other computer. These provided the necessary computer assistance in
the activities pertaining to the respective department. It was not possible to share
information among the departments. As a result, the information was replicated wherever
needed. This increased redundancy caused increased in storage space, less data
consistency etc. Hence, at a point it was decided to connect the computers in various
departments to extract the information and correlate information about the entire
company. The following are the objectives of the computer networks.
Resource sharing is the main objective of the computer network. The goal is to
provide all the program, date and hardware is available to everyone on the network
without regard to the physical location of the resource and the users.
Computer organization has helped organization in saving money. This is due to the
fact that the small computer has much better price to the performance ratio
comparison than the large computer like mainframe. Mainframe computer are
approximately ten times faster that the microcomputers, but they cost thousands times
more. As a result of this imbalance, organization has preferred to install
interconnected microcomputer connected to the mainframe computer.
Computer network have provided means to increase system performance as the work
load increases (load balancing). In the days of mainframe when the system was full it
was to replace with the other large mainframe computer, usually at and expensive rate
not convenience for user.
Computer network help people who live or work apart to report together. So, when
one user prepared some documentation, he can make the document online enabling
other to read and convey their opinions. Thus computer network is a powerful
communication medium.
Only authorized user can access resource in a computer network. Users are
authenticated by their user name and password. Hence it is not possible to access the
data without proper account. This increases security.
1.4 THEME
Two devices are said to be networked when a process in one device is able to exchange
information with a process in another device. Networks may be classified by various
characteristics, such as the media used to transmit signals, the communications protocols
used to organize network traffic, network scale, network topology and organizational
scope. The best-known computer network is the Internet. Communication protocols
define the rules and data formats for exchanging information in a computer network.
3
CHAPTER II
5
LITERATURE SURVEY
2.1 Introduction to Computer Networking
In general, the term network can refer to any interconnected group or system. More
specifically, a network is any method of sharing information between two systems
(human, electrical or mechanical).
A Metropolitan Area Network is a network that connects two or more Local Area
Networks or Campus Area Networks together but does not extend beyond the boundaries
of the immediate town, city, or metropolitan area. Multiple routers, switches & hubs are
connected to create a MAN. A MAN can range anywhere from 5 to 50 km in diameter.
2.2.3 WAN (Wide Area Network)
A WAN is a data communications network that covers a relatively broad geographic area
(i.e. one city to another and one country to another country) and that often uses
transmission facilities provided by common carriers, such as telephone companies. They
are generally connected with each other using routers.
Topology refers to the way in which the network of computers is connected. Each
topology is suited to specific tasks and has its own advantages and disadvantages. The
choice of topology is dependent upon
Cost
Physical Topology: Physical topology defines how devices are connected to the
network through the actual cables that transmit data (physical structure of the
network).
BUS
In a bus topology, a single cable connects each workstation in a linear, daisy-chained
fashion and Signals are broadcasted to all stations, but stations only act on the frames
addressed to them.
RING
In a ring topology, unidirectional links connect the transmit side of one device to the
receive side of another device. Devices transmit frames to the next device (downstream
member) in the ring.
8
STAR
In a star topology, each station is connected to a central Hub or Switch (concentrator) that
functions as a multi-port repeater. The hub broadcasts data all of the devices connected to
it and Switch transmits the data to the dedicated device for which the data is meant for.
In unicast transmissions, a single data packet is sent from a source to a single destination
on the network.
11
Fig.2.10 Repeater
2.5.2 Hubs
A hub contains multiple ports, which is used to connect devices in a star topology. When a
packet arrives at one port, it is copied to all the ports of the hub. But when the packets are
copied, the destination address in the frame does not change to a broadcast address. It
does this in a rudimentary way; it simply copies the data to all of the Nodes connected to
the hub (broadcast).
12
13
14
15
16
Fig.2.18
OSI
The
Model
2.7.1.1
Layer
1:
Physical
Layer
The
Physical
Layer
defines electrical and physical specifications for devices. In particular, it defines the
relationship between a device and a transmission medium, such as a copper or optical
cable. This includes the layout of pins, voltages, cable specifications, hubs, repeaters,
network adapters, host bus adapters (HBA used in storage area networks) and more.
The major functions and services performed by the Physical Layer are:
Establishment and termination of a connection to a communications medium.
17
shared among multiple users. For example, contention resolution and flow control.
Modulation or conversion between the representation of digital data in user equipment
and the corresponding signals transmitted over a communications channel. These are
signals operating over the physical cabling (such as copper and optical fiber) or over a
radio link.
2.7.1.2 Layer 2: Data Link Layer
The Data Link Layer provides the functional and procedural means to transfer data
between network entities and to detect and possibly correct errors that may occur in the
Physical Layer. Originally, this layer was intended for point-to-point and point-tomultipoint media, characteristic of wide area media in the telephone system. Local area
network architecture, which included broadcast-capable multi-access media, was
developed independently of the ISO work in IEEE Project 802. IEEE work assumed sub
layering and management functions not required for WAN use. In modern practice, only
error detection, not flow control using sliding window, is present in data link protocols
such as Point-to-Point Protocol (PPP), and, on local area networks, the IEEE 802.2 LLC
layer is not used for most protocols on the Ethernet, and on other local area networks, its
flow control and acknowledgment mechanisms are rarely used.
2.7.1.3 Layer 3: Network Layer
The Network Layer provides the functional and procedural means of transferring variable
length data sequences from a source host on one network to a destination host on a
different network, while maintaining the quality of service requested by the Transport
Layer (in contrast to the data link layer which connects hosts within the same network).
The Network Layer performs network routing functions, and might also perform
fragmentation and reassembly, and report delivery errors. Routers operate at this layer
sending data throughout the extended network and making the Internet possible. This is a
logical addressing scheme values are chosen by the network engineer. The addressing
scheme is not hierarchical. Careful analysis of the Network Layer indicated that the
Network Layer could have at least three sub layers:
Sub network Access that considers protocols that deal with the interface to networks,
such as X.25;
18
data into the form that the application accepts. This layer formats and encrypts data to be
sent across a network. It is sometimes called the syntax layer.
2.7.1.7 Layer 7: Application Layer
The Application Layer is the OSI layer closest to the end user, which means that both the
OSI application layer and the user interact directly with the software application. This
layer interacts with software applications that implement a communicating component.
Such application programs fall outside the scope of the OSI model. When determining
resource availability, the application layer must decide whether sufficient network or the
requested communication exists. In synchronizing communication, all communication
between applications requires cooperation that is managed by the application layer.
2.7.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model
The TCP/IP Model is a specification for computer network protocols created in the 1970s
by DARPA, an agency of the United States Department of Defense. It laid the foundation
for ARPANET, which was the world's first wide area network and a predecessor of the
Internet.
TCP/IP application layer protocols provide services to the application software running
on a computer. The application Layer identifies the application running on the computer
through Port Numbers.
The various protocols that are used at the Application Layer are:
Telnet
Terminal Emulation, Telnet is a program that runs on your computer and connects your
PC to a server on the network. You can then enter commands through the Telnet program
and they will be executed as if you were entering them directly on the server console.
Port Number :23
FTP
File Transfer Protocol, the protocol used for exchanging files over the Internet. FTP is
most commonly used to download a file from a server using the Internet or to upload a
file to a server. Port Number : 20(data port) ,21(control port)
HTTP
Hyper Text Transfer Protocolis the underlying protocol used by the World Wide Web.
HTTP defines how messages are formatted and transmitted, and what actions Web servers
and browsers should take in response to various commands. For example, when we enter
a URL in the browser, this actually sends an HTTP command to the Web server directing
it to fetch and transmit the requested Web page. Port Number :80
SMTP
Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
In addition, SMTP is generally used to send messages from a mail client to a mail server.
Port Number :25
POP3
Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail
applications (sometimes called an e-mail client) use the POP, although some can use the
newer IMAP (Internet Message Access Protocol)as a replacement for POP3 Port
Number :110
TFTP
21
Trivial File Transfer Protocol, a simple form of the File Transfer Protocol (FTP). TFTP
provides no security features. It is often used by servers to boot diskless workstations, Xterminals, and routers. Port Number :69
DNS
Domain Name System (or Service or Server), an Internet service that translates domain
names into IP addresses. Because domain names are alphabetic, they're easier to
remember. The Internet however, is really based on IP addresses. Every time you use a
domain name, a DNS service must translate the name into the corresponding IP address.
For example, the domain name www.example.com might translate to 198.105.232.4.
Port Number :53
DHCP
Dynamic Host Configuration Protocol, a protocol for assigning dynamicIP addresses to
devices on a network. With dynamic addressing, a device can have a different IP address
every time it connects to the network. Dynamic addressing simplifies network
administration because the software keeps track of IP addresses rather than requiring an
administrator to manage the task. Port Number : 67(Server),68(Client).
2.7.2.2 The TCP/IP Transport Layer
The protocol layer just below the Application layer is the host-to-host layer (Transport
layer). It is responsible for end-to-end data integrity. Transport Layer identifies the
segments through Socket address (Combination of Port Number & I.P. address).
The two most important protocols employed at this layer are the
Transmission Control Protocol (TCP)
TCP provides reliable, full-duplex connections and reliable service by ensuring that data
is retransmitted when transmission results in an error (end-to-end error detection and
correction). Also, TCP enables hosts to maintain multiple, simultaneous connections.
22
When error correction is not required, UDP provides unreliable datagram service
(connectionless) that enhances network throughput at the host-to-host transport layer. It's
used primarily for broad casting messages over a network.
2.7.2.3 The TCP/IP Internet Layer
The best known TCP/IP protocol at the internetwork layer is the Internet Protocol (IP),
which provides the basic packet delivery service for all TCP/IP networks node addresses,
the IP implements a system of logical host addresses called IP addresses.
The IP addresses are used by the internetwork and higher layers to identify devices and to
perform internetwork routing. IP is used by all protocols in the layers above and below it
to deliver data, which means all TCP/IP data flows through IP when it is sent and
received, regardless of its final destination.
2.8 IP Addressing
2.8.1 Introduction
If a device wants to communicate using TCP/IP, it needs an IP address. I.P. addressing
was designed to allow hosts on one network to communicate with a host on a different
network regardless of the type of LANs the hosts are participating in. When the device
has an IP address and the appropriate software and hardware, it can send and receive IP
packets. Any device that can send and receive IP packets is called an IP host.
2.8.2 IP Terminology
The important terms vital to the understanding of the Internet Protocol are:
Bit: A bit is one digit, either a 1 or a 0.
Byte: A byte is 8 bits.
Octet: An octet, made up of 8 bits, is just an ordinary 8-bit binary number. In this
Session, the terms byte and octet are completely interchangeable.
Network address: This is the designation used in routing to send packets to a remote
networkfor example, 10.0.0.0, 172.16.0.0, and 192.168.10.0.
Broadcast address: The address used by applications and hosts to send information to
all nodes on a network is called the broadcast address. Examples include
255.255.255.255, which is all networks, all nodes; 172.16.255.255, which is all subnets
and hosts on network 172.16.0.0; and 10.255.255.255, which broadcasts to all subnets and
hosts on network 10.0.0.0.
23
24
The network address(which can also be called the network number) uniquely identifies
each network. Every machine on the same network shares that network address as part of
its IP address. In the IP address 172.16.30.56, for example, 172.16 is the network address.
The node address is assigned to, and uniquely identifies, each machine on a network. This
part of the address must be unique because it identifies a particular machinean
individualas opposed to a network, which is a group. This number can also be referred
to as a host address. In the sample IP address 172.16.30.56, the 30.56 is the node address.
The designers of the Internet decided to create classes of networks based on network size.
For the small number of networks possessing a very large number of nodes, they created
the rank, Class A network. At the other extreme is the Class C network, which is reserved
for the numerous networks with a small number of nodes. The class distinction for
networks between very large and very small is predictably called the Class B network.
Subdividing an IP address into a network and node address is determined by the class
designation of ones network.
Table. 2.1 Classes of I.P. Address
Classes
8 bits
8 bits
8 bits
8 bits
Class A:
Network
Host
Host
Host
Class B:
Network
Network
Host
Host
Class C:
Network
Network
Network
Host
Class D:
Multicast
Class E:
Research
Class A Network: binary address start with 0, therefore the decimal number can be
anywhere from 1 to 126. The first 8 bits (the first octet) identify the network and the
remaining 24 bits indicate the host within the network. An example of a Class A IP
address is 102.168.212.226, where "102" identifies the network and "168.212.226"
identifies the host on that network.
Class B Network: binary addresses start with 10, therefore the decimal number can be
anywhere from 128 to 191. The first 16 bits (the first two octets) identify the network and
the remaining 16 bits indicate the host within the network. An example of a Class B IP
25
Start Address
Finish Address
A:
0xxx
0.0.0.0
127.255.255.255
B:
10xx
128.0.0.0
191.255.255.255
C:
110x
192.0.0.0
223.255.255.255
D:
1110
224.0.0.0
239.255.255.255
E:
1111
240.0.0.0
255.255.255.255
Class C Network: Binary addresses start with 110, therefore the decimal number can be
anywhere from 192 to 223. The first 24 bits (the first three octets) identify the network
and the remaining 8 bits indicate the host within the network. An example of a Class C IP
address is 200.168.212.226 where "200.168.212" identifies the network and "226"
identifies the host on that network. In a Class C network address, the first three bit
positions are always the binary 110. The calculation is as follows: 3 bytes, or 24 bits,
minus 3 reserved positions leaves 21 positions.
Class D Network: Binary addresses start with 1110, therefore the decimal number can
be anywhere from 224 to 239. Class D networks are used to support multicasting.
Class E Network: Binary addresses start with 1111, therefore the decimal number can
be anywhere from 240 to 255. Class E networks are used for experimentation. They have
never been documented or utilized in a standard way.
2.8.5 Subnet Masks
For the subnet address scheme to work, every machine on the network must know which
part of the host address will be used as the subnet address. This is accomplished by
assigning a subnet mask to each machine. A subnet mask is a 32-bit value that allows the
recipient of IP packets to distinguish the network ID portion of the IP address from the
host ID portion of the IP address.
Table 2.3: Default Subnet Mask
26
Address
Format
Class
Class A
Class B
Class C
network.node.node.node
Network.network.node.node
Network.network.network.nod
255.0.0.0
255.255.0.0
255.255.255.0
e
2.9 Router
2.9.1 Inroduction
Routers are nothing more than a special type of PC. Routers and PCs both have some of
the same components such as a motherboard, RAM, and an operating system. The main
difference is between a router and standard PC, is that a router performs special tasks to
control or "route" traffic between two or more networks. They operate at layer 3 of the
OSI model.
2.9.2 Hardware Components
There are 7 major internal components of a router:
CPU
RAM
NVRAM
Flash
ROM
Console
Interfaces
2.9.2.1 CPU
The CPU performs functions just as it does in a normal PC. It executes commands given
by the IOS using other hardware components. High-end routers may contain multiple
processors or extra slots to add more CPUs later.
2.9.2.2 IOS
The IOS is the main operating system on which the router runs. The IOS is loaded upon
the routers boot up. It usually is around 2 to 5MB in size, but can be a lot larger
depending on the router series. The IOS is currently on version 12, and they periodically
releases minor versions every couple of months e.g. 12.1, 12.3 etc. to fix small bugs and
also add extra functionality.
27
The IOS gives the router its various capabilities and can also be updated or downloaded
from the router for backup purposes.
2.9.2.3 RAM
Random Access Memory; this component is dynamic. Meaning, its content changes
constantly. The main role of the RAM is to hold the ARP cache, Store routing tables, hold
fast-switching cache, performs packet buffering, and hold queues. It also provides
temporary memory for the configuration file of the router while the router is powered on.
However, the RAM loses content when router is restarted or powered off. This component
is upgradeable!
2.9.2.4 NVRAM
Nonvolatile RAM is used to store the startup configuration files. This type of RAM does
not lose its content when the router is restarted or powered off.
2.9.2.5 Flash
Flash memory is very important. It holds the Cisco IOS image file, as well as backups.
This flash memory is classified as an EEPROM (Electronically Erasable Programmable
Read Only Memory). The flash ROM is upgradeable in most Cisco routers.
2.9.2.6 ROM
The ROM performs the same operations as a BIOS. It holds information about the
systems hardware components and runs POST when the router first starts up. This
component can be upgraded by "unplugging" the chip and installing a new one. A ROM
upgrade ensures newer versions of the IOS.
2.9.2.7 Console
The console consists of the physical plugs and jacks on the router. The purpose of the
console is to provide access for configurations.
2.9.2.8 Interfaces
The interfaces provide connectivity to LAN, WAN, and Console/Aux. They can be RJ-45
jacks soldered onto the motherboard, transceiver modules, or card modules. Cisco routers,
especially the higher-end models, can be configured in many different ways. They can use
a combination of transceivers, card modules and onboard interfaces.
Prompt : router>
Prompt : router#
Most statements can be removed from the configuration with the prefix no (ex. no
shutdown)
Prompt : router(config)#
Description
User Mode
Privileged Mode
Global configuration mode
Interface mode
Subinterface mode
Line mode
Router configuration mode
2.10 Routing
The term routing is used for taking a packet from one device and sending it through the
network to another device on a different network. Routers dont really care about hosts
they only care about networks and the best path to each network. The logical network
address of the destination host is used to get packets to a network through a routed
29
network, and then the hardware address of the host is used to deliver the packet from a
router to the correct destination host.
If your network has no routers, then it should be apparent that you are not routing.
Routers route traffic to all the networks in your internetwork. To be able to route packets,
a router must know, at a minimum, the following:
Destination address
The router learns about remote networks from neighbor routers or from an
administrator
The router then builds a routing table (a map of the internetwork) that describes how to
find the remote networks. If a network is directly connected, then the router already
knows how to get to it. If a network isnt directly connected to the router, the router must
use one of two ways to learn how to get to the remote network.
2.10.1 Static routing
It mean that someone must hand-type all network locations into the routing table.
2.10.2 Dynamic routing
In dynamic routing, a protocol on one router communicates with the same protocol
running on neighbor routers. The routers then update each other about all the networks
they know about and place this information into the routing table. If a change occurs in
the network, the dynamic routing protocols automatically inform all routers about the
event.
If static routing is used, the administrator is responsible for updating all changes by hand
into all routers. Typically, in a large network, a combination of both dynamic and static
routing is used.
2.11 Routing Protocol
A routing protocol is a protocol that specifies how routers communicate with each other,
disseminating information that enables them to select routes between any two nodes on a
computer network, the choice of the route being done by routing algorithms.
2.11.1 Routing Information Protocol (RIP)
30
Routing Information Protocol (RIP) is a true distance-vector routing protocol. RIP sends
the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop
count to determine the best way to a remote network, but it has a maximum allowable hop
count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small
networks, but its inefficient on large networks with slow WAN links or on networks with
a large number of routers installed.
RIP version 1 uses only classful routing, which means that all devices in the network must
use the same subnet mask. This is because RIP version 1 doesnt send updates with subnet
mask information.
RIP version 2 provides something called prefix routing and does send subnet mask
information with the route updates. This is called classless routing.
2.11.1.1 Configuring RIP Routing
Configuration Example
Lets use a simple network example, shown in Figure below, to illustrate configuring
RIPv1.
Show IP protocols
show IP route
debug IP rip
Support for IP and IPv6 (and some other useless routed protocols) via protocol
dependent modules.
Considered classless (same as RIPv2 and OSPF).
Support for VLSM/CIDR.
Support for summaries and discontigious networks.
Efficient neighbor discovery.
Communication via Reliable Transport Protocol (RTP).
Best path selection via Diffusing Update Algorithm (DUAL).
Bandwidth
Delay
Load
Reliability
Like IGRP, EIGRP uses only bandwidth and delay of the line to determine the best path to
a remote network by default.
2.11.3.2 Configuring EIGRP
Configuration Example
Lets look at an example, to illustrate how to configure EIGRP on a router. Heres the
routing configuration of the router.
Router(config)# router eigrp 200
Router(config-router)# network 172.16.0.0
Router(config-router)# network 10.0.0.0
2.11.3.3Troubleshooting EIGRP
Here are some of the main commands used when viewing and troubleshooting EIGRP.
show ip protocols
show ip route
show ip eigrp neighbors
show ip eigrp topology
show ip eigrp traffic
debug ip eigrp
is populated with the resulting best paths. OSPF converges quickly, although perhaps not
as quickly as EIGRP, and it supports multiple, equal-cost routes to the same destination.
But unlike EIGRP, it only supports IP routing.
OSPF (Open Shortest Path First) is a router protocol used within larger autonomous
system networks in preference to the Routing Information Protocol (RIP), an older
routing protocol that is installed in many of today's corporate networks. Like RIP, OSPF
is designated by the Internet Engineering Task Force (IETF) as one of several Interior
Gateway Protocols (IGPs).
Using OSPF, a host that obtains a change to a routing table or detects a change in the
network immediately multicasts the information to all other hosts in the network so that
all will have the same routing table information. Unlike the RIP in which the entire
routing table is sent, the host using OSPF sends only the part that has changed. With RIP,
the routing table is sent to a neighbor host every 30 seconds. OSPF multicasts the updated
information only when a change has taken place.
Rather than simply counting the number of hops, OSPF bases its path descriptions on
"link states" that take into account additional network information. OSPF also lets the
user assign cost metrics to a given host router so that some paths are given preference.
OSPF supports a variable network subnet mask so that a network can be subdivided. RIP
is supported within OSPF for router-to-end station communication. Since many networks
using RIP are already in use, router manufacturers tend to include RIP support within a
router designed primarily for OSPF.
OSPF is supposed to be designed in a hierarchical fashion, which basically means that we
can separate the larger internetwork into smaller internetworks called areas. This is the
best design for OSPF.The reasons for creating OSPF in a hierarchical design include:
To speed up convergence
Each router in the network connects to the backbone called area 0, or the backbone
area.OSPF must have an area 0, and all routers should connect to this area if at all
34
possible.But routers that connect other areas to the backbone within an AS are called Area
Border Routers (ABRs). Still, at least one interface must be in area 0.
OSPF runs inside an autonomous system, but can also connect multiple autonomous
systems together. The router that connects these ASes together is called an Autonomous
System Boundary Router (ASBR).
2.11.4.1 OSPF Terminology
Link
A link is a network or router interface assigned to any given network. When an interface
is added to the OSPF process, its considered by OSPF to be a link.
Router ID
The Router ID (RID) is an IP address used to identify the router. Cisco chooses the Router
ID by using the highest IP address of all configured loopback interfaces. If no loopback
interfaces are configured with addresses, OSPF will choose the highest IP address of all
active physical interfaces.
Neighbors
Neighbors are two or more routers that have an interface on a common network,such as
two routers connected on a point-to-point serial link.
Adjacency
An adjacency is a relationship between two OSPF routers that permits the direct exchange
of route updates. OSPF is really picky about sharing routing informationunlike EIGRP,
which directly shares routes with all of its neighbors. Instead, OSPF directly shares routes
only with neighbors that have also established adjacencies. And not all neighbors will
become adjacentthis depends upon both the type of network and the configuration of
the routers.
Hello protocol
The OSPF Hello protocol provides dynamic neighbor discovery and maintains neighbor
relationships. Hello packets and Link State Advertisements (LSAs) build and maintain the
topological database. Hello packets are addressed to 224.0.0.5.
Neighborship database
35
The neighborship database is a list of all OSPF routers for which Hello packets have been
seen. A variety of details, including the Router ID and state, are maintained on each router
in the neighborship database.
Topology database
The topology database contains information from all of the Link State Advertisement
packets that have been received for an area. The router uses the information from the
topology database as input into the Dijkstra algorithm that computes the shortest path to
every network. LSA packets are used to update and maintain the topology database.
Link State Advertisement
A Link State Advertisement (LSA) is an OSPF data packet containing link-state and
routing information thats shared among OSPF routers. There are different types of LSA
packets. An OSPF router will exchange LSA packets only with routers to which it has
established adjacencies.
Designated router
A designated router (DR) is elected whenever OSPF routers are connected to the same
multi-access network. A prime example is an Ethernet LAN.
Backup designated router
A backup designated router (BDR) is a hot standby for the DR on multi-access links The
BDR receives all routing updates from OSPF adjacent routers, but doesnt flood LSA
updates.
OSPF areas
An OSPF area is a grouping of contiguous networks and routers. All routers in the same
area share a common Area ID.
Broadcast (multi-access)
Broadcast (multi-access) networks such as Ethernet allow multiple devices to connect to
(or access) the same network, as well as provide a broadcast ability in which a single
packet is delivered to all nodes on the network. In OSPF, a DR and a BDR must be
elected for each broadcast multi-access network.Non-broadcast multi-access.
36
Non-Broadcast Multi-Access
(NBMA) networks are types such as Frame Relay, X.25, and Asynchronous Transfer
Mode (ATM). These networks allow for multi-access, but have no broadcast ability like
Ethernet. So, NBMA networks require special OSPF configuration to function properly
and neighbor relationships must be defined.
Point-to-point
Point-to-point refers to a type of network topology consisting of a direct connection
between two routers that provides a single communication path. The point-to-point
connection can be physical, as in a serial cable directly connecting two routers, or it can
be logical.
Point-to-multipoint
Point-to-multipoint refers to a type of network topology consisting of a series of
connections between a single interface on one router and multiple destination routers.
SPF Tree Calculation
Within an area, each router calculates the best/shortest path to every network in that same
area.This calculation is based upon the information collected in the topology database and
an algorithm called shortest path first (SPF)
OSPF uses a metric referred to as cost. A cost is associated with every outgoing interface
included in an SPF tree. The cost of the entire path is the sum of costs of the outgoing
interfaces along the path.
Cisco uses a simple equation of 108/ bandwidth.The bandwidth is the configured
bandwidth for the interface. Using this rule, a 100Mbps Fast Ethernet interface would
have a default OSPF cost of 1 and a 10Mbps Ethernet interface would have a cost of 10.
An interface set with a bandwidth of 64,000 would have a default cost of 1563.
37
(Process ID 1 - 65535)
Router>en
Router#configuration terminal
Router(config)#hostname 3600A
3600A(config)#interface S3/0
3600A(config-if)#ip address 20.0.0.2 255.0.0.0
3600A(config-if)#no shutdown
3600A(config-if)#interface S3/1
3600A(config-if)#clock rate 64000
3600A(config-if)#ip address 30.0.0.1 255.0.0.0
3600A(config-if)#no shutdown
3600A(config-if)#clock rate 64000
3600A(config-if)#exit
3600A(config)#router OSPF 2
(Process ID 1 - 65535)
1700B
Router>en
Router#configuration terminal
39
Router(config)#hostname 1700B
1700B(config)#interface fast Ethernet 0/0
1700B(config-if)#ip address 40.0.0.1 255.0.0.0
1700B(config-if)#no shutdown
1700B(config-if)#interface S0/0
1700B(config-if)#ip address 30.0.0.1 255.0.0.0
1700B(config-if)#no shutdown
1700B(config-if)#exit
1700B(config)#router OSPF 1
(Process ID 1 - 65535)
40
41
CHAPTER III
TRAINING WORK
3.1 INTRODUCTION
To configure the network CISCO PACKET TRACER software is used. The software is
used to create scenario of network before actual implementation of hardware in real
world. Software gives view of working, layout, protocols and ip addresses used in a
network.
3.2 WORKING WITH CISCO PACKET TRACER
3.2.1 Starting Cisco Packet Tracer
42
43
Fig. 3.5
Switch is not configured only connected while other devices have their special
configurings.
3.2.4 Connecting devices
Click on CONNECTIONS and choose the type of wire as
44
46
47
3.2.5.5 Configurations
Router 0 (words in capital letters show commands but not case sensitive in packet
tracer).At start of configurong any router following question appears which has to be
answered by NO:
CONTINUE WITH CONFIGURATION DIALOG? [YES/NO]:NO
Router0>ENABLE
Router0#CONFIGURE TERMINAL
(privilege mode)
Router(config)#INTERFACE S0/0
(global mode)
CHAPTER IV
EVALUATION OF TRAINING
Spanning-Tree Protocol (STP) discussed, as well as the different LAN switch types used
by Cisco switches.
Background necessary for success on the exam as well as in the real world by discussing
TCP/IP. This in-depth covers the very beginnings of the Internet Protocol stack and then
goes all the way to IP addressing and subnetting.
Introduction to the Cisco Internetwork Operating System (IOS). We learn how to turn on
a router and configure the basics of the IOS, including setting passwords, banners,
and more. IP configuration discussed.
IP routing, add IP addresses, and route data between routers, static, default, and
dynamic routing.
Virtual LANs and how you can use them in your internetwork. VLANs and the different
concepts and protocols used with VLANs.
Management skills needed to run a Cisco ISO network. Backing up and restoring the
IOS, as well as router configuration, is covered, as are troubleshooting tools necessary to
keep a network up and running.
However, taking the time to study and practice with CISCO PACKET TRACER is the
real key to success.
4.2 Computational work
As stated already in previous chapters, the computational work is working on CISCO
PACKET SOFTWARE which gives view of working, layout, protocols and ip addresses
used in a network. Due to high cost of hardware used in computer networking i.e.
computers, routers, switches etc. (which is in lacs), during training most of network
configuration is on software only.
However real implimentation of networks is done using PUTTY SOFTWARE which is to
be installed in computer used in network.
4.2.1 Result comparison
Lets take example of a simple network shown below:
Links down
51
52
Here connectivity with laptop 0 is checked whose ip address is 192.168.1.2. The result
shows success.
Now connectivity with laptop 3 is checked whose ip address is 192.168.2.3. The result is
failure as link between two routers is down as indicated by red colour in fig. 4.1.
Result in command prompt is:
53
Fig. 4.3
54
Fig.4.4
In this way connectivity between any two end devices in the network is checked.
Successful coneection is indication of right working of network.
55
CHAPTER V
CONCLUSIONS AND FUTURE SCOPE OF TRAINING
5.1 Conclusions & Objectives Achieved
This course provides a solid foundation for the serious effort of preparing for the Cisco
Certified Network Associate (CCNA) exam. This course covers everything we need to
56
know in order to become CCNA certified. However, taking the time to study and practice
with routers or a router simulator is the real key to success.
The information learnt in this course, and need to know for the CCNA exam, is listed in
the following points:
Introduction to internetworking. Basics of the Open Systems Interconnection the way
Cisco wants you to learn it. Also, the Cisco three-layer hierarchical model discussed,
along with how to choose Cisco equipment based on this model. Ethernet networking and
standards are discussed in detail.
Background on layer-2 switching and how switches perform address learning and make
forwarding and filtering decisions. Network loops and how to avoid them with the
Spanning-Tree Protocol (STP) discussed, as well as the different LAN switch types used
by Cisco switches.
Background necessary for success on the exam as well as in the real world by discussing
TCP/IP. This in-depth covers the very beginnings of the Internet Protocol stack and then
goes all the way to IP addressing and subnetting.
Introduction to the Cisco Internetwork Operating System (IOS). We learn how to turn on
a router and configure the basics of the IOS, including setting passwords, banners,
and more. IP configuration discussed.
IP routing, add IP addresses, and route data between routers, static, default, and
dynamic routing.
Virtual LANs and how you can use them in your internetwork. VLANs and the different
concepts and protocols used with VLANs.
Management skills needed to run a Cisco ISO network. Backing up and restoring the
IOS, as well as router configuration, is covered, as are troubleshooting tools necessary to
keep a network up and running.
5.2 Future Scope
5.3 Applications
Applications of Computer Networks:
There are 2 types of network applications:
Email programs
57
They allow users to type messages at their local nodes and then send to someone on the
network. It is a fast and easy way of transferring mail from one computer to another.
Examples of electronic mail programs (Clients) are:
Pegasus mail
Outlook express
Fox mail
Opera
Poco mail
Mozilla Thunderbird
Windows mail
This application facilities transfer of files from one computer to another e.g. from a client
to a server. There are 2 common processes involved in FTP
Downloading: - This is the process of obtaining files from a server to a workstation or a
client (for example when you download programs and music from a server).
Uploading:- This is obtaining of files from a workstation to a server (for instance when
you attach documents and upload them to a server, a good example being when you
upload photos to Facebook).
Examples of FTP programs are:
FTP in Unix
FTP in Linux or
FTP in Windows
Mozilla thunderbird
It allows a workstation to access the server for an application program. This enables you
to control the server and communicate with other servers on the network. The workstation
appears as a down terminal that is directly attached to the server. The user feels like
he/she is using the server directly. TELNET enables PCs and workstations to function as
dumb terminals in sessions with hosts on inter-networks.
Groupware
These applications are used to automate the administration functions of a modern office
for instance video conferencing and chatting. They facilitate the work of groups and
improve on their productivity; they can be used to communicate, co-operate, coordinate,
solve problems, compete, negotiate among others.
58
Video Conferencing
Chatting
It is a real-time communication between two users via computer. Once a chat has been
initiated, either user can enter text by typing on the keyboard and the entered text will
appear on the other users monitor. The two must be online for a chat to be initiated. Most
networks, cybers and online services offer a chat feature which enables computer users to
chat as they go on with their work.
5.3.2 Stand Alone Applications
These are applications that run on stand alone computers (computers not connected to any
other). In order to extend their activity, they are rebuild to run on network environments
e.g. word processors, spreadsheets, database management systems, presentations
graphics, project management etc. They function even when the computer is offline.
59