Ethernet Network Technologies And Protocols

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

This report describes four main topics like Serial Connections, IPv4 Addressing, VLANs and Routing Information Protocol versions. In the first part, types of connectors used with the serial connections are described. Another, synchronous and asynchronous communication protocols are explained.

In the second section, IPv4 addressing format is discussed. Referring to this part , one will come to know about different classes of IPv4 addresses. Concepts of subnetting are explained in this section.

In the next part, a detailed explanation on VLANs is given. The advantages of VLANs over the simple LANs are shown. A format of Ethernet frames is displayed in this section.

Another, Routing Information Protocols are discussed. This will give an idea about types of routing. A hierarchy of different routing protocols is displayed. Three versions of RIPs are explained in detail.

In the section of methodology and configuration, all the above mentioned sections are described theoretically as well as practically. It will show how the commands are used to configure routers and switches in practice.

In the last section, conclusion is given and some recommendations are offered. Along with this references and bibliography is included.

CHAPTER

1

INTRODUCTION

INTRODUCTION

Computer network is a bunch of computers and devices connected with each other. Any two devices are connected either via physical (wired) medium or through a wireless network. There are some predefined communication protocols in computer networks which guide these devices to communicate with each other. This report will explain very basic concepts and methodologies of computer networks. A brief overview of these concepts is described below.

Serial Connections

Serial connection is a very common concept for connection of two devices. To communicate serially, two devices transfer bit by bit data between each other. Serial connections need to follow predefined communication protocols like synchronous and asynchronous lines. For a reliable data transmission, different types of cables are used with these protocols. Synchronous protocols are reliable than asynchronous protocols and they are generally used in networks.

IPv4 Addressing

IPv4 addresses are defined as identifiers at the IP layer of TCP/IP model. IPv4 addresses are 32 bit unique addresses provided to the devices such as computers. They define how they are connected to the internet. IP addresses are notified using dotted decimal notations which are a method to represent binary conversions to decimal. They are based on a standard header that consists of fields including flow control and error control. IPv4 addresses are partitioned in five classes for expansion of network. They can be further subnetted for efficient utilization of addresses.

VLANs

VLAN is a concept to combine number of devices to different LANs. All the devices in the different VLANs act as an individual network and communicate with the other VLANs via router or switch. Creating a VLAN creates a different broadcast domain and it helps to decrease the traffic congestion. This concept is a very useful invention for network administrators that help them to maintain the network very easily and securely.

Routing Information Protocol

RIP is a distance vector routing protocol that is a type of dynamic routing protocol. It uses the hop count methodology that calculates the shortest path from source to destination. There are three versions of RIP : RIPv1, RIPv2, RIPng. Generally , protocol sends an information of route to the connected neighboring devices and updates the routing table in the case of any change.

Outline

The material in this report is organized into 9 chapters. The chapters deal with the following:

Chapter 2…. Serial Connections

Chapter 3…. IPv4 Addressing

Chapter 4…. VLANs / Ethernet Networks

Chapter 5…. Routing Information Protocol

Chapter 6…. Methodology

Chapter 7…. Configuration

Chapter 8…. Laboratory Experiments and Results

Chapter 9…. Conclusion and Recommendations

CHAPTER

2

SERIAL CONNECTIONS

SERIAL CONNECTIONS

Serial communication is a process that transmits a bit sequentially and at a time. Serial connection is a technique that makes connection between two routers. These connections are used in many WANs. Another, they are required in ATM, ISDN, X.25, Frame Relay also. Serial connections can be established mainly in two ways: Synchronous and Asynchronous Lines. The following chapter explains about types serial cables. It also describes how serial communication occurs by the means of synchronous and asynchronous lines.

Serial Cables

Straight through cable

1 2 3 4 5 6 7 8

Pin 2

1 2 3 4 5 6 7 8

1 1

2 2

3 3

4 4

5 5

6 6

7 7

8 8

Pin Layout

Pin 1

Figure 2. Straight Through Cable Pin Layout

Above figure shows the pin diagram of a straight through cable. In this kind of cable, 8 pins exist on the both sides of cable and each pin is connected to the same colored pin. Straight through cables are used to connect different types of devices.

Usually these cables are used:

Between a hub and a router

Between a switch and a computer

Between a hub and a switch or LAN port

Crossover cable

1 2 3 4 5 6 7 8

Pin 1

1 2 3 4 5 6 7 8

Pin 2

1 1

2 2

3 3

4 4

5 5

6 6

7 7

8 8

Pin Layout

Figure 2. Cross Over Cable Pin Layout

Crossover cables are similar to the straight through cables except they have crisscross pin structure. As shown in figure, the Tx and Rx pins are crossed in this cable. These pin structure allows same devices to communicate with each other. So, we can connect two computers, routers, switches or hubs using crossover cables.

Crossover cable

Rollover cables have opposite pin arrangements on both sides. They are also called Yost cables or Cisco console cables. They are usually used to connect a PC with router’s console port.

Serial connections can be used for two types of communication protocols: Synchronous and Asynchronous communications.

1 1

2 2

3 3

4 4

5 5

6 6

7 7

8 8

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Pin 1

Pin Layout

Pin 2

Figure 2. Rollover Cable Pin Layout

2.2 Synchronous Lines

Synchronous lines or communication is a very common transmission mode used in serial communication. This method of communication uses clock synchronization. So, sender and receiver must synchronize each other before data transfer. DB-60 V.35 cable is generally used as a synchronous interface, in which one end is DB -60 connector and other end is Winchester type connector. Figure below shows a DB -60 V.35 connector.

H:\INWK6111\Term Papers & Report\Harsh Term Papers\v.35.jpg

Figure 2. DB – 60 V.35 Connector (RouterWholesale)

Synchronous communication protocols are analogous to the parameters of OSI reference model layers.

2.2.1 Physical layer parameters

All WAN connections are made between DTE and DCE. DTE is usually equipped at customer side and DCE at network side. This layer deals with some basic configurations like clock rate and bandwidth. It is also used to define encoding schemes like NRZ and NRZ-I.

2.2.2 Data Link layer parameters

These parameters are mainly used for encapsulation of synchronous protocols. PPP, HDLC, SDLC, LAPB are examples of data link protocols.

2.2.3 Network layer parameters

Network layer parameters are used to assign IP address to the router for reliable routing. Though IP addressing is not mandatory in synchronous communications, it is a good practice to configure IP address to each interface within a complex network.

Asynchronous Lines

Asynchronous communication is not so much used in modern network. It is used for some specific connections. The most common use of asynchronous communication is to connect a printer to a PC via an EIA/TIA – 232 cables, a PC connected to Cisco router console port using a special Cisco octal cable and a PC connected to internet via dial up connection. An EIA/TIA – 232 cable and Cisco octal cable are shown below.

H:\INWK6111\Term Papers & Report\Harsh Term Papers\EIA TIA-232.jpg

Figure 2. EIA / TIA 232 cable (ComputerCableStore)

H:\INWK6111\Term Papers & Report\Harsh Term Papers\cisco octal cable.jpg

Figure 2. Cisco Octal Cable (13Fe1)

As an example of asynchronous communication, auxiliary ports of the routers are connected to the terminal servers in the laboratory. We can use these ports to configure IP address between each router and terminal server.

Summary

To summarize, this chapter cites at the cable connectors and serial communication protocols. All cable connectors are pictured with pin layouts. It also shows how serial connections are being used with OSI reference model.

CHAPTER

3

IPv4 ADDRESSING

IPv4 ADDRESSING

IPv4 (Internet Protocol version 4) is the fourth version of IP deployment. IPv4 uses 32 bits addressing and provides 232 addresses. IPv4 addressing can be represented using dotted decimal notation. At present IPv4 addresses are exhausted and as a solution IPv6 addressing has been introduced. This chapter talks about binary to decimal conversions, and IPv4 classes.

3.1 Binary Operations

As discussed earlier, IPv4 addressing uses dotted decimal notation. Each decimal number represents an octet (8 bits). In a binary system, a bit is represents power of two like 2n, 2n-1 ,…., 20. The left most bit of a binary number is called MSB that has the highest value. The right most bit is called LSB that has the lowest value. An example of binary to decimal is shown below.

115.16.192.10 - 01110011 00010000 11000000 00001010

IP Address in MSB LSB Binary value Octet

Decimal of 192

(27+26=128+64)

Figure 3. Example Of Dotted Decimal Notation

3.2 Network Classes

IP addresses are classified into five classes for easy administration. An IP classification is shown in the figure below. All the classes have their unique address range depending upon the MSB pattern used in determination of the classes.

Figure 3. IPv4 Network Classes (Blackboard - Dalhousie University)

Each class has network bits and host bits that defines the range of network portion and host components of the addresses of that particular class. Out of this range 2N -2 addresses can be useful because the first network ID and the last broadcast address cannot be used.

3.2.1 Class A Network

Class A network range represents 7 network bits and 24 host bits. The valid range of this class is 1 to 126. Starting from 1.0.0.0 to 126.255.255.255 IP Addresses fall into class A. There are 27 = 128 networks in this class. Total number of IP addresses per network is 224. Address 127.0.0.0 is used as a loopback address for testing, so it is not included in class A.

3.2.2 Class B Network

Class B range has 14 network bits and 16 host bits. Its valid address range starts from 128 to 191. So the range of IP addresses of this class is 128.0.0.0 to 191.255.255.255. Class B provides 214 = 16,384 networks having 216 = 65,536 hosts in each network.

3.2.3 Class C Network

Class C network consists of 21 network bits and 8 host bits. This class ranges from 192 to 223. So, its starting IP address is 192.0.0.0 and the last IP address is 223.255.255.255. it has 221 = 2,097,152 networks and each network has 28 = 256 host addresses.

3.2.4 Class D Network

Class D is not used as a regular IP addressing. It is used for multicast addresses. Its range is from 224 to 239. So, its address range starts from 224.0.0.0 to 239.255.255.255.

3.2.5 Class E Network

Class E reserved for future research purposes. It ranges from 240 to 255. Class E IP addresses can be between 240.0.0.0 to 255.255.255.255.

Subnet Masks

Nowadays, IP addresses are very much concerned with subnet masks. In practice, a network is restricted and cannot use more than few hundred hosts. So, this concept was introduced for efficient utilization of IP address space. An IP address is partitioned in to smaller parts that can be used as a subnet. This partition extends the network bits by taking bits from host part. To get a sub network ID, a logical AND operation is operated between IP address and its subnet mask. A method of creating a subnet is explained below.

Network part

Host part

Network part

Subnet number

Host number

10000000 00010000 00110110 00001101

11111111 11111111 11111111 11111100

10000000 00010000 00110110 00001100

10000000 00010000 00110110 00001111

Network Part Host

Part

IP Address : 128.16.54.13 

Subnet Mask : 255.255.255.252 

Network ID : 128.16.54.12 

(by ANDing with Subnet Mask)

Broadcast ID : 128.16.54.15 

Variable-Length Subnet Masks (VLSM)

VLSM is an extension to the subnet mask concept. Using this concept we can include more than one subnet mask within a network, so a subnetted network can be further subnetted. For example, address 25.0.0.0/8 can be divided into 254 subnets using the mask 25.0.0.0/16. Subnet 25.16.0.0/16 can be further divided into 254 smaller subnets using the mask 25.16.0.0/24, and so on. (Blackboard - Dalhousie University). An example of useful VLSM is shown below.

Figure 3. Example Of VLSM (Blackboard - Dalhousie University)

Private IP Addresses

Private IP addresses are assigned to organizations for personal purposes. They can be used within a network without being assignment by IANA. Though, these addresses must be limited to the network and should not be appear on the internet. Following ranges are used as private IP addresses.

Class A – 10.0.0.0 to 10.255.255.255

Class B – 172.16.0.0 to 171.31.255.255

Class C – 192.168.0.0 to 192.168.255.255

Summary

This chapter gives a broad idea of binary operations being used for binary to decimal conversions. It also explains Classful addressing of IPv4. It cites at the concepts of subnetting and VLSM.

CHAPTER

4

VLANs / ETHERNET NETWORKS

VLANs / ETHERNET NETWORKS

This chapter includes uses and advantages of VLANs. It also introduces the Cisco VTP technology.

4.1 VLANs

VLAN is a concept of partitioning a network into multiple broadcast domains. This facility can be achieved in switches and router. Some general switches may not support this concept.

CONCEPTS OF VLAN:

VLANs are created by network administrator for ease of management. Basically VLANs are not configured in a switch, all the ports of switch lies in the default VLAN. By configuring another VLAN, the administrator creates the second VLAN in addition to the default VLAN. The default VLAN has generally ID 1. Nowadays, this concept is being utilized by ISPs very broadly. By using VLANs, they can control traffic very easily and can react to the traffic flow at instant. An example of our laboratory switch is shown below. It has four VLANs including default VLAN. As per the requirements of laboratory experiments, ports of different routers are configured in different VLANs.

Figure 4. VLANs (Mir, 2013)

Cisco VTP

On Cisco Devices, VTP maintains VLAN configuration consistency across the entire network (Virtual LAN) . VTP uses a mapping scheme that allows VLAN to be trunked over media. It monitors and tracks VLANs very accurately and reports if new VLANs are added to the network. Apart from this advantages, it is has a disadvantage related to Spanning Tree Protocols.

ADVANTAGES OF VLANs

VLANs have some advantages over simple LANs those enhances its popularity.

Performance: VLANs discard unnecessary packets if network traffic increases, that enhances performance of the network.

Ease of Administration: Administrator can add users without changing any configurations.

Cost Effective: Each VLAN provides its own broadcast domain that can work as an individual router. That reduces the needs of more routers.

Ethernet Networks

Ethernet networks are a part of computer networks developed for LANs. It is designed by IEEE 802.3 standards. Ethernet standards are designed as they can be compatible and used for wiring and cabling of physical layer of OSI reference model. Ethernet uses a known CSMA/CD protocol. Ethernet protocols are easy to understand and implement.

Its standard includes predefined frames.

4.2.1 Ethernet Frames

Ethernet frames generally consists 64 to 1518 octets in length. It includes source and destination addresses with preamble and CRC fields. This network uses a bus topology. A standard Ethernet frame is sown below.

Preamble

Source Address

Destination Address

Frame Type

Frame Data

CRC

8 octets

6 octets

6 octets

2 octets

64 – 1518 octets

4 octets

Figure 4. Ethernet Frame

Preamble is used for assign priorities to frames. Next two are source and destination address fields. Frame type describes type of frame. Data field length varies depending upon the size of data. CRC field is used for error detection.

4.2.2 OSI layers

Two OSI reference model layers are based on Ethernet networks. Physical layer and MAC sub layer of the Network access layer.

Physical Layer

Physical layer defines the actual transmission of data by the means of physical medium in Ethernet. This medium can be a co – axial cable or a twisted cable. Physical layer takes data from the upper layer and transmit it to the destination. Ethernet was introduced with the bus topology but now it uses star topology as each of the node in the topology connects to a central device.

Data Link Layer

This layer is divided into two sub layers: LLC and MAC. MAC layer receives data from the upper layer and transmits it to the physical layer of the OSI model. In between it provides functions like addressing, error control and flow control. Each device is provided a unique MAC address by its manufacturer that is known as physical address.

CSMA/CD

CSMA/CD is a collision control methodology for MAC layer. CSMA/CD as the name implies allows the traffic to flow if the network is free. But in the case of collisions, it restricts each device to transmit until the traffic releases. This is called carrier sense.

4.3 Summary

To summarize, this chapter illustrates creation of VLANs. It tells how VLANs have ease the network management. Ethernet network section describes the format of Ethernet frames and shows how they are analogous to OSI reference model.

CHAPTER

5

ROUTING INFORMATION PROTOCOL

ROUTING INFORMATION PROTOCOL

This chapter describes the routing protocols being used in the network. It is possible that data transmission occurs between two different VLANs. In this case, there must be a protocol that initiates and manages the data transfer. Routing Information Protocol fulfills this need for a reliable communication.

Routing Types

Router needs to follow a path during routing a packet from source to destination.

Destination address

Possible paths to destination

Neighboring routers and nodes

Shortest route

Maintaining routing table

For this, router uses two types of routing: Static and Dynamic

Static Routing

In static routing, the routing is predefined. It is a responsibility of network administrator to decide destination, route hops and route paths. The route remains the same until the network administrator makes any change in the route or routing table. The advantage of static routing is there is no overhead on CPU router. Another, the use of bandwidth between two nodes is negligible. It is a secure routing because the change in routing table occurs only when network administrator make changes. Though, it is not so easy to maintain routing tables. The network administrator needs to sincerely study the network and should be able to update the routing table as and when it needs. Otherwise , it will be too tough to control the network. So, static routing is not suggested for large networks.

Dynamic Routing

Dynamic routing establishes at the initialization of routing. It automatically updates the routing table in the case of change of route. When a change occurs in a network, router recalculates the path and distance between nodes and according to the best route updates the table. In order to communicate with each other, routers need to follow some rules. The major advantage of dynamic routing is that there is no need of network administrator. But at the same time it generates many overheads between hops.

Routing Protocol Types

Figure 5. Routing Protocols Classification

The above hierarchy shows classification of routing protocols. It is divided into two main groups:

5.2.1 Interior Gateway Protocol:

It is used in the network that have same administrative domain. Two types of protocols fall under this category. Distance vector protocols and Link state protocols. Routing Information Protocol is a type of distance vector protocol (Wikipedia). IGRP and EIGRP are also examples of distance vector protocol. Link state protocol can be divided in two types: OSPF and IS – IS.

5.2.2 Exterior Gateway Protocol:

EGP is used for different administrative domains. The only example of EGP is Border Gateway Protocol. BGP is also called path vector protocol in contrast to distance vector protocol (Wikipedia).

Routing Information Protocol:

As discussed earlier, RIP is a distance vector routing protocol (Wikipedia). RIP uses hop counts to define the most appropriate route, but it has maximum allowable hops are 15. So, 16th hop is unreachable (Lammle, 2007). RIP uses four types of timers to maintain its performance.

Route Update Timer : It provides interval of 30 seconds between which router sends routing table information to all neighbors.

Route Invalid Timer : It is typically 180 seconds. It is a time period that lays to conclusion of the route and the route becomes invalid. After this time period, router sends updates and informs neighboring nodes that the former path was invalid.

Holddown Timer : This timer sets when an update packet is received. At that time router goes to holddown state . After reception of an update , router gets back to the original route. By default, holddown time is 180 seconds.

Route Flush Timer: This timer is set when a route becomes invalid and router removes that route from the routing table and updates the table. Router informs the neighboring nodes about the conclusion of the invalid route. This timer is generally 240 seconds. That is an enough time to inform the neighbors and to update routing table.

5.3.1 RIP version 1:

RIP version 1 is an example of classful routing. So, subnetting cannot be done in this version. All the devices uses the same subnet mask. Some disadvantages of this version are that it does not support VLSM and does not provide any kind of authentication. Due to this pitfalls RIP version 2 was introduced.

5.3.2 RIP version 2:

This version of RIP supports uses classless routing. In contrast to version 1, it can carry the subnet information. RIPv2 multicasts the routing table using IP address 224.0.0.9. This multicasting utilizes the bandwidth. RIPv2 also supports VLSM so that we can create subnets of subnets. We are using RIPv2 in our laboratory.

5.3.3 RIPng:

RIPng is the advanced version of RIPv2. It is introduced to support RIP to IPv6. This version does not support authentication.

Summary

So, this chapter discusses types of routing. It displays the levels of routing protocols. It also gives a broad idea on all versions of RIP.

CHAPTER

6

METHODOLOGY

METHODOLOGY

This chapter talks about the methodologies using which we can easily configure routers for various purposes. First of all we will take a look at subnetting. It will show how a network can be partitioned to enhance efficiency. Another, it will explain the concept of VLSM. Next, we will see how VLANs are created and how routing occurs between networks.

Subnet Masks

A network consists of large number of host IDs and all of them cannot accommodate practically (Blackboard - Dalhousie University). So, to utilize these large addresses, they are partitioned into smaller networks. This methodology is called subnetting. The below given steps are used for accurate subnetting.

Find out the network part and host part in the given IP address.

Network ID can be found by logical ANDing of network part and subnet mask.

Broadcast can be counted by replacing all bits of host part to 1’s keeping the network part as it is.

VLSM

VLSM is an extension of the subnet mask concept (Blackboard - Dalhousie University). This concept is useful when we want too smaller networks. General subnet mask scheme wastes many addresses when it is being used in large network. The below example shows how subnetworks of a subnetwork can be created using VLSM.

Figure 6. VLSM

Creation Of VLAN

To crate VLANs in a switch or a router following steps should be followed.

First of all, already configured VLANs are checked and unnecessary VLANs are removed.

Then VLAN names and numbers are given.

As per the requirements numbers of ports are assigned to different VLANs.

Confirm that all VLANs are partitioned as per need.

Routing Between Networks

To route the packets between networks, VLANs are created as per network diagram. RIP protocol is used for routing.

6.4.1 Routing using Dynamic RIP

Assign IP addresses to all interfaced devices.

Confirm that all physical links are up.

Enable RIPv2 to all applicable routers.

Advertise all directly connected networks to the switch.

Disable automatic summarization.

Confirm that all segments are reaching to their destination.

Routing using Static RIP

Assign IP addresses to all interfaced devices.

Confirm that all physical links are up.

Enable RIPv2 to all applicable routers.

Advertise all directly connected networks to the switch.

Define a static route and re-route traffic to that path.

Disable automatic summarization.

Confirm that all segments are reaching to their destination.

Summary

To summarize, by following above steps and executing appropriate commands we can configure the routers and switches.

CHAPTER

7

CONFIGURATION

CONFIGURATION

This chapter discusses the step by step configuration of routers and switches for various methodologies described above. Configuration part explains the steps we can use in practice.

7.1 Creation Of A Network

The following figure shows the topology of the network containing 4 routers and connecting those routers via switch1 and hence creating three VLANs using the commands mentioned below the figure.

Figure 7. VLAN Topology

Assigning IP Address

Router>enable

Router# configure terminal

Router (config)# hostname 3R3

3R3 (config)# interface FastEthernet 0/2

3R3 (config-if)# ip address 192.168.3.2 255.255.255.0

3R3 (config-if)#no shut

3R3(config-if)#exit

3R3(config)#exit

3R3#show ip interface in brief

Execution of these commands will set IP address 192.168.3.2 to the Fastethernet port 1/1 of Router 3. Similarly we can assign the IP addresses to Router 2, Router 3and Router 4.

3R3#ping 192.168.4.0

We can use the above command to check the connectivity of Router 3 to Router 4. By pinging to other router’s IP addresses, we will be able to check connectivity with the other routers also.

Now, to configure VLANs we need to create VLANs through switch1 and then configuring them in almost the same way as routers.

Creating VLANs

For creation of VLANs, we will configure ports of a switch and segment its ports to different VLANs.

Switch>enable

Switch# configure terminal

Switch (config)# vlan 3

Switch (config)# name C

The above command gives name and number to the VLAN to be created and we can verify it using show vlan brief command.

Switch (config)# hostname 3S1

3S1 (config)# interface GigabitEthernet 0/9

3S1 (config-if)# switchport mode access

3S1 (config-if)# switchport access vlan 3

3S1 (config-if)#no shut

3S1(config-if)#exit

3S1(config)#exit

3S1#show vlan brief

This will configure the Gigabitethernet port number 0/9 of switch and to VLAN number 3. We can assign other ports of switches to different VLANs as per network diagram. Each of these connections can be tested using the ping command.

7.2 Routing Between Networks

7.2.1 Dynamic routing

C:\Users\Nihar\Desktop\Untitled.jpg

Figure 7. RIPv2 Routing

First of all we need to assign IP addresses to the router ports as shown in the above diagram. That will configure VLANs 2, 3 and 4 for switch1. After that we need to configure the following commands to establish RIPv2 protocol.

3R3(config)#router rip

3R3(config-router)#version2

3R3(config-router)#network 192.168.31.0

3R3(config-router)#no auto-summary

3R3(config)#exit

3R3#show ip protocols

3R3#show ip interface brief

3R3#debug ip rip

Above command will enable RIP through all the routers. To display the routing tables use the command show ip route is used.

7.2.2 Static Routing

In static routing , routes predefined by the network administrator . However, RIPv2 commands are necessary to route the packets through that path.

C:\Users\Nihar\Desktop\Untitled.jpg

Figure 7. Static Routing

3R3#configure terminal

3R3(config)#ip route 192.168.32.3 255.255.255.0 192.168.30.1

3R3(config)#exit

All the routers should run these commands and should check connectivity using the ping command. Also we can analyze the packets being routed to destination using analyzers like wireshark. A snapshot showing RIP response is shown below.

Figure 7. RIP Analysis

7.3 Summary

This chapter gives us details about the configuration commands used practically. Using these commands, we will be able to create VLANs and routing paths.

CHAPTER

8

LABORATORY EXPERIMENTS AND RESULTS

LABORATORY EXPERIMENTS AND RESULTS

This chapter tells the experiments we have done in the laboratory and summarizes the results we obtained by these experiments.

Creating VLANs

We can have a list of interfaces of the routers using command "do show ip interface brief". this command also gives details like assigned IP addresses of the ports and which ports are up or down. We can check connectivity between router using the command #ping <destination address>

8.2 Routing through networks

Two results from experiments on RIP are shown below.

RIP Protocol

First of all, IP addresses should be assigned to different VLANs by using above shown commands. Next, we can route through the network using the RIP protocol. Follow the commands mentioned in last chapter and by enabling RIP, packets will start routing. The results can be obtained by executing the command Router# show ip route

Static Protocol

After executing above mentioned commands for RIP and the following static routing command is used:

# ip route <destination network address><subnet mask><next hop address> - (1)

The results can be obtained by the same command # show ip route

The static routed path is shown with "S" notation.

8.3 Summary

This chapter gives final results of various establishments and how we can display the desired output by executing the commands mentioned in Chapter 7.

CHAPTER

9

CONCLUSION AND RECOMMENDATION

CONCLUSION AND RECOMMENDATIONS

Conclusion

To conclude, by performing the above mentioned experiments, we will be able to establish serial connections on synchronous as well as asynchronous communication lines. Another, we can easily understand the IPv4 addressing. By following the router commands, we can easily configure the VLANs and can path the packets using routing protocols.

Recommendations

Hence, we can route the packets in the network using two types of routing. Static and Dynamic (adaptive). Static routing can be preferred when network is reliable. In the case unreliable network devices, dynamic routing should be used.

References

(n.d.). Retrieved February 13, 2013, from http://di1-2.shoppingshadow.com/images/pi/35/5e/75/83013879-260x260-0-0_Cisco+Cisco+Cisco+Octal+Cable.jpg

Blackboard - Dalhousie University. (n.d.). Retrieved February 14, 2013, from dalhousie.blackboard.com: https://dalhousie.blackboard.com/bbcswebdav/pid-284430-dt-content-rid-1624425_1/courses/INWK6111.13W/IntroLab3.pdf

ComputerCableStore. (n.d.). Retrieved February 13, 2013, from http://www.computercablestore.com: http://www.computercablestore.com/images/products/No%20Manufacturer/CAB-SS-232MT.jpg

Lammle, T. (2007). CCNA : Cisco Certified Network Associate Study Guide (Exam 640-802) , 6th Edition. Wiley Publishing.

Mir, A. (2013, February). DALHOUSIE UNIVERSITY. Retrieved February 14, 2013, from inwk01.inwk.dal.ca: http://inwk01.inwk.dal.ca/diagrams/Switch_Port_Connection_1.pdf

RouterWholesale. (n.d.). Retrieved February 13, 2013, from http://www.routerswholesale.com/images/CAB-NPV35TV2.jpg

Virtual LAN. (n.d.). Retrieved February 14, 2013, from en.wikipedia.org: http://en.wikipedia.org/wiki/Virtual_LAN

Wikipedia. (n.d.). Retrieved February 14, 2013, from en.wikipedia.org: http://en.wikipedia.org/wiki/Routing_Information_Protocol

Wikipedia. (n.d.). Retrieved February 14, 2013, from en.wikipedia.org: http://en.wikipedia.org/wiki/Border_Gateway_Protocol



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now