The Basics Of Router

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

The report says about configuring VLAN using Ethernet Network and as physical medium of serial connectors with different types. The first section describes about serial communication and physical medium use for that. The second part says how the VLANs are configured using switches, enabling us to create Ethernet Network using Cisco routers. This part also explains how to find the physical medium, the transmission mode and the packet size used by the network through various commands.

The third section describes about subneting and allocation procedure of IPs. In fourth section it elaborates how the Routing Information Protocol works by creating VLANs and then implementing the RIP protocol version 2. The connection is checked using a simple ping command. Also two different type of routing are explained. It also describes how the Administrative Distance (AD) is used to determine the best routing algorithm for the system.

In the laboratory, Ethernet Network is created by connecting various VLANs using switch’s interfaces. Thus router in different VLAN can communicate with each other. An experiment showing the functionalities of distance vector routing is carried out by configuring the RIP version 2 protocols on the network.

The results determine both the advantages and disadvantages of using VLANs and static routing through RIP and give some interesting results.

INTRODUCTION

1. Introduction

1.1 Serial Connections

In this chapter we are going to learn types of serial connection and connectors. It also includes some characteristic comparison and use of serial connection in WAN topology. In configuration part we can see the current configuration using commands. In laboratory we can change encoding system, clock rate and bandwidth between routers. In last we can check connectivity by pinging each other.

1.2 IP and VLAN

In this topic we are going to learn concept about IP and its class. We also learn importance of assignment of IP and related networking issue. In laboratory we learn conversion of binary. We also learn about subneting technique that is most important for efficient use of given IP pool. VLSM is method that also uses subneting and can implement for small as well as giant firm.

VLAN is basically evolution in LAN topology. In this chapter we learn use of switch. Most importantly in same switch we can make different VLAN and can communicate with any of the host in network. This is widely used by WAN topology. WAN can create different network to easily identify user and also connect with each other.

1.3 Routing Protocol

Simple VLAN has some limitation like in one single VLAN user can’t connect with another VLAN. So, this leads to invention of routing protocol. This method uses various encoding and routing techniques for interconnection. Distance vector routing is basic method for routing. RIP is first of this kind having many versions. Recently, RIPv2 is in use. IN laboratory we can easily implement and understand this protocol in brief.

1.4 Outline

The material in this report is organised into 9 chapters. The chapters deal with the following topics:

Chapter 2..... Serial Connection

Chapter 3..... IPv4 Addressing

Chapter 4..... VLAN and Ethernet Networks

Chapter 5..... RIP

Chapter 6..... Methodology

Chapter 7….Configuration

Chapter 8..... Experiments and Results

Chapter 9..... Discusses the results of all experiments and draws conclusions. The chapter also provides some recommendations and suggestions for any future work.

2. SERIAL CONNECTIONS

2. Serial Connection

2.1 Introduction

This chapter describes and elaborate use of serial connection with router. It also gives information about which type of port and interfaces are used to connect router with other router, switch or computer. Some topologies like leased lines, frame relay, ISDN or X.25 are using serial connection for network establishment.

2.2 Synchronous Line and Connection

In this type of connection both transmitter and receiver have to synchronize or maintain the sending or receiving procedure with one common running clock. This type of connection technique is useful where more bulk of data need to be transferred very quickly (NA, Fibre Optic For Sale Co. n.d.). Here, there is no need of start and stop bits because both receiver and sender uses common clock to remain sync (N.Ganesan n.d.).

In synchronous communication the physical wire has two ports DCE and DTE. DCE can be any router or switch which act as to be configured device and DTE can be any source that have information or can configure router and switch. (Lab manual)

Figure : Crossover Cable

(wikipedia n.d.)

This type of cables is called crossover cable because both sides have crossed Tx and Rx wires. It has wide application like used to communicate with two computers or computer to router. Further this cable has sub-categories like CAT1, CAT2 and more. The main difference between them is speed and type of material used. Currently, CAT 6 is in use.

Figure : V.35 Cable

(NA, Mc3llc n.d.)

Both sides have different port. One side is only compatible with ‘Computer’ and other one with ‘Router’. Here DTE is always connected to source of data or data sink device. DCE is connected to router or modem.

2.3 Asynchronous Line and Connection

In asynchronous communication sender and receiver are not sync with clock. They used to communicate using start and stop bits so both of them can transfer data effectively (NA n.d.). This scheme uses different encoding techniques to communicate but condition is that both transmitter and receiver use same technique. Here receiver has to maintain the clock to receive data correctly. And it has to decide which one is start and stop bit (InetDemon n.d.).

2.3.1 Different encoding system used by Asynchronous Communication

NRZ-L

NRZI

Manchester

Differential Manchester

Bi-Polar

Pseudo ternary

Figure : Frame use in Asynchronous

(wikipedia n.d.)

In this frame initially line is in idle mode than one start bit indicates that now frame will start. After all 8-bit get transferred one stop bit says now this is end of the frame. And so on it continuous transfers the frames in physical medium.

2.3.2 Encoding systems are used for asynchronous communication because

It gives security. As only transmitter and receiver can understand where to start and stop.

It maintain quality of signal

Figure : EIA/TIA-232 cable

( (NA, Computer Cable Store n.d.)

2.4 Asynchronous v/s Synchronous

Asynchronous

Synchronous

Advantage

Simple

Cheaper

Faster set-up than any other

Disadvantage

Many overhead that lead to less thought put

Advantage

Lower overhead

Fast for small distance

Disadvantage

More complex than asynchronous

Hardware is cheaper

2.5 Summary

From this chapter we learn about the type of communication system with their physical connector. Difference of asynchronous and synchronous can tell us which one is better for our needed communication.

3. IPv4 ADDRESSING

3. IPv4 Addressing

3.1 Introduction

In this chapter we will see classification of IPv4, header, architecture, subneting, concept of VLSM and widely use of this protocol. It also includes need for IPv6.

First of all we will see some basic binary conversion & ANDing operation of binary values.

3.2 Binary Conversion

Figure : Binary Conversation

(Mano n.d.)

Using this binary conversation we can convert any decimal number into binary foam. In this example, 41 is decimal number that is converted into binary 101001. This conversation has further enhancement like hexadecimal, octet, etc. Hexadecimal of 41 is 0100 0001.

3.3 ANDing of Binary Numbers

Figure : And Operation

(Mano n.d.)

This technique can use to find network subnet mask from given IP address. If one of the two inputs is low or ‘0’ than output will be low or ‘0’else both inputs are ‘1’ than output will be ‘1’.

3.4 IPv4 Classification (Internetworking, LAB_3 2013)

Basically IPv4 is 32-bit binary address that can accommodate 232 unique addresses. In this it categorise with its use and application. It can represent in different numbering systems like in dotted decimal 192.168.1.1, dotted binary 11000000.10100000.00000001.00000001 and decimal 3221226219.

There are five main class of IPv4

Class A

Class B

Class C

Class D

Class E

This all has own IP span. Each has its own capacity of host and network.

3.4.1 Class A

Range of 0.0.0.0 to 127.255.255.255

Network mask is 255.0.0.0

127.0.0.0 is used for loopback checking

0.0.0.0 is used for default path

27 networks and 224 hosts

3.4.2 Class B

Range 128.0.0.0 to 191.255.255.255

Network mask is 255.255.0.0

214 networks and 216 hosts

3.4.3 Class C

Range 192.0.0.0 to 223.255.255.255

Network mask is 255.255.255.0

221 networks and 28 hosts

3.4.4 Class D

Range 224.0.0.0 to 239.255.255.255

Don’t have any network mask

Use for Multicasting

Multicast is service that use to send data to particular group of receiver. This technology reduces the size of frame and utilizes the channel with less time. For ex, we want to send data to eight encoders connected with network to do same function with same data. We can give them IP from class D. So, when data comes we can direct that using single IP to 8 encoder.

3.4.5 Class E

Retain for future use and also used for research and development purpose.

3.5 IPv4 Header (Wikipedia_Ipv4 n.d.)

Figure : Header of IPv4

(Wikipedia n.d.)

Version: This field indicate the version of IP used (here 4.)

IHL: This field gives the size of IP header. It is variable in length of 20 to 60 bytes.

DSCP: This defines the type of service.

ECN: Use for end-to-end notification and optional for use.

Total Length: This defines the size of entire packet varied from 20 to 65535 bytes.

Identification: Use for packet tracing.

Flags: Identify the fragment.

Fragment Offset: define the particular offset byte.

Time to Live: to limits datagram lifetime.

Protocols: Defines protocol used.

Header checksum: use for error-checking.

Source Address: Define the address of origin of frame

Destination Address: Contain where packet have to reach

3.6 Subnetting (Cisco n.d.) (Wiki_subneting n.d.)

Figure : Subnetting

(Forouzan n.d.)

Subnetting is mainly used to reduce traffic and efficient use of bits available to host and network. In this technique it takes host bits and put that on network part. This leads to further classification of network. This way we can make efficient use of given IP pool. This also helps when we work with a specific group of people that work differently but under same class. For ex, we need 30 addresses for one laboratory. So, if given class is class c than it has 28-2 = 254 IPs available. If we allocate all these IP than it is waste of them. We want only 5-bits for host (as equation 2n-2; n is no. of host bits) 25-2=30. We give remaining three bit to network so it can use other IPs for another lab or other purpose.

Concept of broadcasting is use to broadcast data or message to particular class. We can effectively use this scheme with subneting. Here after doing subneting that subnet part has its last address as broadcast one. So, if we want to give common information as an example given all 30 IPs we can do that by simply giving data to their broadcast IP.

3.7 VLSM

This can be easily explained by example. An IP with 8-bit as network bit can be divide into 254 subnet and has 16 bit as network. This can further classified with 254 subnets and has 24 bits as network part. Efficient use of this method can be understood by example of huge university. One IP with 8 network bit is given to the university. It can take 8 bit from host and do subneting and allocate that all among their departments like different faculty, management, students, libraries, etc. Now this individual has their own network and hosts so, they can further do subneting by allocate this new subneted IP to their department. This way we can utilize the work and IPs very well than allocating IPs randomly or in sequence. (Internetworking, LAB_3 2013)

Figure : VLSM

( (Internetworking, LAB_3 2013))

3.8 Why we need new version of IP?

IPv4 has been reached to its maximum limit and can’t be further subneted. To overcome this exhaustion IETF develop IPv6.

3.9 Summary

From this chapter we can understand the use of binary conversion with ANDing operation. We can understand the concept of subnetting with VLSM for effective utilization of IP pool.

4. VLAN & ETHERNET NETWORK

4. VLAN & Ethernet Network

4.1 Introduction

In this chapter we are going to understand VLAN & Ethernet Network and connection of it. VLAN is evolution in LAN technology and use for small area like offices.

4.2 VLAN

VLAN allowed network to create a group of people that have independent network. (Jain n.d.)

Figure : VLAN

(Jain n.d.)

Virtual LAN is advancement of LAN with new functions. In the figure shown above, we can see from logical view that the group of people related to marketing engineering and manufacturing is divided in to small LAN and that LAN is connected to router. This method is very useful when big firm or organization work together in single router. So, each of the individual is connected to same department as well as internet and other department.

This technology use broadcast filtering, security, address summarization, and traffic-flow management. One can control traffic patterns and react quickly to relocations. VLAN can useful to change configuration of whole network and also simplified administration that leads to flexibility (Wikipedia_vlan n.d.).

4.2.1 Advantage of VLAN (W.lilakiatsakun n.d.)

Security: Individual group is separated with other in whole network this can make confidential data.

Cost Reduction: More effective use of available resources

Higher performance: Less unnecessary traffic and high data rate.

4.3 Ethernet Network

It is LAN technology and known as IEEE 802.3.It is easy to implement and use CSMA/CD as protocol. Here both PCs connect with transceiver medium. Ethernet frame is used to set control parameter on the physical medium

4.3.1 Ethernet Frame

Figure : Frame Format

(Wikipedia_ethernet_frame n.d.)

4.3.2 CSMA/CD

It is protocol used by Ethernet network. It is abbreviation of Carrier Sense Multiple Access with Collision Detection. In this technique sender listen to receiver for ongoing or pending transmission. This will simplify by below given flow chart

Figure : Flow Chart for CSMA/CD

(Wikipedia_ethernetframe n.d.)

As the data from user to be sent comes that assemble in frame by giving address. On first attempt, first check for line is it free or not? If someone is transmitting of line in use than it goes back and wait for channel to set free. As it get channel it start transmitting. Now in next step it looks for collision if no collision occur than it finish the transmutation else after get recovered form collision it start from scratch.

4.4 Summary

From this topic we can understand use of VLAN and Ethernet Network. It also tells some usable advantage of VLAN like security. The flow chart also tells working of Ethernet frame and transmission of data.

5. RIP

5. RIP

5.1 Introduction

Basically need of routing protocol is in group of VLAN all router or computer can communicate with same VLAN. There is no other way to communicate with other VLAN’s element. This chapter also includes types of routing and version of RIP.

RIP is based on distance vector routing protocol. It designs for smaller group of LAN. RIP uses hop count to routing metric and also limit this count by 15. It uses split horizon, route poisoning and holddown to restrict bad information to be sent. RIP is more compatible with star topology. In this protocol new vector routing path updated for every node after 30 seconds. RIP has different version available and recently version 2 in in use. (Alliedtelesin n.d.)

5.2 Routing Protocols

This is method that use for router to communicate with other router. Protocols determine the path in network. First origin router communicates with neighbour router about rote and so on.

5.2.1 Classification of Protocol

This scheme has major three classifications:

IGP (Interior Gateway Protocol): It use with autonomous system to exchange information among the router in network. It can also resolve the route within system. It divides in two sub categories: Distance Vector Routing Protocol and Link-state Routing Protocol.

EGP(Exterior Gateway Protocol): It use to communicate with different domain

Figure : Dynamic Routing Hierarchy

(Tekkom n.d.)

5.3 Administrative Distance

Administrative Distance is a value used by routers which is used to determine the best route to a destination when there are two or more routes available to the same destination by two different routing protocols. The range of Administrative distance is from 0 to 255 and it determines the most reliable up to the least reliable route i.e. 0 to 255.

5.4 Version

5.4.1 RIPv1: It is classful and does not update subnet mask with routing table. It broadcast on IP 255.255.255.255.

5.4.2 RIPv2: It is classless and have varied subnet mask. Other enhancements offered by RIPv2 include:

• Routing updates are sent via multicast, using address 224.0.0.9

• Encrypted authentication can be configured between RIPv2 routers

• Route tagging is supported (Balchunas n.d.)

5.4.3 RIPng: It is next generation protocol and used for IPv6.

5.4.4 Difference between RIPv1 and RIPv2

RIPv1

RIPv2

Similarity

Distance Vector Routing

Hop count 15

Difference

Based on broadcast

VLSM not supported

No authentication

Distance Vector Routing

Hop count 15

Based on multicast

VLSM supported

MD5 authentication

5.5 Distance Vector Routing

Distance vector routing is major class of routing protocol that use different algorithm to find destination. This will do by router and after fixed period of time every neighbour node sends others updated distance path. This algorithm works on distance from destination. (Wikipedia_DVR n.d.)

5.6 Types of Routing

5.6.1 Static Routing

This is one way to setup the connection in network and this done by network administrator manually. The packet will always follow the same path as configured in router. (Internetworking, RIP 2013)

5.6.2 Dynamic Routing

This routing scheme has capability that each router can decide about sending packet ahead. This has more complexity in algorithm but very efficient way. (Internetworking, RIP 2013)

5.7 RIP Timers

In RIP default time of updating is 30 second. We can change this time with command.

Update Timer

Invalid Timer

Holddown Timer

Route flush Timer

5.8 Summary

In this chapter we learn use of basic routing technique and working of RIP and its timers.

6. Methodology

6. Methodology

6.1 IP Addressing

To find network part from given IP, we have to do AND operation with its network mask. This gives the network IP.

For example, IP: 126.26.67.11/21

126. 26. 67.11

AND

255.255.248.0

=

126. 26. 64.0

01111110. 00011010. 01000100. 00001011

AND

11111111. 11111111. 11111000. 00000000

=

01111110. 00011010. 01000000. 00000000

Here we get 126.26.64.0 is network part of given IP.

6.2 SUBNETING

As we learn subneting in IPv4 Addressing. Let’s take an example IP: 201.212.10.40/24

We can see this IP is belonging to class C. Now we want 32 subnets. So, we have to do 29-bit subnetting in order to get 32 subnets (32=25; so, we have to give 5-bits from host to network).So, AND 201.212.10.40 with 29-bit subnet mask of 255.255.248.0.

For example, 201.212.10.40 Ì· 29

1 1 0 0 1 0 0 1 . 1 1 0 1 0 1 0 0 . 0 0 0 0 1 1 0 0 . 0 0 1 0 1 0 0 0

AND 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 1 1 1 1 1 1 . 1 1 1 1 1 0 0 0

1 1 0 0 1 0 0 1 . 1 1 0 1 0 1 0 0 . 0 0 0 0 1 1 0 0 . 0 0 1 0 1 0 0 0

(Network ID: 201.212.10.40)

This 201.212.10.40 is first subnet so s1=201.212.10.40

For next subnet difference will be calculated like we take 5 bit from last span so total 256-248=8.

So, s2=201.210.10.48 and so on.

In one subnet host bit are 3. So, total 23-2=6 host. For s1 (201.212.10.40) default gateway is 201.212.10.40 and broadcast address is 201.212.10.47.

6.3 VLSM

We can make subneting tree using VLSM.

Figure : VLSM for 10.64.0.0/10

For ex,

In this example, 10.64.0.0/10 has three different network each uses only 2 IPs. So, it would subneting by 30-bit VLSM. Thus we can utilize given IP.

6.4 VLAN

To make VLAN first of all we have to configure switch as connection medium.

Figure : VLAN Connection Logical Diagram

(Dal 2013)

Figure : VLAN Connection Physical Diagram

(Dal 2013)

At switch

Erase and reload configuration

Make 4 VLAN and give them name

Distribute all gigabit Ethernet among all VLAN

At router (here, router is worked as host)

Configure all fast Ethernet and serial port

Allocate IP address

Ping another host in same VLAN

6.5 RIP

To run RIP on network following steps would be followed

First configure switch for all VLAN and allocate Gigabit Ethernet among them.

Allocate IPs to all routers’ serial and Fast Ethernet port.

Check for connectivity in same VLAN

Configure RIP protocol in all router

To do efficient use disable summary

In our lab using ‘Wire shark’ software we can debug all the connectivity and communication in network. This mechanism is fulfilling by hardware called sniffer.

6.6 Summary

This chapter gives all practical steps and information that done in laboratory. This includes subnetting and configuration of RIP. This also helps to configure VLAN and simultaneously use router as host.

7. CONFIGURATION

7. Configuration

7.1 Name the router

PRy; P=pod no., y=router no.

Here, 7R4 stands for pod 7 router 4.

7.2 Mode of Router

Router can use in two mode

7.2.1 Privilege Mode: to active this

7R4>enable

7R4#

# is sign that indicate it’s in privilege mode

7.2.2 Configuration Mode:

7R4#config t

7R4(config)#

7.3 VLAN

Figure : VLAN

7R4>enable

7R4# configure terminal

7R4(config)# hostname 5R1

7R4(config)# interface GigabitEthernet 0/2

7R4(config-if)# IP address 192.168.4.2 255.255.255.0

7R4(config-if)#no shut

7R4(config-if)#exit

7R4(config)#exit

7R4#show IP interface in brief

Do this for all routers.

Now configure switch.

7S1>enable

7S1#config t

7S1(config)#vlan 4

7S1(config)#name D

7S1(config) #int range g0/13-16

7S1(config-if-range) #switchport mode access

7S1(config-if-range) #switchport access vlan 4

Do this for other VLAN. This can give authority to other VLAN use port that set to VLAN 1 as default.

Now ping other router in same VLAN.

7S1# ping 192.168.4.1

7.4 RIP

Do same as VLAN to configure below given network

C:\Users\Nihar\Desktop\Untitled.jpg

Figure : RIP Configuration

7R4>enable

7R4# configure terminal

7R4(config)# hostname 5R1

7R4(config)# interface GigabitEthernet 0/2

7R4(config-if)# IP address 192.168.4.2 255.255.255.0

7R4(config-if)#no shut

7R4(config-if)#exit

7R4(config)#exit

7R4#show IP interface in brief

Do this for all routers.

Now configure switch.

7S1>enable

7S1#config t

7S1(config)#vlan 4

7S1(config)#name D

7S1(config) #int range g0/13-16

7S1(config-if-range) #switchport mode access

7S1(config-if-range) #switchport access vlan 4

In router configure RIP protocol

7R4(config)#router rIP

7R4(config-router)#version 2

7R4(config-router)#network 192.168.71.0

7R4(config-router)#network 192.168.72.0

7R4(config-router)#network 192.168.73.0

7R4(config-router)#no auto-summary

7.5 Summary

This chapter gives configuration command of previous chapter.

8. Laboratory Experiment and Results

8. Laboratory Experiment and Results

8.1 Introduction

This chapter gives output and results that done in laboratory.

8.2 VLAN

We can ping or communicate successfully with router that share same VLAN.

‘debug all’ command can show all the communication and ‘show vlan brief’ gives information of configured VLAN on network.

8.3 RIP

We can communicate with the entire router that configured either in same or different VLAN. "Wire shark" is packet tracer tool use to trace packet. After implementing RIPv2 on network all host communicate with each other successfully.

By means of static routing we can simply fixed path between all nodes. So, after this every router has to follow that predefine path. In last show IP route can show full summary of done configuration.

9. Conclusion and Recommendation

9. Conclusion and Recommendation

9.1 Conclusions

By performing the laboratory experiments we get sufficient knowledge on the addressing of routers and routing of information from one node to another. Also we gain sufficient know how of how the Ethernet works. The difference between various routing protocols is known. The basic understanding of configuration of routers and switches could be gained by creating VLANs and by routing through them using RIP protocol.

9.2 Recommendations

After the routing of packets is done we can use one of the two types of routing protocols namely static and dynamic. In networks that are small, static routing is more preferable as it incurs less overhead on the network by defining the route at start-up. In case of large networks, dynamic routing comes in handy as large routing tables need to be maintained and such a job becomes very hard for a network administrator.

REFERANCES

Alliedtelesin. n.d. http://www.alliedtelesis.co.nz/documentation/atX900/281/pdf/rIP.pdf (accessed February 14, 2013).

Balchunas, Aaron. Routeralley. n.d. http://www.routeralley.com/ra/docs/rIP.pdf (accessed February 14, 2013).

Cisco. n.d. http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a00800a67f5.shtml (accessed February 13, 2013).

CS_fsu. n.d. http://www.cs.fsu.edu/courses/netdesign/2005/lect20jan.ppt (accessed February 14, 2013).

Dal. VLAN. Halifax: Dal_internetworking, 2013.

Forouzan, Behrouz A. TCP/IP ProtocolSuite. The Mc-Graw Hills, n.d.

InetDemon. n.d. http://www.inetdaemon.com/tutorials/basic_concepts/communication/asynchronous_vs_synchronous.shtm (accessed February 13, 2013).

Internetworking, Dal. "LAB_3." Halifax, 2013.

Internetworking, Dal. RIP. Halifax: Dal, 2013.

Jain, Raj. CS. n.d. http://www.cs.wustl.edu/~jain/cis788-97/ftp/h_7vlan.pdf (accessed February 14, 2013).

Mano, Morris. Digital Logic Design. Prentice Hall, n.d.

N.Ganesan. n.d. http://www.calstatela.edu/faculty/nganesa/College%20Courses/Slide%20Download%20Pool/Communication%20Theory/Asynch%20and%20Synch%20Transmission.ppt (accessed February 13, 2013).

NA. n.d. http://www2.cs.uidaho.edu/~krings/CS420/Notes.S10/420-10-6b.pdf (accessed February 13, 2013).

—. Computer Cable Store. n.d. http://www.computercablestore.com/images/products/No%20Manufacturer/CAB-SS-232MT.jpg (accessed February 13, 2013).

—. Fibre Optic For Sale Co. n.d. http://www.fiberoptics4sale.com/wordpress/what-is-synchronous-transmission-and-asynchronous-transmission/ (accessed February 13, 2013).

—. Mc3llc. n.d. http://www.mc3llc.com/prodimages/CABSSV35MT-15_LR.jpg (accessed 02 13, 2013).

—. WikIPedia. n.d. http://en.wikIPedia.org/wiki/Serial_cable (accessed 02 13, 2013).

Tekkom. n.d. http://mars.tekkom.dk/mediawiki/images/b/b5/ScreenShot742.jpg (accessed February 14, 2013).

W.lilakiatsakun. Msit. n.d. http://www.msit2005.mut.ac.th/msit_media/2_2550/ITEC4610/Lecture/20080120120648BO.ppt (accessed 02 14, 2013).

Wiki_subneting. n.d. http://en.wikIPedia.org/wiki/Subnetwork (accessed February 13, 2013).

wikIPedia. n.d. http://upload.wikimedia.org/wikIPedia/commons/4/47/Puerto_serie_Rs232.png (accessed 02 13, 2013).

wikIPedia. n.d. http://en.wikIPedia.org/wiki/Crossover_cable (accessed February 13, 2013).

WikIPedia. n.d. http://en.wikIPedia.org/wiki/IPv4 (accessed February 13, 2013).

WikIPedia_DVR. n.d. http://en.wikIPedia.org/wiki/Distance-vector_routing_protocol (accessed February 14, 2013).

WikIPedia_en. n.d. http://en.wikIPedia.org/wiki/Ethernet_network (accessed February 14, 2013).

WikIPedia_ethernet_frame. n.d. http://en.wikIPedia.org/wiki/Ethernet_frame (accessed February 14, 2013).

WikIPedia_ethernetframe. n.d. http://en.wikIPedia.org/wiki/Ethernet_frame (accessed February 14, 2013).

WikIPedia_IPv4. n.d. http://en.wikIPedia.org/wiki/IPv4 (accessed February 13, 2013).

WikIPedia_rIP. n.d. http://en.wikIPedia.org/wiki/Routing_Information_Protocol (accessed February 14, 2013).

WikIPedia_vlan. n.d. http://en.wikIPedia.org/wiki/Virtual_LAN (accessed February 14, 2013).

BIBLOGRAPHY

Data Communications and networking, 3rd edition by Behrouz A. Forouzan., Chap. 14

Computer Networks, 4th edition by Andrew S. Tanenbaum, Chap. 4

CCNA Study Guide Ed.: 7 by Todd Lammle



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now