Professional Documents
Culture Documents
CN - Journall - 2020 - V - SEM (Exp 5-8)
CN - Journall - 2020 - V - SEM (Exp 5-8)
Grade: AA / AB / BB / BC / CC / CD /DD
This experiment enables student for identifying the class of the IP address and design
particular subnets as per user requirements.
_______________________________________________________________
Expected Outcome of Experiment:
CO:
________________________________________________________________
Books/ Journals/ Websites referred:
1. A. S. Tanenbaum, “Computer Networks”, Pearson Education, Fourth Edition
2. B. A. Forouzan, “Data Communications and Networking”, TMH, Fourth
Edition
________________________________________________________________
Pre Lab/ Prior Concepts: IP Address, Classes, Subnet concept
Additional bits can be added to the default subnet mask for a given Class to further
subnet, or break down, a network. When a bitwise logical AND operation is
performed between the subnet mask and IP address, the result defines the Subnet
Address (also called the Network Address or Network Number). There are some
restrictions on the subnet address. Node addresses of all "0"s and all "1"s are
reserved for specifying the local network (when a host does not know its network
address) and all hosts on the network (broadcast address), respectively. This also
applies to subnets. A subnet address cannot be all "0"s or all "1"s. This also implies
that a 1 bit subnet mask is not allowed. This restriction is required because older
standards enforced this restriction. Recent standards that allow use of these subnets
have superseded these standards, but many "legacy" devices do not support the
newer standards. If you are operating in a controlled environment, such as a lab, you
can safely use these restricted subnets.
In this example, the subnet 192.60.128.0 includes all the addresses from
192.60.128.0 to 192.60.131.255. In the binary representation of the subnet mask, the
Network portion of the address is 22 bits long, and the host portion is 10 bits long.
Under CIDR, the subnet mask notation is reduced to simplified shorthand. Instead of
spelling out the bits of the subnet mask, it is simply listed as the number of 1s bits
that start the mask. In the above example, instead of writing the address and subnet
mask as 192.60.128.0, Subnet Mask 255.255.252.0 .the network address would be
written simply as: 192.60.128.0/22 Which indicates starting address of the network,
and number of 1s bits (22) in the network portion of the address. Subnet mask in
binary
The use of a CIDR notated address is the same as for a Classful address. Classful
addresses can easily be written in CIDR notation as Class A = /8, Class B = /16, and
Class C = /24
To calculate the number of subnets or nodes,
n
No. of Nodes/ Subnets =2 -2
Multiplying the number of subnets by the number of nodes available per subnet gives
you the total number of nodes available for your class and subnet mask. Also, note
that although subnet masks with non-contiguous mask bits are allowed, they are not
recommended.
Example:
10001100.10110011.11011100.11001000 140.179.220.200IP Address
11111111.11111111.11100000.00000000 255.255.224.000Subnet Mask
10001100.10110011.11000000.00000000 140.179.192.000Subnet Address
10001100.10110011.11011111.11111111 40.179.223.255 Broadcast Address
1. Program starts with taking IP address from user and the number of subnets
from the user.
2. Then the calculation for subnet mask is done as specified in methodology.
3. Then with AND ing with subnet mask the subnet addresses are calculated.
CONCLUSION:
A. 14 B. 15
C. 16 D. 30
6. You need to subnet a network that has 5 subnets, each with at least 16 hosts.
Which classful subnet mask would you use?
A. 255.255.255.192 B. 255.255.255.224
C. 255.255.255.240 D. 255.255.255.248
7. You have a network that needs 29 subnets while maximizing the number of
host addresses available on each subnet. How many bits must you borrow
from the host field to provide the correct subnet mask?
A. 2 B. 3
C. 4 D. 5
Grade: AA / AB / BB / BC / CC / CD /DD
TITLE: Study Cisco Router Configuration Command using Cisco packet tracer
________________________________________________________________AIM: To
study basic Cisco Router configuration Commands
________________________________________________________________Books/
Journals/ Websites referred:
1. S. Tanenbaum, “Computer Networks”, Pearson Education, Fourth Edition
2. Forouzan, “Data Communications and Networking”, TMH, Fourth Edition
________________________________________________________________
Pre Lab/ Prior Concepts: Basics of Routing and Cisco Packet Tracer
________________________________________________________________
New Concepts to be learned: Different Modes of Operation of Cisco router
Configuration Mode:
Configuration mode has a set of submodes that you use for modifying interface settings,
routing protocol settings, line settings, and so forth. Use caution with configuration mode
because all changes you enter take effect immediately.
To enter configuration mode, enter the command configure terminal and exit by pressing
Ctrl-Z.
Note: Almost every configuration command also has a no form. In general, use the no
form to disable a feature or function. Use the command without the keyword no to re-
enable a disabled feature or to enable a feature that is disabled by default. For example,
IP routing is enabled by default. To disable IP routing, enter the no ip routing command
and enter ip routing to re-enable it.
CONCLUSION:
Grade: AA / AB / BB / BC / CC / CD /DD
TITLE: Study and configure RIP protocol using Cisco Packet tracer
________________________________________________________________AIM: To
study and configure RIP protocol using Cisco Packet tracer
________________________________________________________________
________________________________________________________________
Books/ Journals/ Websites referred:
1. A. S. Tanenbaum, “Computer Networks”, Pearson Education, Fourth Edition
2. B. A. Forouzan, “Data Communications and Networking”, TMH, Fourth
Edition
________________________________________________________________
CONCLUSION:
Grade: AA / AB / BB / BC / CC / CD /DD
TITLE: Study and configure OSPF protocol using Cisco Packet tracer
________________________________________________________________AIM: To
study and configure OSPF protocol using Cisco Packet tracer
________________________________________________________________
Expected Outcome of Experiment:
CO:
________________________________________________________________
Books/ Journals/ Websites referred:
1. A. S. Tanenbaum, “Computer Networks”, Pearson Education, Fourth Edition
2. B. A. Forouzan, “Data Communications and Networking”, TMH, Fourth
Edition
________________________________________________________________
Pre Lab/ Prior Concepts:
IPv4 Addressing, Subnetting, Link State Protocol, Router configuration Commands
________________________________________________________________
New Concepts to be learned: OSPF Protocol and its configuration.
________________________________________________________________
OSPF (Routing Information Protocol)
OSPF (Open Shortest Path First) is a link state routing protocol. Because it is an
open standard, it is implemented by a variety of network vendors. OSPF will run
on most routers that doesn’t necessarily have to be Cisco routers (unlike EIGRP
which can be run only on Cisco routers).
OSPF is a classless routing protocol that supports VLSM and CIDR, manual
route summarization, incremental updates, equal cost load balancing and many
other useful features. OSPF uses only one parameter as the metric, namely
interface cost. The administrative distance of OSPF routes is, by default, 110.
OSPF uses multicast addresses 224.0.0.5 and 224.0.0.6 for routing updates.
Department of Computer Engineering
CN/Jul-Dec 2020
K. J. Somaiya College of Engineering, Mumbai-77
Routers running OSPF have to establish neighbor relationships before
exchanging routes. Because OSPF is a link state routing protocol, neighbors
doesn’t exchange routing tables. Instead, they exchange information about
network topology. Each OSFP router then runs SFP algorithm to calculate the
best routes and adds those to the routing table. Because each router knows the
entire topology of a network, a chance for a routing loop to occur is minimal.
Each OSPF router stores routing and topology information in three tables:
• Neighbor table – stores information about OSPF neighbors
• Topology table – stores the topology structure of a network
• Routing table – stores the best routes
OSPF neighbors
OSPF routers need to establish a neighbor relationship before exchanging
routing updates. OSPF neighbors are dynamically discovered by sending Hello
packets out each OSPF-enabled interface on a router. Hello packets are sent to
the multicast IP address of 224.0.0.5.
The process is explained in the following figure:
Routers R1 and R2 are directly connected. After OSFP is enabled both routers send
Hellos to each other to establish a neighbor relationship.
Each OSPF router is assigned a router ID. A router ID is determined by using one of the
following:
1. Init state – a router has received a Hello message from the other OSFP router
2. 2-way state – the neighbor has received the Hello message and replied with a Hello
message of his own
3. Exstart state – beginning of the LSDB exchange between both routers. Routers are
starting to exchange link state information.
4. Exchange state – DBD (Database Descriptor) packets are exchanged. DBDs contain
LSAs headers. Routers will use this information to see what LSAs need to be
exchanged.
5. Loading state – one neighbor sends LSRs (Link State Requests) for every network it
doesn’t know about. The other neighbor replies with the LSUs (Link State Updates)
which contain information about requested networks. After all the requested information
have been received, other neighbor goes through the same process
6. Full state – both routers have the synchronized database and are fully adjacent with
each other.
OSPF areas
OSPF uses the concept of areas. An area is a logical grouping of contiguous networks
and routers. All routers in the same area have the same topology table, but they don’t
know about routers in the other areas. The main benefits of creating areas is that the
size of the topology and the routing table on a router is reduced, less time is required to
run the SFP algorithm and routing updates are also reduced.
Each area in the OSPF network has to connect to the backbone area (area 0). All router
inside an area must have the same area ID to become OSPF neighbors. A router that
has interfaces in more than one area (area 0 and area 1, for example) is called Area
Border Router (ABR). A router that connects an OSPF network to other routing domains
(EIGRP network, for example) is called Autonomous System Border Routers (ASBR).
All routers are running OSPF. Routers R1 and R2 are inside the backbone area (area 0).
Router R3 is an ABR, because it has interfaces in two areas, namely area 0 and area 1.
Router R4 and R5 are inside area 1. Router R6 is an ASBR, because it connects OSFP
network to another routing domain (an EIGRP domain in this case). If the R1’s directly
connected subnet fails, router R1 sends the routing update only to R2 and R3, because
all routing updates all localized inside the area.
After configuring OSPF on both routers, routers exchange LSAs to describe their
respective topology database. Router R1 sends an LSA header for its directly connected
network 10.0.1.0/24. Router R2 check its topology database and determines that it
doesn’t have information about that network. Router R2 then sends Link State Request
message requesting further information about that network. Router R1 responds with
Link State Update which contains information about subnet 10.0.1.0/24 (next hop
address, cost…).
OSPF Configuration:
CONCLUSION:
B. 100
C. 110
D. 120
B. 1 and 2 only
C. 3 and 4 only
D. 3, 4 and 5
6.
5. If routers in a single area are configured with the same priority value, what value
does a router use for the OSPF Router ID in the absence of a loopback interface?
A. The lowest IP address of any physical interface
6. You get a call from a network administrator who tells you that he typed the following
into his router:
Router(config)#router ospf 1
Router(config-router)#network 10.0.0.0 255.0.0.0 area 0
He tells you he still cannot see any routes in the routing table. What configuration
error did the administrator make?
A. The wildcard mask is incorrect.