Search This Blog

Tuesday 6 September 2022

Routing Protocol RIP Configuration & Verification

 Below is the network diagram we are having for designing a network, where two different networks are connected to two routers. One of the networks is connected directly while the other network is connected to a router through a Switch.


Above is the network diagram where Host 2 is connected to the Rincewind router and Host1 is connected to a switch which is further connected to the Vetinari router. Basically, the networks connected to the routers on their Giga Ethernet ports are local Area networks and the two routers have a WAN connection between them. The WAN connection is a serial connection.

1. Addressing Scheme

For the proper communication between the devices, we need IP planning. The IP plan is generated using the provided network address. In this network, we will be using 192.168.10.0/24 for subnetting. The IP subnetting, we are using, in this case, it s a fixed-length subnet mask and needs to break down the network into 8 sub-networks.

 

Subnetting is done by borrowing bits from the host part and keeps borrowing till we satisfy the need of the network. In the above scene,ario we need a total of 8 subnets so below is detailed subnetting stepsAbove is the network diagram where Host 2 is connected to Renewing router and Host1 is connected to a switch which is further connected to the Veterinary router. Basically, the networks connected to the routers on their giga Ethernet ports are local Area networks and the two routers have a WAN connection between them. The WAN connection is a serial connection. Above is the network diagram where Host 2 is connected to Renewing router and Host1 is connected to a switch which is further connected to the Veterinary router. Basically, the networks connected to the routers on their giga Ethernet ports are local Area networks and the two routers have a WAN connection between them. The WAN connection is a serial connection

 

 

                                                            192.168.10.0/24

 

Subnetworks Calculation formula = 2n (n= bits borrowed)

Here the number of subnets required is = 8

 

So,

 

8=2n   =>=>=>   23=2n and now n=3, So to get 8 subnets from the above Class C IP address we need to borrow three bits from the host part. In class C the last octet with 8 bits is dedicated to hosting. So

 

192.168.10.0/24+3 = 192.168.10.0/27 is the new cider of the above network and

 Host per subnet is calculated as =2n-2 (n= remaining host bits)

                                                            =25-2= 30 hosts per subnet

 

 

The above subnets can be written as below. That are total of 8 bits from subnet Zero through Subnet seven.

 

No

Subnet

First host

Last host

Broadcast

Subnet mask

0

192.168.10.0/27

192.168.10.1

192.168.10.30

192.168.10.31

255.255.255.224

1

192.168.10.32/27

192.168.10.33

192.168.10.62

192.168.10.63

255.255.255.224

2

192.168.10.64/27

192.168.10.65

192.168.10.94

192.168.10.95

255.255.255.224

3

192.168.10.96/27

192.168.10.97

192.168.10.126

192.168.10.127

255.255.255.224

4

192.168.10.128/27

192.168.10.129

192.168.10.158

192.168.10.159

255.255.255.224

5

192.168.10.160/27

192.168.10.161

192.168.10.190

192.168.10.191

255.255.255.224

6

192.168.10.192/27

192.168.10.193

192.168.10.222

192.168.10.223

255.255.255.224

7

192.168.10.224/27

192.168.10.225

192.168.10.254

192.168.10.255

255.255.255.224

 

According to instructions subnet, Zero and subnet seven cannot be used for our network. Therefore, we are using subnets 1, 2 & 3 for our network.

 

1.2 Device IP addresses:

 

The below IP addresses have been assigned to the interfaces of the routers and hosts. The first IP address in each subnet has been assigned to the router interface IP and the second IP to the PC.

 

The gateway IP assigned to every PC is the interface ip of the router connected to the PC

Device

Port

IP address

Subnet mask

Default Gateway

Vetinari

Ethernet 0/0

192.168.10.33

255.255.255.224

N/A

Vetinari

Serial 0/2/0

192.168.10.65

255.255.255.224

N/A

Rincewind

Ethernet 0/0

192.168.10.97

255.255.255.224

N/A

Rincewind

Serial 0/2/0

192.168.10.66

255.255.255.224

N/A

Host 1

Ethernet

192.168.10.34

255.255.255.224

192.168.10.33

Host 2

Ethernet

192.168.10.98

255.255.255.224

192.168.10.97

 

2. Cabling

Cabling is the selection of appropriate cables for connecting the networking devices with each other. In our network designed below, we have connected the host pcs with the router and switch. The cable from the PC to the Switch in the Vetinari network is a straight-through cable and from the switch to the router, it’s again a straight-through copper cable. The cable between host pc 2 to the router is a cross-over cable and the cable between the two routers is a serial cable.  The serial cable used in this network shows that there is a good distance between the two routers.

Initially, when the network is deployed, we used a console cable to get connected to a switch or router to do configurations. The cable shown in the above snapshot is the console cable being used for the configuration of networking devices.

·         The serial cable that is connected to Vetinari is a Data terminating end and the other end is connected to Rincewind which is the DCE or data communication end that provides a clock to the network.



3. Basic router commands & Modes

The configuration of a router is done through a command from the command line interface or CLI. To run these commands, we need different privilege levels. The privilege level of a router is set in different modes of a router.

User-Exec mode

The mode which we access after just logging into a router is called “User Exec Mode” and very few commands can be run over here.


To check the type of commands we run in user exec mode, we type question marks which show us the commands we are allowed to use. Below is the list of some commands with their function that can be run in privilege mode.

 

 

Command

Function

1

enable

Turn on privileged commands

2

exit

Exit from the EXEC mode

3

terminal

Set terminal line parameters

4

ping

Send echo messages

5

logout

Exit from the EXEC

6

ssh

Open a secure shell client connection

7

show

Show running system information

8

traceroute

Trace route to destination

 

Privilege mode

 Below is the list of commands that can be run in user privilege mode. The number of commands that can be run in this mode needs more privileges and below are a few commands.

 

To enter this mode, we need to type the “enable” command and the view of the router becomes like below.



We have selected below privileged exec mode commands prompting when question mark is typed in this mode.

 

 

Command

Function

1

ping

Send echo messages

2

copy

Copy from one file to another

3

setup

Run the SETUP command facility

4

erase

Erase a filesystem

5

debug

Debugging functions

6

traceroute

Trace route to destination

7

configure

Enter configuration mode

8

clear

clear Reset functions

 

4. Basic router configuration

 

Global configuration mode

This is the mode that needs the highest level of privilege, we must move into this mode to modify, add, or remove the configuration of a network. All configurations we have done in this network need to move into privilege mode. Below is the list of commands that we can run in this mode. We enter configuration mode by typing “config terminal” in the user privilege mode.

We have run the below commands on these routers for the configuration of this network.

We start from the configuration of the device name to the whole configuration.

 

4.1 Router names: hostname is the command to change the router name to a new name

 

Router(config)#hostname Vetinari

Router(config)#hostname Rincewind

 

4.2 Interfaces: The mode we use to assign interface IPs and interface activation is done in this mode also called interface configuration mode.

 

Below are the steps to set the interface IPs of a router.

 

// Ethernet port for Vetinari:

       Vetinari(config)#interface FastEthernet0/0

       Vetinari(config-if)# ip address 192.168.10.33 255.255.255.224

       Vetinari(conf-if)# no shutdown

 

// Ethernet port for Rincewind:

      Rincewind(config)#interface FastEthernet0/0

      Rincewind(config-if)# ip address 192.168.10.97 255.255.255.224

      Rincewind(config-if)#no shutdown

 

// Serial port for Vetinari:

      Vetinari(config-if)#interface Serial0/2/0

      Vetinari(config-if)# ip address 192.168.10.65 255.255.255.224

      Vetinari(config-if)#no shutdown

 

// Serial port for Rincewind:

        Rincewind(config-if)#interface Serial0/2/0

        Rincewind(config-if)# ip address 192.168.10.66 255.255.255.224

        Rincewind(config-if)#clock rate 56000

        Rincewind(config-if)#no shutdown

 

4.3 Setting up passwords

 

The password of a router or a switch is set to ensure the security of devices. On a router or a switch, we can set Console password, Line vty password, and enable password. Below are the configuration steps to do that.

 

// Passwords for telnet session (enter line configuration mode)

Vetinari(config)#line vty 0 4

      Vetinari(config-line)#password cisco

      Vetinari(config-line)#login

  

      Rincewind(config)#line vty 0 4

      Rincewind(config-line)#password cisco

      Rincewind(config-line)#login

 

// Console and privilege mode passwords

     Vetinari(config)#enable password cisco

     Vetinari(config)#enable secret class

 

     Rincewind(config)#enable password cisco

     Rincewind(config)#enable secret class

 

Cisco is the console and vty password and class is the privilege mode password.

 

 

5. Making the network a working Network

 

Until and unless all devices are not properly connected and configured there will be no information exchange between the devices. We have configured the computers and all other devices to make them work.

5.1 Configuring the computers:

The computers have been assigned with the above-mentioned IP address to make the work properly and below are the screenshots showing the IP assignment. When correct IP addresses are assigned to the PC and the router-connected interface, we get a ping response from the router-interface IP.

Below is the ping verification from the host to interface IPs after the correct configuration

Host 2 to its default Gateway

 Host2 can ping its default gateway IP which means configuration is fine from the PC to the router.


Host 1 to its Default Gateway




But in this case, all point-to-point links should be able to ping each other like the end IP’s of the serial links should also ping each other like below. 

Host 2 cannot ping Host 1 

Host 2 can’t ping Host 1 because there is no routing enabled between the two routers.




But in this case, all point-to-point links should be able to ping each other like the end IP’s of the serial links should also ping each other like below.


Configuring RIP: Routing Information Protocol

 

RIP is one of the oldest routing protocols used for enabling routing in smaller networks for up to 15 consecutive hopes. Due to this and some other issues, a few other protocols are preferred in networks now. The configuration of RIP is simple.

The theme of enabling a routing protocol is to advertise the connected networks, which can be queried as below.

We have used the below steps to enable RIP routing in the network by advertising the above-connected routes.

 

Vetinari Router

 

Vetinari(config)#router rip

Vetinari(config-router)# version 2

Vetinari(config-router)#no auto-summary

Vetinari(config-router)#network 192.168.10.32

Vetinari(config-router)#network 192.168.10.6

 

Rincewind Router

 

Rincewind(config)#router rip

Rincewind(config-router)#version 2

Rincewind(config-router)#network 192.168.10.64

Rincewind(config-router)#network 192.168.10.96

Rincewind(config-router)#no auto-summary

6. Testing the network

After the configuration of the RIP protocol, the routers should be able to exchange routes with each other and the host should ping each other.



Host1 can ping the hsot2 lying on a different network. Now, these hosts can ping any IP within the network because all connected routes have been advertised successfully and we can query the routes of one network on the other router to verify this.


From the above routing table of Rincewind, we see that it receives the routes of host2 through RIP protocol through the serial link se0/2/0.

6.2 Ping host from each router

Ping to both hosts from Vetinari Router


Ping verification




Trace the Route

The successful testing is conducted using the ping and trace route tool, we use traceroute to check the path from source to destination which is successful.




6.4 Telnet to Vetinari from Host 2

 

Telnet is a remote management protocol, which is used to access devices from a different network for maintenance. We have configured the routers for remote management using the telnet protocol. Which is successful.












 

 

No comments:

Post a Comment

OSPF Operation and Route Selection - A detailed discussion

  OSPF Routing Protocol   Abstract:               The report discusses the OSPF Routing protocol and its implementation in networks. T...