263 Exp3 CNS
263 Exp3 CNS
Aim:- Study of Network simulation tools to configure and see behavior of IP routing protocols like
RIP, BGP etc.)
Objectives:Configure routers using basic interface configuration commands, Enable RIP, Verify
the RIP configuration using Network simulation tool Cisco Packet Tracer
Theory:
Packet Tracer is a network simulation tool that allows us to create network topologies by building
virtual networking devices. Packet Tracer is highly encouraged for network enthusiasts as it allows
them to have keen in-depth knowledge of networking.
Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a
routing metric to find the best path between the source and the destination network. RIP uses port
number 520.
1 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
how to reach. Each router broadcasts its entire routing table to its closest neighbors every 30
seconds. In this context, neighbors are the other routers to which a router is connected directly --
that is, the other routers on the same network segments as the selected router. The neighbors, in
turn, pass the information on to their nearest neighbors, and so on, until all RIP hosts within the
network have the same knowledge of routing paths. This shared knowledge is known as
convergence.
RIP operates on the application layer of the OSI model. The configuration process for the Routing
Information Protocol is fairly simple. Once IP addresses have been assigned to the involved
computers and interfaces of routers, then developers can issue the router RIP command -- which
tells the router to enable RIP. Then, developers can use the network command, which enables users
to identify the networks with which they want to work. Only the networks directly associated with
the router need to be specified.
Router in this protocol basically implements the distance-vector routing algorithm However, the
algorithm has been modified as described below.
First, since a router in an AS (Autonomous System) needs to know how to forward a packet to
different networks (subnets) in an AS, RIP routers advertise the cost of reaching different networks
instead of reaching other nodes in a theoretical graph. In other words, the cost is defined between
a router and the network in which the destination host is located.
Second, to make the implementation of the cost simpler (independent from performance factors of
the routers and links, such as delay, bandwidth, and so on), the cost is defined as the number of
hops, which means the number of networks (subnets) a packet needs to travel through from the
source router to the final destination host. Note that the network in which the source host is
connected is not counted in this calculation because the source host does not use a forwarding table;
the packet is delivered to the default router. Figure shows the concept of hop count advertised by
three routers from a source host to a destination host. In RIP, the maximum cost of a path can be
15, which means 16 is considered as infinity (no connection). For this reason, RIP can be used only
in autonomous systems in which the diameter of the AS is not more than 15 hops.
2 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
just come up or by a router that has some time-out entries. A request message can ask about
specific entries or all entries. A response (or update) message can be either solicited or
unsolicited. A solicited response message is sent only in answer to a request message. It contains
information about the destination specified in the corresponding request message. An unsolicited
response message, on the other hand, is sent periodically, every 30 seconds or when there is a
change in the forwarding table.
Steps to Configure and Verify Three Router Connections in Cisco Packet Tracer using RIP
Routing:
Step 1: First, open the Cisco packet tracer desktop and select the devices PC,Switches & routers
Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table
Result:
3 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
4 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
5 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
6 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
7 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
8 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
9 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
Conclusion:
In conclusion, the study of network simulation tools for configuring and observing the behavior of
IP routing protocols like RIP is crucial for understanding how routers communicate and adapt to
changes in network topology. Through the use of Cisco Packet Tracer, the objectives of configuring
routers, enabling RIP, and verifying the RIP configuration can be achieved in a controlled virtual
environment. This hands-on experience enhances the understanding of practical networking
scenarios and helps in gaining insights into the operation of routing protocols. Overall, the study
provides valuable skills and knowledge for anyone involved in designing, managing, or
troubleshooting computer networks.
Short Questions
10 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
Now, let’s know the working of the bellman ford algorithm, and how exactly the algorithm
deals with negative edges using dynamic programming approaches. the
Step-2: Visit each edge and relax the path if the previous path was not accurate. To relax the path
for vertices and for edge u-v: If, (d(u) + c(u , v) < d(v)) d(v) = d(u) + c(u , v) the above equation
means if the sum of distance value of source node and cost of moving from source to destination
is less than distance of source vertex. Then, the distance value of destination vertex from the source
vertex will be equals to distance value of the source and cost of reaching the destination from
source.
Step-3: If the new distance value is less than the previous one, then update the distance value in
each iteration for the edges. The distance value to every node is the total distance from the starting
vertex to that particular vertex.
Step-4: Repeat the above steps multiple iterations, to ensure the obtained result is optimized.
11 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
1. Definition: A hop refers to each router or network device that data packets must
pass through between the source and destination. The hop count is simply the number of
routers a packet must traverse to reach its destination.
2. Metric: In RIP, each hop along the path between the source and destination is
counted as a metric. By default, RIP considers the number of hops as the metric for
determining the best route to a destination network.
3. Routing Table Entry: RIP routers maintain a routing table where they store
information about reachable networks along with the corresponding hop count. When a
router learns about a network from its neighbors, it updates its routing table with the
network's address and the number of hops required to reach that network.
4. Path Selection: RIP routers use the hop count as the primary criterion for selecting
the best path to a destination network. A route with the fewest hops is considered the best
route. However, RIP has a maximum hop count limit of 15. If a route exceeds this limit, it's
considered unreachable.
Overall, hop count in RIP serves as a simple metric for determining the best routes within
a network. However, RIP's reliance solely on hop count makes it less suitable for large,
complex networks where other factors like network bandwidth, latency, or reliability may
be more important considerations for routing decisions.
RIP OSPF
12 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
13 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
14 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2
15 | Page