0% found this document useful (0 votes)
12 views15 pages

263 Exp3 CNS

The document discusses configuring and observing the behavior of the RIP routing protocol in a network simulation using Cisco Packet Tracer. It provides instructions on setting up a network topology with multiple routers and PCs, configuring the routers and PCs with IP addresses, enabling RIP on the routers, and verifying connectivity between nodes by pinging IP addresses.

Uploaded by

neha.shroff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views15 pages

263 Exp3 CNS

The document discusses configuring and observing the behavior of the RIP routing protocol in a network simulation using Cisco Packet Tracer. It provides instructions on setting up a network topology with multiple routers and PCs, configuring the routers and PCs with IP addresses, enabling RIP on the routers, and verifying connectivity between nodes by pinging IP addresses.

Uploaded by

neha.shroff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

T.Y.B.

Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

Name: Neha Shroff


CNum: UEC2021263
Experiments no: 3

Aim:- Study of Network simulation tools to configure and see behavior of IP routing protocols like
RIP, BGP etc.)

Objectives:Configure routers using basic interface configuration commands, Enable RIP, Verify
the RIP configuration using Network simulation tool Cisco Packet Tracer

Theory:

Cisco Packet Tracer:

Packet Tracer is a network simulation tool that allows us to create network topologies by building
virtual networking devices. Packet Tracer is highly encouraged for network enthusiasts as it allows
them to have keen in-depth knowledge of networking.

Classification of Routing Protocols

Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a
routing metric to find the best path between the source and the destination network. RIP uses port
number 520.

How Routing Information Protocol works


RIP uses a distance vector algorithm to decide which path to put a packet on to get to its destination.
Each RIP router maintains a routing table, which is a list of all the destinations the router knows

1 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

how to reach. Each router broadcasts its entire routing table to its closest neighbors every 30
seconds. In this context, neighbors are the other routers to which a router is connected directly --
that is, the other routers on the same network segments as the selected router. The neighbors, in
turn, pass the information on to their nearest neighbors, and so on, until all RIP hosts within the
network have the same knowledge of routing paths. This shared knowledge is known as
convergence.

RIP operates on the application layer of the OSI model. The configuration process for the Routing
Information Protocol is fairly simple. Once IP addresses have been assigned to the involved
computers and interfaces of routers, then developers can issue the router RIP command -- which
tells the router to enable RIP. Then, developers can use the network command, which enables users
to identify the networks with which they want to work. Only the networks directly associated with
the router need to be specified.

Router in this protocol basically implements the distance-vector routing algorithm However, the
algorithm has been modified as described below.
First, since a router in an AS (Autonomous System) needs to know how to forward a packet to
different networks (subnets) in an AS, RIP routers advertise the cost of reaching different networks
instead of reaching other nodes in a theoretical graph. In other words, the cost is defined between
a router and the network in which the destination host is located.
Second, to make the implementation of the cost simpler (independent from performance factors of
the routers and links, such as delay, bandwidth, and so on), the cost is defined as the number of
hops, which means the number of networks (subnets) a packet needs to travel through from the
source router to the final destination host. Note that the network in which the source host is
connected is not counted in this calculation because the source host does not use a forwarding table;
the packet is delivered to the default router. Figure shows the concept of hop count advertised by
three routers from a source host to a destination host. In RIP, the maximum cost of a path can be
15, which means 16 is considered as infinity (no connection). For this reason, RIP can be used only
in autonomous systems in which the diameter of the AS is not more than 15 hops.

Fig. Hop counts in RIP


RIP processes, a client and a server, like any other processes, need to exchange Messages RIP
has two types of messages: request and response. A request message is sent by a router that has

2 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

just come up or by a router that has some time-out entries. A request message can ask about
specific entries or all entries. A response (or update) message can be either solicited or
unsolicited. A solicited response message is sent only in answer to a request message. It contains
information about the destination specified in the corresponding request message. An unsolicited
response message, on the other hand, is sent periodically, every 30 seconds or when there is a
change in the forwarding table.

Steps to Configure and Verify Three Router Connections in Cisco Packet Tracer using RIP
Routing:
Step 1: First, open the Cisco packet tracer desktop and select the devices PC,Switches & routers

● Then, create a network topology as shown below the image.


● Use an Automatic connecting cable to connect the devices with others.

Step 2: Configure the PCs (hosts) with IPv4 address and Subnet Mask according to the IP
addressing table

Step 3: Configure router with IP address and Subnet mask.

● To assign an IP address in router0, click on router0.


● Then, go to config and then Interfaces.
● Make sure to turn on the ports.
● Then, configure the IP address in FastEthernet and serial ports according to IP addressing
Table.
● Fill IPv4 address and subnet mask.
● Repeat this for every router in network

Step 4: Verifying the network by pinging the IP address of any PC.

● We will use the ping command to do so.


● First, click on PC0 then Go to the command prompt. ● Then type ping <IP address of
targeted node>.

Result:

a)Diagram of network with PC & Router configuration’

3 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

4 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

5 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

6 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

7 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

8 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

9 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

b) Result of ping command between any two PCs in network

Conclusion:

In conclusion, the study of network simulation tools for configuring and observing the behavior of
IP routing protocols like RIP is crucial for understanding how routers communicate and adapt to
changes in network topology. Through the use of Cisco Packet Tracer, the objectives of configuring
routers, enabling RIP, and verifying the RIP configuration can be achieved in a controlled virtual
environment. This hands-on experience enhances the understanding of practical networking
scenarios and helps in gaining insights into the operation of routing protocols. Overall, the study
provides valuable skills and knowledge for anyone involved in designing, managing, or
troubleshooting computer networks.

Short Questions

10 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

1. Explain Bellman-Ford equation

Bellman-Ford is a single source shortest path algorithm that determines the


shortest path between a given source vertex and every other vertex in a graph.
This algorithm can be used on both weighted and unweighted graphs.
Working

Now, let’s know the working of the bellman ford algorithm, and how exactly the algorithm
deals with negative edges using dynamic programming approaches. the

step-by-step working of the algorithm is as follows:


Step-1: Initialize the distance value Infinite to every other vertex and set distance value 0 to the
source node itself.

Step-2: Visit each edge and relax the path if the previous path was not accurate. To relax the path
for vertices and for edge u-v: If, (d(u) + c(u , v) < d(v)) d(v) = d(u) + c(u , v) the above equation
means if the sum of distance value of source node and cost of moving from source to destination
is less than distance of source vertex. Then, the distance value of destination vertex from the source
vertex will be equals to distance value of the source and cost of reaching the destination from
source.

Step-3: If the new distance value is less than the previous one, then update the distance value in
each iteration for the edges. The distance value to every node is the total distance from the starting
vertex to that particular vertex.

Step-4: Repeat the above steps multiple iterations, to ensure the obtained result is optimized.

2. Explain the concept of hop count in RIP.


In the context of the Routing Information Protocol (RIP), hop count refers to the metric
used to determine the distance between routers in a network. RIP is a distance-vector
routing protocol used to exchange routing information within a small to medium-sized
network.

11 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

Here's how hop count works in RIP:

1. Definition: A hop refers to each router or network device that data packets must
pass through between the source and destination. The hop count is simply the number of
routers a packet must traverse to reach its destination.

2. Metric: In RIP, each hop along the path between the source and destination is
counted as a metric. By default, RIP considers the number of hops as the metric for
determining the best route to a destination network.

3. Routing Table Entry: RIP routers maintain a routing table where they store
information about reachable networks along with the corresponding hop count. When a
router learns about a network from its neighbors, it updates its routing table with the
network's address and the number of hops required to reach that network.

4. Path Selection: RIP routers use the hop count as the primary criterion for selecting
the best path to a destination network. A route with the fewest hops is considered the best
route. However, RIP has a maximum hop count limit of 15. If a route exceeds this limit, it's
considered unreachable.

5. Convergence: RIP routers periodically exchange routing information with their


neighboring routers, updating each other about network changes. When a network
topology change occurs, such as a link failure or network outage, routers recalculate their
routing tables based on the updated information received from neighboring routers. This
process continues until all routers in the network converge on the new routing information.

Overall, hop count in RIP serves as a simple metric for determining the best routes within
a network. However, RIP's reliance solely on hop count makes it less suitable for large,
complex networks where other factors like network bandwidth, latency, or reliability may
be more important considerations for routing decisions.

3. Compare RIP and OSPF protocols

RIP OSPF

12 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

RIP Stands for Routing OSPF stands for Open Shortest


Information Protocol. Path First.

RIP works on the OSPF works on Dijkstra


Bellman-Ford algorithm. algorithm.

It is a link-state protocol and it


It is a Distance Vector protocol
analyzes different sources like the
and it uses the distance or
speed, cost and path
hops count to determine the
congestion while identifying the
transmission path.
shortest path.

It is used for smaller size It is used for larger size


organizations. organizations in the network.

It allows a maximum of 15 There is no such restriction on the


hops. hop count.

13 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

It is not a more intelligent It is a more intelligent routing


dynamic routing protocol. protocol than RIP.

The networks are classified as


The networks are classified as
areas, sub-areas, autonomous
areas and tables here.
systems, and backbone areas here.

Its administrative distance is


Its administrative distance is 110.
120.

RIP uses UDP(User OSPF works for IP(Internet


Datagram Protocol) Protocol. Protocol) Protocol.

It calculates the metric in terms It calculates the metric in terms of


of Hop Count. bandwidth.

14 | Page
T.Y.B.Tech(E&TC) ,CCEW Computer Network & Security Lab (2022-23) Sem 2

In RIP, the whole routing table is


In OSPF, parts of the routing table
to be broadcasted to the
are only sent when a change has
neighbors every 30 seconds by
been made to it.
the routers.

RIP utilizes less memory


OSPF device resource requirements
compared to OSPF but is CPU
are CPU intensive and memory.
intensive like OSPF.

It consumes more bandwidth


because of
It consumes less bandwidth as only
greater network resource
part of the routing table is to send.
requirements in sending the
whole routing table.

Its multicast address is OSPF’s multicast addresses are


224.0.0.9. 224.0.0.5 and 224.0.0.6.

15 | Page

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy