SlideShare una empresa de Scribd logo
1 de 49
www.professordkinney.com
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Lessons Objectives:
 Understanding the TCP/IP Internet
 Understanding the TCP/IP Transport
 Addressing and Subnets
 Exploring the Functions of Routing
 Configuring a Cisco Router
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic
communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network (either an intranet or
an extranet). When you are set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP program just as every other
computer that you may send messages to or get information from also has a
copy of TCP/IP.
 TCP/IP uses the client/server model of communication in which a computer
user (a client) requests and is provided a service (such as sending a Web page)
by another computer (a server) in the network. TCP/IP communication is
primarily point-to-point, meaning each communication is from one point
(or host computer) in the network to another point or host computer.
 Many Internet users are familiar with the even higher layer application
protocols that use TCP/IP to get to the Internet. These include the World Wide
Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP),
Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail
Transfer Protocol (SMTP). These and other protocols are often packaged
together with TCP/IP as a "suite."
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
The TCP/IP Protocol Architecture
 Figure 2 shows the TCP/IP protocol architecture; this diagram is by no means
exhaustive, but shows the major protocol and application components
common to most commercial TCP/IP software packages and their
relationship.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
The Network Interface Layer
PPP
It is worth spending a little bit of time discussing PPP because of its importance in
Internet access today. As its name implies, PPP was designed to be used over
point-to-point links. In fact, it is the prevalent IP encapsulation scheme for
dedicated Internet access as well as dial-up access. One of the significant
strengths of PPP is its ability to negotiate a number of things upon initial
connection, including passwords, IP addresses, compression schemes, and
encryption schemes.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
PPP Frame Format
 PPP generally uses an HDLC-like (bit-oriented protocol) frame format as
shown in Figure 3, although RFC 1661 does not demand use of HDLC. HDLC
defines the first and last two fields in the frame:
 Flag: The 8-bit pattern "01111110" used to delimit the beginning and end of the
transmission.
 Address: For PPP, uses the 8-bit broadcast address, "11111111".
 Frame Check Sequence (FCS): An 8-bit remainder from a cyclic redundancy
check (CRC) calculation, used for bit error detection.
The Internet Layer
The Internet Protocol (RFC 791), provides services that are roughly equivalent
to the OSI Network Layer. IP provides a datagram (connectionless) transport
service across the network. This service is sometimes referred to
as unreliable because the network does not guarantee delivery nor notify the
end host system about packets lost due to errors or network congestion. IP
datagrams contain a message, or one fragment of a message, that may be up to
65,535 bytes (octets) in length. IP does not provide a mechanism for flow
control.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
IP Packet Header Format
Establishing Internet Connectivity
IP Addresses
IP (version 4) addresses are 32 bits in length (Figure 5). They are typically written
as a sequence of four numbers, representing the decimal value of each of the
address bytes. Since the values are separated by periods, the notation is
referred to as dotted decimal. A sample IP address is 208.162.106.17.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
IP Address Format
Establishing Internet Connectivity
The Transport Layer Protocols
The TCP/IP protocol suite comprises two protocols that correspond roughly to the
OSI Transport and Session Layers; these protocols are called the Transmission
Control Protocol and the User Datagram Protocol (UDP)
TCP
 TCP, described in RFC 793, provides a virtual circuit (connection-oriented)
communication service across the network. TCP includes rules for formatting
messages, establishing and terminating virtual circuits, sequencing, flow
control, and error correction. Most of the applications in the TCP/IP suite
operate over the reliable transport service provided by TCP.
 The TCP data unit is called a segment; the name is due to the fact that TCP
does not recognize messages, per se, but merely sends a block of bytes from the
byte stream between sender and receiver.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
TCP segment format
UDP
UDP is described in RFC 768, provides an end-to-end datagram (connectionless)
service. Some applications, such as those that involve a simple query and
response, are better suited to the datagram service of UDP because there is no
time lost to virtual circuit establishment and termination. UDP's primary
function is to add a port number to the IP address to provide a socket for the
application.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
UDP Datagram Format
 Subnetting:
Lets work by Example.
Example 1: A service provider has given you the Class C network range 209.50.1.0.
Your company must break the network into 20 separate subnets.
Step 1) Determine the number of subnets and convert to binary
- In this example, the binary representation of 20 = 00010100.
Step 2) Reserve required bits in subnet mask and find incremental value
- The binary value of 20 subnets tells us that we need at least 5 network bits to
satisfy this requirement (since you cannot get the number 20 with any less than
5 bits – 10100)
- Our original subnet mask is 255.255.255.0 (Class C subnet)
- The full binary representation of the subnet mask is as follows:
255.255.255.0 = 11111111.11111111.11111111.00000000
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
We must “convert” 5 of the client bits (0) to network bits (1) in order to satisfy the
requirements:
New Mask = 11111111.11111111.11111111.11111000
- If we convert the mask back to decimal, we now have the subnet mask that will
be used on all the new networks – 255.255.255.248
- Our increment bit is the last possible network bit, converted back to a binary
number:
New Mask = 11111111.11111111.11111111.1111(1)000 – bit with the parenthesis is your
increment bit. If you convert this bit to a decimal number, it becomes the
number „8‟
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Step 3) Use increment to find network ranges
- Start with your given network address and add your increment to the subnetted
octet:
209.50.1.0
209.50.1.8
209.50.1.16
…etc
- You can now fill in your end ranges, which is the last possible IP address before
you start the next range
209.50.1.0 – 209.50.1.7
209.50.1.8 – 209.50.1.15
209.50.1.16 – 209.50.1.23
…etc
- You can then assign these ranges to your networks. Remember the first and last
address from each range (network / broadcast IP) are unusable
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Example 1: A service provider has given you the Class C network range 209.50.1.0.
Your company must break the network into as many subnets as possible as long
as there are at least 50 clients per network.
Step 1) Determine the number of clients and convert to binary
- In this example, the binary representation of 50 = 00110010
Step 2) Reserve required bits in subnet mask and find incremental value
- The binary value of 50 clients tells us that we need at least 6 client bits to satisfy
this requirement (since you cannot get the number 50 with any less than 6 bits
– 110010)
- Our original subnet mask is 255.255.255.0 (Class C subnet)
- The full binary representation of the subnet mask is as follows:
255.255.255.0 = 11111111.11111111.11111111.00000000
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
We must ensure 6 of the client bits (0) remain client bits (save the clients!) in
order to satisfy the requirements. All other bits can become network bits:
New Mask = 11111111.11111111.11111111.11 000000 note the 6 client bits that we have
saved
- If we convert the mask back to decimal, we now have the subnet mask that will
be used on all the new networks – 255.255.255.192
- Our increment bit is the last possible network bit, converted back to a binary
number:
New Mask = 11111111.11111111.11111111.1(1)000000 – bit with the parenthesis is your
increment bit. If you convert this bit to a decimal number, it becomes the
number „64‟
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Step 3) Use increment to find network ranges
- Start with your given network address and add your increment to the subnetted
octet:
209.50.1.0
209.50.1.64
209.50.1.128
209.50.1.192
- You can now fill in your end ranges, which is the last possible IP address before
you start the next range
209.50.1.0 – 209.50.1.63
209.50.1.64 – 209.50.1.127
209.50.1.128 – 209.50.1.191
209.50.1.192 – 209.50.1.255
- You can then assign these ranges to your networks. Remember the first and last
address from each range (network / broadcast IP) are unusable
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 When subnetting based on the number of
networks, SUBTRACT 1 from the number
 When subnetting based on the number of hosts
per network, ADD 1 to the number
 Follow these rules and you'll always be safe.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Exploring the Functions of Routing
 we are going to explore the packet delivery process, from the routing
perspective. We will see how one of the main functions of routing is to
determine the optimal path across a routed network for IP packets.
Routers:
Routers implement layer 3 or network layer functions. Their main job is to
forward packets based upon a routing table. When doing so, they also provide
traffic segmentation, multiple broadcast domains, and define network layer
addressing subnets and networks. Those networks are defined by router
network adapters or ports to which IP addresses are assigned. Those IP
addresses are typically the default gateway to PCs and servers or other
networking devices. Routers also connect to service providers and act as
gateways to other networks, typically found at the perimeter or edge of the
network. Some of those network adapters will be other than Ethernet. They
will have connectivity to serial interfaces, DSL connections, and other forms of
WAN
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Routers
Router Functions
The basic routing function can be split into two areas; one is to build a
map of the network and for that routers typically use either static
routing or dynamic routing protocols. With the help of dynamic routing
protocols, routers will let other network devices know about not only the
topology of the network but also about network changes. Static routing
will be that static and will not adapt to network changes. Both models
accomplish the task of building the map of the network in the form of
the routing table.
 The command and output shown here display the routing table on a Cisco
router. With show IP route, an IOS device like this one could show the different
destinations, the cost to get there, what is known as the administrative distance
to define priorities for different routing protocols, and the next-hop to get to
that destination. Notice how the routing protocol that learned that particular
entry or destination is shown there in the first column. This is EIGRP, this is
RIP, and this is OSPF. With this information, routers will be able to determine
where to forward packets. They will do so by sending the packet to the next
router in the path according to the info in the routing table. Notice then that
routing is based on destination addresses.
Path Determination
 During the process of path determination, the routers will consider multiple
alternatives to get to the same place; those alternatives result from the
redundancy built into most network designs. You want multiple paths, so that
if one goes down, other alternatives will become available. In determining the
best path, routers will consider several things. One of them is the source of the
information, and so you could have multiple dynamic routing protocols or even
static routing populating the routing table and telling the router what the
options are.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 The second piece of information is the cost of taking each path, and knowing
that the path is made up of multiple links or hops that are defined by other
routers. Then we could add the concepts of the cost in the context of the total
path, but that cost is nothing more than the sum of all the costs to reach each
hop in the path.
 Well, the two decisions are ruled by different pieces of information, for
example, in order to define a tie breaker between sources of information, the
routers use the administrative distance, so if a routing protocol like OSPF is
telling the router information on a destination and also RIP is telling that
router information on the same destination, then the administrative distance
will define who wins. Once the source is selected, then the cost is what matters;
in other words, if OSPF is giving me the information on those two paths, then
the cost of the path will define which one I take. This is similar to having two
maps to drive from one city to the other. You first select which map you are
going to follow and then if the map is giving you more than one option, then
you will select the option according to perhaps the amount of time it takes or
the amount of miles you have to drive for each option.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Routing Tables
 So the routing table contains the network layer intelligence that tells the router
how to forward packets to remote destinations. Initially, that routing table is
made up of networks that are directly connected to the particular router. They
are obviously shown as directly connected networks, after that the way to learn
about remote destinations is by either populating the routing table with static
routes in which an administrator will tell the router how to get to the
destination or by populating the routing table via routing table advertisements
coming from other routers.
 So routers are gossipy and they will tell each other information that allows
them to know about all the gossip in the network. In both cases, static and
dynamic routing notice how routers use the reserved subnet addresses or
network addresses that contain all 0s in the host portion of the IP address.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 In this case, we are talking about a classless subnetted class A address. Network
10 split into subnets similar to a class C. However, in all cases here, the host
portion of the address, the fourth byte is all 0s and that represents that subnet
or network itself. In other words, these are destination networks or subnets. In
the case of remote destinations, the routing table entries show what the next
hop is in order to reach that destination. In this case, in order to reach 10.1.3.0,
our next-hop is router 2 at 10.1.2.2.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 These are categories of routing table entries that could be populated either
dynamically or statically. Some of them are born with the router. As soon as the
router boots up, it will identify its directly connected active networks and
interfaces and define them as reachable destinations, only because of the fact
that the router is directly attached or connected to it. Now that is pretty smart,
but even smarter is the fact that the routers will communicate with each other,
exchange routing information via dynamic routing protocols like OSPF or
EIGRP, and then learn not only about those destinations, but also adjust to
changes on those destinations.
 Routing protocols will be able to identify topology changes and tell each other
about them. Soon enough, entries will appear and disappear from the routing
table according to availability; again, an administrator could come in and
manually insert static entries. This is sometimes not recommended because
they will be static and they will not adjust to network changes; in other words,
if the entry or the destination goes down, the entry will remain there and the
router will still forward packets to a destination that is not available.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 Perhaps a special case of a static route is the default route. Although they can
also be learned dynamically, static defaults are used when no explicit route to a
destination is known and so this is the entry that identifies all unknown
destinations. The router will say, "If I do not know about a certain destination, I
will forward a packet to someone that does, typically another router.
Routing Metrics
 Optimal path selection depends on what is known as the cost to reach a
destination across a certain path. Again, the cost of a path is made up of
incremental costs for each hop along the path. The cost is also known as
metric, and different routing protocols will consider different criteria in order
to define the metric. Older technologies and protocols consider the number of
routers along the path in order to reach a destination; that is what they call the
hop count. Hop count is sometimes not an efficient way to determine cost,
because you could have different bandwidths associated with each hop or each
link.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Router Cost Path Factors
Establishing Internet Connectivity
 In this example the two-hop path is better, because it has more bandwidth
available. Other routing protocols start considering bandwidth as a measure of
cost, and even more parameters in the criteria, for example, EIGRP considers
bandwidth delay, reliability, load, and maximum transmission unit. In that
case, a path with enough bandwidth, but one that is fully congested, would not
be selected and perhaps another path with less available bandwidth would be
selected because it is less congested and more reliable.
 Perhaps one of the points and highlights of this lesson is the fact that routing
protocol selection, if you are doing dynamic routing, is key in determining the
cost or metric and, therefore, how efficient and optimal the path selection will
be, but also the convergence time, which is defined by the time it takes for
routing protocol to detect a topology change and adjust by selecting an
alternative path if the main path is down. There are different categories of
routing protocols if you are using dynamic routing that define their cost and
metric, but also their behavior under those circumstances.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Distance Vector Routing Protocols
 Perhaps one of the points and highlights of this lesson is the fact that routing
protocol selection, if you are doing dynamic routing, is key in determining the
cost or metric and, therefore, how efficient and optimal the path selection will
be, but also the convergence time, which is defined by the time it takes for
routing protocol to detect a topology change and adjust by selecting an
alternative path if the main path is down. There are different categories of
routing protocols if you are using dynamic routing that define their cost and
metric, but also their behavior under those circumstances.
 Using the distance vector approach, which is one of the categories, routers do
not have to really know the whole path toward the destination. They only have
to know the direction or vector in which to send a packet. In that sense, it will
only keep information in the routing tables related to what the next-hop
should be in order to reach a certain destination.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Link-State Routing Protocols
 Link-State protocols are more efficient and effective in creating network
topologies, sharing them, and selecting the best path as compared to distance
vector protocols. There are several differences between the two categories. For
example, link state protocols will not broadcast the information per router, it
will use multicast where each router advertises via that multicast the link it
knows to the neighbors. Secondly, link-state protocols do not advertise
periodically. After an initial flood of all the information, yet will only advertise
changes to the topology. In other words, if the link goes down then that small
change will be advertised via multicast. Third, router not only know about the
next hop toward a destination, they know about the whole topological map of
the network. Each router after the initial flood will build that map of the
network, which includes all the routers and all the links. With that
information, each router is capable of browsing those tables via using the
shortest path first algorithm, and select the best path toward each destination.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Configuring a Cisco Router
Here i will provide you some basic commands to set up your router .
More details on each topic will be coming in following lessons.
The Cisco IOS software provides access to several different command modes.
Each command mode provides a different group of related commands.
For security purposes, the Cisco IOS software provides two levels of access to
commands: user and privileged. The unprivileged user mode is called user EXEC
mode. The privileged mode is called privileged EXEC mode and requires a
password. The commands available in user EXEC mode are a subset of the
commands available in privileged EXEC mode.
The following table in the next slides describes some of the most commonly used
modes, how to enter the modes, and the resulting prompts. The prompt helps
you identify which mode you are in and, therefore, which commands are
available to you
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Cisco Router Mode
User EXEC Mode:
 When you are connected to the router, you are started in user EXEC mode. The
 user EXEC commands are a subset of the privileged EXEC commands.
Privileged EXEC Mode:
 Privileged commands include the following:
 Configure – Changes the software configuration.
 Debug – Display process and hardware event messages.
 Setup – Enter configuration information at the prompts.
 Enter the command disable to exit from the privileged EXEC mode and return
to
 user EXEC mode.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Configuration Mode
 Configuration mode has a set of sub modes that you use for modifying
interface
 settings, routing protocol settings, line settings, and so forth. Use caution with
 configuration mode because all changes you enter take effect immediately.
 To enter configuration mode, enter the command configure terminal and exit
by pressing Ctrl-Z
Getting Help
 In any command mode, you can get a list of available commands by entering a
 question mark (?).
 Router>?
 To obtain a list of commands that begin with a particular character sequence,
 type in those characters followed immediately by the question mark (?).
 Router#co?
 configure connect copy
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 To list keywords or arguments, enter a question mark in place of a keyword or
 argument. Include a space before the question mark.
 Router#configure ?
 memory Configure from NV memory
 network Configure from a TFTP network host
 terminal Configure from the terminal
 You can also abbreviate commands and keywords by entering just enough
 characters to make the command unique from other commands. For example,
 you can abbreviate the show command to sh.
Configuration Files
 Any time you make changes to the router configuration, you must save the
 changes to memory because if you do not they will be lost if there is a system
 reload or power outage. There are two types of configuration files: the running
 (current operating) configuration and the startup configuration.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
 Use the following privileged mode commands to work with configuration files.
 configure terminal – modify the running configuration manually from the
terminal.
 show running-config – display the running configuration.
 show startup-config – display the startup configuration.
 copy running-config startup-config – copy the running configuration to the
startup configuration.
 copy startup-config running-config – copy the startup configuration to the
running configuration.
 erase startup-config – erase the startup-configuration in NVRAM.
 copy tftp running-config – load a configuration file stored on a
Trivial File Transfer Protocol (TFTP) server into the running configuration.
 copy running-config tftp – store the running configuration on a TFTP server.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
IP Address Configuration
Take the following steps to configure the IP address of an interface.
Step 1: Enter privileged EXEC mode:
 Router>enable password
Step 2: Enter the configure terminal command to enter global configuration
mode.
 Router#config terminal
Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface
 type port (for Cisco 2500 series) to enter the interface configuration mode.
 Example:
 Router (config)#interface ethernet 0/1
Step 4: Enter the IP address and subnet mask of the interface using the ip
 address ipaddress subnetmask command.
 Example,
 Router (config-if)#ip address 192.168.10.1 255.255.255.0
 Step 5: Exit the configuration mode by pressing Ctrl-Z
 Router(config-if)#[Ctrl-Z]
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Here is an example of configuring a serial port with an IP address:
switchA#config
switchA (config)#interface serial 1/1
switchA (config-if)#ip address 192.168.155.2 255.255.255.0
switchA (config-if)#ipv6 address fe80::230:1bff:fe80:b8ea/64
switchA (config-if)#ipv6 enable
switchA (config-if)#no shutdown
switchA (config-if)#ctrl-Z
Then to verify configuration:
switchA #show interface serial 1
In the Cisco IOS, the way to reverse or delete the results of any command is to
simply put no in front of it. For instance, if we wanted to unassign the IP
address we had assigned to interface serial 1/1:
switchA(config)#interface serail 1/1
switchA (config-if)#no ip address 192.168.155.2 255.255.255.0
switchA(config-if)ctrl-Z
switchA #show interface serial 1/1
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
To create a static route, the administrator tells the router operating system that
any network traffic destined for a specified network layer address should be
forwarded to a similiarly specified network layer address. In the Cisco IOS this
is done with the ip route and ipv6 route commands.
switchA #config
switchA(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1
switchA(config)#ctrl-Z
switchA #show ip route
switchA #config
switchA(config)#ipv6 route fe80::230:1bff:fe80::/64 fe80::230:1bff:fe80::1
switchA(config)#ctrl-Z
switchA #show ipv6 route
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Routing Protocol Configuration
Routing Information Protocol (RIP)
Step 1: Enter privileged EXEC mode:
 Router>enable password
Step 2: Enter the configure terminal command to enter global configuration
mode.
Router#config terminal
Step 3: Enter the router rip command
 Router(config)#router rip
Step 4: Add the network number to use RIP and repeat this step for all the
 numbers.
 Router(config-router)#network network-number
Example: Router(config-router)#network 192.168.10.0
To turn off RIP, use the no router rip command.
 Router(config)#no router rip
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Other useful commands
 Specify a RIP Version
By default, the software receives RIP version 1 and version 2 packets, but sends
only version 1 packets. To control which RIP version an interface sends, use one
of the following commands in interface configuration mode:
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
To control how packets received from an interface are processed, use one of the
following commands:
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Enable or Disable Split Horizon
Use one of the following commands in interface configuration mode:
Establishing Internet Connectivity
Open Shortest Path First (OSPF)
Step 1: Enter privileged EXEC mode:
 Router>enable password
Step 2: Enter the configure terminal command to enter global configuration
mode.
 Router#config terminal
Step 3: Enter the router ospf command and follow by the process-id.
 Router(config)#router ospf process-id
Pick the process-id which is not being used. To determine what ids are being
used, issue the show process command.
 Router(config)#show process
Step 4: Add the network number, mask and area-id
 Router(config-router)#network network-number mask area area-id
The network-number identifies the network using OSPF. The mask tells which bits to use
from the network-number, and the area-id is used for determining areas in an OSPF
configuration.
Example:
 Router(config-router)#network 192.168.10.0 255.255.255.0 area 0.0.0.0
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Repeat this step for all the network numbers.
To turn off OSPF, use the following command.
 Router(config)#no router ospf process-id
Configure OSPF Interface Parameters
You are not required to alter any of these parameters, but some interface parameters must be
consistent across all routers in an attached network. In interface configuration mode,
specify any of the following:
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Interior Gateway Routing Protocol (IGRP)
Create the IGRP Routing Process
To create the IGRP routing process, use the following required commands starting in global
configuration mode:-
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Disable Holddown
The holddown mechanism is used to help avoid routing loop in the network, but
has the effect of increasing the topology convergence time.
To disable holddowns with IGRP, use the following command in router
configuration mode. All devices in an IGRP autonomous system must be
consistent in their use of holddowns.
Commands: No metric holddown
Establishing Internet Connectivity
Enforce a Maximum Network Diameter
Define a maximum diameter to the IGRP network. Routes whose hop counts
exceed this diameter are not advertised. The default maximum diameter is 100 hops. The
maximum diameter is 255 hops.
 Use the following command in router configuration mode.
metric maximum-hops hops
To turn off IGRP, use the following command-
Router(config)#no router igrp autonomous-system
Border Gateway Protocol (BGP)
Enable BGP Routing
Use the following commands in global configuration mode.
router bgp autonomoussystem ---- Enable a BGP routing process, which places you in
router configuration mode.
network network-number[mask network-mask] [routemap route-map-name]—
Flag network as local to this autonomous system and enter it to the BGP table.
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Configure BGP Neighbors
BGP must completely understand the relationships it has with its neighbors.
Command: neighbor{ip-address | peergroup-name}remote-as number
-- Specify a BGP neighbour.
Reset BGP Connections
Use either of the following commands in EXEC mode to reset BGP connections
clear ip bgp address -- Reset a particular BGP connection.
clear ip bgp *-- Reset all BGP connections.
To turn off BGP, use the following command.
Router(config)#no router bgp autonomous-system
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity
Lessons Learned:
 TCP/IP Protocol Structure
 Subnetting
 Functions of Router
 Configuring Cisco Router
8/2/2013
Instructional Design-Computer Networking -
Bridges Educational Group
Establishing Internet Connectivity

Más contenido relacionado

La actualidad más candente

CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsAmir Jafari
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addressesAmandeep Kaur
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Using Exchange Server 2007 for Unified Messaging
Using Exchange Server 2007 for Unified MessagingUsing Exchange Server 2007 for Unified Messaging
Using Exchange Server 2007 for Unified MessagingMo Lucas
 
Ccna 3-discovery-4-0-module-1-100
Ccna 3-discovery-4-0-module-1-100Ccna 3-discovery-4-0-module-1-100
Ccna 3-discovery-4-0-module-1-100junkut3
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyhome
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguideYahye159
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)welcometofacebook
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
Modeling, Configuration and Performance Analysis of the customized network us...
Modeling, Configuration and Performance Analysis of the customized network us...Modeling, Configuration and Performance Analysis of the customized network us...
Modeling, Configuration and Performance Analysis of the customized network us...Fatema Zohora
 

La actualidad más candente (20)

CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Module 6 ip addresing
Module 6   ip addresingModule 6   ip addresing
Module 6 ip addresing
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
CCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking ModelsCCCNA R&S-02-The TCP-IP and OSI Networking Models
CCCNA R&S-02-The TCP-IP and OSI Networking Models
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Report on ip addresses
Report on ip addressesReport on ip addresses
Report on ip addresses
 
IP Address
IP AddressIP Address
IP Address
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Using Exchange Server 2007 for Unified Messaging
Using Exchange Server 2007 for Unified MessagingUsing Exchange Server 2007 for Unified Messaging
Using Exchange Server 2007 for Unified Messaging
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Ccna 3-discovery-4-0-module-1-100
Ccna 3-discovery-4-0-module-1-100Ccna 3-discovery-4-0-module-1-100
Ccna 3-discovery-4-0-module-1-100
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Hardware9
Hardware9Hardware9
Hardware9
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 
Cnd labguide
Cnd labguideCnd labguide
Cnd labguide
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)
 
internet layer protocol
internet layer protocolinternet layer protocol
internet layer protocol
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Modeling, Configuration and Performance Analysis of the customized network us...
Modeling, Configuration and Performance Analysis of the customized network us...Modeling, Configuration and Performance Analysis of the customized network us...
Modeling, Configuration and Performance Analysis of the customized network us...
 

Destacado (11)

Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
IPV6
IPV6 IPV6
IPV6
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
Wan networks
Wan networksWan networks
Wan networks
 
Building a medium sized network
Building a medium sized networkBuilding a medium sized network
Building a medium sized network
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 

Similar a Presentation 3 for Students of professordkinney.com

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectMDMusab
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfNetworkershome
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
Yu linux-tsm2004
Yu linux-tsm2004Yu linux-tsm2004
Yu linux-tsm2004alegara
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxManojGowdaKb
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address TranslationErin Moore
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5Irsandi Hasan
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategyMustafa Salam
 

Similar a Presentation 3 for Students of professordkinney.com (20)

The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Bangladesh Computer Council Networking Project
Bangladesh Computer Council Networking ProjectBangladesh Computer Council Networking Project
Bangladesh Computer Council Networking Project
 
Free CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdfFree CCNA workbook by networkers home pdf
Free CCNA workbook by networkers home pdf
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Layered Architecture
Layered ArchitectureLayered Architecture
Layered Architecture
 
Yu linux-tsm2004
Yu linux-tsm2004Yu linux-tsm2004
Yu linux-tsm2004
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Final project report
Final project reportFinal project report
Final project report
 
Vlsm
VlsmVlsm
Vlsm
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Data link layer
Data link layerData link layer
Data link layer
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
Network And Network Address Translation
Network And Network Address TranslationNetwork And Network Address Translation
Network And Network Address Translation
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
IP Addressing & subnetting strategy
IP Addressing & subnetting strategyIP Addressing & subnetting strategy
IP Addressing & subnetting strategy
 

Más de Arnold Derrick Kinney (6)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Network device management
Network device managementNetwork device management
Network device management
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Presentation 3 for Students of professordkinney.com

  • 2. Establishing Internet Connectivity 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Lessons Objectives:  Understanding the TCP/IP Internet  Understanding the TCP/IP Transport  Addressing and Subnets  Exploring the Functions of Routing  Configuring a Cisco Router 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 4.  TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.  TCP/IP uses the client/server model of communication in which a computer user (a client) requests and is provided a service (such as sending a Web page) by another computer (a server) in the network. TCP/IP communication is primarily point-to-point, meaning each communication is from one point (or host computer) in the network to another point or host computer.  Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include the World Wide Web's Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a "suite." 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 5. The TCP/IP Protocol Architecture  Figure 2 shows the TCP/IP protocol architecture; this diagram is by no means exhaustive, but shows the major protocol and application components common to most commercial TCP/IP software packages and their relationship. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 6. The Network Interface Layer PPP It is worth spending a little bit of time discussing PPP because of its importance in Internet access today. As its name implies, PPP was designed to be used over point-to-point links. In fact, it is the prevalent IP encapsulation scheme for dedicated Internet access as well as dial-up access. One of the significant strengths of PPP is its ability to negotiate a number of things upon initial connection, including passwords, IP addresses, compression schemes, and encryption schemes. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity PPP Frame Format
  • 7.  PPP generally uses an HDLC-like (bit-oriented protocol) frame format as shown in Figure 3, although RFC 1661 does not demand use of HDLC. HDLC defines the first and last two fields in the frame:  Flag: The 8-bit pattern "01111110" used to delimit the beginning and end of the transmission.  Address: For PPP, uses the 8-bit broadcast address, "11111111".  Frame Check Sequence (FCS): An 8-bit remainder from a cyclic redundancy check (CRC) calculation, used for bit error detection. The Internet Layer The Internet Protocol (RFC 791), provides services that are roughly equivalent to the OSI Network Layer. IP provides a datagram (connectionless) transport service across the network. This service is sometimes referred to as unreliable because the network does not guarantee delivery nor notify the end host system about packets lost due to errors or network congestion. IP datagrams contain a message, or one fragment of a message, that may be up to 65,535 bytes (octets) in length. IP does not provide a mechanism for flow control. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 8. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group IP Packet Header Format Establishing Internet Connectivity
  • 9. IP Addresses IP (version 4) addresses are 32 bits in length (Figure 5). They are typically written as a sequence of four numbers, representing the decimal value of each of the address bytes. Since the values are separated by periods, the notation is referred to as dotted decimal. A sample IP address is 208.162.106.17. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group IP Address Format Establishing Internet Connectivity
  • 10. The Transport Layer Protocols The TCP/IP protocol suite comprises two protocols that correspond roughly to the OSI Transport and Session Layers; these protocols are called the Transmission Control Protocol and the User Datagram Protocol (UDP) TCP  TCP, described in RFC 793, provides a virtual circuit (connection-oriented) communication service across the network. TCP includes rules for formatting messages, establishing and terminating virtual circuits, sequencing, flow control, and error correction. Most of the applications in the TCP/IP suite operate over the reliable transport service provided by TCP.  The TCP data unit is called a segment; the name is due to the fact that TCP does not recognize messages, per se, but merely sends a block of bytes from the byte stream between sender and receiver. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 11. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity TCP segment format
  • 12. UDP UDP is described in RFC 768, provides an end-to-end datagram (connectionless) service. Some applications, such as those that involve a simple query and response, are better suited to the datagram service of UDP because there is no time lost to virtual circuit establishment and termination. UDP's primary function is to add a port number to the IP address to provide a socket for the application. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity UDP Datagram Format
  • 13.  Subnetting: Lets work by Example. Example 1: A service provider has given you the Class C network range 209.50.1.0. Your company must break the network into 20 separate subnets. Step 1) Determine the number of subnets and convert to binary - In this example, the binary representation of 20 = 00010100. Step 2) Reserve required bits in subnet mask and find incremental value - The binary value of 20 subnets tells us that we need at least 5 network bits to satisfy this requirement (since you cannot get the number 20 with any less than 5 bits – 10100) - Our original subnet mask is 255.255.255.0 (Class C subnet) - The full binary representation of the subnet mask is as follows: 255.255.255.0 = 11111111.11111111.11111111.00000000 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 14. We must “convert” 5 of the client bits (0) to network bits (1) in order to satisfy the requirements: New Mask = 11111111.11111111.11111111.11111000 - If we convert the mask back to decimal, we now have the subnet mask that will be used on all the new networks – 255.255.255.248 - Our increment bit is the last possible network bit, converted back to a binary number: New Mask = 11111111.11111111.11111111.1111(1)000 – bit with the parenthesis is your increment bit. If you convert this bit to a decimal number, it becomes the number „8‟ 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 15. Step 3) Use increment to find network ranges - Start with your given network address and add your increment to the subnetted octet: 209.50.1.0 209.50.1.8 209.50.1.16 …etc - You can now fill in your end ranges, which is the last possible IP address before you start the next range 209.50.1.0 – 209.50.1.7 209.50.1.8 – 209.50.1.15 209.50.1.16 – 209.50.1.23 …etc - You can then assign these ranges to your networks. Remember the first and last address from each range (network / broadcast IP) are unusable 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 16. Example 1: A service provider has given you the Class C network range 209.50.1.0. Your company must break the network into as many subnets as possible as long as there are at least 50 clients per network. Step 1) Determine the number of clients and convert to binary - In this example, the binary representation of 50 = 00110010 Step 2) Reserve required bits in subnet mask and find incremental value - The binary value of 50 clients tells us that we need at least 6 client bits to satisfy this requirement (since you cannot get the number 50 with any less than 6 bits – 110010) - Our original subnet mask is 255.255.255.0 (Class C subnet) - The full binary representation of the subnet mask is as follows: 255.255.255.0 = 11111111.11111111.11111111.00000000 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 17. We must ensure 6 of the client bits (0) remain client bits (save the clients!) in order to satisfy the requirements. All other bits can become network bits: New Mask = 11111111.11111111.11111111.11 000000 note the 6 client bits that we have saved - If we convert the mask back to decimal, we now have the subnet mask that will be used on all the new networks – 255.255.255.192 - Our increment bit is the last possible network bit, converted back to a binary number: New Mask = 11111111.11111111.11111111.1(1)000000 – bit with the parenthesis is your increment bit. If you convert this bit to a decimal number, it becomes the number „64‟ 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 18. Step 3) Use increment to find network ranges - Start with your given network address and add your increment to the subnetted octet: 209.50.1.0 209.50.1.64 209.50.1.128 209.50.1.192 - You can now fill in your end ranges, which is the last possible IP address before you start the next range 209.50.1.0 – 209.50.1.63 209.50.1.64 – 209.50.1.127 209.50.1.128 – 209.50.1.191 209.50.1.192 – 209.50.1.255 - You can then assign these ranges to your networks. Remember the first and last address from each range (network / broadcast IP) are unusable 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 19.  When subnetting based on the number of networks, SUBTRACT 1 from the number  When subnetting based on the number of hosts per network, ADD 1 to the number  Follow these rules and you'll always be safe. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 20. Exploring the Functions of Routing  we are going to explore the packet delivery process, from the routing perspective. We will see how one of the main functions of routing is to determine the optimal path across a routed network for IP packets. Routers: Routers implement layer 3 or network layer functions. Their main job is to forward packets based upon a routing table. When doing so, they also provide traffic segmentation, multiple broadcast domains, and define network layer addressing subnets and networks. Those networks are defined by router network adapters or ports to which IP addresses are assigned. Those IP addresses are typically the default gateway to PCs and servers or other networking devices. Routers also connect to service providers and act as gateways to other networks, typically found at the perimeter or edge of the network. Some of those network adapters will be other than Ethernet. They will have connectivity to serial interfaces, DSL connections, and other forms of WAN 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 21. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity Routers Router Functions The basic routing function can be split into two areas; one is to build a map of the network and for that routers typically use either static routing or dynamic routing protocols. With the help of dynamic routing protocols, routers will let other network devices know about not only the topology of the network but also about network changes. Static routing will be that static and will not adapt to network changes. Both models accomplish the task of building the map of the network in the form of the routing table.
  • 22.  The command and output shown here display the routing table on a Cisco router. With show IP route, an IOS device like this one could show the different destinations, the cost to get there, what is known as the administrative distance to define priorities for different routing protocols, and the next-hop to get to that destination. Notice how the routing protocol that learned that particular entry or destination is shown there in the first column. This is EIGRP, this is RIP, and this is OSPF. With this information, routers will be able to determine where to forward packets. They will do so by sending the packet to the next router in the path according to the info in the routing table. Notice then that routing is based on destination addresses. Path Determination  During the process of path determination, the routers will consider multiple alternatives to get to the same place; those alternatives result from the redundancy built into most network designs. You want multiple paths, so that if one goes down, other alternatives will become available. In determining the best path, routers will consider several things. One of them is the source of the information, and so you could have multiple dynamic routing protocols or even static routing populating the routing table and telling the router what the options are. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 23.  The second piece of information is the cost of taking each path, and knowing that the path is made up of multiple links or hops that are defined by other routers. Then we could add the concepts of the cost in the context of the total path, but that cost is nothing more than the sum of all the costs to reach each hop in the path.  Well, the two decisions are ruled by different pieces of information, for example, in order to define a tie breaker between sources of information, the routers use the administrative distance, so if a routing protocol like OSPF is telling the router information on a destination and also RIP is telling that router information on the same destination, then the administrative distance will define who wins. Once the source is selected, then the cost is what matters; in other words, if OSPF is giving me the information on those two paths, then the cost of the path will define which one I take. This is similar to having two maps to drive from one city to the other. You first select which map you are going to follow and then if the map is giving you more than one option, then you will select the option according to perhaps the amount of time it takes or the amount of miles you have to drive for each option. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 24. Routing Tables  So the routing table contains the network layer intelligence that tells the router how to forward packets to remote destinations. Initially, that routing table is made up of networks that are directly connected to the particular router. They are obviously shown as directly connected networks, after that the way to learn about remote destinations is by either populating the routing table with static routes in which an administrator will tell the router how to get to the destination or by populating the routing table via routing table advertisements coming from other routers.  So routers are gossipy and they will tell each other information that allows them to know about all the gossip in the network. In both cases, static and dynamic routing notice how routers use the reserved subnet addresses or network addresses that contain all 0s in the host portion of the IP address. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 25.  In this case, we are talking about a classless subnetted class A address. Network 10 split into subnets similar to a class C. However, in all cases here, the host portion of the address, the fourth byte is all 0s and that represents that subnet or network itself. In other words, these are destination networks or subnets. In the case of remote destinations, the routing table entries show what the next hop is in order to reach that destination. In this case, in order to reach 10.1.3.0, our next-hop is router 2 at 10.1.2.2. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 26.  These are categories of routing table entries that could be populated either dynamically or statically. Some of them are born with the router. As soon as the router boots up, it will identify its directly connected active networks and interfaces and define them as reachable destinations, only because of the fact that the router is directly attached or connected to it. Now that is pretty smart, but even smarter is the fact that the routers will communicate with each other, exchange routing information via dynamic routing protocols like OSPF or EIGRP, and then learn not only about those destinations, but also adjust to changes on those destinations.  Routing protocols will be able to identify topology changes and tell each other about them. Soon enough, entries will appear and disappear from the routing table according to availability; again, an administrator could come in and manually insert static entries. This is sometimes not recommended because they will be static and they will not adjust to network changes; in other words, if the entry or the destination goes down, the entry will remain there and the router will still forward packets to a destination that is not available. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 27.  Perhaps a special case of a static route is the default route. Although they can also be learned dynamically, static defaults are used when no explicit route to a destination is known and so this is the entry that identifies all unknown destinations. The router will say, "If I do not know about a certain destination, I will forward a packet to someone that does, typically another router. Routing Metrics  Optimal path selection depends on what is known as the cost to reach a destination across a certain path. Again, the cost of a path is made up of incremental costs for each hop along the path. The cost is also known as metric, and different routing protocols will consider different criteria in order to define the metric. Older technologies and protocols consider the number of routers along the path in order to reach a destination; that is what they call the hop count. Hop count is sometimes not an efficient way to determine cost, because you could have different bandwidths associated with each hop or each link. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 28. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Router Cost Path Factors Establishing Internet Connectivity
  • 29.  In this example the two-hop path is better, because it has more bandwidth available. Other routing protocols start considering bandwidth as a measure of cost, and even more parameters in the criteria, for example, EIGRP considers bandwidth delay, reliability, load, and maximum transmission unit. In that case, a path with enough bandwidth, but one that is fully congested, would not be selected and perhaps another path with less available bandwidth would be selected because it is less congested and more reliable.  Perhaps one of the points and highlights of this lesson is the fact that routing protocol selection, if you are doing dynamic routing, is key in determining the cost or metric and, therefore, how efficient and optimal the path selection will be, but also the convergence time, which is defined by the time it takes for routing protocol to detect a topology change and adjust by selecting an alternative path if the main path is down. There are different categories of routing protocols if you are using dynamic routing that define their cost and metric, but also their behavior under those circumstances. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 30. Distance Vector Routing Protocols  Perhaps one of the points and highlights of this lesson is the fact that routing protocol selection, if you are doing dynamic routing, is key in determining the cost or metric and, therefore, how efficient and optimal the path selection will be, but also the convergence time, which is defined by the time it takes for routing protocol to detect a topology change and adjust by selecting an alternative path if the main path is down. There are different categories of routing protocols if you are using dynamic routing that define their cost and metric, but also their behavior under those circumstances.  Using the distance vector approach, which is one of the categories, routers do not have to really know the whole path toward the destination. They only have to know the direction or vector in which to send a packet. In that sense, it will only keep information in the routing tables related to what the next-hop should be in order to reach a certain destination. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 31. Link-State Routing Protocols  Link-State protocols are more efficient and effective in creating network topologies, sharing them, and selecting the best path as compared to distance vector protocols. There are several differences between the two categories. For example, link state protocols will not broadcast the information per router, it will use multicast where each router advertises via that multicast the link it knows to the neighbors. Secondly, link-state protocols do not advertise periodically. After an initial flood of all the information, yet will only advertise changes to the topology. In other words, if the link goes down then that small change will be advertised via multicast. Third, router not only know about the next hop toward a destination, they know about the whole topological map of the network. Each router after the initial flood will build that map of the network, which includes all the routers and all the links. With that information, each router is capable of browsing those tables via using the shortest path first algorithm, and select the best path toward each destination. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 32. Configuring a Cisco Router Here i will provide you some basic commands to set up your router . More details on each topic will be coming in following lessons. The Cisco IOS software provides access to several different command modes. Each command mode provides a different group of related commands. For security purposes, the Cisco IOS software provides two levels of access to commands: user and privileged. The unprivileged user mode is called user EXEC mode. The privileged mode is called privileged EXEC mode and requires a password. The commands available in user EXEC mode are a subset of the commands available in privileged EXEC mode. The following table in the next slides describes some of the most commonly used modes, how to enter the modes, and the resulting prompts. The prompt helps you identify which mode you are in and, therefore, which commands are available to you 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 33. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity Cisco Router Mode
  • 34. User EXEC Mode:  When you are connected to the router, you are started in user EXEC mode. The  user EXEC commands are a subset of the privileged EXEC commands. Privileged EXEC Mode:  Privileged commands include the following:  Configure – Changes the software configuration.  Debug – Display process and hardware event messages.  Setup – Enter configuration information at the prompts.  Enter the command disable to exit from the privileged EXEC mode and return to  user EXEC mode. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 35. Configuration Mode  Configuration mode has a set of sub modes that you use for modifying interface  settings, routing protocol settings, line settings, and so forth. Use caution with  configuration mode because all changes you enter take effect immediately.  To enter configuration mode, enter the command configure terminal and exit by pressing Ctrl-Z Getting Help  In any command mode, you can get a list of available commands by entering a  question mark (?).  Router>?  To obtain a list of commands that begin with a particular character sequence,  type in those characters followed immediately by the question mark (?).  Router#co?  configure connect copy 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 36.  To list keywords or arguments, enter a question mark in place of a keyword or  argument. Include a space before the question mark.  Router#configure ?  memory Configure from NV memory  network Configure from a TFTP network host  terminal Configure from the terminal  You can also abbreviate commands and keywords by entering just enough  characters to make the command unique from other commands. For example,  you can abbreviate the show command to sh. Configuration Files  Any time you make changes to the router configuration, you must save the  changes to memory because if you do not they will be lost if there is a system  reload or power outage. There are two types of configuration files: the running  (current operating) configuration and the startup configuration. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 37.  Use the following privileged mode commands to work with configuration files.  configure terminal – modify the running configuration manually from the terminal.  show running-config – display the running configuration.  show startup-config – display the startup configuration.  copy running-config startup-config – copy the running configuration to the startup configuration.  copy startup-config running-config – copy the startup configuration to the running configuration.  erase startup-config – erase the startup-configuration in NVRAM.  copy tftp running-config – load a configuration file stored on a Trivial File Transfer Protocol (TFTP) server into the running configuration.  copy running-config tftp – store the running configuration on a TFTP server. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 38. IP Address Configuration Take the following steps to configure the IP address of an interface. Step 1: Enter privileged EXEC mode:  Router>enable password Step 2: Enter the configure terminal command to enter global configuration mode.  Router#config terminal Step 3: Enter the interface type slot/port (for Cisco 7000 series) or interface  type port (for Cisco 2500 series) to enter the interface configuration mode.  Example:  Router (config)#interface ethernet 0/1 Step 4: Enter the IP address and subnet mask of the interface using the ip  address ipaddress subnetmask command.  Example,  Router (config-if)#ip address 192.168.10.1 255.255.255.0  Step 5: Exit the configuration mode by pressing Ctrl-Z  Router(config-if)#[Ctrl-Z] 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 39. Here is an example of configuring a serial port with an IP address: switchA#config switchA (config)#interface serial 1/1 switchA (config-if)#ip address 192.168.155.2 255.255.255.0 switchA (config-if)#ipv6 address fe80::230:1bff:fe80:b8ea/64 switchA (config-if)#ipv6 enable switchA (config-if)#no shutdown switchA (config-if)#ctrl-Z Then to verify configuration: switchA #show interface serial 1 In the Cisco IOS, the way to reverse or delete the results of any command is to simply put no in front of it. For instance, if we wanted to unassign the IP address we had assigned to interface serial 1/1: switchA(config)#interface serail 1/1 switchA (config-if)#no ip address 192.168.155.2 255.255.255.0 switchA(config-if)ctrl-Z switchA #show interface serial 1/1 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 40. To create a static route, the administrator tells the router operating system that any network traffic destined for a specified network layer address should be forwarded to a similiarly specified network layer address. In the Cisco IOS this is done with the ip route and ipv6 route commands. switchA #config switchA(config)#ip route 172.16.0.0 255.255.255.0 192.168.150.1 switchA(config)#ctrl-Z switchA #show ip route switchA #config switchA(config)#ipv6 route fe80::230:1bff:fe80::/64 fe80::230:1bff:fe80::1 switchA(config)#ctrl-Z switchA #show ipv6 route 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 41. Routing Protocol Configuration Routing Information Protocol (RIP) Step 1: Enter privileged EXEC mode:  Router>enable password Step 2: Enter the configure terminal command to enter global configuration mode. Router#config terminal Step 3: Enter the router rip command  Router(config)#router rip Step 4: Add the network number to use RIP and repeat this step for all the  numbers.  Router(config-router)#network network-number Example: Router(config-router)#network 192.168.10.0 To turn off RIP, use the no router rip command.  Router(config)#no router rip 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 42. Other useful commands  Specify a RIP Version By default, the software receives RIP version 1 and version 2 packets, but sends only version 1 packets. To control which RIP version an interface sends, use one of the following commands in interface configuration mode: 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 43. To control how packets received from an interface are processed, use one of the following commands: 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Enable or Disable Split Horizon Use one of the following commands in interface configuration mode: Establishing Internet Connectivity
  • 44. Open Shortest Path First (OSPF) Step 1: Enter privileged EXEC mode:  Router>enable password Step 2: Enter the configure terminal command to enter global configuration mode.  Router#config terminal Step 3: Enter the router ospf command and follow by the process-id.  Router(config)#router ospf process-id Pick the process-id which is not being used. To determine what ids are being used, issue the show process command.  Router(config)#show process Step 4: Add the network number, mask and area-id  Router(config-router)#network network-number mask area area-id The network-number identifies the network using OSPF. The mask tells which bits to use from the network-number, and the area-id is used for determining areas in an OSPF configuration. Example:  Router(config-router)#network 192.168.10.0 255.255.255.0 area 0.0.0.0 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 45. Repeat this step for all the network numbers. To turn off OSPF, use the following command.  Router(config)#no router ospf process-id Configure OSPF Interface Parameters You are not required to alter any of these parameters, but some interface parameters must be consistent across all routers in an attached network. In interface configuration mode, specify any of the following: 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 46. Interior Gateway Routing Protocol (IGRP) Create the IGRP Routing Process To create the IGRP routing process, use the following required commands starting in global configuration mode:- 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Disable Holddown The holddown mechanism is used to help avoid routing loop in the network, but has the effect of increasing the topology convergence time. To disable holddowns with IGRP, use the following command in router configuration mode. All devices in an IGRP autonomous system must be consistent in their use of holddowns. Commands: No metric holddown Establishing Internet Connectivity
  • 47. Enforce a Maximum Network Diameter Define a maximum diameter to the IGRP network. Routes whose hop counts exceed this diameter are not advertised. The default maximum diameter is 100 hops. The maximum diameter is 255 hops.  Use the following command in router configuration mode. metric maximum-hops hops To turn off IGRP, use the following command- Router(config)#no router igrp autonomous-system Border Gateway Protocol (BGP) Enable BGP Routing Use the following commands in global configuration mode. router bgp autonomoussystem ---- Enable a BGP routing process, which places you in router configuration mode. network network-number[mask network-mask] [routemap route-map-name]— Flag network as local to this autonomous system and enter it to the BGP table. 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 48. Configure BGP Neighbors BGP must completely understand the relationships it has with its neighbors. Command: neighbor{ip-address | peergroup-name}remote-as number -- Specify a BGP neighbour. Reset BGP Connections Use either of the following commands in EXEC mode to reset BGP connections clear ip bgp address -- Reset a particular BGP connection. clear ip bgp *-- Reset all BGP connections. To turn off BGP, use the following command. Router(config)#no router bgp autonomous-system 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity
  • 49. Lessons Learned:  TCP/IP Protocol Structure  Subnetting  Functions of Router  Configuring Cisco Router 8/2/2013 Instructional Design-Computer Networking - Bridges Educational Group Establishing Internet Connectivity