Professional Documents
Culture Documents
PRACTICAL FILE
SUBMITTED BY : SUBMITTED TO
Ishan Sharma MS. Megha Kumar
00618007220
B.TECH (CSE 3RD YEAR )
SECTION B
8 Implementation of Routing
Information Protocol using Cisco
Packet Tracer
Experiment no. 1
AIM: Implementation of bus topology using cisco packet tracer .
DESCRIPITON :
Multiple computers are connected to each other through a link. These computers in a network are
known as Nodes. They are connected either through cable or wireless radio links. These computers
connected in the network share resources such as files, network access, printers, etc…By connecting in a
network a computer can do many tasks.In Bus Topology used in computer networks, all the computers
are connected through a single cable. Usually Ethernet cable is used for Bus Topology. In this topology,
the information intended for the last node has to pass through all the computers present in the
network. If this cable is damaged then the connection of all the computers will be lost.
Instead of cable either network card, co-axial cable or RJ-47 can be used depending on the type of
computers used in the network. When Bus Topology has only two endpoints, it is known as Linear
Topology. In Bus topology data is transmitted only in one direction.
Here, the node that transmits data is known as Host. All the computers connected in the network will
receive all the network traffic. Each node is given equal priority for data transmission. The nodes use
Media Access Technology such as a bus master to share the bus.
Advantages
• It is very simple to design.
• Require less cabling compared to other topologies.
• Each to implement for small networks.
• It is easy to expand by simply joining two cables together.
• Very cost-effective.
Disadvantages
• The network stands on a single cable. So, if any damage caused to this cable the whole
network falls.
• As the traffic is shared by all the nodes in the network, the performance of the network
decreases as the traffic increases.
• It is difficult to find the flaws and faults in the network connected with this method.
• Packet loss is high.
• This topology is very slow compared to other topologies.
Network Model :
Stimulated Output :
Experiment no. 2
AIM: Implementation of ring topology using cisco packet tracer .
DESCRIPITON :
In a ring network, packets of data travel from one device to the next until they reach their
destination. Most ring topologies allow packets to travel only in one direction, called
a unidirectional ring network. Others permit data to move in either direction,
called bidirectional.
Advantages
1. Flow of data is in circular direction which minimizes the chance of packet collision.
2. The uni-directional ring topology provides very high speed.
3. It has better performance than bus topology, even when the nodes are increased.
4. Ring network can handle high volume of nodes in a network (Robust).
5. It can handle heavy traffic as compared to bus topology due to Token passing principal.
Disadvantages
1. A single break in the cable can cause disturbance in the entire network
2. In Uni-directional Ring, a data packet (token) must pass through all the nodes.
3. Addition and removal of any node in a network is difficult and can cause issue in network
activity.
4. Ring network is much slower than Ethernet network under normal load conditions.
DESCRIPITON :
Star topology is a network topology in which each network component is physically connected
to a central node such as a router, hub or switch.
In a star topology, the central hub acts like a server and the connecting nodes act like clients.
When the central node receives a packet from a connecting node, it can pass the packet on to
other nodes in the network. A star topology is also known as a star network.
Star networks require a point-to-point connection between the central node and connecting
devices. To improve communication between the devices on the network, the central node can
provide signal reconditioning and amplification services.
Advantage
The main advantage of a star IoT network is that it delegates communication complexity to the
central node. All the rest IoT devices can communicate according to their time or frequency
slot. In case of a device failure, the rest devices are not affected. Likewise, in the case of a
security attack against an IoT device, only a single node is compromised, as endpoints operate
independently of each other. Hence, star topologies offer better security than mesh networks.
It is also easy and straightforward to add or remove nodes from the central connection point.
This makes star topologies flexible and scalable. As already outlined, popular LPWAN networks
rely on star topologies in order to minimize power consumption and to ensure that sensors and
IoT devices can operate for large intervals without a battery change
Disadvantage
One of the main drawbacks of a star topology is that the radio link between the gateway and
the devices can be very long, which increases the amount of energy needed for relaying a
message. Nevertheless, contrary to mesh networks, in star topologies devices do not consume
energy continuously, but rather only when they transmit data.
DESCRIPITON :
Mesh topology is a type of networking in which all the computers are inter-connected to each
other. In Mesh Topology, the connections between devices take place randomly. The connected
nodes can be computers, switches, hubs, or any other devices. In this topology setup, even if
one of the connections goes down, it allows other nodes to be distributed. This type of
topology is very expensive and does not have any hierarchy, interdependency, and uniform
pattern between nodes. The connections of the mesh topology are not easier to establish.
All computers, in a mesh topology, not only responsible for sending their own signals but also
relays for other nodes. Usually, it is used for wireless networks, and its connections can be
wired or wireless. Also, there is a point-to-point connection between all nodes in the mesh
topology setup.
Advantages
• Failure during a single device won’t break the network.
• There is no traffic problem as there is a dedicated point to point links for every computer.
• Fault identification is straightforward.
• This topology provides multiple paths to succeed in the destination and tons of
redundancy.
• It provides high privacy and security.
• Data transmission is more consistent because failure doesn’t disrupt its processes.
Disadvantages
• It’s costly as compared to the opposite network topologies i.e. star, bus, point to point
topology.
• Installation is extremely difficult in the mesh.
• Power requirement is higher as all the nodes will need to remain active all the time and
share the load.
• Complex process.
• The cost to implement mesh is above other selections.
DESCRIPITON :
TELNET stands for TErminaL NETwork. It is a type of protocol that enables one computer to
connect to local computer. It is a used as a standard TCP/IP protocol for virtual terminal
service which is given by ISO. Computer which starts connection known as the local
computer. Computer which is being connected to i.e. which accepts the connection known
as remote computer. When the connection is established between local and remote
computer. During telnet operation whatever that is being performed on the remote computer
will be displayed by local computer. Telnet operates on client/server principle. Local
computer uses telnet client program and the remote computers uses telnet server program.
Advantages of Telnet
⚫ It can be used to send/receive information.
⚫ It helps in administration of the network elements.
⚫ It supports user authentication.
⚫ All the telnet clients and servers implement a network virtual terminal (NVT).
⚫ Automation test facilities are used by remote computers on shared basis. This saves cost by
limiting costly test equipments/facilities at selected locations for all the users across the
world.
Disadvantage
⚫ User ID and password are transmitted without any encryption. This leads to security risk in
Telnet protocol as eavesdropping and snooping are easier to implement by intruders or
hackers.
⚫ It is not possible to run GUI based tools over Telnet connection as it is character based
communication tool. It is not possible to transmit cursor movements and other GUI
information.
⚫ It is very inefficient protocol.
Each keystrokes require several context switches before it reaches the other end
⚫ It is expensive due to slow typing speeds.
Code
Configuration
Network Model and Stimulated Output
Experiment no. 6
AIM: To connect wireless router using cisco packet tracer .
DESCRIPITON :
Wireless router : A wireless router connects directly to a modem by a cable. This allows it to
receive information from — and transmit information to — the internet. The router then
creates and communicates with your home Wi-Fi network using built- in antennas.
This provides all the devices on your home network with internet access.
Stimulated Output
Experiment no. 7
AIM: Implementation of static routing using cisco packet tracer .
DESCRIPITON :
Static routing is a routing type in which a network administrator configures the routes into the
routing table to be used by the router to send packets to a destination network.
Static routing is only optimal in a few situations. Network degradation, latency and congestion
are inevitable consequences of the non-flexible nature of static routing because there is no
adjustment when the primary route is unavailable.
Static routing performs routing decisions with preconfigured routes in the routing table, which
can be changed manually only by administrators. Static routes are normally implemented in
those situations where the choices in route selection are limited, or there is only a single
default route available. Also, static routing can be used if you have only few devices for route
configuration and there is no need for route change in the future.
• Static routes are not advertised through the network, which increases security.
• Static routes consume less bandwidth than dynamic routing protocols. No CPU cycle is
used to calculate and communicate routes.
• The route that uses a static route to send data is known.
• Static routes are not advertised through the network, which increases security.
• Static routes consume less bandwidth than dynamic routing protocols. No CPU cycle is
used to calculate and communicate routes.
• The route that uses a static route to send data is known.
Network Model and Stimulated Output
Experiment no. 8
AIM: Implementation of routing information protocol using cisco packet tracer .
DESCRIPITON :
Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a
routing metric to find the best path between the source and the destination network. It is a
distance-vector routing protocol that has an AD value of 120 and works on the Network layer
of the OSI model. RIP uses port number 520.
Hop Count
Hop count is the number of routers occurring in between the source and destination network.
The path with the lowest hop count is considered as the best route to reach a network and
therefore placed in the routing table. RIP prevents routing loops by limiting the number of
hops allowed in a path from source and destination. The maximum hop count allowed for RIP
is 15 and a hop count of 16 is considered as network unreachable.
Features of RIP
1. Updates of the network are exchanged periodically.
2. Updates (routing information) are always broadcast.
3. Full routing tables are sent in updates.
4. Routers always trust routing information received from neighbor routers. This is also
known as Routing on rumors.
Advantages of RIP
• It is easy to configure.
• that it does not require an update every time the topology of network changes.
• Guaranteed to support almost all routers
Disadvantages of RIP
• It is only based on hop count. So, if there is a better route available with better
bandwidth then it will not select that route.
Network Model and Stimulated Output