You are on page 1of 17

Infrastructure Management Services 2022-23

Chapter 1

Introduction

1.1 Introduction
Nodes and links are the basic building blocks in computer networking. A network node may
be data communication equipment (DCE) such as a modem, hub or, switch, or data terminal
equipment (DTE) such as two or more computers and printers. A link refers to the
transmission media connecting two nodes. Links may be physical, like cable wires or optical
fibres, or free space used by wireless networks. In a working computer network, nodes follow
a set of rules or protocols that define how to send and receive electronic data via the links.
The computer network architecture defines the design of these physical and logical
components. It provides the specifications for the network’s physical components, functional
organization, protocols, and procedures. RIP is an interior gateway protocol (IGP) that routes
packets within a single autonomous system (AS). RIP uses link-state information to make
routing decisions, making route calculations using the shortest-path-first (SPF) algorithm
(also referred to as the Dijkstra algorithm). A computer networking is a process of connecting
two more than two computers with the purpose to share data, provide technical support, and
to communicate (especially for the business purpose.

Internet is the technology that is used to connect different computer systems (located in
different geographic location). Networking technology has revolutionized the world and
created a new arena for the overall development of every nation.

Types of Network In this section, we will discuss the different types of network. The types
are described below
 Local Area Network (LAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)

Dept. CS&E, GEC Hassan Page 1


Infrastructure Management Services 2022-23

Local Area Network


Local Area Network or simply LAN is the technique of interconnecting a few computers
located in a given premise. It is normally used for a single business office or a residential
apartment.

Metropolitan Area Network


Metropolitan Area Network or simply MAN is a system of network that normally covers
a large metropolitan area (city part).It provides high speed Internet services throughout
the area covered within the network.

Wide Area Network


Wide Area Network or simply WAN is a system of network that covers a large geographical
area across the world.

Figure 1.1: Topology

Dept. CS&E, GEC Hassan Page 2


Infrastructure Management Services 2022-23

Topology :

 Bus network. In the bus network topology, every node is connected in series along a
single cable. This arrangement is found today primarily in cable broadband distribution
networks.
 Star network. In the star network topology, a central device connects to all other nodes
through a central hub. Switched local area networks based on Ethernet switches and
most wired home and office networks have a physical star topology.
 Ring network. In the ring network topology, the nodes are connected in a closed-loop
configuration. Some rings pass data in one direction only, while others are capable of
transmission in both directions.
 Mesh network. The mesh network topology links nodes with connections so that
multiple paths between at least some points of the network are available. A network is
considered to be fully meshed if all nodes are directly connected to all other nodes and
partially meshed if only some nodes have multiple connections to others.
 Hybrid network. The hybrid network topology is any combination of two or more
topologies. Hybrid topologies typically provide exceptional flexibility, as they can
accommodate a number of setups. For example, different departments in the same
organization may opt for personalized network topologies that are more adaptable to
their network needs.

1.2 Problem Statement

Design and Simulate University Network using RIP mechanism and centralized Router as a
DHCP server.

1.3 Objectives
The main objective is to distribute IP routing information throughout a systems in an IP
network.
1.4 Application
 RIP is the first widely deployed routing protocol. It can converge with a network in a
few seconds, and it is one of the protocols that can provide loop-free paths.
 Open Short Path First is better at load sharing on external links compared to other IGPs.

Dept. CS&E, GEC Hassan Page 3


Infrastructure Management Services 2022-23

 Aside from these features, Open Short Path First allows the imposition of policies for
the propagation of routes in the network.
 Compared with distance-vector routing protocols such as the Routing Information
Protocol (RIP), RIP is more suitable for serving large, heterogeneous internetworks.
 RIP can recalculate the routes in a short amount of time when the network topology
changes.
 With OSPF, you can divide an Autonomous System (AS) into areas and keep area
topologies separate to decrease the RIP routing traffic and the size of the link-state
database of each area.

1.5 Advantages
 Facility of Technical Support
 Easy Sharing of Data
 Easy Sharing of Hardware Resource
 Easy Sharing Software
 Easy to Communicate
 Simplicity: RIP is easy to set up and configure, making it a good choice for small
networks that don’t require a lot of complexity.
 Easy to troubleshoot: Because RIP is a simple protocol, it is easy to troubleshoot and
diagnose problems when they occur.
 Widely supported: RIP is a widely supported protocol, which means that it can be used
with a variety of different network devices and vendors.

1.6 Disadvantages
 Limited scalability: RIP is not well-suited for large networks because it can only support
a limited number of hops (15 by default). This means that RIP is not a good choice for
networks with many routers or a complex topology.
 It is a more complex protocol to understand and learn compared to other Internet
Protocols.
 High network traffic: RIP sends updates every 30 seconds by default, regardless of
whether there have been any changes to the routing table. This can result in unnecessary
network traffic and increased overhead.

Dept. CS&E, GEC Hassan Page 4


Infrastructure Management Services 2022-23

1.7 Organization of Report


This report is divided into chapters, each dealing with different aspects of the project. Each
chapter has a short introduction, explaining the subject of each chapter, and then the details of
each module is explained separately. The following is a short overview of each of the
chapters.

Chapter 1: This section gives the overview of Networking and gives a brief introduction to
RIP.

Chapter 2: Outlines some of the research made on the project in the beginning. More
research was made as this project report was being developed, as new areas had to be
investigated. This research is summarized in the various chapters according to the different
modules.

Chapter 3: Specifies the requirements specification of the project

Chapter 4: This section specifies the overflow/ proposed methodology of the project.

Chapter 5: Explains the flow diagram and also gives an outline of the design of our project.

Chapter 6: This section specifies the implementation of the project. The snapshots related to
the project can also be seen here.

Chapter 7: The final conclusion of the project is discussed here.

Dept. CS&E, GEC Hassan Page 5


Infrastructure Management Services 2022-23

Chapter 2

Literature Survey

“Routing Information Protocol (RIP)” by Charles E. Perkins and Pravin Bhagwat, published
in Network Protocols Handbook, 2nd Edition (2007). This book chapter provides a detailed
overview of RIP, its operation, advantages, and limitations.

“A Performance Comparison of RIP and OSPF Routing Protocols in Enterprise Network” by


Imtiaz Ahmad and Muhammad Asim, published in Journal of Applied Sciences (2011). This
research article compares the performance of RIP and OSPF routing protocols in a
mediumsized enterprise network and concludes that OSPF outperforms RIP in terms of
convergence time, scalability, and network stability.

“A New Routing Protocol for Wireless Sensor Networks Based on RIP” by Junzhao Du,
published in Journal of Networks (2011). This research article proposes a modified version of
RIP called RIPv2-WSN, which is optimized for wireless sensor networks. The paper shows
that RIPv2-WSN outperforms traditional RIP and other routing protocols in terms of energy
consumption and network lifetime.

“Comparison between RIP and EIGRP routing protocols” by Raad M. Al-Qassas and Thaer
M. Salah, published in International Journal of Computer Networks Communications (2012).
This research article compares the performance of RIP and Enhanced Interior Gateway
Routing Protocol (EIGRP) in a simulated network and concludes that EIGRP outperforms
RIP in terms of convergence time, scalability, and network stability.

‘Secure Routing Information Protocol (RIP) using IP Security (IPSec)” by Yaqub Ali and
Fawaz A. Al-Qahtani, published in International Journal of Computer Science Issues (2012).

This research article proposes a secure version of RIP using IP Security (IPSec) and shows
that the proposed protocol provides secure and reliable routing in a simulated network.

Dept. CS&E, GEC Hassan Page 6


Infrastructure Management Services 2022-23

Overall, these literature sources provide a comprehensive understanding of RIP, its


performance, advantages, and limitations, and also suggest ways to improve the protocol’s
performance and security in different network environments.

References:
1. S. Sendra, P. A. Fern´andez, M. A. Quilez and J. Lloret, ”Study and Performance of
Interior Gateway IP routing Protocols”, Network Protocols and Algorithms, 2010. 2. V.
Vetriselvan, P. R. Patil and M. Mahendran, ”Survey on the RIP OSPF EIGRP Routing
Protocols”, Int. Journal of Computer Science and Information Technologies, 2014.

Dept. CS&E, GEC Hassan Page 7


Infrastructure Management Services 2022-23

Chapter 3

Requirement Analysis

 Processor i3 or i5 2Ghz
 RAM 4G
 Cable
An Ethernet cable allows the user to connect their devices such as computers, mobile
phones, routers, etc.; to a network that will allow a user to have internet access, it also
carries broadband signals between devices connected through it.
 Switch
Switches are networking devices operating at layer 2 or a data link layer of the OSI
model. They connect devices in a network and use packet switching to send, receive or
forward data packets or data frames over the network. A switch has many ports, to which
computers are plugged in. When a data frame arrives at any port of a network switch, it
examines the destination address, performs necessary checks and sends the frame to the
corresponding device(s).It supports unicast, multicast as well as broadcast
communications. supports unicast, multicast as well as broadcast communications.
 DHCP
DHCP stands for Dynamic Host Configuration Protocol, which is a network protocol
used to dynamically assign IP addresses and other network configuration parameters to
devices
 DNS
The Domain Name System (DNS) turns domain names into IP addresses, which browsers
use to load internet pages. Every device connected to the internet has its own IP address,
which is used by other devices to locate the device.
 Web Server
A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and
other protocols to respond to client requests made over the World Wide Web. The main
job of a web server is to display website content through storing, processing and
delivering webpages to users.

Dept. CS&E, GEC Hassan Page 8


Infrastructure Management Services 2022-23

 Router
A router is a device that connects two or more packet-switched networks or sub networks.
It serves two primary functions: managing traffic between these networks by forwarding
data packets to their intended IP addresses, and allowing multiple devices to use the same
Internet connection. There are several types of routers, but most routers pass data between
LANs (local area networks) and WANs (wide area networks).

3.3 Functional Requirements

 Secure network infrastructure


Network Infrastructure Security, typically applied to enterprise IT environments, is a
process of protecting the underlying networking infrastructure by installing preventative
measures to deny unauthorized access, modification, deletion, and theft of resources and
data.
 Secure network components
Firewalls, IPS, network access control (NAC), and security information and event
management (SIEM) are the four most essential components of network security.
 Secure local communication
secure communication is crucial for many applications to protect data transmission
between two network nodes. The Transport Layer Security (TLS) protocol is a
standardized technology for establishing a secure, encrypted and authenticated link
between two parties over an insecure network.

Dept. CS&E, GEC Hassan Page 9


Infrastructure Management Services 2022-23

3.4 Non Functional Requirements


 Capacity and Scalability
Sufficient amount of resources must be made available to the system, and the system
must make use of these resources as required.
 Bandwidth
Network bandwidth is a measurement indicating the maximum capacity of a wired or
wireless communications link to transmit data over a network connection in a given
amount of time.
 Speed
Speed refers to the maximum rate you can transmit data, typically measured as megabits
per second (Mbps).
 Performance Requirements
The need for quality software to be fast and responsive cannot be overemphasized. The
user should not have any disconcerting feeling while using the application due to slow
response times when a request is made. Skillted should be fast and responsive.

Dept. CS&E, GEC Hassan Page 10


Infrastructure Management Services 2022-23

Chapter 4

Proposed Methodology

4.1 Methodology
RIP (Routing Information Protocol) is a distance-vector routing protocol used in computer
networks to distribute routing information within a network. It is a protocol used to help
routers communicate with each other and determine the best path for data to take as it moves
through the network. How does RIP work?

These are the following steps that can explain the working of RIP:

Step 1: Open Cisco Packet Tracer and create a network topology.


Step 2: Add routers and connect them with appropriate links.
Step 3: Select a router and go to the “Config” tab.
Step 4: Type “router rip” in the console to enable RIP on the router.
Step 5:Type “network [network-address]” to add networks to the routing table. Replac
[network-address] with the IP address and subnet mask of the network you want to add.
Step 6: Repeat step 5 for each network you want to add.
Step 7: Type “exit” to exit the router configuration mode
Step 8: Designing the Ip address for RIP network manually. The networks created are:
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
192.168.4.0/24
Step 8: Establishing RIP routing within a network in order to get shortest route.
Step 9: Update the bandwidth according to the user requirements.
Step 10: Routing between the routers depends on bandwidth and hop count.

Dept. CS&E, GEC Hassan Page 11


Infrastructure Management Services 2022-23

Chapter 5

Design

5.1 Flow Daigram

Figure 5.1: Flow Daigram

Dept. CS&E, GEC Hassan Page 12


Infrastructure Management Services 2022-23

The flow of our project is:

 Firstly created the four networks, connected them using switches and routers.
 Checked those network, whether they are pinging each other and between the each
network.
 End devices are pinging using their IP addresses.
 Next, setting up with the DHCP server which helps in getting dynamic IP for end
systems.
 To establish connection between the network , we used RIP protocol in order to
communicate with other network by calculating shortest path between them
 RIP runs mainly by calculating the shortest path between devices.

Dept. CS&E, GEC Hassan Page 13


Infrastructure Management Services 2022-23

Chapter 6

Implementation

6.1 SNAPSHOTS

Figure 6.1: IP configuration

This figure shows that how IP configuration has set to individual end devices.

Dept. CS&E, GEC Hassan Page 14


Infrastructure Management Services 2022-23

Figure 6.2: Pinging the systems

Above figure indicates the pinging a system from one network to another. Pinging can be
done within a LAN network also between the LAN network.

Dept. CS&E, GEC Hassan Page 15


Infrastructure Management Services 2022-23

Figure 6.3: RIP network with LAN WAN

Above figure shows our whole project with 4 LAN network 3 WAN network , where routing
are done by RIP network.

Dept. CS&E, GEC Hassan Page 16


Infrastructure Management Services 2022-23

Chapter 7

Conclusion

Routing Information Protocol (RIP) is a distance-vector routing protocol used in computer


networks to determine the best path for data to travel between routers. RIP is a simple and
easy-to-configure protocol, but it has some limitations, such as its limited hop count and slow
convergence time. As a result, RIP is not commonly used in modern networks and has largely
been replaced by more advanced routing protocols such as Open Shortest Path First (OSPF)
and Border Gateway Protocol (BGP). However, RIP is still supported by some legacy
systems and can be a useful protocol in smaller networks where simplicity and ease of use are
more important than advanced features.

Dept. CS&E, GEC Hassan Page 17

You might also like