ICT Smart Solution

Energy solutions, Smart Choice within Reach. By NIYONGABO Olivier

Follow Us

NIYONGABO Olivier.

We Connect You

To All IT Services, Find it in ICT Smart Solution.

Our Services

In The Truth We Are Able To Give You This Services Above.

Our Address

Call Us On That Contact Above.

SUBNETING

0 comments


SUBNETTING


- Subnetting Explained with Examples
This tutorial explains Subnetting in easy language with examples. This tutorial is divided in three sections. First section provides a basic overview of Subnetting tools. Second section explains Subnetting process in easy steps. Last section includes Subnetting examples for beginners.
Subnetting
Subnetting is a process of dividing large network into the smaller networks based on layer 3 IP address. Every computer in network has an IP address which represents its location in network. There are two versions of IP address; IPv4 and IPv6. This tutorial explains Subnetting in IPv4.
This tutorial is the second part of our article “Network Addressing Explained with Subnetting and VLSM”. You can read other parts of this article here.

This tutorial is the first part of this article. It explains how computers find each other in network with basic terminology of network addressing.

This tutorial is the last part of this article. It explains VLSM in detail with examples including a unique six steps method of VLSM that will help you in learning VLSM rapidly.
IPv4
IP addresses are displayed in dotted decimal notation, and appear as four numbers separated by dots. Each number of an IP address is made from eight individual bits known as octet. Each octet can create number value from 0 to 255. An IP address would be 32 bits long in binary divided into the two components, network component and host component. Network component is used to identify the network that the packet is intend for, and host component is used to identify the individual host on network.
IP addresses are broken into the two components:
Network component :- Defines network segment of device.
Host component :- Defines the specific device on a particular network segment
IP Classes in decimal notation
Class A addresses range from 1-126
Class B addresses range from 128-191
Class C addresses range from 192-223
Class D addresses range from 224-239
Class E addresses range from 240-254
·         0 [Zero] is reserved and represents all IP addresses.
·         127 is a reserved address and is used for testing, like a loop back on an interface.
·         255 is a reserved address and is used for broadcasting purposes.
Subnet mask
Subnet mask is a 32 bits long address used to distinguish between network address and host address in IP address. Subnet mask is always used with IP address. Subnet mask has only one purpose, to identify which part of an IP address is network address and which part is host address.
For example how will we figure out network partition and host partition from IP address 192.168.1.10 ? Here we need subnet mask to get details about network address and host address.
·         In decimal notation subnet mask value 1 to 255 represent network address and value 0 [Zero] represent host address.
·         In binary notation subnet mask ON bit [ 1] represent network address while OFF bit[0] represent host address.
In decimal notation
IP address       192.168.1.10
Subnet mask      255.255.255.0
Network address is 192.168.1 and host address is 10.
In binary notation
IP address 11000000.10101000.00000001.00001010
Subnet mask 11111111.11111111.11111111.00000000
Network address is 11000000.10101000.00000001 and host address is 00001010

IP Class
Default Subnet
Network bits
Host bits
Total hosts
Valid hosts
A
255.0.0.0
First 8 bits
Last 24 bits
16, 777, 216
16, 777, 214
B
255.255.0.0
First 16 bits
Last 16 bits
65,536
65,534
C
255.255.255.0
First 24 bits
Last 8 bits
256
254
Network ID
First address of subnet is called network ID. This address is used to identify one segment or broadcast domain from all the other segments in the network.
Block Size
Block size is the size of subnet including network address, hosts addresses and broadcast address.
Broadcast ID
There are two types of broadcast, direct broadcast and full broadcast.
Direct broadcast or local broadcast is the last address of subnet and can be hear by all hosts in subnet.
Full broadcast is the last address of IP classes and can be hear by all IP hosts in network. Full broadcast address is 255.255.255.255
The main difference between direct broadcast and full broadcast is that routers will not propagate local broadcasts between segments, but they will propagate directed broadcasts.
Host Addresses
All address between the network address and the directed broadcast address is called host address for the subnet. You can assign host addresses to any IP devices such as PCs, servers, routers, and switches.
Subnetting
Subnetting is a process of breaking large network in small networks known as subnets. Subnetting happens when we extend default boundary of subnet mask. Basically we borrow host bits to create networks. Let's take a example
Being a network administrator you are asked to create two networks, each will host 30 systems.
Single class C IP range can fulfill this requirement, still you have to purchase 2 class C IP range, one for each network. Single class C range provides 256 total addresses and we need only 30 addresses, this will waste 226 addresses. These unused addresses would make additional route advertisements slowing down the network.
With subnetting you only need to purchase single range of class C. You can configure router to take first 26 bits instead of default 24 bits as network bits. In this case we would extend default boundary of subnet mask and borrow 2 host bits to create networks. By taking two bits from the host range and counting them as network bits, we can create two new subnets, and assign hosts them. As long as the two new network bits match in the address, they belong to the same network. You can change either of the two bits, and you would be in a new subnet.
Advantage of Subnetting
·         Subnetting breaks large network in smaller networks and smaller networks are easier to manage.
·         Subnetting reduces network traffic by removing collision and broadcast traffic, that overall improve performance.
·         Subnetting allows you to apply network security polices at the interconnection between subnets.
·         Subnetting allows you to save money by reducing requirement for IP range.
Subnetting math
Subnetting process involves binary math calculation. Computers communicate with each other's in binary language. To succeed in any kind of networking career, you might be fluent in binary math calculation. Subnetting needs two type of calculation, convert decimal to binary and convert binary to decimal.
Base position
27
26
25
24
23
22
21
20
Decimal value
128
64
32
16
8
4
2
1
Binary system works exactly same as decimal system, except the base number. Base number is 2 in binary system and 10 in decimal system. To calculate decimal equivalent value of a binary number, you have to replace base value 10 with 2. Binary numbers are displayed in columns and each position in binary system has double value than the position in right. From earlier section of this article you know that each number of an IP address is made from eight individual bits known as octet. So you should remember at least eight decimal equivalent value from binary position.
Convert decimal to binary
To convert a decimal number in binary we would use addition till number method. In this method we start adding from left to get target value. If after adding right position value, sum is lower than target number, keep adding, or if sum is greater than target number skip the position value. Only the value of on bit [1] will be added in sum. Off bit [0] has zero value. For example, convert decimal number 117 in binary.
Target decimal number 117
Move direction From Left ===========================> to Right
Base position
27
26
25
24
23
22
21
20
Decimal value
128
64
32
16
8
4
2
1
Bit status
0
1
1
1
0
1
0
1
Decimal value in addition
0
64
32
16
0
4
0
1
Binary value of 117 is 01110101.
Decimal calculation
Bit in binary
128 is greater than 117
off the bit
0+64 = 64 is less than 117
on the bit
0+64+32 = 96 is less than 117
on the bit
0+64+32+16 = 112 is less than 117
on the bit
0+64+32+16+8 = 120 is greater than 117
off the bit
0+64+32+16+0+4 = 116 is less than 117
on the bit
0+64+32+16+0+4+2 = 118 is greater than 117
off the bit
0+64+32+16+0+4+0+1 = 117 is equivalent to 117
on the bit
Convert binary in decimal
To convert a binary in decimal we will follow above method in reverse mode. We will find the decimal value of on binary bit position and add them. For example convert 10101010 binary number in decimal.
Target binary number 10101010
Move direction From Left ===========================> to Right
Base position
27
26
25
24
23
22
21
20
Decimal value
128
64
32
16
8
4
2
1
Bit status
1
0
1
0
1
0
1
0
Decimal value in addition
128
0
32
0
8
0
2
0
Decimal value of 10101010 is 170 [ 128+0+32+0+8+0+2+0 ]
Binary bit
Decimal value
1 On bit
128
0 Off bit
0
1 On bit
64
0 Off bit
0
1 On bit
32
0 Off bit
0
1 On bit
8
0 Off bit
0
1 On bit
2
0 Off bit
0
Review above method and do as much practice of following as you can.
·         Pick any number from 0 - 255 and convert it in binary.
·         Pick any combination from 00000000 - 11111111 and convert it in decimal.
Better you are with this conversion, the better you will do on the subnetting.
Combination provided by binary position
Now you know the process of converting binary in decimal and decimal in binary. Our next step is to figure out the combination provided by a binary position.
First bit provide two combination 0 or 1. If we take two bits than we have four combinations 00,01,10,11. IP address has 32 bits, so you should be able to find the number of combinations provided by each bit position until position number 32.
Number of bit[s]
Number of combinations
Number of bits
Number of combinations
1
2
17
131072
2
4
18
262144
3
8
19
524288
4
16
20
1048576
5
32
21
2097152
6
64
22
4194304
7
128
23
8388608
8
256
24
16777216
9
512
25
33554432
10
1024
26
67108864
11
2048
27
134217728
12
4096
28
268435456
13
8192
29
536870912
14
16384
30
1073741824
15
32768
31
2147483648
16
65536
32
4294967296
Default subnet mask
Class
Subnet Mask
Format
A
255.0.0.0
Network.Host.Host.Host
B
255.255.0.0
Network.Network.Host.Host
C
255.255.255.0
Network.Network.Network.Host
Key terms to remembers
·         A subnet is a smaller portion of large network treated as its own separate network. To create subnet we borrow bits from host portion and assign them as network bits. This mean more networks, fewer hosts.
·         If the network bits on two addresses do not match, then the two packets are intended for two separate networks.
·         On a 32 bits IP address at least eight bits must belong to the network portion and at least 2 bits must belong to the host portion.
·         Each IP address has a predefined IP class and that cannot be changed.
·         Each class has a predefined default subnet mask that tell us the octets, which are already part of the network portion, as well as how many bits we have available to work with.
·         Whatever network class is it, we cannot change those bits that are already assigned.
·         We cannot assign the network ID and the broadcast address to a host.
·         Regardless how many bits are left in the host field, network ID and the broadcast address must be reserved.
·         Subnet bits start at the left and go to the right, without skipping bits.
CIDR [ Classless Inter Domain Routing]
CIDR is a slash notation of subnet mask. CIDR tells us number of on bits in a network address.
·         Class A has default subnet mask 255.0.0.0. that means first octet of the subnet mask has all on bits. In slash notation it would be written as /8, means address has 8 bits on.
·         Class B has default subnet mask 255.255.0.0. that means first two octets of the subnet mask have all on bits. In slash notation it would be written as /16, means address has 16 bits on.
·         Class C has default subnet mask 255.255.255.0. that means first three octets of the subnet mask have all on bits. In slash notation it would be written as /24, means address has 24 bits on.
Method of subnetting
In subnetting we find the answer of following questions.
·         What is subnet mask for given address?
·         How many subnets does given subnet mask provide ?
·         What is block size for given subnet mask?
·         What are the valid subnets?
·         What are the total hosts?
·         How many valid hosts are available per subnet?
·         What is broadcast address of each subnet?
·         What is network address of each subnet?
To answer above questions we use following method of subnetting.
What is subnet mask for given address?
Subnetting take places when we extend the default subnet mask. We cannot perform subnetting with default subnet mask and every classes have default subnet mask. To figure out subnetted subnet mask ,we first need to write down the default subnet mask. Now find the host bits borrowed to create subnets and convert them in decimal. For example find the subnet mask of address 188.25.45.48/20 ? This address belong to class B and class B has default subnet mask 255.255.0.0[ /16 in CIDR ]. We borrowed 4 bits from hosts portion. As you know subnetting move from left to right and it cannot skip any network bit. So this subnet mask in binary would be 11111111. 11111111.11110000.00000000. First two octet have default value so its decimal value would be 255.255. We will convert third octet in decimal value. To convert a binary number in decimal we add its decimal equivalent value. In our example it would be 128+64+32+16+0+0+0+0 = 240. Our fourth octet has all bits off so its decimal value would be 0+0+0+0+0+0+0+0 =0. Our answer subnet mask would be 255.255.240.0
How many subnets does given subnet mask provide ?
To calculate the number of subnets provided by given subnet mask we use 2N , where N = number of bits borrowed from host bits to create subnets. For example in 192.168.1.0/27, N is 3. By looking at address we can determined that this address is belong to class C and class C has default subnet mask 255.255.255.0 [/24 in CIDR]. In given address we borrowed 27 - 24 = 3 host bits to create subnets. Now 23 = 8, so our answer is 8.
What is block size for subnet mask?
Block size or increment number is used to calculate the valid subnets. Once you figure out the block size, calculation of valid subnets become piece of cake. To figure out the block size, use this formula 256 - Subnet mask = block size. For example block size for subnet mask 255.255.255.240 is 256 - 240 = 16.
What are the valid subnets?
Calculating valid subnet is two steps process. First calculate total subnet by using formula 2N. In second step find the block size and count from zero in block until you reach the subnet mask value. For example calculate the valid subnets for 192.168.1.0/26.
Borrowed host bits are 2 [26-24].
Total subnets are 2
2 = 4.Subnet mask would be 255.255.255.192.
Block size would be 256-192 = 64.
Start counting from zero at blocks of 64, so our valid subnets would be 0,64,128,192.
What are the total hosts?
Total hosts are the hosts available per subnet. To calculate total hosts  use formula 2H = Total hosts. H is the number of host bits. For example in address 192.168.1.0/26 we have 32 - 26 [Total bits in IP address - Bits consumed by network address] = 6. Total hosts per subnet would be 26 = 64.
How many valid hosts are available per subnet?
Valid hosts are the number of hosts those can be assigned to devices. As we know, we need to reduce two address per subnet, one for network ID and another for broadcast ID. So our formula, to calculate valid hosts would be Total hosts - 2 = Valid hosts. In above example we have 64 hosts per subnet, so valid hosts in each subnet would be 64 - 2 = 62.
What is broadcast address of each subnet?
Broadcast address is the last address of subnet. This address is reserve for network broadcast, and cannot be assigned to any host. In above example
0 Subnet has broadcast address 63
64 Subnet has broadcast address 127
128 Subnet has broadcast address 191
192 Subnet has broadcast address 255
What is the network address of each subnet?
Network address is the first address of subnet. This address is used to locate the network, and cannot be assigned to any host. In above example address 0,64,128,192 are the network address.
·         Network address is always the first IP address of subnet.
·         Broadcast address is always the last IP address of subnet ( IP address before the next subnet).
·         Valid hosts are the IP addresses between network address and broadcast address.
At this point you have powered with all essential tools for subnetting. In last section of this article we will practically implement what we have learn so far. Due to length of this article I will include examples only from class C.
Class C Subnetting
Default subnet mask of class C is 255.255.255.0. CIDR notation of class C is /24, which means 24 bits from IP address are already consumed by network portion and we have 8 host bits to work with. We cannot skip network bit, when we turned them on. Subnetting moves from left to right. So Class C subnet masks can only be the following:
CIDR
Decimal
Binary
/25
128
10000000
/26
192
11000000
/27
224
11100000
/28
240
11110000
/29
248
11111000
/30
252
11111100
As we have already discussed earlier in this article that we have to have at least 2 host bits for assigning IP addresses to hosts, that means we can't use /31 and /32 for subnetting.
/25
CIDR /25 has subnet mask 255.255.255.128 and 128 is 10000000 in binary. We used one host bit in network address.
Subnetting class C CIDR /25
N = 1 [Number of host bit used in network]
H = 7 [Remaining host bits]
Total subnets ( 2
N ) :- 21 = 2Block size (256 - subnet mask) :- 256 - 128 = 128
Valid subnets ( Count blocks from 0) :- 0,128
Total hosts (2
H) :- 27 = 128Valid hosts per subnet ( Total host - 2 ) :- 128 - 2 = 126
Subnets
Subnet 1
Subnet 2
Network ID
0
128
First host
1
129
Last host
126
254
Broadcast ID
127
255
/26
CIDR /26 has subnet mask 255.255.255.192 and 192 is 11000000 in binary. We used two host bits in network address.
Subnetting class C CIDR /26
N = 2
H = 6
Total subnets ( 2
N ) :- 22 = 4Block size (256 - subnet mask) :- 256 - 192 = 64
Valid subnets ( Count blocks from 0) :- 0,64,128,192
Total hosts (2
H) :- 26 = 64Valid hosts per subnet ( Total host - 2 ) :- 64 - 2 = 62
Subnets
Subnet 1
Subnet 2
Subnet 3
Subnet 4
Network ID
0
64
128
192
First host
1
65
129
193
Last host
62
126
190
254
Broadcast ID
63
127
191
255
/27
CIDR /27 has subnet mask 255.255.255.224 and 224 is 11100000 in binary. We used three host bits in network address.
Subnetting class C CIDR /27
N = 3
H = 5
Total subnets ( 2
N ) :- 23 = 8Block size (256 - subnet mask) :- 256 - 224 = 32
Valid subnets ( Count blocks from 0) :- 0, 32, 64, 96, 128, 160, 192, 224
Total hosts (2
H) :- 25 = 32Valid hosts per subnet ( Total host - 2 ) :- 32 - 2 = 30
Subnets
Sub 1
Sub 2
Sub 3
Sub 4
Sub 5
Sub 6
Sub 7
Sub 8
Network ID
0
32
64
96
128
160
192
224
First host
1
33
65
97
129
161
193
225
Last host
30
62
94
126
158
190
222
254
Broadcast ID
31
63
95
127
159
191
223
255
Sub = Subnet
/28
CIDR /28 has subnet mask 255.255.255.240 and 240 is 11110000 in binary. We used four host bits in network address.
Subnetting class C CIDR /28
N = 4
H = 4
Total subnets ( 2
N ) :- 24 = 16Block size (256 - subnet mask) :- 256 - 240 = 16
Valid subnets ( Count blocks from 0) :-0, 16, 32, 48, 64, 80, 96, 112, 128, 144, 160, 176, 192, 208, 224, 240
Total hosts (2
H) :- 24 = 16Valid hosts per subnet ( Total host - 2 ) :- 16 - 2 = 14
I hope you have understand the pattern of making the subnet chart with above information's. Let's join me in this practice. For this example and next two examples I will fill only two subnets [first and last one], it's your turn to fill the middle subnets.
Subnets
Subnet 1
Subnet 2 To Subnet 15(Filled by you)
Subnet 16
Network ID
0
........................................
240
First host
1
........................................
241
Last host
14
........................................
254
Broadcast ID
15
......................................
255
/29
CIDR /29 has subnet mask 255.255.255.248 and 248 is 11111000 in binary. We used five host bits in network address.
Subnetting class C CIDR /29
N = 5
H = 3
Total subnets ( 2
N ) :- 25 = 32Block size (256 - subnet mask) :- 256 - 248 = 8
Valid subnets ( Count blocks from 0) :-
0, 8, 16, 24, 32, 40, 48, 56, 64, 72, 80, 88, 96, 104, 112, 120, 128, 136, 144, 152, 160, 168, 176, 184, 192, 200, 208, 216, 224, 232, 240, 248
Total hosts (2
H) :- 23 = 8Valid hosts per subnet ( Total host - 2 ) :- 8 - 2 = 6
Subnets
Subnet 1
Subnet 2 To Subnet 31(Filled by you)
Subnet 32
Network ID
0
..........................................
248
First host
1
..........................................
249
Last host
6
..........................................
254
Broadcast ID
7
.........................................
255
/30
CIDR /30 has subnet mask 255.255.255.252 and 252 is 11111100 in binary. We used six host bits in network address.
Subnetting class C CIDR /30
N = 6
H = 2
Total subnets ( 2
N ) :- 26 = 64Block size (256 - subnet mask) :- 256 - 252 = 4
Valid subnets ( Count blocks from 0) :-
0, 4, 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 52, 56, 60, 64, 68, 72, 76, 80, 84, 88, 92, 96, 100, 104, 108, 112, 116, 120, 124, 128, 132, 136, 140, 144, 148, 152, 156, 160, 164, 168, 172, 176, 180, 184, 188, 192, 196, 200, 204, 208, 212, 216, 220, 224, 228, 232, 236, 240,2 44, 248, 252
Total hosts (2
H) :- 22 = 4Valid hosts per subnet ( Total host - 2 ) :- 4 - 2 = 2
Subnets
Subnet 1
Subnet 2 To Subnet 63 (Filled by you)
Subnet 64
Network ID
0
..........................................
252
First host
1
..........................................
253
Last host
2
..........................................
254
Broadcast ID
3
.........................................
255
At the end of this long article I have a small word for you, that is practice. Believe me in exam you are going to face many questions related to subnetting. More practice will make you more comfortable in exam.



By NIYONGABO Olivier

Tel: +250722833804
E-mail: niyolivier90@gmail.com



0 comments

EIGRP stands for Enhanced Interior Gateway Routing Protocol.  

It is a Cisco-proprietary routing protocol for TCP/IP. It is based on IGRP routing protocol. It has several enhancements to scale the enterprise size network.
Features and characteristics of EIGRP
 It is a Cisco Proprietary routing protocol.  It is based on IGRP Routing protocol.  It is an enhanced version of IGRP (Interior Gateway Routing Protocol) protocol.  In comparison of IGRP it provides faster convergence times, superior handling of routing loops and improved scalability.  It was released in 1994.  It is a hybrid routing protocol.  It has characteristics of both distance vector and link state protocols.  It uses DUAL (Diffusing Update Algorithm) algorithm to select the best path.  It uses RTP (Reliable Transport Protocol) to communicate with neighbors.  It uses multicast for routing updates.  It supports IP [Both IPv4 and IPV6], Apple Talk and IPX routed protocols.  It includes subnet mask information in routing updates.  It supports route summarization and discontiguous networks.  It supports VLSM/CIDR.  It supports load balancing across the six routes for a single destination.  It supports trigger updates.
Since EIGRP is hybrid protocol, it has advantages of both link state and distance vector protocol. It uses composite metric calculation formula to select the best route for destination. It sends partial or full update only when something is change in network. It maintains three tables for ultra-fast convergence.
1. Neighbor Table 2. Topology Table 3. Routing Table
Neighbor Table
EIGRP shares routing information only with neighbors. To know who the neighbors are, it uses neighbor table. When a new neighbor is discovered, EIGRP would add its address and interface on which neighbor is connected in neighbor table. EIGRP uses separate neighbor table for each routed protocol.
Topology Table
EIGRP uses this table to store all routes which it learned from neighbors. It contains a list of all destinations and routes advertised by neighboring routers. EIGRP selects single best route for each destination from this list. That route goes in routing table. Remaining routes are marked as backup routes. EIGRP refers selected route as Successor and backup route as Feasible Successor. EIGRP uses separate topology table for each routed protocol.
Routing Table
EIGRP stores single best (Successor) route for each destination in this table. Router uses this table to forward the packet. There is a separate routing table for each routed protocol.
Protocol Dependent Modules
PDMs are the special feature of EIGPR. Through these modules EIGRP supports multiple network layer protocols. It maintains separate tables for separate routed (Network Layer) protocols. For example if you are using both (IPv4 and IPv6) versions of IP protocol, it will maintain separate IPv4/EIGRP and IPv6/EIGRP tables.
DUAL
EIGRP uses DUAL (Diffusing Update Algorithm) to provide the fastest route convergence among all protocols. Route convergence includes:-
 Selecting best route from all available routes  Supporting VLSMs
 Dynamically recovering from route failure  Finding an alternative route if primary route goes down
DUAL uses topology table along with RTP to accomplish above tasks in minimal time. As we know EIGRP maintain a copy of all routes including neighbors in topology table, so it would be the first place to look for an alternative route in a route failure situation. If EIGRP does not find an alternative here, it will ask neighbors for help. If neighbors have any updates about asked route, they will reply back with that information. This strong mechanism allows DUAL to find and maintain the best routes for destination speedily.
Autonomous System
EIGRP shares routing information only with neighbors. In order to become a neighbor AS number must be matched. AS create a logical boundary for route information. By default router will not propagate route information outside the AS. For example a router which belongs to AS number 10 will not share routing information with the router that belongs to AS number 20 or any other AS numbers except AS number 10. For easy administration a large network may have multiple ASes.
Not all routing protocols understand the concept of AS. Luckily EIGRP not only understand the concept of AS but also supports multiple ASes. We can easily configure multiple AS instance with EIGRP to divide a large network in smaller segments. By default EIGRP routers will not share routing information between different AS.
Redistribution is used to exchange the route information between different ASes. When a route is learned through the redistribution, it has higher AD value than its original source. For example EIGRP has two AD values 90 for interior EIGRP and 170 for exterior EIGRP. Exterior EIGRP means EIGRP instance which has different AS number.
Enhanced Interior Gateway Routing Protocol (EIGRP) Configuration
Enhanced Interior Gateway Routing Protocol (EIGRP) can be configured in a router using the following IOS commands.
Router(config)# router eigrp ASN Router(config-router)# network Network_ID
ASN in the above IOS command stands for Autonomous System Number.
Enhanced Interior Gateway Routing Protocol (EIGRP) - Lab Practice
The following diagram shows our lab setup. We have three routers, three switches and three hosts connected as below. The host names, IP addresses and the interfaces of the routers are shown in diagram. The IP addresses of the hosts are also shown in the diagram.
.
Hostname and IP address configuration in Router01
Connect to Router01 console and use the following IOS commands to configure host name as Router01.
Router>enable
Router#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router(config)#hostname Router01 Router01(config)#
Use the following IOS commands to open the fast ethernet interface Fa0/0 configuration mode on Router01 and configure IP address as 172.16.0.1/16.
Router01>enable  Router01#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router01(config)#interface fa0/0 Router01(config-if)#ip address 172.16.0.1 255.255.0.0 Router01(config-if)#no shutdown
Use the following IOS commands to open the serial interface S0/0 configuration mode on Router01 and configure IP address as 172.17.0.1/16. You have to set a clock rate also using the "clock rate" command on S0/0 interface, since this is the DCE side.
Router01>enable Router01#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router01(config)#interface s0/0 Router01(config-if)#clock rate 64000 Router01(config-if)#ip address 172.17.0.1 255.255.0.0 Router01(config-if)#no shutdown
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
Hostname and IP address configuration in Router02
Connect to Router02 console and use the following IOS commands to configure host name as Router02.
Router>enable Router#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router(config)#hostname Router02 Router02(config)#
Use the following IOS commands to open the fast ethernet interface Fa0/0 configuration mode on Router02 and configure IP address as 172.18.0.1/16.
Router02>enable  Router02#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router02(config)#interface fa0/0 Router02(config-if)#ip address 172.18.0.1 255.255.0.0 Router02(config-if)#no shutdown
Use the following IOS commands to open the serial interface S0/0 configuration mode on Router02 and configure IP address as 172.17.0.2/16.
Router02>enable Router02#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router02(config)#interface s0/0 Router02(config-if)#ip address 172.17.0.2 255.255.0.0 Router02(config-if)#no shutdown
Use the following IOS commands to open the serial interface S0/1 configuration mode on Router02 and configure IP address as 172.19.0.1/16. You have to set a clock rate also using the "clock rate" command on S0/1 interface, since this is the DCE side.
Router02>enable Router02#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router02(config)#interface s0/1 Router02(config-if)#clock rate 64000 Router02(config-if)#ip address 172.19.0.1 255.255.0.0 Router02(config-if)#no shutdown
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
Hostname and IP address configuration in Router03
Connect to Router03 console and use the following IOS commands to configure host name as Router03.
Router>enable Router#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router(config)#hostname Router03 Router03(config)#
Use the following IOS commands to open the fast ethernet interface Fa0/0 configuration mode on Router03 and configure IP address as 172.20.0.1/16.
Router03>enable Router03#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router03(config)#interface fa0/0
Router03(config-if)#ip address 172.20.0.1 255.255.0.0 Router03(config-if)#no shutdown
Use the following IOS commands to open the serial interface S0/1 configuration mode on Router03 and configure IP address as 172.19.0.2/16.
Router03>enable Router03#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router03(config)#interface s0/1 Router03(config-if)#ip address 172.19.0.2 255.255.0.0 Router03(config-if)#no shutdown
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
Enhanced Interior Gateway Routing Protocol (EIGRP) configuration in Router01
Connect to Router01 console and use the following IOS commands to configure Enhanced Interior Gateway Routing Protocol (EIGRP) in Router01. Please refer the beginning of this lesson to view the Enhanced Interior Gateway Routing Protocol (EIGRP) configuration IOS command.
In the IOS "network" command, shown below, we specify only the directly connected networks of this router.
Router01>enable  Router01#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router01(config)#router eigrp 1 Router01(config-router)#network 172.16.0.0 Router01(config-router)#network 172.17.0.0 Router01(config-router)#exit
Router01(config)#exit Router01#
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
Enhanced Interior Gateway Routing Protocol (EIGRP) configuration in Router02
Connect to Router02 console and use the following IOS commands to configure Enhanced Interior Gateway Routing Protocol (EIGRP) in Router02. Please refer the beginning of this lesson to view the Enhanced Interior Gateway Routing Protocol (EIGRP) configuration IOS command.
In the IOS "network" command, shown below, we specify only the directly connected networks of this router.
Router02>enable Router02#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router02(config)#router eigrp 1 Router02(config-router)#network 172.17.0.0 Router02(config-router)#network 172.18.0.0 Router02(config-router)#network 172.19.0.0 Router02(config-router)#exit Router02(config)#exit Router02#
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
Enhanced Interior Gateway Routing Protocol (EIGRP) configuration in Router03
Connect to Router03 console and use the following IOS commands to configure Enhanced Interior Gateway Routing Protocol (EIGRP) in Router03. Please refer the beginning of this
lesson to view the Enhanced Interior Gateway Routing Protocol (EIGRP) configuration IOS command.
In the IOS "network" command, shown below, we specify only the directly connected networks of this router.
Router03>enable Router03#configure terminal Enter configuration commands, one per line.  End with CNTL/Z. Router03(config)#router eigrp 1 Router03(config-router)#network 172.19.0.0 Router03(config-router)#network 172.20.0.0 Router03(config-router)#exit Router03(config)#exit Router03#
Do remember to run the "copy running-config startup-config" command from enable mode, if you want to save the changes you have made in the router.
How to view the routing table in Router01
After the initial configuration and Enhanced Interior Gateway Routing Protocol (EIGRP) configuration in all routers, we can use the "show ip route" to view the routing table in Router01

How to Configuring RIP

0 comments


Configuring RIP
We are going to demonstrate the configuration of the RIP protocol, which belongs to the distance vector category. So let us analyze it according to our three criteria.
Distance Vector Routing Protocol
The first criteria is how routers discover each other and the answer to that lies in the fact that distance vector protocols will rely on neighbors to tell them the direction or vector toward destinations and how far away those destinations are, and so a routing protocol like RIP will advertise to its neighbors and obtain the information directly from its neighbors, those routers running the same protocol. In that sense, they rely on sort of a chain reaction.
In example, router would need to wait his neighbour routers to advertise to each other in chain. This makes them slower in understanding network changes and it also makes them rely on secondhand information, which also makes them inaccurate. They become even slower, when you see how they exchange information with their neighbors. They will periodically pass copies of the entire routing table. Some of them, like RIP version 1, will actually broadcast this information which is also a very inefficient method.
Source of Information and Discovering Routes
In terms of how distance vector protocols learn the information then, we were talking about periodic advertisements of the entire routing table coming from directly connected neighbors. Some of the information though is remote and so that is why they rely on secondhand information. The figure illustrates the chain reaction that would have to happen for A to learn about networks known to C. The exchange is periodic and it includes the complete routing table, so even if the topology does not change, routers keep telling each other about the same thing.
RIP Discovering Information
RIP Overview
Other features of RIP result from our third criteria, how the protocols adjust to changes in the topology. The answer for a distance vector protocol like RIP is very slowly convergence timed or the amount of time it takes for RIP to know about a topology change and select a different path is a matter of minutes sometimes. Also, in order to be more accurate, it tends to be a very conservative protocol and so in the presence of a redundant topology like this one with loops in order to avoid packets from traveling around the network. Following the loop it will set a maximum cost of 15 for any path in the network; 16 is considered unreachable.
RIP Overview
Those costs are measured in hop counts or the number of routers to go through along a certain path. This makes it less effective in selecting the best path in the presence of this redundant topology. The one hop path across that slower link will be selected, whereas the three-hop path would be faster but would not be selected. Even though a maximum of 16 equal cost paths can be selected, which is good in terms of load balancing, this routing protocol suffers from some inherent features that make it a less efficient, for example, periodically advertising every 30 seconds.
RIPv1 and RIPv2 Comparison
In an effort to improve RIP, designers came up with a second version of the protocol, RIP version 2. Several improvements were made to make this a classless routing protocol, which means it supports variable length subnet masks because the masks are advertised along with the routing update. This also makes RIP version 2 a protocol that can summarize routes. Other efforts were made to make it more efficient and so the advertisements are made on a multicast address and not as a broadcast.
With more security in mind, the protocol also supports router-to-router authentication, which means routers will not exchange routing information unless they share a common secret. Still, RIP version 2 is a distance vector protocol and it suffers from similar convergence issues. It still frequently advertises every 30 seconds and it still suffer from the maximum hop count of 16 for any network.
IP Routing Configuration Tasks
One of the good news about routing protocols is that their configuration is fairly consistent across the board in Cisco IOS routers. They follow similar steps. You first need to select the routing protocol and enable it in global configuration mode and then define the networks that you want this routing protocol to advertise on and receive advertisements through.
In the end, this is going to become advertisements coming in and out of interfaces, but the configuration is based on the network numbers configured on those interfaces. Remember, some routing protocols are classful and so they will not understand subnets, and this means that by enabling the routing protocol in a certain major network, you may be enabling the routing protocol on multiple interfaces that are simply subnets of the same major network.
RIP Configuration
So as we see here the basic commands to enable something like RIP in certain networks; similar steps will be necessary for other routing protocols. The command router enables the routing protocol process and at this time we are using RIP, but you could be using OSPF or EIGRP with the same command. With that, you enter routing protocol configuration mode.
RouterA#
RouterA#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
RouterA(config)#router rip
RouterA(config-router)#version 2
RouterA(config-router)#network 172.16.0.0
RouterA(config-router)#
For RIP, we are enabling RIP version 2 just to make sure that we are dealing with a classless routing protocol and to obtain the advantages of the more efficient RIP version 2.
The third command defines the networks directly connected to this router that will be participating in the RIP process. Even though RIP version 2 is a classless protocol, its configuration follows a classful criteria and so the network you specify there is a major classful network number.
RIP Configuration Example
So it becomes your job to look at the router’s interfaces, understand the network IDs attached or assigned to those interfaces, and then enable the protocol on those networks. In this example, for router A, this device is attached to networks 10 and 172.16 and so we enable the protocol on those two classful networks. Notice that B is connected only to networks that belong to the major classful network 10 and so we need only one command there, network 10.0.0.0, and that is going to enable the protocol on all interfaces that belong to that network 10, in this case, both serial interfaces.
RIP Configuration Example
RouterA#
RouterA#conf t
RouterA(config)#router rip
RouterA(config-router)#version 2
RouterA(config-router)#network 172.16.0.0
RouterA(config-router)#network 10.0.0.0
RouterB#
RouterB#conf t
RouterB(config)#router rip
RouterB(config-router)#version 2
RouterB(config-router)#network 10.0.0.0
RouterC#
RouterC#conf t
RouterC(config)#router rip
RouterC(config-router)#version 2
RouterC(config-router)#network 192.168.1.0
RouterC(config-router)#network 10.0.0.0
There is a similar configuration for router C. Now in that router C, we had another link on network 10 and we do not want RIP running there; we would be running it with that network statement. The meaning of the network statement then is to enable the protocol on any and all interfaces that match the major network specified in the statement.
Verifying the RIP Configuration
Several commands are available to verify the configuration. Other than show running, you can see more live definitions of how RIP is configured and working by using the show IP protocols command. The output shows general information on the current timers being used by RIP and any routing filter that you may have applied. In terms of the network statement, the routing for networks section will display the exact networks that you configured the routing protocol for. So this means that we have two network statements, one for network 10 and one for network 172.16. The impact of that in the case of router A is that those two interfaces are now advertising and receiving advertisement for RIP. Fa0/0 belongs to network 172.16 and S0/0 belongs to network 10; both are sending and receiving RIP version 2 advertisements.
RouterA#show ip protocols
Routing Protocol is "rip"
  Outgoing update filter list for all interfaces is not set
  Incoming update filter list for all interfaces is not set
  Sending updates every 30 seconds, next due in 15 seconds
  Invalid after 180 seconds, hold down 180, flushed after 240
  Redistributing: rip
  Default version control: send version 2, receive version 2
    Interface             Send  Recv  Triggered RIP  Key-chain
    FastEthernet0/0       2     2
    Serial0/0             2     2
  Automatic network summarization is in effect
  Maximum path: 4
  Routing for Networks:
    10.0.0.0
    172.16.0.0
  Routing Information Sources:
    Gateway         Distance      Last Update
    10.1.1.2             120      00:00:24
  Distance: (default is 120)
Displaying the IP Routing Table and Troubleshooting
The main responsibility of any routing protocol is to populate the routing table, and so displaying the routing table is a good troubleshooting and verification approach. The output here belongs to router A again and we can see all the entries or routes being learned via RIP by looking at the first column. This piece will have information on the protocol that advertised the route.
RouterA#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route

Gateway of last resort is not set

     172.16.0.0/24 is subnetted, 1 subnets
C       172.16.1.0 is directly connected, FastEthernet0/0
     10.0.0.0/24 is subnetted, 2 subnets
R       10.2.2.0 [120/1] via 10.1.1.2, 00:00:16, Serial0/0
C       10.1.1.0 is directly connected, Serial0/0
R    192.168.1.0/24 [120/2] via 10.1.1.2, 00:00:16, Serial0/0
If you look at the legend up there, then you will see the different letters associated to each protocol. Through this output, we also know that the administrative distance of RIP is 120 and that the cost to get to that particular destination is the second number within brackets. 10.2.2.0 is one hop away, while 192.168.1.0 is two hops away. The timer there indicates the amount of time since the route was updated. Remember, RIP will advertise every 30 seconds and if it misses one route in one of the advertisements, it will flag it as possibly down.
If you want to see live RIP advertisements, you can use the debug IP RIP command. You can see how in this example for router A the router is sending advertisements on both interfaces to a broadcast destination. It is also receiving updates coming from B on 10.1.1.2 through the serial interface. In both cases, the routes being learned and advertised are part of the output of the command as well as the cost to reach each destination. This is a very powerful tool to verify whether your neighbors are running the protocol or whether they have filters that may be blocking certain networks or whether you made mistakes in enabling the protocols on certain interfaces.
RouterA#deb ip rip
RIP protocol debugging is on
RouterA#
00:16:59.871: RIP: received v2 update from 10.1.1.2 on Serial0/0
00:16:59.875:      10.2.2.0/24 via 0.0.0.0 in 1 hops
00:16:59.875:      192.168.1.0/24 via 0.0.0.0 in 2 hops
00:17:00.747: RIP: sending v2 update to 224.0.0.9 via Serial0/0 (10.1.1.1)
00:17:00.747: RIP: build update entries
00:17:00.747:   172.16.0.0/16 via 0.0.0.0, metric 1, tag 0
00:17:22.779: RIP: sending v2 update to 224.0.0.9 via FastEthernet0/0 (172.16.1.1)
00:17:22.779: RIP: build update entries
00:17:22.779:   10.0.0.0/8 via 0.0.0.0, metric 1, tag 0
00:17:22.783:   192.168.1.0/24 via 0.0.0.0, metric 3, tag 0
00:17:28.907: RIP: received v2 update from 10.1.1.2 on Serial0/0
00:17:28.911:      10.2.2.0/24 via 0.0.0.0 in 1 hops
00:17:28.911:      192.168.1.0/24 via 0.0.0.0 in 2 hops
RouterA#un all
All possible debugging has been turned off
RouterA#


By NIYONGABO Olivier
Tel: +250722833804
E-mail: niyolivier90@gmail.com

How To Get 1000Likes On FB Photo

0 comments













Know How You Can Get 1000Likes On You Facebook Photo Post.......!!!

 Click To Whatch It: How To Get 1000likes On Facebook Photohttps://youtu.be/V_0laA3bibQ

How To Cut Video In VLC Player Media

0 comments


Don't Count The Days Make The Days Count

Like What You Do

How to Routing 2 Routers

0 comments

How Routing 2 Routers
Try This Routing Of Two Routers

By NIYONGABO Olivier
https://www.youtube.com/watch?v=QERBBe7tNuE

CCNA NET Part1

0 comments

CCNA NET Part 1
Hey My Name In NIYONGABO Olivier,
Know About This!!niyolivier90@gmail.com

Energy Solution, Smart Choice Within Reach

 
ICT Smart Solution © 2017-2019 | Designed by NIYONGABO Olivier