CIS 256 Lab 8 - Configuring Cisco Router with RIP Protocol
.docx
keyboard_arrow_up
School
Community College of Philadelphia *
*We aren’t endorsed by this school
Course
256
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
7
Uploaded by thebigd130
.
Page 1
of CIS 256: Lab 8
– Configuring Cisco Router(s)
Configuring and Verifying RIP
Topology Diagram
Required Resources
The following resources are required for packet tracer program
Two routers, each with an Ethernet and serial interface. You will need two (2) Cisco 2011 routers with HWIC-2T (serial module) installed on it.
Two computers or hosts
Two straight-through Category 5 Ethernet cables (H1 to switch and switch to R1)
Crossover Category 5 Ethernet cable (H2 to router R2)
Console cables (from H1 and H2 to routers R1 and R2)
Access to the H1 and H2 command prompt
Access to the H1 and H2 network TCP/IP configuration
Addressing Table
Device
Host Name
Interface
IP Address
Subnet Mask
R1
R1
Serial 0/0/0 (DCE)
172.17.0.1
255.255.255.224
Fast Ethernet 0/0
172.16.0.1
255.255.255.0
R2
R2
Serial 0/0/0 (DTE)
172.17.0.2
255.255.255.224
Fast Ethernet 0/0
172.18.0.1
255.255.255.0
CIS-256
Routing & Switching
Lab 8: Basic RIP Protocol
.
Page 2
of Lab Goals
Upon completion of this lab, you will be able to:
Cable a network design as described above topology diagram
Configure IP addressing described above
Verifying RIP routing protocol and verifying it.
Part 1: Prepare the Network
Step 1: Build the network and configure the routers.
Build the network shown above topology diagram
Step 2: Configure the hosts.
a.
Configure host H1 attached to R1 with an IP address, subnet mask, and default gateway that is compatible with the IP address of the R1 Fast Ethernet interface (172.16.0.1/24)
Host H1 IP configuration
:
IP address: 172.16.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.16.0.1
b.
Configure host H2 attached to R2 with an IP address, subnet mask, and default gateway that is compatible with the IP address of the R2 Fast Ethernet interface (172.18.0.1/24)
Host H2 IP configuration
:
IP address: 172.18.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.18.0.1
Step 3: Check the R1 routing table
a.
View the IP routing table for R1 using the show ip route command.
R1>
show ip route
<output omitted>
Gateway of last resort is not set
C
172.16.0.0/16
is
directly connected,
FastEthernet0/0 C 172.17.0.0/16
is
directly
connected, Serial0/0/0
b.
What is the significance of the “C” to the left of the 172.16.0.0 and 172.17.0.0 network entries
in the routing table?
The routes are not connected to the router unless the interfaces are up.
Step 4: Test end-to-end connectivity
a.
From R1, ping the R2 router Fast Ethernet interface.
R1#
ping 172.18.0.1 b.
From host H1, ping host H2 (from network 172.16.0.2 to network 172.18.0.2).
C:\>
ping 172.18.0.2
CIS-256
Routing & Switching
Lab 8: Basic RIP Protocol
.
Page 3
of Are the pings successful? No
Step 5: Configure the routing protocol of the routers.
There are two versions of RIP: version 1 and version 2. It is important to specify RIP version 2 (RIPv2) in this configuration, because RIPv2 is the most current version. Some routers default to RIPv2, but it is best to not assume that is the case.
a.
In global configuration mode, enter the following on R1.
R1(config)#
router rip
R1(config-router)#
version 2
R1(config-router)#
network 172.16.0.0
R1(config-router)#
network 172.17.0.0
R1(config-router)#
exit R1(config)#
exit
b.
Save the R1 router configuration.
R1#
copy running-config startup-config
c.
In global configuration mode, enter the following on R2.
R2(config)#
router rip
R2(config-router)#
version 2
R2(config-router)#
network 172.17.0.0
R2(config-router)#
network 172.18.0.0
R2(config-router)#
exit R2(config)#exit
d.
Save the R2 router configuration.
R2#
copy running-config startup-config
Step 6: View the routing tables for each router.
a.
In enable or privileged EXEC mode, examine the routing table entries using the show ip route
command on router R1.
R1#
show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
C
172.17.0.0/16 is directly connected, Serial0/0/0
C
172.16.0.0/16 is directly connected, FastEthernet0/0
R
172.18.0.0/16
[120/1]
via
172.17.0.2,
00:00:17,
Serial0/0/0
Step 7: Test end-to-end connectivity.
a.
From R1, ping the R2 router Fast Ethernet interface.
R1#
ping 172.18.0.1
Are the pings successful? Yes
b.
From the host H1 command prompt, ping H2 (from network 172.16.0.2 to network 172.18.0.2).
C:\>
ping 172.18.0.2
Are the pings successful? Yes
c.
Why are the pings successful this time? One router was able to find the other router and its ethernet network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Question 3
(a) Write and support FIVE (5) reasons to use Industrial Ethernet (IE) based on
industrial networking system.
(b)
From Figure 1, evaluate the path from the Ethernet Input/Output (I/O) module to
the user related to the firewall, private IP address, HTTP, HTTPS, software,
hardware & etc.
User
HTTP communicates over public IP
addresses through port 80 by default
or port 443 for secure HTTPS
Browser
Software
Internet
Hardware
Firewall
Communicates over private IP
addresses (10.x.x.x, 192.168.x.x.
172.16.x.x-172.32.x.x)
Server
or
Router
Corporate
Network
*firewall may be software installed on
the router or a separate hardware
Figure 1
Ethernet
I/O
Module
arrow_forward
Question 10
Full explain this question
arrow_forward
Write down the steps or process of communication between two or more PCs in an Ethernet LAN switch. Use Layer 1 to 3 of the OSI model as part of your explanation.
arrow_forward
Define the main function of the following network monitoring tools: (Indicate specific tasks it performs)
1. Wireshark
2. SNMP
3. TCPDUMP
4. SIEM
5. Netflow
NOTES:
Common methods used to capture traffic and send it to network monitoring devices:
• Network Test Access Points (TAPS)
• Traffic mirroring using Switch Port Analyzer (SPAN)
1. Wireshark - traffic analyzer, latency, packet drops
2. SNMP - log files, bandwidth usage, device readings
3. TCPDUMP - displaying packets that are being created or received by the computer it's running on
4. SIEM - real-time, suspicious activities
5. Netflow - IP address, flow, cisco
arrow_forward
How communication occurs across a local Ethernet network.
Explain how communication occurs across a local Ethernet network? You must include detail on the Ethernet standard.
Ethernet, Internet Protocol & Transport Protocols is deliberately broken down into a sensible order to use for tasks 14 and 15.
Remember, Ethernet operates over the bottom two layers of the OSI model:
Data link layer
Frames
CSMA/CD
Physical layer
1000BASE-T etc.
arrow_forward
Please assist me with this lab:
2.17 LAB: Network Automation (modules)
In network administration, many admins will use a VLAN (Virtual Local Area Network) to create logical subnetworks. The advantages of this type of a setup is better confinement of broadcast domains, reduced broadcast traffic and more efficient maintenance of the network. The admin can group network nodes that are physically dispersed into similar broadcast domains for improved network traffic management.
Configuration of VLANS on multiple switches can be very time consuming. Python scripts can help automate tasks reducing the need to physically go from switch to switch. Minimal configuration variables may include VLAN name, VLAN number, and Network device.
The main.py template provides a list of 5 network switch names. The script will simulate the configuration of those 5 devices.
Define the VLANSetup class in VLANSetup.py with a constructor to initialize a VLAN's information. The constructor should by default…
arrow_forward
2.
Ethernet frames must be at least 64 bytes long to ensure that the transmitter is still
going in the event of a collision at the far end of the cable. Fast Ethernet has the same
64-byte minimum frame size but can get the bits out ten times faster. How is it possi-
ble to maintain the same minimum frame size?
arrow_forward
Note: Please do not handwritten.
arrow_forward
A company's network may connect as many as 70 individual workstations across three unique sites using a router. Workstations connect to the network through a 100 mbps switch, while servers connect via 100 mbps links. Doubling the bandwidth of the network's switches and NICs from 100 megabits per second to a gigabit per second might address two problems. Is there anything more I should know about this revision? How can you make sure your network is in perfect working order before doing an update?
arrow_forward
An ethernet switch swl interconnects four switches sw2, sw3, sw4 and sw5. Each of the
four switches (sw2 - sw5) interconnects four hosts A,B,C and D. Does the network
performance improve or does it degrade when you replace the switch swl with a router?
Discuss any two factors that contribute to the change in performance that you have
highlighted
arrow_forward
Using Cisco Packet Tracer
arrow_forward
STP and Etherchannel Consider the below topology, noting that all the switches have the same priority 32768
arrow_forward
How does the choice of cable type and length affect the maximum data transfer speed in an Ethernet network? Provide examples of scenarios where selecting the right cable is crucial for network performance.
arrow_forward
Please give me answer immediately ....
arrow_forward
Assume you are working for a communications company. Your line manager asked you to provide a short report for one client of the company. The report will be used to decide what equipment, cabling and topology will be used for a new wired local area network segment with 25 desktop computers. The client already decided that the Ethernet protocol will be used. Your report must describe the posible network topologies. For each topology: you need to describe what possible cabling and equipment would be necessary, briefly describe some advantages and disadvantages of the topology; and how data colision and error detection will be dealt with using the specified equipment and topology. Your total answer should have a maximum of 450 words.
arrow_forward
Define terms: in details
PPTP VPNs
L2TP VPNs
SSL VPNs
DTLS VPNs
DMV VPN
Alternative VNP
Configuring a VLAN Switch
InterVLAN routing
Multilayer Switches
Load Balancing
arrow_forward
A junior technician requires your expertise to analyse a network topology as depicted in Figure
4-1. Illustrate the following to him.
192.168.1.65
0003.E4CC 2E02
192.168.1.1
Switch2
0003. E4CC ZE01
Gigo/1
Gigo/1
Fa02
Gigo/0
Routert
Gigo/1
Faort
Access point
Switch1
Fa0
Fab1
Fa0
PC2
192.168.1.74
Laptop
192.168.1.75
0060.3E94.68A0
0002.17E8.7708
PC1
192.168.1.10
0060.3E56.6A83
Figure 4-1: Network Topology
(i)
Default gateway for PC1 and Laptop.
(ii)
Total number of local area networks shown in Figure 4-1.
(ii)
PCI communicates with PC2. Examine the MAC addresses and IP addresses for the
routes shown in Figure 4-1, as a packet travels from PC1 to PC2 by filling up a Table
4-1.
Routes
Destination
Source MAC Destination
Source IP
MAC address address
address
IP address
PC1 to Router1
Routerl to PC2
Table 4.1: PDU information from PC1 to PC2
arrow_forward
For over a decade, Ramanathan has been working as a network engineer in an MNC that uses FC (Fibre Channel) networking architecture. His primary duty is to ensure that there are no issues in the network connections between servers and SAN (storage area network) devices, so that maximum throughput is achieved at all times. Recently, one of the connections of the FC device to the network malfunctioned, which Ramanathan has to fix. Analyze which of the following Ramanathan should do in this scenario.
a.
Use NICs to connect the FC devices to the network
b.
Use the iSCSI protocol
c.
Install CNAs to connect to network servers
d.
Connect the FC devices to the network through HBAs
Which of the following planes is made up of the physical or virtual devices that receive and send network messages on their way to their destinations?
a.
The control plane
b.
The management plane
c.
The application plane
d.
The infrastructure plane
Which…
arrow_forward
Think of the TCP connection setup.i. What concept is used to set up a TCP link?ii. Why is the concept needed?iii. Outline how the mechanism works with the aid of a diagram. b. How different is gateway from router? c. An enterprise you are working for needs the installation of Ten (10) new computers. Every one of the computer’s NIC (network adapter) is expected to communicate at 1000 Mbps over its twisted-pair cabling. This cabling must be able to send and receive data at the same time. Which Ethernet standard would you consider, and what technology should you utilize?
arrow_forward
Describe VLAN segmentation and its benefits in terms of network security and isolation.
arrow_forward
Background /Scenario
In this Packet Tracer Physical Mode (PTPM) activity, you will design and build a network from scratch. Your
design must include a minimum of one Cisco 4321 router, two Cisco 2960 switches, and 5 PCs. Fully
configure the network and use IPv4 or IPv6 (subnetting must be included as a part of your addressing
scheme). Secure the network using SSH, secure passwords, and console passwords. Make sure to name
your devices with unique Hostnames and MOTD (for each student, please refrain from copying this). Label
the network devices and provide essential information that would help the Network Admin to understand
your network design/blueprint.
arrow_forward
Analyze the characteristics and identify the communication protocol:
I - It can be used both for communication with field instruments and for communication with PLCs and supervisory systems;
II - Uses logical IP addresses;
III - It can use both optical fiber and twisted pair as a physical medium;
IV - This is a promising protocol for automation applications in industry 4.0.
Alternatives Alternative
1: Profinet. Alternative
2: Profibus DP.
Alternative 3: Modbus
Alternative 4: Profibus PA
arrow_forward
Correct and detailed answer will be Upvoted else downvoted. Thank you!
arrow_forward
Two access layer switches sw1 and sw2 are connected by four fast ethernet links. (i) Describe any two problems that would be experienced when redundancy is implemented without the use of STP (Spanning Tree Protocol) (ii) Explain what STP would do to help resolve the problems described. Use an example broadcast frame transmitted between sw1 and sw2 to explain your answers.
arrow_forward
How does ARP (Address Resolution Protocol) work, and why is it important in Ethernet-based networks? What are the security implications of ARP spoofing?
arrow_forward
Computer Science
A 10-Mb/s Classic Ethernet transmits data packets obtained from the Network Layer. Assume for simplicity that the obtained data packets are directly placed into the MAC Ethernet frame, i.e. that no extra bytes are added in the LLC sub-layer.
arrow_forward
On Ethernet networks, data is delivered to devices by their MAC addresses. For this to happen, switches and PCs dynamically build ARP caches and MAC address tables. With only a few computers on the network this process seems fairly easy. What might be some of the challenges on larger networks?
arrow_forward
Please help me quickly I need necessary
arrow_forward
Solve it , only if you are good in computer networking. Otherwise i will downvote.
Computer science
arrow_forward
Network perimeter
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning
Related Questions
- Question 3 (a) Write and support FIVE (5) reasons to use Industrial Ethernet (IE) based on industrial networking system. (b) From Figure 1, evaluate the path from the Ethernet Input/Output (I/O) module to the user related to the firewall, private IP address, HTTP, HTTPS, software, hardware & etc. User HTTP communicates over public IP addresses through port 80 by default or port 443 for secure HTTPS Browser Software Internet Hardware Firewall Communicates over private IP addresses (10.x.x.x, 192.168.x.x. 172.16.x.x-172.32.x.x) Server or Router Corporate Network *firewall may be software installed on the router or a separate hardware Figure 1 Ethernet I/O Modulearrow_forwardQuestion 10 Full explain this questionarrow_forwardWrite down the steps or process of communication between two or more PCs in an Ethernet LAN switch. Use Layer 1 to 3 of the OSI model as part of your explanation.arrow_forward
- Define the main function of the following network monitoring tools: (Indicate specific tasks it performs) 1. Wireshark 2. SNMP 3. TCPDUMP 4. SIEM 5. Netflow NOTES: Common methods used to capture traffic and send it to network monitoring devices: • Network Test Access Points (TAPS) • Traffic mirroring using Switch Port Analyzer (SPAN) 1. Wireshark - traffic analyzer, latency, packet drops 2. SNMP - log files, bandwidth usage, device readings 3. TCPDUMP - displaying packets that are being created or received by the computer it's running on 4. SIEM - real-time, suspicious activities 5. Netflow - IP address, flow, ciscoarrow_forwardHow communication occurs across a local Ethernet network. Explain how communication occurs across a local Ethernet network? You must include detail on the Ethernet standard. Ethernet, Internet Protocol & Transport Protocols is deliberately broken down into a sensible order to use for tasks 14 and 15. Remember, Ethernet operates over the bottom two layers of the OSI model: Data link layer Frames CSMA/CD Physical layer 1000BASE-T etc.arrow_forwardPlease assist me with this lab: 2.17 LAB: Network Automation (modules) In network administration, many admins will use a VLAN (Virtual Local Area Network) to create logical subnetworks. The advantages of this type of a setup is better confinement of broadcast domains, reduced broadcast traffic and more efficient maintenance of the network. The admin can group network nodes that are physically dispersed into similar broadcast domains for improved network traffic management. Configuration of VLANS on multiple switches can be very time consuming. Python scripts can help automate tasks reducing the need to physically go from switch to switch. Minimal configuration variables may include VLAN name, VLAN number, and Network device. The main.py template provides a list of 5 network switch names. The script will simulate the configuration of those 5 devices. Define the VLANSetup class in VLANSetup.py with a constructor to initialize a VLAN's information. The constructor should by default…arrow_forward
- 2. Ethernet frames must be at least 64 bytes long to ensure that the transmitter is still going in the event of a collision at the far end of the cable. Fast Ethernet has the same 64-byte minimum frame size but can get the bits out ten times faster. How is it possi- ble to maintain the same minimum frame size?arrow_forwardNote: Please do not handwritten.arrow_forwardA company's network may connect as many as 70 individual workstations across three unique sites using a router. Workstations connect to the network through a 100 mbps switch, while servers connect via 100 mbps links. Doubling the bandwidth of the network's switches and NICs from 100 megabits per second to a gigabit per second might address two problems. Is there anything more I should know about this revision? How can you make sure your network is in perfect working order before doing an update?arrow_forward
- An ethernet switch swl interconnects four switches sw2, sw3, sw4 and sw5. Each of the four switches (sw2 - sw5) interconnects four hosts A,B,C and D. Does the network performance improve or does it degrade when you replace the switch swl with a router? Discuss any two factors that contribute to the change in performance that you have highlightedarrow_forwardUsing Cisco Packet Tracerarrow_forwardSTP and Etherchannel Consider the below topology, noting that all the switches have the same priority 32768arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide to Hardware (Standalone Book) (MindTap C...Computer ScienceISBN:9781305266452Author:Jean AndrewsPublisher:Cengage Learning
A+ Guide to Hardware (Standalone Book) (MindTap C...
Computer Science
ISBN:9781305266452
Author:Jean Andrews
Publisher:Cengage Learning