Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INTRODUCTION
Internet Protocol (IP) is used throughout the public Internet and has become the most
important routed protocol to the majority of Internet applications today. Our objective is to
design and implement an IP based data network that securely support IP Data traffic by
properly designing the IP address Pool and network mask using the concept of VLSM.
VLSM increases the efficiency of the network as well as it helps in the optimum
utilization of IP address resources. VLSM is a process of dividing a single network in to
different smaller networks as per the requirement of the System Administrator for reducing
IPV4 address wastage and also helps in the effective routing process.
This project is intended to design a VLSM based Data Network and through this
locations, can view as well as transfer information and data rather than maintaining physical
The Internet is composed of many routers that interconnect different networks. Each
router interface must be on a unique network and must have a unique address. Assigning
different IP addresses to different networks is required because of the IP addressing scheme
required by routers. Subnetting and VLSMs are two ways of dividing an assigned network
address into multiple, smaller networks for use within an organization. In our project we used
these techniques to save the address space.
Subnetting creates subnets with equal number of hosts,in a network. The number of
bits subnetted i.e,the length of subnet mask will be same for all the subnets. A network of
single subnet mask locked the organization into a fixed number of fixed sized subnets. This
method of achieving subnetting,with variable length of subnet mask,is known as Variable
Length Subnet Mask.Subnets of different Subnets of different size can exist within a Class
Based Network ID. Different Sized Subnets are needed to minimize the wasting of IP
addresses. The creation and deployment of various sized subnets of a Network ID is known as
Variable Length Subnetting and uses Variable Length Subnet Masks.
SUBNETTING
IP networks can be divided into smaller networks or subnets. Subnets are under local
administration. RFC 950 defined a standard procedure to support the subnetting, or
division, of a single Class A, B, or C network number into smaller pieces
Subnetting is
Subnetting - How?
Subnet ID
A subnet ID is created by borrowing bits from the host field and designating them as
the subnet field.
NETWORK ID HOST ID
NETWORK ID SUBNET ID
LINK-3
DATA COMMUNICATION 3 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Subnet MASK
Subnet Mask is defined as a 32-bit value which is used to distinguish the Network ID
from the Host ID in an arbitrary IP address
The bits of the subnet mask are defined as
All bits that correspond to Network ID and subnet ID are set to 1.
All bits that correspond to Host ID are reset to 0.
Subnet mask is required to extract a Network ID and Subnet ID for a subnetted network.
Types of Subnet Mask
Class A /8
Class B /16
Class C /24
5.4.4 Example
Internet routers use only the network-prefix of the destination address to route traffic to
a subnetted environment.
Routers within the subnetted environment use the extended-network- prefix to route
traffic between the individual subnets.
The extended-network-prefix is composed of the classful network-prefix and the
subnet-number.
32 bits
Extended-network-prefix-length
The standards describing modern routing protocols often refer to the extended-
network-prefix- length rather than the subnet mask.
The prefix length is equal to the number of contiguous one-bits in the traditional subnet
mask.
DATA COMMUNICATION 5 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
The network address 130.5.5.25 with a subnet mask of 255.255.255.0 can also be
expressed as 130.5.5.25/24.
The /<prefix-length> notation is more compact and easier to understand than writing
out the mask in its traditional dotted-decimal format.
INTRODUCING VLSM
The Internet is composed of many routers that interconnect different networks.
Each router interface must be on a unique network and must have a unique address.
Assigning different IP addresses to different networks is required because of the IP
addressing scheme required by routers. Subnetting and VLSMs are two ways of dividing
an assigned network address into multiple, smaller networks for use within an
organization. These smaller networks are referred to as subnetworks.
Subnetting
• Isolate network traffic within local subnets, therefore reducing contention for network
bandwidth
• Secure or limit access to a subnet
• Enable localization of specific network protocols to a subnet
• Allow the association of a subnet with a specific geography or a department
• Allow administrative work to be broken into logical units
The basic idea of subnetting is to divide the standard host number field into two parts:
the subnet number and the host number on that subnet. That leads us from two level
hierarchy (NetworkNumber/HostNumber) to three level hierarchy
(NetworkNumber/SubnetNumber/HostNumber).
VLSM
One of the major problems with supporting only a single subnet mask across a
given network number is that once the mask is selected, it locks the organization into a
fixed number of fixed-sized subnets. For example, a Class B subnet that is masked with
DATA COMMUNICATION 6 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
255.255.252.0 yields additional 64 subnets with 1024 hosts per subnet. If you need 1028
subnets with some as large as 1000 hosts and some as small as 64 hosts you are out of luck.
Similar to the IP space separation into A,B, and C classes VLSM permits organization to
use subnets with different number of hosts.
RFC 950 specified how an IP network could use multiple subnet masks. The key
idea here is similar to idea of class A,B,and C network recursively applied to host part of
the address. Variable-Length Subnet Masking (VLSM) is the same concept as CIDR, but
the term is now obsolite. Because the old class distinctions are ignored, the new system
was called classless routing. This led to the original system being called, classful routing.
When an IP network is assigned more than one subnet mask, it is considered a
network with VLSMs because the extended-network numbers have different lengths at
each subnet level. To provide the address mask information the ICMP protocol was
extended by adding a new pair of ICMP message types, "Address Mask Request" and
"Address Mask Reply", analogous to the "Information Request" and "Information Reply"
ICMP messages (type 17 and 18 messages).
In key idea was that netmask becomes the part that is nessesary for the
interpretation of the address and can be specified by the number of the bit in network part
of the address, for example 10.10.10.10/24 mean C class network (24-bit network part of
of the address and 8-bit host part of the address)
Two of the main advantages to assign more than one subnet mask to a given IP network
number are:
• Multiple subnet masks permit more efficient use of an organization’s assigned IP address
space.
• Multiple subnet masks permit route aggregation, which can significantly reduce the amount
of routing information at the backbone level within an organization’s routing domain.
An example of a VLSM entry is:
12.0.0.0 255.255.0.0
12.3.0.0 255.255.255.0
12.3.254.0 255.255.255.224
VLSM subnet masks syntax has been recognized since the Solaris 2.6 OE.
CIDR
CIDR allows single routing entries to refer either to the larger block or to its individual
constituents. This permits a single, general routing entry to be used through most of the
Internet, more specific routes only being required for routers in the subnetted block.
A subnet mask is a 32-bit number that determines how an IP address is split into
network and host portions, on a bitwise basis. For example, 255.255.0.0 is a standard class
B subnet mask, since the first two bytes are all ones (network), and the last two bytes are
all zeros (host). In a subnetted network, the network portion is extended. For example, a
subnet mask of 255.255.255.0 would subnet a class B address space using its third byte.
Using this scheme, the first two bytes of an IP address would identify the class B network,
the next byte would identify the subnet within that network, and the final byte would select
an individual host. Since subnet masks are used on a bit-by-bit basis, masks like
255.255.240.0 (4 bits of subnet; 12 bits of host) are perfectly normal.
In a traditional subnetted network, several restrictions apply, which have been lifted by
CIDR. However, if older, non-CIDR routing protocols (such as RIP version 1) are in use,
these restrictions must still be observed.
1. Identical subnet masks. Since non-CIDR routing updates do not include subnet masks, a
router must assume that the subnet mask it has been configured with is valid for all
2. Contiguous subnets. A subnetted network can't be split into isolated portions. All the
subnets must be contiguous, since routing information can't be passed to non-members.
Within a network, all subnets must be able to reach all other subnets without passing traffic
through other networks.
The Internet is composed of many routers that interconnect different networks. Each
router interface must be on a unique network and must have a unique address. Assigning
different IP addresses to different networks is required because of the IP addressing
scheme required by routers. Subnetting and VLSMs are two ways of dividing an assigned
network address into multiple, smaller networks for use within an organization. These
smaller networks are referred to as subnetworks. VLSM, conceptually a stepping stone
from subnetting to CIDR, lifted the restrictions of subnetting by relaying subnet
information through routing protocols
To add a static route on a Cisco router, use the `ip route` command.
The syntax to utilize is: ip route <destination> <netmask> <next hop>.
The example shows the creation of a static route for a single host:
Cisco# conf t
Cisco (config)# ip route 193.252.19.5 255.255.255.255 193.252.19.1
Default routing: Refers to a “last resort” outlet – traffic to destinations that are
unknown to the local router. The destinations that are unknown to the local router are sent
to the default outlet router. Default routing is the easiest form of routing for a domain
connected to a single exit point. A default route is a path on which a router should forward
a packet if it does not have specific knowledge about the packet’s destination.
Dynamic routing
In most networks, routing is managed automatically through the use of dynamic
routing. In dynamic routing, routing protocols create and maintain the routing tables
automatically. Dynamic routing responds much more quickly to network changes (and
network failures) than static routing.
Routing Protocol
In simple terms, a protocol is an agreed set of rules that determine how something
will operate. A routing protocol is a set of rules that describes how Layer 3 routing devices
will send updates between each other about the available networks. If more than one path
to the remote network exists, the protocol also determines how the best path or route is
selected.
The Purpose of a Routing Protocol is
a. A routing protocol is the mechanism used to update the Layer 3 routing devices.
b. When they all have the same accurate understanding of the network, they can route
the data across the best path.
Participating routers advertise the routes that they know about to their neighbors in
routing updates. Routes learned from routing updates are held in the routing table.
The routed protocol is the Layer 3 protocol used to transfer data from one end
device to another across the network. The routed protocol is the Layer 3 datagram that
carries the application data as well as the upper-layer information. Also the routing
protocol is the protocol used to send updates between the routers about the networks that
exist in the organization, thereby allowing the routing process to determine the path of the
datagram across the network.
Table 1 provides a list of routed protocols and their corresponding interior routing
protocols.
Vines RTP
Routing Table
A routing table is a database in which a router stores information about the network
layer topology of the network. The router will reference the routing table and make a
decision about forwarding data packets to the end destination identified in the destination
address of the datagram/packet.
The Network field contains the networks that the router knows exist in the
organization. These entries either were entered manually as static routes or default routes,
or were learned via a routing protocol as dynamic routes. The Purpose of the Network
Field is when a datagram comes into the router, the routing process attempts to forward it
to the remote network, where it is hoped that it will find the destination host. To achieve
this, it must know that the remote network exists. It determines this by looking in the
routing table for the remote network.
Typically, only the network portion of the address is stored in the table. Using the
hierarchical strength of the addressing keeps the routing table small and the lookup short.
The routing process makes a decision based on the longest match. This ensures that if
VLSM has been deployed, the most specific network is chosen. Cisco IOS code mandates
that the longest match can be a /32 or 255.255.255.255 mask. This is a match based on the
full host address and is used in specific situations such as an OSPF environment. It is not
encouraged as a common configuration because the size of the routing table grows rapidly.
The Outgoing Interface is the interface on the router to which the routing process
sends the datagram. This is the first step of its journey, the exit point of the router. This
field is necessary for the routing process to know which interface queue to use to send the
outbound datagram. It also informs the administrator of the interface through which the
network was heard in the routing update—or, more accurately, the interface through which
the chosen network was heard.
3. The Metric Field
The metric is a value that is assigned to each path based on the criteria specified in
the routing protocol. The Metric field is used to determine which path to use if there are
multiple paths to the remote network. The metric used depends on the routing protocol.
This value is used to choose between different paths to the same destination network, to
select the best path. If the values are the same, either the router selects the path that it heard
first, or it uses both paths, sending the datagrams across each route.It is the responsibility
of the end device to reassemble the datagrams before sending them to the Application.
OSPF Cost. (The Cisco default states that the cost of an interface is
inversely proportional to the bandwidth of that interface. A
higher bandwidth indicates a lower cost.)
IS - IS Cost
The next logical hop is the destination address of the next forwarding router. The
address of the next logical hop will be on the same subnet as the outgoing interface. The
purpose of identifying the next logical hop is so that the router can create the Layer 2
frame with the destination address.
The reason that the logical address is stored instead of the MAC address of the next
hop is to ensure that the information is accurate. The MAC address may change because of
changes in the hardware; however, such changes do not affect the logical address. Also, the
router is dealing at Layer 3 and just examines the source address of the routing update to
determine the next hop. The simplicity of this action reduces the need for extra
computation and memory.
The capability to send traffic from one end of the network to the other depends on
how accurate and current the routing table in every router is within the network. Although
all routing protocols have this written into their mission statements, the more recent routing
protocols are more efficient, so their networks scale more easily. For example, RIP will
send out the entire routing table every 30 seconds, while OSPF updates contain only the
change and are sent only when that changes occurs. Although OSPF sends the entire table
every 30 minutes after the last update, this is far less demanding of network resources than
the older protocol, RIP.
The accuracy of the table will be affected by how quickly it responds to changes in
the network.
These changes include the following:
• Learning new networks
• Learning a better path to an existing network
• Learning that a network is no longer available
• Learning an alternative route to a network
IP routing protocols use two main technologies: Link-state and Distance vector
technologies. These are discussed next.
Distance vector protocols are the earliest protocols, and they include RIP and
IGRP. Distance vector protocols send periodic updates. These updates are sent to directly
connected neighbors. The update is periodic because it waits for the timer to expire before
it sends an update. After receiving a neighbor’s routing table, the router updates its table
and sends the modified table in subsequent updates. This is the reason that distance vector
routing protocols are said to be “routing by rumor.”
The metric used by distance vector protocols is often stated as being distance
measured in the number of hand-off points or hops (routers) encountered on the way to the
end device. The path selection is made using the Bellman Ford algorithm based on the
metric or value of each available path. RFC 1058 discusses this in depth in reference to
RIPv1.
Routing Information Protocol (RIP) is the best known and most widely used of the
distance vector routing protocols. RIP version 1 (RIP v1), which is now outmoded, was the
first routing protocol accepted as a standard for TCP/IP. RIP version 2 (RIP v2) provides
authentication support, multicast announcing, and better support for classless networks.
Using RIP, the maximum hop count from the first router to the destination is 15.
Any destination greater than 15 hops away is considered unreachable. This limits the
diameter of a RIP network to 15. However, if you place your routers in a hierarchical
structure, 15 hops can cover a large number of destinations.
Link state routing protocols address some of the limitations of distance vector
routing protocols. For example, link state routing protocols provide faster convergence
than do distance vector routing protocols. Although link state routing protocols are more
reliable and require less bandwidth than do distance vector routing protocols, they are also
more complex, more memory-intensive, and place a greater load on the CPU.
Unlike distance vector routing protocols, which broadcast updates to all routers at
regularly scheduled intervals, link state routing protocols provide updates only when a
network link changes state. When such an event occurs, a notification in the form of a link
state advertisement is sent throughout the network.
The Open Shortest Path First (OSPF) protocol is the best-known and most widely
used link state routing protocol. OSPF is an open standard developed by the Internet
Engineering Task Force (IETF) as an alternative to RIP. OSPF compiles a complete
topological database of the network. The shortest path first (SPF) algorithm, also known as
the Djikstra algorithm, is used to compute the least-cost path to each destination. Whereas
RIP calculates cost on the basis of hop count only, OSPF can calculate cost on the basis of
metrics such as link speed and reliability in addition to hop count.
Unlike RIP, OSPF can support an inter network diameter of 65,535 (assuming that
each link is assigned a cost of 1). OSPF transmits multicast frames, reducing CPU usage
on a LAN. We can hierarchically subdivide OSPF networks into areas, reducing router
memory overhead and CPU overhead.
Like RIP v2, OSPF supports variable length subnet masks (VLSM).
Selecting the Appropriate Routing Protocol
The boundaries of the organization are defined as the autonomous system. The
unique number assigned to the autonomous system then identifies the organization. The
autonomous system number may be viewed as another layer of hierarchy in the IP
addressing scheme because the number can represent a collection of NIC numbers.
Exterior Routing Protocols
OSPF, IS-IS and RIP are IGPs used within the individual ASs; BGP is the EGP
used between ASs.
NETWORK ARCHITECTURE
DESCRIPTION OF ARCHITECTURE
The architecture consists of three networks as shown above having two routerts R1
and R2.Network 1 consists of three workstations connected via a switch(Intex 10/100 fast
Ethernet switch). Network2 lies between the routers. Network 3 contains the webserver in
one of it’s interfaces. In this network we use CISCO 1840 series (1841) router. The
webserver is configured in Microsoft Windows 2003 server OS. Whereas the workstations
are loaded with Microsoft windows 2000 Proffessional OS.
Network 2 2
Network 3 2
Given IP = 192.168.100.0/27
No of IP available = 2^5 = 32
Ip requirement for each network
Network 1
Network address= 1
Total requirement= 6
Network 2
Network address= 1
Broadcast address= 1
Total requirement= 4
Network 3
Network address= 1
Broadcast address= 1
Total requirement= 4
We now got a single network consists of 32 hosts(2^5= 32), but we require three
different networks having different number of ip pools, ie 6,4 and 4 respectively. So we are
going to split this single IP pool using subnetting.
In this step we will take one bit from host and will give it to the network portion. So the
network mask now becomes 28 and getting splitted into two equal networks having
number of ip addresses 16 each.
Subnet 1: 192.168.100.0/28 to 192.168.100.15/28
DATA COMMUNICATION 22 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Subnet 2: 192.168.100.16/28 to 192.168.100.31/28
Subnet mask: 255.255.255.240
Since we only require 14 IP address we only select subnet block 192.168.100.0/28 and
discard subnet block 192.168.100.16/28 as spare block.
Two bit subnetting
In this step we will take one more bit from host and will give it to the network
portion. So the network mask now becomes 29 and getting splitted into two equal
networks having number of ip addresses 8 each.
Subnet 1.1: 192.168.100.0/29 to 192.168.100.7/29
We will again split subnet 2.1 by taking one more bit to the network portion. This is
three bit subnetting.
In this step we will take one more bit from host and will give it to the network
portion. So the network mask now becomes 30 and getting splitted into two equal
networks having number of ip addresses 4 each.
Network 3
Network address: 192.168.100.12/30
Broadcast address: 192.168.100.15/30
192.168.100.9
2 2 192.168.100.8 to 192.168.100.11 255.255.255.
192.168.100.10 252
192.168.100.13
3 2 192.168.100.12 to 192.168.100.15 255.255.255.
192.168.100.14 252
Network Details
Network 1
PC 1 192.168.100.226 255.255.255.248
PC 2 192.168.100.227 255.255.255.248
PC 3 192.168.100.228 255.255.255.248
PC 4 192.168.100.229 255.255.255.248
Network 1
• Click No, Skip this step and continue installing windows for Get Updated Setup
Files window and click Next.
• Windows start to load installation files
• Setup will Restart (Don’t enter for boot from CD, while booting)
• Welcome to setup window appears as follows
o To set up Windows now, press ENTER.
o To repair a windows installation using Recovery console, press R.
o To quit setup without installing windows, press F3.
• Press Enter (First Option)
• Now the setup will sense all the hard disk part ions and we
should select one partition for installation.
• Select the needed partition (Never Select the existing OS
partition) and press ENTER.
• Setup will ask to continue Setup using this partition, press C.
Press C.
• Setup will ask to select the Format pattern. Highlight Format the
partition using the NTFS file system. And press ENTER.
• For confirmation press F to the next window.
Setup will format the partition and will copy the windows file system to the hard disk
o Setup will restart the system and gives the first GUI window.
DATA COMMUNICATION 27 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
o The computer screen will blink ones or twice to adjust the display setting.
• For region and Language setting Click Next after selecting the Regional location as
India.
• Enter the Name: Network Lab PCn and Organization : RTTC .
• For licensing Modes, Simply Click NEXT.
• Enter Computer Name: PCn , Administrator Password: NTlabPCn
• Setup will restart the system again for final setup and will get the Ctrl+Alt+del
window.
• Enter password: NtlabPCn and click Enter for the Windows 2003 Desktop.
• Note down the logical disk of Windows 2003
(If the software is an OEM version it is to be registered with Microsoft within 30 days,
otherwise your desktop will be locked after 30 days)
• Insert the mother board CD into the CD drive (CD may automatically run, then stop
it)
• R. Click the hardware you want to install (Say Ethernet controller)
• Click on Update Driver
• Select Install the software Automatically and Click Next
• The setup will install the driver for the selected hardware from the CD
• Click Finish
• Using Device manager verify that the hardware is properly installed.
Disk management
• R Click the partition and select Change drive letter and path
• Take properties
• Under General tab Enter the needed Name for the Partition.
User Management
Log on as Guest
To log on as Guest, first logoff the administrator & then try for Guest
• Start / Log Off administrator (Wait for saving the settings)
• Press Ctrl+Alt+Delete to logon.
• Type User Name: Guest and Click OK (Since the Guest has no Password)
• Verify that the Guest is not having any Administrative rights
Then logoff the Guest and logon as Administrator with the password: NtlabPCn
Users & Groups
For User management two folders are created as Users & Groups.
These can be seen under Local Users and groups in MMC.
Users folder has all the list of users created and the Groups folder has the Powers of the
users.
• Click the Action tab and then select the New User. OR
• R. Click the empty space and select the new user.
• Enter the Username and Password (twice)
• Uncheck the User must change the password at nest logon
• Check the User Cannot change the password & Password never expires.
• Click Create
• Click Close
Now the user is having only user level privileges. Verify the privileges of the newly crated
user by logging on.
DHCP is not installed by default while loading the OS; we should install the DHCP
separate.
• Insert the windows 2003 CD into the CD drive
• Start/Setting/Control Panel/Add Remove Programs
• Click Add Remove Windows Component
• Select Network services and then click on the Details
• Check the DHCP & next (Wait while loading the DHCP)
• Click Finish & Close Add Remove Programs
• Better Reboot the PC
Note that now in Services the DHCP server is also available.
Also in Start/Programs/Administrative Tools/DHCP
Microsoft calls the range of IP address and the descriptive information associated with
them as a SCOPE. To create a scope
• Right click the servers icon and choose new scope & Click Next
• Give the descriptive information for the Scope (NW Lab) & Click Next
• Enter the start IP address and the End IP address
• For mask either select the Length or Enter the subnet mask
• Click Next
• Add the IP exclusions & Click next
• Click Next for Lease Duration (for these days the client IP will not change and
after the default 8 days the client will get the new IP. But once in 4 days the Client
will sent new broadcast for new IP for DHCP and will get the fresh IP)
• Next for Configure DHCP Options
• Next for Gateway
• Next for Domain
• Next for WINS servers
DATA COMMUNICATION 35 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
1. When connecting devices with network cables, be sure each end of the cable
connects tightly. Loose cables are one of the most common sources of network
setup problems.
Items Needed:
• A network router (wireless or wired)
• Network adapters installed on all devices to be connected to the router
• A working Internet modem (optional)
• A Web browser installed at least one computer in the network
DATA COMMUNICATION 39 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
Router R2 configuration
CISCO Router 1841 is configured using hyper terminal application software.
R2#erase st
Erasing the nvram filesystem will remove all configuration files! Continue? [con
firm]y[OK]
Erase of nvram: complete
R2#
*Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
R2#reload
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
sslinit fn
*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change
d to: Initialized
*Jan 3 05:48:06.903: %VPN_HW-6-INFO_LOC: Crypto engine: onboard 0 State change
d to: Enabled
*Jan 3 05:48:09.751: %SYS-5-CONFIG_I: Configured from memory by console
*Jan 3 05:48:10.063: %LINK-5-CHANGED: Interface FastEthernet0/1, changed state
to administratively down
*Jan 3 05:48:10.063: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state t
o up
*Jan 3 05:48:10.575: %SYS-5-RESTART: System restarted --
Cisco IOS Software, 1841 Software (C1841-ADVSECURITYK9-M), Version 12.4(3i),
REL
EASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2007 by Cisco Systems, Inc.
Compiled Wed 28-Nov-07 18:48 by stshen
*Jan 3 05:48:10.575: %SNMP-5-COLDSTART: SNMP agent on host R2 is undergoing a
c
old start
*Jan 3 05:48:10.739: %SYS-6-BOOTTIME: Time taken to reboot after reload = 66
seconds
*Jan 3 05:48:10.887: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
*Jan 3 05:48:11.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to up
*Jan 3 05:48:14.303: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/0, changed state to down
R2>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface fa 0/0
DATA COMMUNICATION 43 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
R2(config-if)#ip add 192.168.100.14 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#^Z
R2#
*Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console
R2#wr memory
Building configuration...
[OK]
R2#sh start
Using 642 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
!
R2#
R2#exit
R2 con0 is now available
R2>
R2>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R2(config)#interface fa 0/0
R2(config-if)#ip address 192.168.100.13 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#interface fa 0/1
R2(config-if)#ip address 192.168.100.10 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
*Jan 3 06:20:06.199: %LINK-3-UPDOWN: Interface FastEthernet0/1, changed state t
o up
*Jan 3 06:20:07.199: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to up
*Jan 3 06:20:14.359: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthern
et0/1, changed state to down
R2(config-if)#interface fa 0/0
R2(config-if)#ip address 192.168.100.13 255.255.255.252
R2(config-if)#no shutdown
R2(config-if)#exit
R2(config)#^Z
R2#
*Jan 3 06:23:05.067: %SYS-5-CONFIG_I: Configured from console by console
R2#wr memory
Building configuration...
[OK]
R2#sh start
Using 660 out of 196600 bytes
!
version 12.4
DATA COMMUNICATION 45 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R2
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
Router R1 configuration
CISCO Router R2 configuration using Hyper Terminal Application software.
R2#erase st
Erasing the nvram filesystem will remove all configuration files! Continue? [con
firm]y[OK]
Erase of nvram: complete
R2#
*Jan 3 05:45:11.351: %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram
R2#reload
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
sslinit fn
R1>en
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface fa 0/0
R1(config-if)#ip add 192.168.100.14 255.255.255.252
R1(config-if)#no shutdown
R1(config-if)#
R1(config-if)#
R1(config-if)#
R1(config-if)#
R1(config-if)#exit
R1(config)#^Z
R1#
*Jan 3 06:05:33.335: %SYS-5-CONFIG_I: Configured from console by console
R1#wr memory
Building configuration...
[OK]
R1#sh start
Using 642 out of 196600 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname R1
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
DATA COMMUNICATION 51 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
!
R1#
R1#exi
R1 con0 is now available
R1>
R1>en
R2#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#interface fa 0/0
R1(config-if)#ip address 192.168.100.13
% Incomplete command.
OBSERVATION
IP CONFIGURATION
IP addresses are the unique network addresses for the network nodes which interact
each other with in a network. IP addresses are the 32 bit addresses with a network id part
and host id part in it.
So in the subnetted network one IP address each should be allotted for the server
and the clients for interconnecting them with in the network.
While assigning the IP addresses for the PCs the interface IP addresses of the
routers with which they are connected should also be made into consideration, i.e. ,both
should have the same network address.
The IP configurations of server and the client PCs are given below.
DATA COMMUNICATION 55 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
1) SERVER
2) PC1
IP address : 192.168.100.1
3) PC 2
DATA COMMUNICATION 58 RTTC
TRIVANDRUM
MAJOR PROJECT REPORT’2011 VLSM BASED IP DATA NETWORK
IP address : 192.168.100.2
4) PC 3
IP address : 192.168.100.3
WEBSITE ACCESS
Before connecting the routers with in the network it’s interface ports will be shut
BEFORE CONNECTIVITY:
AFTER CONNCTIVITY:
ROUTER R2
BEFORE CONNECTIVITY:
AFTER CONNCTIVITY:
After configuring a router using a PC, the routing table of the particular router will
only contain the addresses of networks associated with it’s own interface. So if we are
interested to connect the router with in an internetwork we must also specify the network
addresses of other networks also.
It can be seen from the following routing tables for both the routers R1 and R2
below .
ROUTER R1
BEFORE static ROUTING:
R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
ROUTER R2
BEFORE static ROUTING:
R1#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
R1#sh ip route
Codes C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
A ping test determines whether your computer can communicate with another
computer over the network. Then, if network communication is established, ping tests also
determine the connection latency (technical term for delay) between the two computers.
The ping test is used to check the connectivity of different nodes within the network. In our
network the clients in network 1 can check their connectivity with the server in network 3
using the ping test.
Ping test can be conducted as below
Ping Test:
1. Click on Start.
2. Click on Run. (You will get a small Run window with Open Combo Box)
3. Type Cmd
4. In the Black DOS prompt screen, type ipconfig.
For our network we will conduct the client to server ping tests from the 3 PCs namely PC
1,PC 2 and PC 3
The 0% loss defines the perfect connection between PC 1 and the server
The 0% loss defines the perfect connection between PC 2 and the server
The 0% loss defines the perfect connection between PC 3 and the server
WEBSITE ACCESS
After connecting the three workstations and the server with in the inter network
each workstation will be able to access the web page in the server
APPLICATIONS
CONCLUSION
Subnet masking has arrived as a network supporter for data networks. Among this
variable length subnet masking is been the most suitable technique for the efficient use of
IP class addresses.
The design of subnet masking from class level IP addresses can be made of variable
length subnet masks also. This makes the network more user applicable. VLSM based Data
located at remotely different locations, can view as well as transfer information and data
REFERENCES