CIS 256 Lab 8 - Configuring Cisco Router with RIP Protocol
.docx
keyboard_arrow_up
School
Community College of Philadelphia *
*We aren’t endorsed by this school
Course
256
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
7
Uploaded by thebigd130 on coursehero.com
.
Page 1
of CIS 256: Lab 8
– Configuring Cisco Router(s)
Configuring and Verifying RIP
Topology Diagram
Required Resources
The following resources are required for packet tracer program
Two routers, each with an Ethernet and serial interface. You will need two (2) Cisco 2011 routers with HWIC-2T (serial module) installed on it.
Two computers or hosts
Two straight-through Category 5 Ethernet cables (H1 to switch and switch to R1)
Crossover Category 5 Ethernet cable (H2 to router R2)
Console cables (from H1 and H2 to routers R1 and R2)
Access to the H1 and H2 command prompt
Access to the H1 and H2 network TCP/IP configuration
Addressing Table
Device
Host Name
Interface
IP Address
Subnet Mask
R1
R1
Serial 0/0/0 (DCE)
172.17.0.1
255.255.255.224
Fast Ethernet 0/0
172.16.0.1
255.255.255.0
R2
R2
Serial 0/0/0 (DTE)
172.17.0.2
255.255.255.224
Fast Ethernet 0/0
172.18.0.1
255.255.255.0
CIS-256
Routing & Switching
Lab 8: Basic RIP Protocol
.
Page 2
of Lab Goals
Upon completion of this lab, you will be able to:
Cable a network design as described above topology diagram
Configure IP addressing described above
Verifying RIP routing protocol and verifying it.
Part 1: Prepare the Network
Step 1: Build the network and configure the routers.
Build the network shown above topology diagram
Step 2: Configure the hosts.
a.
Configure host H1 attached to R1 with an IP address, subnet mask, and default gateway that is compatible with the IP address of the R1 Fast Ethernet interface (172.16.0.1/24)
Host H1 IP configuration
:
IP address: 172.16.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.16.0.1
b.
Configure host H2 attached to R2 with an IP address, subnet mask, and default gateway that is compatible with the IP address of the R2 Fast Ethernet interface (172.18.0.1/24)
Host H2 IP configuration
:
IP address: 172.18.0.2
Subnet mask: 255.255.0.0
Default gateway: 172.18.0.1
Step 3: Check the R1 routing table
a.
View the IP routing table for R1 using the show ip route command.
R1>
show ip route
<output omitted>
Gateway of last resort is not set
C
172.16.0.0/16
is
directly connected,
FastEthernet0/0 C 172.17.0.0/16
is
directly
connected, Serial0/0/0
b.
What is the significance of the “C” to the left of the 172.16.0.0 and 172.17.0.0 network entries
in the routing table?
The routes are not connected to the router unless the interfaces are up.
Step 4: Test end-to-end connectivity
a.
From R1, ping the R2 router Fast Ethernet interface.
R1#
ping 172.18.0.1 b.
From host H1, ping host H2 (from network 172.16.0.2 to network 172.18.0.2).
C:\>
ping 172.18.0.2
CIS-256
Routing & Switching
Lab 8: Basic RIP Protocol
.
Page 3
of Are the pings successful? No
Step 5: Configure the routing protocol of the routers.
There are two versions of RIP: version 1 and version 2. It is important to specify RIP version 2 (RIPv2) in this configuration, because RIPv2 is the most current version. Some routers default to RIPv2, but it is best to not assume that is the case.
a.
In global configuration mode, enter the following on R1.
R1(config)#
router rip
R1(config-router)#
version 2
R1(config-router)#
network 172.16.0.0
R1(config-router)#
network 172.17.0.0
R1(config-router)#
exit R1(config)#
exit
b.
Save the R1 router configuration.
R1#
copy running-config startup-config
c.
In global configuration mode, enter the following on R2.
R2(config)#
router rip
R2(config-router)#
version 2
R2(config-router)#
network 172.17.0.0
R2(config-router)#
network 172.18.0.0
R2(config-router)#
exit R2(config)#exit
d.
Save the R2 router configuration.
R2#
copy running-config startup-config
Step 6: View the routing tables for each router.
a.
In enable or privileged EXEC mode, examine the routing table entries using the show ip route
command on router R1.
R1#
show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
C
172.17.0.0/16 is directly connected, Serial0/0/0
C
172.16.0.0/16 is directly connected, FastEthernet0/0
R
172.18.0.0/16
[120/1]
via
172.17.0.2,
00:00:17,
Serial0/0/0
Step 7: Test end-to-end connectivity.
a.
From R1, ping the R2 router Fast Ethernet interface.
R1#
ping 172.18.0.1
Are the pings successful? Yes
b.
From the host H1 command prompt, ping H2 (from network 172.16.0.2 to network 172.18.0.2).
C:\>
ping 172.18.0.2
Are the pings successful? Yes
c.
Why are the pings successful this time? One router was able to find the other router and its ethernet network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario.
a.
Layer 4 switches
b.
ToR switches
c.
EoR switches
d.
Layer 3 switches
As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices?
a.
Load…
arrow_forward
5.2 From the above scenario, RIP and internal EIGRP routing protocols were configured on the same router. Identify and explain which one of the two routing protocols will be selected bythe network and why
arrow_forward
Q1/ Suppose you has IP address 220.254.255.x / 28, conclude the class
and analyze the subnetting for finding mask address, number of
subnets, addersses range of subnets , and number of hosts at
each subnet.
Q2/ How can perform encapsulation process of OSI model for
sender, and what happen of encapsulation data at receiver
side, explain and draw graph of that.
Q3/ Discuss the advantages and disadvantages of shielding the copper
cables .
arrow_forward
8. Answer the questions below based on the given network topology:
(a) How many collision domains are there?
(b) How many broadcast domains are there?
(c) What type of cable (straight-through or crossover) is required to connect PCO and Switch0?
(d) What type of cable (straight-through or crossover) is required to connect two PCs?
(e) If PCO wishes to discover the MAC address of PC1, which network protocol should be utilized?
arrow_forward
Subject code - rcs509
Correct answer will be appreciated , else downvoted.
Consider a 10 km long broadcast LAN has 10^10 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2.5 x 10^8 m/s. What is the minimum packet size that can be used on this network?
arrow_forward
Q1.
a, Access to media by multiple senders at the same time lead towards data collision, which particular protocol(s) and at what Layer(s) these are available to cater this issue? Does these protocols ensure 100% collision free delivery? If not then what other mechanism are available to resolve the issue?
b, Elaborate with the help of diagrams, how different types of MAC Address (unicast, multicast and broadcast) works.
c, Among the two popular LAN technologies, Ethernet and WiFi, which one has the higher data rate and highest bit error rate (also explain why)?
arrow_forward
172. 16. 0. 0 /19 (resolve sub mask)
Design a network for this IP address for Class B (VLAN) and design on a DMZ, and 4 other servers and label each device with assigned IP address, don't forget to only assign host IP addresses)
arrow_forward
Sections 4.5.7
Lab - Build a Simple Network (do it in Packet Tracer)
In this lab, you will complete the following objectives:
Identify cables and ports for use in the network.
Cable a physical lab topology.
Enter static IP address information on the LAN interface of the hosts.
Verify that PCs can communicate using the ping utility.
arrow_forward
A 1-km-long, 10-Mbps CSMA/CD LAN (i.e., Classic Ethernet)has a propagation speed of 200 m/μsec (i.e., how fast the radio signal moves on the link). Thereare no repeaters in this system. Data frames are 512 bits long, including 480 bits of payload (i.e.,effective data) and 32 bits of overhead (e.g., header, checksum, and other overhead fields). Everydata frame should be confirmed by a 64-bit ACK frame. We assume the sender needs to use onecontention slot to seize the channel before transmitting the data frame, and the receiver needsto use one contention slot to seize the channel before transmitting the ACK frame. Answer thefollowing questions:
a. What is the minimum length of a contention slot in μsec?
b. What is the effective data rate for the sender to send one data frame? Assume that there areno collisions. Show the calculation
c. What would be the impact on the total delay and the effective data rate if we used a longerdata payload size in the data frame? Given one application…
arrow_forward
Question P .The network shown below connects two buildings using a series of routers and fibre links. Assuming all routers are perfectly reliable, find the total reliability of the network if the link availabilities are as follows: • L1 = L2 = 99% • L3 = L4 = 97.5% • L5 = 99%
Full explain this question and text typing work only
We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
arrow_forward
------please answer these (3) questions -------
1) Consider this block 192.168.0.0/16 of private IP addresses to be used for a company
LAN. Allocate IP addresses to the following departments:
a. Dept1: needs to support 1000 users.
b. Dept1: needs to support 250 users.
c. Dept3: needs to support 64 users.
2) network admin wants to block all incoming and outgoing UDP flows and telnet
connections. IP protocol field = 17 for UDP & telnet port# is 23. Fill in this ACL entry to
configure the firewall.
( Fill ACL table with Action, soure dest# of Ip AND port#, and Falg bit)
arrow_forward
This is Networking subject, Fixed length subnet mask (FLSM) Subnetting in IPv4
Network design problem:
Given the class b network of 172.30.0.0/16, subnet the network in order to create the network in the figure below with host requirements shown by preparing a complete ipv4 address summary table. Please provide computation for each solutions.
Solution:
a. Required subnets
b. Number of subnets
c. Available hosts per subnets
d. Network increment (INC)
e. New prefix length and subnet mask address
f. IPv4 Address summary table
arrow_forward
Use VLSM to subnet the 128.153.0.0/22 network based on the following requirements shown on the topology diagram below. Subnets do not need to be provided for the router-to-router links.
Provide the network address, broadcast address, second usable IP address, as well as the subnet mask for each subnet. Provide the subnet mask in dotted-decimal notation (eg. 255.0.0.0).
Subnet
Network Address
Broadcast Address
Second Usable IP Address
Subnet Mask
A
B
C
D
arrow_forward
Use VLSM to subnet the 128.153.0.0/22 network based on the following requirements shown on the topology diagram below. Subnets do not need to be provided for the router-to-router links.
Provide the network address, broadcast address, second usable IP address, as well as the subnet mask for each subnet. Provide the subnet mask in dotted-decimal notation (eg. 255.0.0.0).
Please answer B, C, and D
arrow_forward
55-
A network for a local office requires 4 LAN subnets as follows:
· Subnet A - North Office with 31 hosts;
· Subnet B - East Office with 15 hosts; and
· Subnet C - South Office with 7 hosts.
· Subnet D – West Office with 4 hosts.
Given the IP Address 192.168.15.0 /24 and above described network requirements:
1. Design an optimal address scheme using Variable Length Subnet Mask (VLSM) method;
What will be the network address of Subnet C?
Select one:
A.
192.16.15.128
B.
192.168.15.191
C.
192.168.15.96
D.
192.168.15.32
arrow_forward
58-
A network for a local office requires 4 LAN subnets as follows:
· Subnet A - North Office with 31 hosts;
· Subnet B - East Office with 15 hosts; and
· Subnet C - South Office with 7 hosts.
· Subnet D – West Office with 4 hosts.
Given the IP Address 192.168.15.0 /24 and above described network requirements:
1. Design an optimal address scheme using Variable Length Subnet Mask (VLSM) method
What will be the network address of Subnet D?
Select one:
A.
192.168.15.232
B.
192.168.15.191
C.
192.168.15.112
D.
192.168.15.240
arrow_forward
Draw a network design that you think will be useful in the future for the industry that you have visited. Network should include the following requirements:
3 routers
4 switches
10 PCs
4 VLANs.
Suitable IP addressing scheme in tabular form (assume as many hosts as necessary for each department).
Indicate where do you use static routing, dynamic routing protocols (name the protocols, RIP, EIGRP, OSPF, etc.), Access Control List (ACL) as per the network preferences. Justify your choices.
arrow_forward
The below network diagram consists of Rustaq, Middle and Sohar networks. Both Sohar and Rustaq network uses UTP cable with data rate of 100 Mbps.
A) What is the network address of Rustaq, Middle and Sohar networks?
B ) Identify the category of the UTP cable in Sohar and Rustaq networks.
C) What is the need of DNS & DHCP server in Sohar networks?
arrow_forward
3.2 Consider two neighbours, Alice and Bob. Each have wireless IPv4 routers with integrated NAT. Each neighbour connects their laptop to their own wireless router, and each uses appropriate utilities to examine the IP address of each laptop. They realise the laptops have the same IP address.
3.2.1 How is that possible?
3.2.2 Justify one reason that wide-spread deployment of IPv6 would remove the need for the NAT devices.
arrow_forward
Discuss the advantages of using virtual LANs (VLANs) for network segmentation and security.
arrow_forward
Refer to Figure Q.2d , and answer the questions belowi. Which Router Information Protocol (RIP) version would you recommend. Giving TWO reasons justify your choice. ii. Describe FIVE general characteristics of RIP
arrow_forward
B(i) Propose ONE (1) suitable device to be added into the network topology to ensure communication among hosts in VLAN 10 and VLAN 20 as shown in Figure 2-1.Redesign and redraw an updated network topology with the new device added.[You may draw your answer on paper, then snap the image to put into the answer file.]
arrow_forward
Figure has been attached
A) List down the functionality of each layer of a OSI model.( Do not write book type documents.only list the responsible functions. For instance: Data link layer: 1. Framing, 2. Error control,3…… etc.)B) According to the given figure, assume that, PC0 wants to send a message to PC4. If the distancebetween the two points is 22,000 km, 3.2-kbyte message sends in 2.4 x 100000000 mls speedthrough cable and the transmission link has 1.5 Gbps Bandwidth. When the message arrives atRouters ,a) Router0 already has 4 packets to process in the queue and each will need 2ms.b) Router1 has no packets in the queue, but if it had then would require 3ms to process.c) Router2 already has 5 packets to process in the queue and each will need 1ms.Calculate the total time to send the message from PC0 to PC4
arrow_forward
Refer to the exhibit. Router1 and Router2 each support separate areas of a data center, and are connected via a crossover cable. Resources attached to Router1 are unable to connect to resources attached to Router2. What is the likely cause?
QUESTION: The answer is below. Please explain in complete sentences why this is the answer. I don't understand how the IP addressing is inncorrect .
Answer:
The crossover cable is faulty.
The IP addressing is incorrect.
There is a Layer 2 problem with the router connection.
The upper layers are experiencing an unspecified problem.
One or both of the Ethernet interfaces are not working correctly.
arrow_forward
Question G.Design 16 subnets for a company with the site address 189.47.217.0. a. What is the network mask? b. What is the subnet mask? c. How many hosts are on each subnet? d. What is the address of the 4th subnet (no partial credit)?
Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning
Related Questions
- James has been appointed as the service manager in one of the outlets for Grason Communication, which sells switches and routers. A client approaches James with a query from a network provider who is requesting for an alternative router that is less expensive and will work within layer 5 and layer 7 in the OSI (open systems interconnection) model. Analyze which of the following options James should present to his client in this scenario. a. Layer 4 switches b. ToR switches c. EoR switches d. Layer 3 switches As a network administrator of your company, you have decided to implement redundant connections between network devices to solve problems like network bottlenecks. You have decided to implement this change so that multiple network interfaces and ports can act as one logical interface and focus on increasing total throughput and better load balancing. Which of the following will you use to implement this change in your Windows devices? a. Load…arrow_forward5.2 From the above scenario, RIP and internal EIGRP routing protocols were configured on the same router. Identify and explain which one of the two routing protocols will be selected bythe network and whyarrow_forwardQ1/ Suppose you has IP address 220.254.255.x / 28, conclude the class and analyze the subnetting for finding mask address, number of subnets, addersses range of subnets , and number of hosts at each subnet. Q2/ How can perform encapsulation process of OSI model for sender, and what happen of encapsulation data at receiver side, explain and draw graph of that. Q3/ Discuss the advantages and disadvantages of shielding the copper cables .arrow_forward
- 8. Answer the questions below based on the given network topology: (a) How many collision domains are there? (b) How many broadcast domains are there? (c) What type of cable (straight-through or crossover) is required to connect PCO and Switch0? (d) What type of cable (straight-through or crossover) is required to connect two PCs? (e) If PCO wishes to discover the MAC address of PC1, which network protocol should be utilized?arrow_forwardSubject code - rcs509 Correct answer will be appreciated , else downvoted. Consider a 10 km long broadcast LAN has 10^10 bps bandwidth and uses CSMA/CD. The signal travels along the wire at 2.5 x 10^8 m/s. What is the minimum packet size that can be used on this network?arrow_forwardQ1. a, Access to media by multiple senders at the same time lead towards data collision, which particular protocol(s) and at what Layer(s) these are available to cater this issue? Does these protocols ensure 100% collision free delivery? If not then what other mechanism are available to resolve the issue? b, Elaborate with the help of diagrams, how different types of MAC Address (unicast, multicast and broadcast) works. c, Among the two popular LAN technologies, Ethernet and WiFi, which one has the higher data rate and highest bit error rate (also explain why)?arrow_forward
- 172. 16. 0. 0 /19 (resolve sub mask) Design a network for this IP address for Class B (VLAN) and design on a DMZ, and 4 other servers and label each device with assigned IP address, don't forget to only assign host IP addresses)arrow_forwardSections 4.5.7 Lab - Build a Simple Network (do it in Packet Tracer) In this lab, you will complete the following objectives: Identify cables and ports for use in the network. Cable a physical lab topology. Enter static IP address information on the LAN interface of the hosts. Verify that PCs can communicate using the ping utility.arrow_forwardA 1-km-long, 10-Mbps CSMA/CD LAN (i.e., Classic Ethernet)has a propagation speed of 200 m/μsec (i.e., how fast the radio signal moves on the link). Thereare no repeaters in this system. Data frames are 512 bits long, including 480 bits of payload (i.e.,effective data) and 32 bits of overhead (e.g., header, checksum, and other overhead fields). Everydata frame should be confirmed by a 64-bit ACK frame. We assume the sender needs to use onecontention slot to seize the channel before transmitting the data frame, and the receiver needsto use one contention slot to seize the channel before transmitting the ACK frame. Answer thefollowing questions: a. What is the minimum length of a contention slot in μsec? b. What is the effective data rate for the sender to send one data frame? Assume that there areno collisions. Show the calculation c. What would be the impact on the total delay and the effective data rate if we used a longerdata payload size in the data frame? Given one application…arrow_forward
- Question P .The network shown below connects two buildings using a series of routers and fibre links. Assuming all routers are perfectly reliable, find the total reliability of the network if the link availabilities are as follows: • L1 = L2 = 99% • L3 = L4 = 97.5% • L5 = 99% Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forward------please answer these (3) questions ------- 1) Consider this block 192.168.0.0/16 of private IP addresses to be used for a company LAN. Allocate IP addresses to the following departments: a. Dept1: needs to support 1000 users. b. Dept1: needs to support 250 users. c. Dept3: needs to support 64 users. 2) network admin wants to block all incoming and outgoing UDP flows and telnet connections. IP protocol field = 17 for UDP & telnet port# is 23. Fill in this ACL entry to configure the firewall. ( Fill ACL table with Action, soure dest# of Ip AND port#, and Falg bit)arrow_forwardThis is Networking subject, Fixed length subnet mask (FLSM) Subnetting in IPv4 Network design problem: Given the class b network of 172.30.0.0/16, subnet the network in order to create the network in the figure below with host requirements shown by preparing a complete ipv4 address summary table. Please provide computation for each solutions. Solution: a. Required subnets b. Number of subnets c. Available hosts per subnets d. Network increment (INC) e. New prefix length and subnet mask address f. IPv4 Address summary tablearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning