UNIT-4 (Networking With TCP-IP Notes)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR

(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)


NAAC Accredited with A++ Grade

Networking With TCP/IP-150512


UNIT-4
RIP Protocol: -
Routing Information Protocol (RIP) is a dynamic routing protocol that uses hop count as a
routing metric to find the best path between the source and the destination network. It is a
distance-vector routing protocol that has an AD value of 120 and works on the Network layer
of the OSI model. RIP uses port number 520.

Hop Count

Hop count is the number of routers occurring in between the source and destination network.
The path with the lowest hop count is considered as the best route to reach a network and
therefore placed in the routing table. RIP prevents routing loops by limiting the number of hops
allowed in a path from source and destination. The maximum hop count allowed for RIP is 15
and a hop count of 16 is considered as network unreachable.

Features of RIP

1. Updates of the network are exchanged periodically.

2. Updates (routing information) are always broadcast.

3. Full routing tables are sent in updates.

4. Routers always trust routing information received from neighbor routers. This is also
known as Routing on rumors.

RIP versions:

There are three versions of routing information protocol – RIP Version1, RIP Version2, and
RIPng.

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

RIP v1 is known as Classful Routing Protocol because it doesn’t send information of subnet
mask in its routing update.

RIP v2 is known as Classless Routing Protocol because it sends information of subnet mask
in its routing update.

Configuration:

Consider the above-given topology which has 3-routers R1, R2, R3. R1 has IP address
172.16.10.6/30 on s0/0/1, 192.168.20.1/24 on fa0/0. R2 has IP address 172.16.10.2/30 on
s0/0/0, 192.168.10.1/24 on fa0/0. R3 has IP address 172.16.10.5/30 on s0/1, 172.16.10.1/30 on
s0/0, 10.10.10.1/24 on fa0/0.

Configure RIP for R1:

R1(config)# router rip

R1(config-router)# network 192.168.20.0

R1(config-router)# network 172.16.10.4

R1(config-router)# version 2

R1(config-router)# no auto-summary

Configuring RIP for R2:

R2(config)# router rip

R2(config-router)# network 192.168.10.0

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

R2(config-router)# network 172.16.10.0

R2(config-router)# version 2

R2(config-router)# no auto-summary

Similarly, Configure RIP for R3:

RIP timers:

Update timer: The default timing for routing information being exchanged by the routers
operating RIP is 30 seconds. Using an Update timer, the routers exchange their routing table
periodically.

Invalid timer: If no update comes until 180 seconds, then the destination router considers it
invalid. In this scenario, the destination router mark hop counts as 16 for that router.

Hold down timer: This is the time for which the router waits for a neighbor router to respond.
If the router isn’t able to respond within a given time, then it is declared dead. It is 180 seconds
by default.

Flush time: It is the time after which the entry of the route will be flushed if it doesn’t respond
within the flush time. It is 60 seconds by default. This timer starts after the route has been
declared invalid and after 60 seconds i.e time will be 180 + 60 = 240 seconds.

Normal utilization of RIP:

Small to medium-sized networks: RIP is normally utilized in little to medium-sized networks


that have moderately basic directing prerequisites. It is not difficult to design and requires little
support, which goes with it a famous decision for little organizations.

Legacy organizations: RIP is as yet utilized in some heritage networks that were set up before
further developed steering conventions were created. These organizations may not merit the
expense and exertion of overhauling, so they keep on involving RIP as their directing
convention.

Lab conditions: RIP is much of the time utilized in lab conditions for testing and learning
purposes. A basic convention is not difficult to set up, which pursues it a decent decision for
instructive purposes.

Backup or repetitive steering: In certain organizations, RIP might be utilized as a


reinforcement or excess directing convention, on the off chance that the essential steering
convention falls flat or encounters issues. RIP isn’t generally so productive as other directing
conventions; however, it very well may be helpful as a reinforcement if there should be an
occurrence of crisis.

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

Advantages of RIP:

• Simplicity: RIP is a relatively simple protocol to configure and manage, making it an


ideal choice for small to medium-sized networks with limited resources.
• Easy implementation: RIP is easy to implement, as it does not require much technical
expertise to set up and maintain.
• Convergence: RIP is known for its fast convergence time, meaning that it can quickly
adapt to changes in network topology and route packets efficiently.
• Automatic updates: RIP automatically updates routing tables at regular intervals,
ensuring that the most up-to-date information is being used to route packets.
• Low bandwidth overhead: RIP uses a relatively low amount of bandwidth to exchange
routing information, making it an ideal choice for networks with limited bandwidth.
• Compatibility: RIP is compatible with many different types of routers and network
devices, making it easy to integrate into existing networks.

Disadvantages of RIP:

• Limited scalability: RIP has limited scalability, and it may not be the best choice for
larger networks with complex topologies. RIP can only support up to 15 hops, which
may not be sufficient for larger networks.
• Slow convergence: While RIP is known for its fast convergence time, it can be slower
to converge than other routing protocols. This can lead to delays and inefficiencies in
network performance.
• Routing loops: RIP can sometimes create routing loops, which can cause network
congestion and reduce overall network performance.
• Limited support for load balancing: RIP does not support sophisticated load
balancing, which can result in suboptimal routing paths and uneven network traffic
distribution.
• Security vulnerabilities: RIP does not provide any native security features, making it
vulnerable to attacks such as spoofing and tampering.
• Inefficient use of bandwidth: RIP uses a lot of bandwidth for periodic updates, which
can be inefficient in networks with limited bandwidth.

OSPF Open Shortest Path First (OSPF) protocol: -


Open Shortest Path First (OSPF) is a link-state routing protocol that is used to find the best
path between the source and the destination router using its own Shortest Path First). OSPF is
developed by Internet Engineering Task Force (IETF) as one of the Interior Gateway Protocol
(IGP), i.e, the protocol which aims at moving the packet within a large autonomous system or
routing domain. It is a network layer protocol which works on protocol number 89 and uses
AD value 110. OSPF uses multicast address 224.0.0.5 for normal communication and 224.0.0.6
for update to designated router (DR)/Backup Designated Router (BDR).

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

OSPF Terms

➢ Router Id – It is the highest active IP address present on the router. First, the highest
loopback address is considered. If no loopback is configured then the highest active IP
address on the interface of the router is considered.
➢ Router priority – It is an 8-bit value assigned to a router operating OSPF, used to elect
DR and BDR in a broadcast network.
➢ Designated Router (DR) – It is elected to minimize the number of adjacencies formed.
DR distributes the LSAs to all the other routers. DR is elected in a broadcast network
to which all the other routers share their DBD. In a broadcast network, the router
requests for an update to DR, and DR will respond to that request with an update.
➢ Backup Designated Router (BDR) – BDR is a backup to DR in a broadcast network.
When DR goes down, BDR becomes DR and performs its functions.
➢ DR and BDR election – DR and BDR election takes place in the broadcast network or
multi-access network. Here are the criteria for the election:

• The router having the highest router priority will be declared as DR.
• If there is a tie in router priority then the highest router I’d be considered. First, the
highest loopback address is considered. If no loopback is configured then the highest
active IP address on the interface of the router is considered.

OSPF States

The device operating OSPF goes through certain states. These states are:

Down – In this state, no hello packets have been received on the interface.

Note – The Downstate doesn’t mean that the interface is physically down. Here, it means that
the OSPF adjacency process has not started yet.

INIT – In this state, the hello packets have been received from the other router.

2WAY – In the 2WAY state, both the routers have received the hello packets from other
routers. Bidirectional connectivity has been established.

Note – In between the 2WAY state and Exstart state, the DR and BDR election takes place.

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

Exstart – In this state, NULL DBD are exchanged. In this state, the master and slave elections
take place. The router having the higher router I’d become the master while the other becomes
the slave. This election decides Which router will send its DBD first (routers who have formed
neighbourship will take part in this election).

Exchange – In this state, the actual DBDs are exchanged.

Loading – In this state, LSR, LSU, and LSA (Link State Acknowledgement) are exchanged.

Important – When a router receives DBD from another router, it compares its own DBD with
the other router DBD. If the received DBD is more updated than its own DBD then the router
will send LSR to the other router stating what links are needed. The other router replies with
the LSU containing the updates that are needed. In return to this, the router replies with the
Link State Acknowledgement.

Full – In this state, synchronization of all the information takes place. OSPF routing can begin
only after the Full state.

Border Gateway Protocol (BGP) protocol: -


Border Gateway Protocol (BGP) is used to Exchange routing information for the internet and
is the protocol used between ISP which are different ASes.

The protocol can connect together any internetwork of autonomous system using an arbitrary
topology. The only requirement is that each AS have at least one router that is able to run BGP
and that is router connect to at least one other AS’s BGP router. BGP’s main function is to
exchange network reach-ability information with other BGP systems. Border Gateway
Protocol constructs an autonomous systems’ graph based on the information exchanged
between BGP routers.

Characteristics of Border Gateway Protocol (BGP):

• Inter-Autonomous System Configuration: The main role of BGP is to provide


communication between two autonomous systems.
• BGP supports Next-Hop Paradigm.
• Coordination among multiple BGP speakers within the AS (Autonomous System).
• Path Information: BGP advertisement also include path information, along with the
reachable destination and next destination pair.
• Policy Support: BGP can implement policies that can be configured by the
administrator. For ex: - a router running BGP can be configured to distinguish
between the routes that are known within the AS and that which are known from
outside the AS.

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

• Runs Over TCP.


• BGP conserve network Bandwidth.
• BGP supports CIDR.
• BGP also supports Security.

Functionality of Border Gateway Protocol (BGP):

BGP peers performs 3 functions, which are given below.

• The first function consists of initial peer acquisition and authentication. both the peers
established a TCP connection and perform message exchange that guarantees both sides
have agreed to communicate.
• The second function mainly focus on sending negative or positive reach-ability
information.
• The third function verifies that the peers and the network connection between them are
functioning correctly.

BGP Route Information Management Functions:

• Route Storage: Each BGP stores information about how to reach other networks.
• Route Update: In this task, Special techniques are used to determine when and how to
use the information received from peers to properly update the routes.
• Route Selection: Each BGP uses the information in its route databases to select good
routes to each network on the internet network.
• Route advertisement: Each BGP speaker regularly tells its peer what is known about
various networks and methods to reach them.

Application Layer: DNS, FTP, TFTP, Mail transfer Protocol,


TELNET, HTTP –

The application layer is present at the top of the OSI model. It is the layer through which users
interact. It provides services to the user. Application layer performs several kinds of functions
which are requirement in any kind of application or communication process.

Application Layer Protocol in Computer Network

1. TELNET

Telnet stands for the TELetype NETwork. It helps in terminal emulation. It allows Telnet
clients to access the resources of the Telnet server. It is used for managing files on the internet.
It is used for the initial setup of devices like switches. The telnet command is a command that
uses the Telnet protocol to communicate with a remote device or system. Port number of telnets
is 23.

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

Command

telnet [\\RemoteServer]

\\RemoteServer

: Specifies the name of the server

to which you want to connect

2. FTP

FTP stands for File Transfer Protocol. It is the protocol that actually lets us transfer files. It can
facilitate this between any two machines using it. But FTP is not just a protocol but it is also a
program. FTP promotes sharing of files via remote computers with reliable and efficient data
transfer. The Port number for FTP is 20 for data and 21 for control.

Command

ftp machinename

3. TFTP

The Trivial File Transfer Protocol (TFTP) is the stripped-down, stock version of FTP, but it’s
the protocol of choice if you know exactly what you want and where to find it. It’s a technology
for transferring files between network devices and is a simplified version of FTP. The Port
number for TFTP is 69.

Command

tftp [ options... ] [host [port]] [-c command]

4. SMTP

It stands for Simple Mail Transfer Protocol. It is a part of the TCP/IP protocol. Using a process
called “store and forward,” SMTP moves your email on and across networks. It works closely
with something called the Mail Transfer Agent (MTA) to send your communication to the right
computer and email inbox. The Port number for SMTP is 25.

5. HTTP/HTTPS

Prof. Hemlata Arya Department of CSE Subject Code: -150512


MADHAV INSTITUTE OF TECHNOLOGY & SCIENCE, GWALIOR
(A Govt. Aided UGC Autonomous Institute Affiliated to RGPV, Bhopal)
NAAC Accredited with A++ Grade

HTTP stands for Hypertext Transfer Protocol and HTTPS is the more secured version of HTTP,
that’s why HTTPS stands for Hypertext Transfer Protocol Secure. This protocol is used to
access data from the World Wide Web. The Hypertext is the well-organized documentation
system that is used to link pages in the text document.

HTTP is based on the client-server model.

It uses TCP for establishing connections.

HTTP is a stateless protocol, which means the server doesn’t maintain any information about
the previous request from the client.

HTTP uses port number 80 for establishing the connection.

Command

MAIL FROM:<mail@abc.com?

6. DNS

It stands for Domain Name System. Every time you use a domain name, therefore, a DNS
service must translate the name into the corresponding IP address. For example, the domain
name www.abc.com might translate to 198.105.232.4.

The Port number for DNS is 53.

Command

ipconfig /flushdns

Prof. Hemlata Arya Department of CSE Subject Code: -150512

You might also like