SlideShare a Scribd company logo
Topics
1.Router
2.Routing
Name: Iran GUL
Router
•Router is a device which makes connection possible
between two or more different networks present at same
or different geographical locations.
•It works on 3rd layer of OSI Model(i.e on network layer)
•It does two basic things:.
1. Select the best path from the routing table.
2. Forward the packet on that path.
Vendors of Router
Many companies are manufacturing routers
• Cisco
• Nortel
• Multicom
• Juniper
• Dlink
•3com
Cisco is the leading manufacturer of routers and
switches.It manufactures 70% of routers and switches o
the market.
3 level hierarchy Cisco router
1. Access level/layer
2. Distribution level/layer
3. Core level/layer
Access Layer Routers
• Routers which are used by the small organizations
and
are also known as Desktop routers or company layer
routers.
• Access layer routers are of low speed, low
processing power, low RAM and lower no of ports
and are also low price.
Router Series
800,1000,1600,1700,2500
1700 Series Router
Distribution Layer Routers
• Routers which are used by ISP’s and
are also known as ISP layer routers.
• Distribution layer routers are batter in speed,
processing and RAM than access layer
routers.
• These routers are costly than access layer
routers
2600,3200,3600,3700
Router Series
3600 Series Router
Front side
3600 Series Router
Back Side
Core Layer Router
• Routers that are used by the Global
ISP’s and are also known as
backbone routers.
• Core layer routers are best routers
than all and are costly routers.
Router series
6400,7200,7300,7400,7500,7600,10000,
12000
7200 Series Router
7600 Series Router
Special Series of
Routers
• Integrated Service Routers/ISR
• They just not do routing, can also do
security and voice implementation.
800,1800,2800,3800 etc.
Router Classification
Routers are classified in two classes.
1. Fixed Routers
2. Modular Routers
Fixed Routers
• Fixed routers are non upgradable, can not
add or remove the Ethernet or serial ports.
• Does not have any slot.
• In fixed routers the ports are integrated on
the mother board.(Fixed on mother
board).
• Access routers are fixed routers.
Modular Routers
• Modular Routers are upgradable, can add
or remove the interfaces as per our
requirement.
• Number of slots available depends on the
series of the router.
• Can add LAN and WAN cards.
• Router series greater than 2600 are
modular routers.
Ports on Router
There are three types of ports on the
router.
1. LAN ports
2. WAN ports
3. Administrative Ports
LAN Ports
• The ports where local area network is
connected with the router are called LAN
ports.
• Ethernet ports, fast Ethernet ports, Gig
Ethernet ports, 10gbps are LAN ports.
• Ethernet 10Mbps
• Fast Ethernet 100Mbps
• Gig Ethernet 1000Mbps
• All Ports are of RJ45 connectors
LAN Ports
WAN Ports
• Ports that are used for WAN
connection/router to router connection are
called WAN ports.
• WAN ports are serial
interfaces(S0,S1,S0/0,S0/1,S0/0/0 etc).
• Serial ports are of two category
1. 26pins
2. 60pins
WAN Ports
Administrative
Ports
1. Console RJ45-Local
administrative
2. Auxiliary RJ45-Remote
administrative
Console Ports
• Console ports are known as Local
ports
• They are generally used for initial
confi-guration, password recovery and
local administration of the router.
• One side of the console port/cable is
RJ45 and other is 9pin com
port.
Console Ports
• Console ports not carry the traffic
like LAN and WAN
ports/interfaces, it just carry the
commands.
Auxiliary Ports
• Auxiliary ports are known as remote
administrative ports.
• They are RJ45 ports.
• A console or a rollover cable is to be
used.
• RJ45 to DB-25
Internal components of router
• ROM(Read Only Memory)
• POST(Power on self Test)
• Mini-IOS
• RAM(Random Access Memory)
• Flash Memory
• NVRAM(Non-Volatile RAM)
ROM
• ROM is a chip integrated on the
mother board which contains a
bootstrap program which tells how to
load the IOS.
• Used to start and maintain the router.
Holds the POST and Bootstrap
program, as well as the mini-IOS.
POST
• Stored in the microcode of the ROM.
• Post is used to check the basic
functionality of the router hardware
and determines which interfaces are
present.
IOS
• Internetwork Operating System/IOS.
• Operating system inside the router is
called IOS.
• Different vendors have there own IOS
like Cisco IOS, Juniper IOS.
• IOS are platform depended e.g Cisco
IOS work only with Cisco routers.
RAM
• Hold the temporary configurations,
ARP cache, routing tables and are
also the software and data
structures that allow the router to
function.
• The IOS is loaded in to the RAM
from the flesh at the time of
booting.
Flash Memory
• Stores the IOS by default.
• Flash memory is not erased when the
router is reloaded.
NVRAM
• Hold the router and switch configuration
• NVRAM is not erased when the router or
switch is reloaded/switched off.
• The configuration register is stored in the
non-volatile memory.
• Configuration means passwords, IP
addresses and routing table.
Internal components
of router
Modes of the
Router
• Here are different modes of the router
• Setup Mode
• User Mode
• Privileged Mode
• Global Configuration Mode
• Interface Mode
• Setup Mode
• The router enters in to the setup mode if the
NVRAM is empty.
Continue with configuration dialog[yes/no]
Answer with ‘Yes’ or ‘No’.
• User Mode
• Only some basic monitoring
• Limited show commands ping, trace,
• Router>
• Privileged Mode
• Monitoring and some troubleshooting.
• All show commands, ping trace, copy and
erase
• Router#
• Global Configuration Mode
• To make any change that affect the router like
hostname, routing configuration.
• Router(config)#
• Global Configuration Mode
• Configurations done on the specific interface.
• Router(config-if)#
• Rommon Mode
• Reverting Password
Basic Commands
• Setup Mode
• Continue with configuration
dialog?[Yes/No]
• Answer ‘Yes’ or ‘No’.
• User Mode
• Router>
• Router>enable
• Privileged Mode
• Router#Show running-config
• Router#Show start-config
• Router#Show flash
• Router#Show version
• Router#Show ip interface brief
• Global Configuration Mode
• Router#Configure Terminal
• Router(config)#Hostname R-1
• R-1(config)#Show IP route
• R-1(config)enable password<password>
• R-1(config)enable secret <password>
• Interface Mode
• Router(config)# interface FastEthernet0/0
• Router(config-if)#ip address <ip address>
<Subnet Mask>
• Rouetr(config)#interface Serial 0/0
• Router(config-if)ip address <ip address>
<Subnet Mask>
Routing
• Forwarding the packets from one network
to the other network choosing the best path
from the routing table.
• Routing makes possible for two or more
networks to communicate with each other
• Routing table only consist of only the best
routes for each destination
Types of routing
1. Static routing
2. Default routing
3. Dynamic routing
Types of routing
• Static Routing – This is the method by which an administrator manually
adds routes to the routing table of a router. This is a method for small
networks but it is not scalable for larger networks.
• Default Routing – This is the method where all routers are configured to
send all packets towards a single router. This is a very useful method
for small networks or for networks with a single entry and exit point.
It is usually used in addition to Static and/or Dynamic routing.
• Dynamic Routing – This is the method where protocols and algorithms are
used to automatically propagate routing information. This is the most
common method and most complex method of routing. Each routing
protocol can have chapters or even whole books written about then. Most
of them have one or more RFCs dedicated to them. In fact, the whole of
the next chapter is dedicated to dynamic routing.
Routing Protocol
• There are different types of routing Protocols and Each use different Metrics
to Select best Paths,
.
Routing Metrics
• Routers use various metrics and calculations to determine the best route for a
packet to reach its final network destination. Each routing protocol uses its
own algorithm with varying weights to determine the best possible path.
• The algorithm determines the metric for routes throughout the network and
the smaller the metric value the better the route is likely to be. Smaller
metrics indicate faster, better and more trustworthy routes. Higher metrics are
the opposite and reflect routes that are not positive for any of the 3 attributes
listed above.
The following are metrics used in determining the best path for a routing protocol:
• Bandwidth – Throughput speed in bits per second
• Cost – An arbitrary value assigned by an administrator for the intersecting of
networks
• Delay – Network latency caused by such factors as distance or congestion
• Hop Count – The number of routers (hops) a packets passes through to its destination
• Load – Measurement of traffic that flows through a router
• MTU (Maximum Transmission Unit) – The largest unit size allowed to be transmitted
on all routes from source to destination
• Reliability – Represents the amount of network downtime, that is, how reliable a
network path is)
When are Routing Metrics Compared?
• The Routing Metrics of routes are compared when the routes
have the same Administrative Distance. The Administrative
Distance (AD) is a measure of trust worthiness of the routing
information received.
• The default administrative distances of common routing
protocols are listed below:
Routing Protocol Metrics
Note: Class-full and Classless
,No of count Hops
Rules to assign the IP address to the router
1. All the LAN and WAN should be in the different
networks(or should not repeat the same network).
2. Router Ethernet IP address and the LAN IP address
should be in the same network.
3. Both the interfaces of routers facing each other
should be in the same network.
4. All the interfaces of routers should be in the different
network.
Configuring the Static and Default Routing
Configuring the Static Routing
Router(config)#ip route destination_network mask
{next_hop_address | exit_interface}
Router1(config)#ip route 192.168.5.0 255.255.255.0
10.1.1.2
Router2(config)#ip route 192.168.5.0 255.255.255.0
10.1.2.2
Router3(config)#ip route 192.168.1.0 255.255.255.0 10.1.2.1
Router2(config)#ip route 192.168.1.0 255.255.255.0
10.1.1.1
Configuring the Default Routing
ip route 0.0.0.0 0.0.0.0 next-hop
Router3(config)#ip route 0.0.0.0 0.0.0.0
10.1.2.1
Thanks


More Related Content

What's hot

Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
Muhammad Arshad
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
kirbadh
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
KarthicaMarasamy
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
Darwish Ahmad
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
Dr Rajiv Srivastava
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
OSI Model
OSI ModelOSI Model
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Network servers
Network serversNetwork servers
Network servers
Online
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
Varinder Singh Walia
 

What's hot (20)

Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
 
Vlan
VlanVlan
Vlan
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Network servers
Network serversNetwork servers
Network servers
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Vlan
Vlan Vlan
Vlan
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 

Similar to Router and routing

presentation-140514125659-phpapp01.pdf
presentation-140514125659-phpapp01.pdfpresentation-140514125659-phpapp01.pdf
presentation-140514125659-phpapp01.pdf
gebreyesusweldegebri2
 
Presentation CCNA
Presentation CCNAPresentation CCNA
Presentation CCNA
wisdom PK
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
birhanugebisa1
 
Chapter07
Chapter07Chapter07
Chapter07
Muhammad Ahad
 
Routing
RoutingRouting
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
VISHNU N
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
AmzadKhn
 
Routing Protocols
Routing ProtocolsRouting Protocols
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
gebreyesusweldegebri2
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
AayushMishra89
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
Vignesh kumar
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
hamsa nandhini
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
Zee Haak
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
CYBERINTELLIGENTS
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
CYBERINTELLIGENTS
 

Similar to Router and routing (20)

presentation-140514125659-phpapp01.pdf
presentation-140514125659-phpapp01.pdfpresentation-140514125659-phpapp01.pdf
presentation-140514125659-phpapp01.pdf
 
Presentation CCNA
Presentation CCNAPresentation CCNA
Presentation CCNA
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
 
Chapter07
Chapter07Chapter07
Chapter07
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Routing
RoutingRouting
Routing
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
 
Router & functionality
Router & functionalityRouter & functionality
Router & functionality
 
CCNA part 5 routing
CCNA part 5 routingCCNA part 5 routing
CCNA part 5 routing
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ccna routing
Ccna routingCcna routing
Ccna routing
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Final Presentation on the Network layer
Final Presentation on the Network layerFinal Presentation on the Network layer
Final Presentation on the Network layer
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Router and routing

  • 2. Router •Router is a device which makes connection possible between two or more different networks present at same or different geographical locations. •It works on 3rd layer of OSI Model(i.e on network layer) •It does two basic things:. 1. Select the best path from the routing table. 2. Forward the packet on that path.
  • 3.
  • 4. Vendors of Router Many companies are manufacturing routers • Cisco • Nortel • Multicom • Juniper • Dlink •3com Cisco is the leading manufacturer of routers and switches.It manufactures 70% of routers and switches o the market.
  • 5. 3 level hierarchy Cisco router 1. Access level/layer 2. Distribution level/layer 3. Core level/layer
  • 6. Access Layer Routers • Routers which are used by the small organizations and are also known as Desktop routers or company layer routers. • Access layer routers are of low speed, low processing power, low RAM and lower no of ports and are also low price.
  • 9. Distribution Layer Routers • Routers which are used by ISP’s and are also known as ISP layer routers. • Distribution layer routers are batter in speed, processing and RAM than access layer routers. • These routers are costly than access layer routers
  • 13. Core Layer Router • Routers that are used by the Global ISP’s and are also known as backbone routers. • Core layer routers are best routers than all and are costly routers. Router series 6400,7200,7300,7400,7500,7600,10000, 12000
  • 16. Special Series of Routers • Integrated Service Routers/ISR • They just not do routing, can also do security and voice implementation. 800,1800,2800,3800 etc.
  • 17. Router Classification Routers are classified in two classes. 1. Fixed Routers 2. Modular Routers
  • 18. Fixed Routers • Fixed routers are non upgradable, can not add or remove the Ethernet or serial ports. • Does not have any slot. • In fixed routers the ports are integrated on the mother board.(Fixed on mother board). • Access routers are fixed routers.
  • 19. Modular Routers • Modular Routers are upgradable, can add or remove the interfaces as per our requirement. • Number of slots available depends on the series of the router. • Can add LAN and WAN cards. • Router series greater than 2600 are modular routers.
  • 20. Ports on Router There are three types of ports on the router. 1. LAN ports 2. WAN ports 3. Administrative Ports
  • 21. LAN Ports • The ports where local area network is connected with the router are called LAN ports. • Ethernet ports, fast Ethernet ports, Gig Ethernet ports, 10gbps are LAN ports. • Ethernet 10Mbps • Fast Ethernet 100Mbps • Gig Ethernet 1000Mbps • All Ports are of RJ45 connectors
  • 23. WAN Ports • Ports that are used for WAN connection/router to router connection are called WAN ports. • WAN ports are serial interfaces(S0,S1,S0/0,S0/1,S0/0/0 etc). • Serial ports are of two category 1. 26pins 2. 60pins
  • 25. Administrative Ports 1. Console RJ45-Local administrative 2. Auxiliary RJ45-Remote administrative
  • 26. Console Ports • Console ports are known as Local ports • They are generally used for initial confi-guration, password recovery and local administration of the router. • One side of the console port/cable is RJ45 and other is 9pin com port.
  • 27. Console Ports • Console ports not carry the traffic like LAN and WAN ports/interfaces, it just carry the commands.
  • 28. Auxiliary Ports • Auxiliary ports are known as remote administrative ports. • They are RJ45 ports. • A console or a rollover cable is to be used. • RJ45 to DB-25
  • 29. Internal components of router • ROM(Read Only Memory) • POST(Power on self Test) • Mini-IOS • RAM(Random Access Memory) • Flash Memory • NVRAM(Non-Volatile RAM)
  • 30. ROM • ROM is a chip integrated on the mother board which contains a bootstrap program which tells how to load the IOS. • Used to start and maintain the router. Holds the POST and Bootstrap program, as well as the mini-IOS.
  • 31. POST • Stored in the microcode of the ROM. • Post is used to check the basic functionality of the router hardware and determines which interfaces are present.
  • 32. IOS • Internetwork Operating System/IOS. • Operating system inside the router is called IOS. • Different vendors have there own IOS like Cisco IOS, Juniper IOS. • IOS are platform depended e.g Cisco IOS work only with Cisco routers.
  • 33. RAM • Hold the temporary configurations, ARP cache, routing tables and are also the software and data structures that allow the router to function. • The IOS is loaded in to the RAM from the flesh at the time of booting.
  • 34. Flash Memory • Stores the IOS by default. • Flash memory is not erased when the router is reloaded.
  • 35. NVRAM • Hold the router and switch configuration • NVRAM is not erased when the router or switch is reloaded/switched off. • The configuration register is stored in the non-volatile memory. • Configuration means passwords, IP addresses and routing table.
  • 37. Modes of the Router • Here are different modes of the router • Setup Mode • User Mode • Privileged Mode • Global Configuration Mode • Interface Mode
  • 38. • Setup Mode • The router enters in to the setup mode if the NVRAM is empty. Continue with configuration dialog[yes/no] Answer with ‘Yes’ or ‘No’. • User Mode • Only some basic monitoring • Limited show commands ping, trace, • Router>
  • 39. • Privileged Mode • Monitoring and some troubleshooting. • All show commands, ping trace, copy and erase • Router# • Global Configuration Mode • To make any change that affect the router like hostname, routing configuration. • Router(config)#
  • 40. • Global Configuration Mode • Configurations done on the specific interface. • Router(config-if)# • Rommon Mode • Reverting Password
  • 41. Basic Commands • Setup Mode • Continue with configuration dialog?[Yes/No] • Answer ‘Yes’ or ‘No’. • User Mode • Router> • Router>enable
  • 42. • Privileged Mode • Router#Show running-config • Router#Show start-config • Router#Show flash • Router#Show version • Router#Show ip interface brief
  • 43. • Global Configuration Mode • Router#Configure Terminal • Router(config)#Hostname R-1 • R-1(config)#Show IP route • R-1(config)enable password<password> • R-1(config)enable secret <password>
  • 44. • Interface Mode • Router(config)# interface FastEthernet0/0 • Router(config-if)#ip address <ip address> <Subnet Mask> • Rouetr(config)#interface Serial 0/0 • Router(config-if)ip address <ip address> <Subnet Mask>
  • 45. Routing • Forwarding the packets from one network to the other network choosing the best path from the routing table. • Routing makes possible for two or more networks to communicate with each other • Routing table only consist of only the best routes for each destination
  • 46. Types of routing 1. Static routing 2. Default routing 3. Dynamic routing
  • 47. Types of routing • Static Routing – This is the method by which an administrator manually adds routes to the routing table of a router. This is a method for small networks but it is not scalable for larger networks. • Default Routing – This is the method where all routers are configured to send all packets towards a single router. This is a very useful method for small networks or for networks with a single entry and exit point. It is usually used in addition to Static and/or Dynamic routing. • Dynamic Routing – This is the method where protocols and algorithms are used to automatically propagate routing information. This is the most common method and most complex method of routing. Each routing protocol can have chapters or even whole books written about then. Most of them have one or more RFCs dedicated to them. In fact, the whole of the next chapter is dedicated to dynamic routing.
  • 48. Routing Protocol • There are different types of routing Protocols and Each use different Metrics to Select best Paths, .
  • 49. Routing Metrics • Routers use various metrics and calculations to determine the best route for a packet to reach its final network destination. Each routing protocol uses its own algorithm with varying weights to determine the best possible path. • The algorithm determines the metric for routes throughout the network and the smaller the metric value the better the route is likely to be. Smaller metrics indicate faster, better and more trustworthy routes. Higher metrics are the opposite and reflect routes that are not positive for any of the 3 attributes listed above. The following are metrics used in determining the best path for a routing protocol: • Bandwidth – Throughput speed in bits per second • Cost – An arbitrary value assigned by an administrator for the intersecting of networks • Delay – Network latency caused by such factors as distance or congestion • Hop Count – The number of routers (hops) a packets passes through to its destination • Load – Measurement of traffic that flows through a router • MTU (Maximum Transmission Unit) – The largest unit size allowed to be transmitted on all routes from source to destination • Reliability – Represents the amount of network downtime, that is, how reliable a network path is)
  • 50. When are Routing Metrics Compared? • The Routing Metrics of routes are compared when the routes have the same Administrative Distance. The Administrative Distance (AD) is a measure of trust worthiness of the routing information received. • The default administrative distances of common routing protocols are listed below:
  • 51. Routing Protocol Metrics Note: Class-full and Classless ,No of count Hops
  • 52. Rules to assign the IP address to the router 1. All the LAN and WAN should be in the different networks(or should not repeat the same network). 2. Router Ethernet IP address and the LAN IP address should be in the same network. 3. Both the interfaces of routers facing each other should be in the same network. 4. All the interfaces of routers should be in the different network.
  • 53.
  • 54. Configuring the Static and Default Routing
  • 55. Configuring the Static Routing Router(config)#ip route destination_network mask {next_hop_address | exit_interface} Router1(config)#ip route 192.168.5.0 255.255.255.0 10.1.1.2 Router2(config)#ip route 192.168.5.0 255.255.255.0 10.1.2.2 Router3(config)#ip route 192.168.1.0 255.255.255.0 10.1.2.1 Router2(config)#ip route 192.168.1.0 255.255.255.0 10.1.1.1
  • 56. Configuring the Default Routing ip route 0.0.0.0 0.0.0.0 next-hop Router3(config)#ip route 0.0.0.0 0.0.0.0 10.1.2.1