Here are the steps to solve this problem:1. Configure OSPF on the routers in region A and EIGRP on the routers in region B separately. 2. At the boundary routers between A and B, configure route redistribution. Redistribute connected, static and OSPF routes into EIGRP and vice versa.3. To redistribute OSPF routes into EIGRP, use the command:router eigrp 1redistribute ospf 100 metric 10000 100 255 1 15004. To redistribute EIGRP routes into OSPF, use: router ospf 100redistribute eigrp 1 metric type-15. Enable authentication
The document describes an internship report submitted by Roja P for their internship at Konigtronics (OPC) Private Limited. It provides details about the company such as its areas of service including R&D, software engineering, and technical training. It also includes profiles of the external guide and founder of the company. The report then covers topics learned during the internship over 4 weeks including the OSI model, network simulation using GNS3, network addressing, routing protocols like RIP, EIGRP and OSPF, and the Telnet protocol. It discusses network topologies and configuring routing protocols and addresses on sample networks. It also presents two problem statements solved around configuring routing protocols and performing route redist
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
More Related Content
Similar to Here are the steps to solve this problem:1. Configure OSPF on the routers in region A and EIGRP on the routers in region B separately. 2. At the boundary routers between A and B, configure route redistribution. Redistribute connected, static and OSPF routes into EIGRP and vice versa.3. To redistribute OSPF routes into EIGRP, use the command:router eigrp 1redistribute ospf 100 metric 10000 100 255 1 15004. To redistribute EIGRP routes into OSPF, use: router ospf 100redistribute eigrp 1 metric type-15. Enable authentication
Similar to Here are the steps to solve this problem:1. Configure OSPF on the routers in region A and EIGRP on the routers in region B separately. 2. At the boundary routers between A and B, configure route redistribution. Redistribute connected, static and OSPF routes into EIGRP and vice versa.3. To redistribute OSPF routes into EIGRP, use the command:router eigrp 1redistribute ospf 100 metric 10000 100 255 1 15004. To redistribute EIGRP routes into OSPF, use: router ospf 100redistribute eigrp 1 metric type-15. Enable authentication (20)
Here are the steps to solve this problem:1. Configure OSPF on the routers in region A and EIGRP on the routers in region B separately. 2. At the boundary routers between A and B, configure route redistribution. Redistribute connected, static and OSPF routes into EIGRP and vice versa.3. To redistribute OSPF routes into EIGRP, use the command:router eigrp 1redistribute ospf 100 metric 10000 100 255 1 15004. To redistribute EIGRP routes into OSPF, use: router ospf 100redistribute eigrp 1 metric type-15. Enable authentication
1. VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Belgaum, Karnataka
BANGALORE INSTITUTE OF TECHNOLOGY
K. R. Road, V.V. Puram, Bangalore - 560004
DEPARTMENT OF TELECOMMUNICATION ENGINEERING
INTERNSHIP SEMINAR (15EC84)
Batch-2020
INTERNSHIP TITLE: NETWORKING AND DATA COMMUNICATION
GUIDE : Prof .N.G GIRISH KUMAR
CO-EVALUATOR : Prof. JAMUNA.M
BY
ROJA P(1BI16TE041)
3. EXTERNAL GUIDE
● He has completed B.E in Telecommunication
Engineering from VTU, in 2015.
● He has recently completed his MBA in e-
Business and PG Diploma in International
Business.
● He also worked as an intern under
Dr.Shivananju BN, former Research Scholar,
Department of Instrumentation, IISc,
Bangalore.
Mr. VISHESH S
The Founder and
Managing Director
4. COMPANY PROFILE
● Konigtronics (OPC) Private Limited was incorporated as a corporate company by the Ministry
of Corporate Affairs (MCA) on 9th January 2017.
● Konigtronics has conducted technical workshops on topics like embedded systems, IoT
(Internet of Things), cloud computing, network simulation and bio-medical signal processing.
● Konigtronics Pvt Ltd has extended its services in the field of
>R&D
>Software engineering
>Placement training,HRD and Job consultancy
>Technical and Non-technical training
>REAL ESTATE (Siddesh BS, BE(civil))
>Guidance to International Students in their R&D
5. • Data communications are the exchange of data between two devices via some form of
transmission medium .
• The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
What is Networking?
• A network is the interconnection of a set of devices capable of communication.
• The devices in a network are connected using wired or wireless transmission media such as
cable or air.
• A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security
What is Datas Communication?
6. WEEK 1
❖ THE Open Systems Interconnection (OSI) MODEL
● An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture.
● The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable.
● It was designed to be a reference model and It has seven layers, with each layer describing a
different function of data traveling through a network.
7. • Here is the graphical representation of OSI layers:
• OSI versus TCP/IP: session and presentation Layers, are not in the TCP/IP protocol
8. ❏ Data Flow
● Communication between two devices can be simplex, half-duplex, or full-duplex as
shown below
9. ❏ Type of Connection
● A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another.
● There are two possible types of connections: point-to-point and multipoint.
10. ● GNS3 is a Graphical Network Simulator that allows emulation of complex
networks. These programs allow us to run operating systems such as Windows
XP Professional or Ubuntu Linux in a virtual environment on your computer.
● GNS3 allows the same type of emulation using Cisco Internetwork Operating
Systems.
● GNS3 is an open source, free program.
● Simulated topology can be connected to real world.
● It provides around 1,000 packets per second throughput in a virtual environment.
GRAPHICAL NETWORK SIMULATOR 3
11. WEEK 2
❖ Steps for Router Configuration
● Click on a router icon under Nodes Types in our tool we have used c7200 platform.
● Right-click the router and choose Configure.
● Click on R1 and then the Slots tab. click the drop-down arrow next to slot1 and choose PA-
4T+(based on our choice).
● Right-click on the Router and choose Start.
● Right-click on the Router again and choose Console.start typing the commands for interfacing
the routers.
● Start pinging on the routers with their IP address.
12. Commands for Router Configuration are
● R1#config t:To change a device configuration, you need to enter the global
configuration mode. This mode can be accessed by typing configure terminal from the
enable mode.
● R1(config)#:interface type_number: interfacing the routers with their type of
connection and Port number. Ex: interface serial1/1
● R1(config-router)#ip address IP_ADDRESS SUBNET_MASK.: The ip address interface
mode command is used to assign an IP address to an interface.
Ex: ip address 10.1.12.1 255.255.255.0
● R1(config-router)#no shutdown: By default, all interfaces on a Cisco router are turned
off. To enable an interface, no shutdown command is used.
13. Network Topology is the schematic description of a network arrangement, connecting various
nodes(sender and receiver) through lines of connection.
Simple Topologies: Simple topology with 2 routers and a ring networks are shown in below
figures.
Figure: 2 Router topology
NETWORK TOPOLOGY
14. Figure Ring topology
Then ICMP packets successfully echoed across the network indicating 100% success rate during
PING from any routers in both the 2 router topology and Ring topology.
show ip interface brief : provides information about the interfaces on a router, including the
logical (IP) address and status.
RING TOPOLOGY
15. Complex Topologies: With Partial Mesh in below Figure shows some nodes are organized in a
full mesh scheme but others are only connected to one or two in the network.
Figure Partial Mesh
Pinging from R4 to R2
wasn’t successful since
R4 not having dedicated
point to point link to R2
router
16. ADDRESSING
The identifiers used in the IP layer of the TCP/IP to identify the connection of each device to
the internet is called the Internet address or IP address.
An address space is the total number of addresses used by the protocol.
IPv4 uses 32-bit addresses, which means that the address space is 232or 4,294,967,296 .
The whole address space was divided into five classes.
17. WEEK 3
ROUTING PROTOCOLS
• A protocol needs to define its domain of operation, the messages exchanged,
communication between routers, and interaction with protocols in other domains.
1. Routing Information Protocols (RIP) Version 2
• The Routing Information Protocol (RIP) is a distance-vector,interior gateway (IGP) routing
protocol used by routers to exchange routing information. and uses the hop count as a
routing metric.
• Configuration Example for RIP version 2: R1#config t
R1(config)#router rip
R1(config-router)#version 2
R1(config-router)#network 10.0.0.0
R1(config-router)#no auto-summary
18. 2. Enhanced Interior Gateway Routing Protocol (EIGRP)
● EIGRP is an interior gateway protocol suited for many different topologies and media.
● EIGRP scales well and provides extremely quick convergence times with minimal network
traffic.
● EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm
(DUAL) to calculate the shortest path to a destination within a network.
● EIGRP composite cost metric = 256*((K1*Bw) + (K2*Bw)/(256 – Load) +
(K3*Delay)*(K5/(Reliability + K4))). Where Bw= Bandwidth
● Configuration Example
R1#config t
R1(config)#router eigrp PROCESS_ID
R1(config-router)#network IP_ADDRESS WILDCARD_MASK
19. 3. Open Shortest Path First Routing Protocol (OSPF)
• OSPF configured on routers to effectively move packets around the computer network.
• OSPF uses the Dijkstra shortest path first algorithm to determine the shortest path in the
network. and follows the Link-state routing protocol.
• The OSPF process builds and maintains three separate tables:
1. Neighbor table
2. Topology table
3. Routing table
● Configuration Example
• R1#config t
• R1(config)#router ospf PROCESS_ID
• R1(config-router)#network IP_ADDRESS WILDCARD_MASK AREA_ID
20. TELNET PROTOCOL
• Telnet is an application protocol that allows a user to communicate with a remote device.
• Telnet is often used by network administrators to access and manage remote devices. A
network administrator can access the device by telnetting to the IP address or hostname of a
remote device.
• The network administrator will then be presented with a virtual terminal that can interact
with the remote host.
• Configure a password for the telnet access – by default, the telnet access is disabled. You
need to enable it. This is done using the following sequence of commands:
• HOSTNAME(config) line vty FIRST_VTY LAST_VTY
• HOSTNAME(config-line) password PASSWORD
• HOSTNAME(config-line) login
21. WEEK 4
Problem Statement 1:
To build a communication network consisting of routers at the nodes, forwarding packets to
intended destination.. To configure Open Shortest Path First (OSPF) and Enhanced Interior
Gateway Routing Protocol (EIGRP) routing protocols on the network routers. VLSM IP addressing
scheme,The network needs to be password protected and encrypted by setting of CTY and VTY
password, create interface loopbacks to test the advertisement by OSPF and EIGRP routing
protocol configured on each router.Telnet protocol to remotely access the target router(s).
22. Configured by
OSPF with
ProcessID=100
and Area 0
Configured by
EIGRP with
ProcessID=1
Configured by
OSPF with
ProcessID=100
and Area 0
Configured by
OSPF and EIGRP with
Process_ID 100 & 1
respectively
23. Problem Statement 2:
Consider a region A whose routers are configured with OSPF routing protocol and enclosed
within area 0. Consider another region B using EIGRP as the Internal routing protocol. OSPF and
EIGRP are configured within the AS of region A and region B respectively. Due to some reason
region A decides to merge with region B. In this case we have to connect networks running
different routing protocols. Route redistribution allows different routing protocols to exchange
routing information. Route redistribution needs to be carried out at the boundary routers. The
routers in ‘A’ must be able to send and receive data packets to and from ‘B’ respectively. The
data must be encrypted and intrusion free communication must be enabled.