SlideShare a Scribd company logo
1 of 44
Download to read offline
1/23
Theoretical Section
Practical Section
Introduction to Router and Routing Basics
Darwish Ahmad Herati
St. Joseph’s College (Autonomous)
Computer Science Department
MSc (Computer Science)
SUPERVISOR
Prof. Ms. Mary Merlin
June 25, 2015
Darwish Ahmad Herati Router and Routing Basics
2/23
Theoretical Section
Practical Section
Contents
1 Theoretical Section
Introduction
Routing Basics
2 Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Darwish Ahmad Herati Router and Routing Basics
3/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router
Definition: It is an internetworking device Used to connect
two or more different NETWORKS.
OSI Reference Model: Network Layer(Layer Three).
Logical Address(IP Address)
TCP/IP Model: Internet Layer(Layer Two). Logical
Address(IP Address)
Darwish Ahmad Herati Router and Routing Basics
3/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router
Definition: It is an internetworking device Used to connect
two or more different NETWORKS.
OSI Reference Model: Network Layer(Layer Three).
Logical Address(IP Address)
TCP/IP Model: Internet Layer(Layer Two). Logical
Address(IP Address)
Darwish Ahmad Herati Router and Routing Basics
4/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
ROM: Store the Routers bootstrap details, operating
system software.
Flash Memory: Holds the operating systems images. The
content is retained when the Router is restarted.
RAM: Store the Routing tables, configuration files, caching
and buffering details. Content is LOST when lost router is
switched off or restarted.
NVRAM: Stores the Routers startup configuration files.
Data is NON volatile.
Network Interfaces: Connect Router to Network.
Let’s See The Components!!!
Darwish Ahmad Herati Router and Routing Basics
4/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
ROM: Store the Routers bootstrap details, operating
system software.
Flash Memory: Holds the operating systems images. The
content is retained when the Router is restarted.
RAM: Store the Routing tables, configuration files, caching
and buffering details. Content is LOST when lost router is
switched off or restarted.
NVRAM: Stores the Routers startup configuration files.
Data is NON volatile.
Network Interfaces: Connect Router to Network.
Let’s See The Components!!!
Darwish Ahmad Herati Router and Routing Basics
4/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
ROM: Store the Routers bootstrap details, operating
system software.
Flash Memory: Holds the operating systems images. The
content is retained when the Router is restarted.
RAM: Store the Routing tables, configuration files, caching
and buffering details. Content is LOST when lost router is
switched off or restarted.
NVRAM: Stores the Routers startup configuration files.
Data is NON volatile.
Network Interfaces: Connect Router to Network.
Let’s See The Components!!!
Darwish Ahmad Herati Router and Routing Basics
4/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
ROM: Store the Routers bootstrap details, operating
system software.
Flash Memory: Holds the operating systems images. The
content is retained when the Router is restarted.
RAM: Store the Routing tables, configuration files, caching
and buffering details. Content is LOST when lost router is
switched off or restarted.
NVRAM: Stores the Routers startup configuration files.
Data is NON volatile.
Network Interfaces: Connect Router to Network.
Let’s See The Components!!!
Darwish Ahmad Herati Router and Routing Basics
4/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
ROM: Store the Routers bootstrap details, operating
system software.
Flash Memory: Holds the operating systems images. The
content is retained when the Router is restarted.
RAM: Store the Routing tables, configuration files, caching
and buffering details. Content is LOST when lost router is
switched off or restarted.
NVRAM: Stores the Routers startup configuration files.
Data is NON volatile.
Network Interfaces: Connect Router to Network.
Let’s See The Components!!!
Darwish Ahmad Herati Router and Routing Basics
5/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Components
Darwish Ahmad Herati Router and Routing Basics
6/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Network Router Architecture
Darwish Ahmad Herati Router and Routing Basics
7/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Routing Basics
Routing Definition: In internetworking, the process of
moving a packet of data from SOURCE to DESTINATION.
Routing is usually performed by a dedicated device called
a ROUTER.
Types of Routing: Dynamic Routing and Static Routing.
Routing Table: Contains a list of specific routing
destinations and when the Router receives a packet of
data it references the Routing Table to know where to send
that data.
See The Routing Tables :
1. Cisco Routers IOS: show ip route
2. Linux OS: route -n
3. Windows OS: route print, netstat -rn
Darwish Ahmad Herati Router and Routing Basics
7/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Routing Basics
Routing Definition: In internetworking, the process of
moving a packet of data from SOURCE to DESTINATION.
Routing is usually performed by a dedicated device called
a ROUTER.
Types of Routing: Dynamic Routing and Static Routing.
Routing Table: Contains a list of specific routing
destinations and when the Router receives a packet of
data it references the Routing Table to know where to send
that data.
See The Routing Tables :
1. Cisco Routers IOS: show ip route
2. Linux OS: route -n
3. Windows OS: route print, netstat -rn
Darwish Ahmad Herati Router and Routing Basics
7/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Routing Basics
Routing Definition: In internetworking, the process of
moving a packet of data from SOURCE to DESTINATION.
Routing is usually performed by a dedicated device called
a ROUTER.
Types of Routing: Dynamic Routing and Static Routing.
Routing Table: Contains a list of specific routing
destinations and when the Router receives a packet of
data it references the Routing Table to know where to send
that data.
See The Routing Tables :
1. Cisco Routers IOS: show ip route
2. Linux OS: route -n
3. Windows OS: route print, netstat -rn
Darwish Ahmad Herati Router and Routing Basics
8/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Routing Algorithms
Routing algorithm determines the best possible path
(next hop) and update the Routing Table.
Examples of Routing Algorithms :
1. Bellman-Ford Algorithm
2. Dijkstra’s Algorithm
3. The Floyd Warshall Algorithm
4. etc.
Darwish Ahmad Herati Router and Routing Basics
9/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Classification of Routing Protocols According to:
Purpose: Interior Gateway Protocol (IGP) or Exterior
Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol,
or path-vector protocol.
Behavior: Classful (legacy) or classless protocol.
Let See the Examples !!!
Darwish Ahmad Herati Router and Routing Basics
9/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Classification of Routing Protocols According to:
Purpose: Interior Gateway Protocol (IGP) or Exterior
Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol,
or path-vector protocol.
Behavior: Classful (legacy) or classless protocol.
Let See the Examples !!!
Darwish Ahmad Herati Router and Routing Basics
9/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Classification of Routing Protocols According to:
Purpose: Interior Gateway Protocol (IGP) or Exterior
Gateway Protocol (EGP)
Operation: Distance vector protocol, link-state protocol,
or path-vector protocol.
Behavior: Classful (legacy) or classless protocol.
Let See the Examples !!!
Darwish Ahmad Herati Router and Routing Basics
10/23
Theoretical Section
Practical Section
Introduction
Routing Basics
Examples of Routing Protocols:
RIPv1 (Legacy): IGP, distance vector, classful protocol.
IGRP (legacy): IGP, distance vector, classful protocol
developed by Cisco (deprecated from 12.2 IOS and later).
RIPv2: IGP, distance vector, classless protocol.
EIGRP: IGP, distance vector, classless protocol developed
by Cisco.
OSPF: IGP, link-state, classless protocol.
IS-IS: IGP, link-state, classless protocol.
BGP: EGP, path-vector, classless protocol.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
11/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Router Manufacturers Companies
: Cisco
: D-Link
: MikroTik
: Juniper
: LinkSys
: etc.
Darwish Ahmad Herati Router and Routing Basics
12/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Systems
General Information :
Net income: (2014) 7.9 Billion Dollar
Number of Employees: About 74000
CEO of Cisco System: John T. Chambers
Darwish Ahmad Herati Router and Routing Basics
13/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Systems Co-Founder
Darwish Ahmad Herati Router and Routing Basics
14/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco System Training Courses:
Darwish Ahmad Herati Router and Routing Basics
15/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Hierarchical Model:
Divided into Three Layers:
1. Access Layer
2. Distribution Layer
3. Core Layer
Darwish Ahmad Herati Router and Routing Basics
16/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Hierarchical Model: Access Layer Routers
Access Layers Routers:
Small Organizations, Also known as Desktop or Company
Layer Routers.
Router Series: 800, 1000, 1600, 1700, 1800,2500
Darwish Ahmad Herati Router and Routing Basics
17/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Hierarchical Model: Distribution Layer Routers
Distribution Layers Routers:
ISPs, Also known as ISP Layer Routers.
Router Series: 2600, 3200, 3600, 3700, 3800
Darwish Ahmad Herati Router and Routing Basics
18/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Cisco Hierarchical Model: Core Layer Routers
Core Layers Routers:
Global ISPs, Also known as Backbone Routers.
Router Series: 6400, 7200, 7300, 7400,
7500,7600,10000,12000
Darwish Ahmad Herati Router and Routing Basics
19/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies:
1st: Cloonix
2nd: (CORE) Common
Open Research
Emulator
3rd: GNS3
4th: (IMUNES)
Integrated
Multi-protocol Network
Emulator/Simulator
5th: Marionnet
Darwish Ahmad Herati Router and Routing Basics
19/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies:
1st: Cloonix
2nd: (CORE) Common
Open Research
Emulator
3rd: GNS3
4th: (IMUNES)
Integrated
Multi-protocol Network
Emulator/Simulator
5th: Marionnet
Darwish Ahmad Herati Router and Routing Basics
19/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies:
1st: Cloonix
2nd: (CORE) Common
Open Research
Emulator
3rd: GNS3
4th: (IMUNES)
Integrated
Multi-protocol Network
Emulator/Simulator
5th: Marionnet
Darwish Ahmad Herati Router and Routing Basics
19/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies:
1st: Cloonix
2nd: (CORE) Common
Open Research
Emulator
3rd: GNS3
4th: (IMUNES)
Integrated
Multi-protocol Network
Emulator/Simulator
5th: Marionnet
Darwish Ahmad Herati Router and Routing Basics
19/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies:
1st: Cloonix
2nd: (CORE) Common
Open Research
Emulator
3rd: GNS3
4th: (IMUNES)
Integrated
Multi-protocol Network
Emulator/Simulator
5th: Marionnet
Darwish Ahmad Herati Router and Routing Basics
20/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies: Cont...
6th: Netkit
7th: Psimulator2
8th: Packet Tracer
9th: etc.
Darwish Ahmad Herati Router and Routing Basics
20/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies: Cont...
6th: Netkit
7th: Psimulator2
8th: Packet Tracer
9th: etc.
Darwish Ahmad Herati Router and Routing Basics
20/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies: Cont...
6th: Netkit
7th: Psimulator2
8th: Packet Tracer
9th: etc.
Darwish Ahmad Herati Router and Routing Basics
20/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Network Simulation Technologies: Cont...
6th: Netkit
7th: Psimulator2
8th: Packet Tracer
9th: etc.
Darwish Ahmad Herati Router and Routing Basics
21/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
LAN Implementation using Cisco Packet Tracer:
Darwish Ahmad Herati Router and Routing Basics
22/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
References
Deepankar Medhi, Karthikeyan Ramasamy. (2007).
Network Routing. December.
Todd Lammle, (2009). (CCNA) Cisco Certified Network
Associate Study Guide 5th Edition. April
N2013 Shaun L. Hummel . (2013). Routing Protocol
Selection Guide.June
etc...
Darwish Ahmad Herati Router and Routing Basics
23/23
Theoretical Section
Practical Section
Router Manufacturers
Simulation Technologies
LAN Implementation
Thank You For Your
Attention
Darwish Ahmad Herati Router and Routing Basics

More Related Content

What's hot (20)

Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Ospf
 Ospf Ospf
Ospf
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)OPEN SHORTEST PATH FIRST (OSPF)
OPEN SHORTEST PATH FIRST (OSPF)
 
Eigrp.ppt
Eigrp.pptEigrp.ppt
Eigrp.ppt
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Ccnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] ClassCcnp presentation [Day 1-3] Class
Ccnp presentation [Day 1-3] Class
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 

Viewers also liked

Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Darwish Ahmad
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDarwish Ahmad
 
GRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSGRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSManojit Chakraborty
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDarwish Ahmad
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationDarwish Ahmad
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Königsberg, Euler and the origins of graph theory
Königsberg, Euler and the origins of graph theoryKönigsberg, Euler and the origins of graph theory
Königsberg, Euler and the origins of graph theorypupbroeders
 
ACIT Mumbai - CCNA Training - Router Introduction
ACIT Mumbai - CCNA Training -  Router Introduction ACIT Mumbai - CCNA Training -  Router Introduction
ACIT Mumbai - CCNA Training - Router Introduction Sleek International
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and lifeMilan Joshi
 
Graph coloring and_applications
Graph coloring and_applicationsGraph coloring and_applications
Graph coloring and_applicationsmohammad alkhalil
 
Graph theory in Practise
Graph theory in PractiseGraph theory in Practise
Graph theory in PractiseDavid Simons
 
Graph theory 1
Graph theory 1Graph theory 1
Graph theory 1Tech_MX
 
Application of graph theory in drug design
Application of graph theory in drug designApplication of graph theory in drug design
Application of graph theory in drug designReihaneh Safavi
 
Football and graph theory
Football and graph theoryFootball and graph theory
Football and graph theoryUmang Aggarwal
 
Router components in hindi
Router components in hindiRouter components in hindi
Router components in hindiVipin sharma
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theoryTech_MX
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slidesiarthur
 
introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theoryChuckie Balbuena
 
Graph Coloring : Greedy Algorithm & Welsh Powell Algorithm
Graph Coloring : Greedy Algorithm & Welsh Powell AlgorithmGraph Coloring : Greedy Algorithm & Welsh Powell Algorithm
Graph Coloring : Greedy Algorithm & Welsh Powell AlgorithmPriyank Jain
 

Viewers also liked (20)

Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring Introduction to Graph and Graph Coloring
Introduction to Graph and Graph Coloring
 
Designing Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : DocumentationDesigning Countermeasures For Tomorrows Threats : Documentation
Designing Countermeasures For Tomorrows Threats : Documentation
 
Router
RouterRouter
Router
 
GRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONSGRAPH COLORING AND ITS APPLICATIONS
GRAPH COLORING AND ITS APPLICATIONS
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
 
Basic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentationBasic introduction and countermeasures to ransomware threats presentation
Basic introduction and countermeasures to ransomware threats presentation
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Königsberg, Euler and the origins of graph theory
Königsberg, Euler and the origins of graph theoryKönigsberg, Euler and the origins of graph theory
Königsberg, Euler and the origins of graph theory
 
ACIT Mumbai - CCNA Training - Router Introduction
ACIT Mumbai - CCNA Training -  Router Introduction ACIT Mumbai - CCNA Training -  Router Introduction
ACIT Mumbai - CCNA Training - Router Introduction
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and life
 
Graph coloring and_applications
Graph coloring and_applicationsGraph coloring and_applications
Graph coloring and_applications
 
Graph theory in Practise
Graph theory in PractiseGraph theory in Practise
Graph theory in Practise
 
Graph theory 1
Graph theory 1Graph theory 1
Graph theory 1
 
Application of graph theory in drug design
Application of graph theory in drug designApplication of graph theory in drug design
Application of graph theory in drug design
 
Football and graph theory
Football and graph theoryFootball and graph theory
Football and graph theory
 
Router components in hindi
Router components in hindiRouter components in hindi
Router components in hindi
 
Interesting applications of graph theory
Interesting applications of graph theoryInteresting applications of graph theory
Interesting applications of graph theory
 
Networking Slides
Networking SlidesNetworking Slides
Networking Slides
 
introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theory
 
Graph Coloring : Greedy Algorithm & Welsh Powell Algorithm
Graph Coloring : Greedy Algorithm & Welsh Powell AlgorithmGraph Coloring : Greedy Algorithm & Welsh Powell Algorithm
Graph Coloring : Greedy Algorithm & Welsh Powell Algorithm
 

Similar to Introduction to Router and Routing Basics

Similar to Introduction to Router and Routing Basics (20)

All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
 
Pemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfPemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdf
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
Exp2
Exp2Exp2
Exp2
 
Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)Industrial Training Presentaion(Networking)
Industrial Training Presentaion(Networking)
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
Routing table : Notes
Routing table : NotesRouting table : Notes
Routing table : Notes
 
Mod5
Mod5Mod5
Mod5
 
Ospf
OspfOspf
Ospf
 
IP Routing
IP RoutingIP Routing
IP Routing
 
JUNOS: OSPF and BGP
JUNOS: OSPF and BGPJUNOS: OSPF and BGP
JUNOS: OSPF and BGP
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
Report on Router
Report on RouterReport on Router
Report on Router
 
Ch5
Ch5Ch5
Ch5
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Introduction to Router and Routing Basics

  • 1. 1/23 Theoretical Section Practical Section Introduction to Router and Routing Basics Darwish Ahmad Herati St. Joseph’s College (Autonomous) Computer Science Department MSc (Computer Science) SUPERVISOR Prof. Ms. Mary Merlin June 25, 2015 Darwish Ahmad Herati Router and Routing Basics
  • 2. 2/23 Theoretical Section Practical Section Contents 1 Theoretical Section Introduction Routing Basics 2 Practical Section Router Manufacturers Simulation Technologies LAN Implementation Darwish Ahmad Herati Router and Routing Basics
  • 3. 3/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Definition: It is an internetworking device Used to connect two or more different NETWORKS. OSI Reference Model: Network Layer(Layer Three). Logical Address(IP Address) TCP/IP Model: Internet Layer(Layer Two). Logical Address(IP Address) Darwish Ahmad Herati Router and Routing Basics
  • 4. 3/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Definition: It is an internetworking device Used to connect two or more different NETWORKS. OSI Reference Model: Network Layer(Layer Three). Logical Address(IP Address) TCP/IP Model: Internet Layer(Layer Two). Logical Address(IP Address) Darwish Ahmad Herati Router and Routing Basics
  • 5. 4/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components ROM: Store the Routers bootstrap details, operating system software. Flash Memory: Holds the operating systems images. The content is retained when the Router is restarted. RAM: Store the Routing tables, configuration files, caching and buffering details. Content is LOST when lost router is switched off or restarted. NVRAM: Stores the Routers startup configuration files. Data is NON volatile. Network Interfaces: Connect Router to Network. Let’s See The Components!!! Darwish Ahmad Herati Router and Routing Basics
  • 6. 4/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components ROM: Store the Routers bootstrap details, operating system software. Flash Memory: Holds the operating systems images. The content is retained when the Router is restarted. RAM: Store the Routing tables, configuration files, caching and buffering details. Content is LOST when lost router is switched off or restarted. NVRAM: Stores the Routers startup configuration files. Data is NON volatile. Network Interfaces: Connect Router to Network. Let’s See The Components!!! Darwish Ahmad Herati Router and Routing Basics
  • 7. 4/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components ROM: Store the Routers bootstrap details, operating system software. Flash Memory: Holds the operating systems images. The content is retained when the Router is restarted. RAM: Store the Routing tables, configuration files, caching and buffering details. Content is LOST when lost router is switched off or restarted. NVRAM: Stores the Routers startup configuration files. Data is NON volatile. Network Interfaces: Connect Router to Network. Let’s See The Components!!! Darwish Ahmad Herati Router and Routing Basics
  • 8. 4/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components ROM: Store the Routers bootstrap details, operating system software. Flash Memory: Holds the operating systems images. The content is retained when the Router is restarted. RAM: Store the Routing tables, configuration files, caching and buffering details. Content is LOST when lost router is switched off or restarted. NVRAM: Stores the Routers startup configuration files. Data is NON volatile. Network Interfaces: Connect Router to Network. Let’s See The Components!!! Darwish Ahmad Herati Router and Routing Basics
  • 9. 4/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components ROM: Store the Routers bootstrap details, operating system software. Flash Memory: Holds the operating systems images. The content is retained when the Router is restarted. RAM: Store the Routing tables, configuration files, caching and buffering details. Content is LOST when lost router is switched off or restarted. NVRAM: Stores the Routers startup configuration files. Data is NON volatile. Network Interfaces: Connect Router to Network. Let’s See The Components!!! Darwish Ahmad Herati Router and Routing Basics
  • 10. 5/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Components Darwish Ahmad Herati Router and Routing Basics
  • 11. 6/23 Theoretical Section Practical Section Introduction Routing Basics Network Router Architecture Darwish Ahmad Herati Router and Routing Basics
  • 12. 7/23 Theoretical Section Practical Section Introduction Routing Basics Routing Basics Routing Definition: In internetworking, the process of moving a packet of data from SOURCE to DESTINATION. Routing is usually performed by a dedicated device called a ROUTER. Types of Routing: Dynamic Routing and Static Routing. Routing Table: Contains a list of specific routing destinations and when the Router receives a packet of data it references the Routing Table to know where to send that data. See The Routing Tables : 1. Cisco Routers IOS: show ip route 2. Linux OS: route -n 3. Windows OS: route print, netstat -rn Darwish Ahmad Herati Router and Routing Basics
  • 13. 7/23 Theoretical Section Practical Section Introduction Routing Basics Routing Basics Routing Definition: In internetworking, the process of moving a packet of data from SOURCE to DESTINATION. Routing is usually performed by a dedicated device called a ROUTER. Types of Routing: Dynamic Routing and Static Routing. Routing Table: Contains a list of specific routing destinations and when the Router receives a packet of data it references the Routing Table to know where to send that data. See The Routing Tables : 1. Cisco Routers IOS: show ip route 2. Linux OS: route -n 3. Windows OS: route print, netstat -rn Darwish Ahmad Herati Router and Routing Basics
  • 14. 7/23 Theoretical Section Practical Section Introduction Routing Basics Routing Basics Routing Definition: In internetworking, the process of moving a packet of data from SOURCE to DESTINATION. Routing is usually performed by a dedicated device called a ROUTER. Types of Routing: Dynamic Routing and Static Routing. Routing Table: Contains a list of specific routing destinations and when the Router receives a packet of data it references the Routing Table to know where to send that data. See The Routing Tables : 1. Cisco Routers IOS: show ip route 2. Linux OS: route -n 3. Windows OS: route print, netstat -rn Darwish Ahmad Herati Router and Routing Basics
  • 15. 8/23 Theoretical Section Practical Section Introduction Routing Basics Routing Algorithms Routing algorithm determines the best possible path (next hop) and update the Routing Table. Examples of Routing Algorithms : 1. Bellman-Ford Algorithm 2. Dijkstra’s Algorithm 3. The Floyd Warshall Algorithm 4. etc. Darwish Ahmad Herati Router and Routing Basics
  • 16. 9/23 Theoretical Section Practical Section Introduction Routing Basics Classification of Routing Protocols According to: Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP) Operation: Distance vector protocol, link-state protocol, or path-vector protocol. Behavior: Classful (legacy) or classless protocol. Let See the Examples !!! Darwish Ahmad Herati Router and Routing Basics
  • 17. 9/23 Theoretical Section Practical Section Introduction Routing Basics Classification of Routing Protocols According to: Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP) Operation: Distance vector protocol, link-state protocol, or path-vector protocol. Behavior: Classful (legacy) or classless protocol. Let See the Examples !!! Darwish Ahmad Herati Router and Routing Basics
  • 18. 9/23 Theoretical Section Practical Section Introduction Routing Basics Classification of Routing Protocols According to: Purpose: Interior Gateway Protocol (IGP) or Exterior Gateway Protocol (EGP) Operation: Distance vector protocol, link-state protocol, or path-vector protocol. Behavior: Classful (legacy) or classless protocol. Let See the Examples !!! Darwish Ahmad Herati Router and Routing Basics
  • 19. 10/23 Theoretical Section Practical Section Introduction Routing Basics Examples of Routing Protocols: RIPv1 (Legacy): IGP, distance vector, classful protocol. IGRP (legacy): IGP, distance vector, classful protocol developed by Cisco (deprecated from 12.2 IOS and later). RIPv2: IGP, distance vector, classless protocol. EIGRP: IGP, distance vector, classless protocol developed by Cisco. OSPF: IGP, link-state, classless protocol. IS-IS: IGP, link-state, classless protocol. BGP: EGP, path-vector, classless protocol. Darwish Ahmad Herati Router and Routing Basics
  • 20. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 21. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 22. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 23. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 24. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 25. 11/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Router Manufacturers Companies : Cisco : D-Link : MikroTik : Juniper : LinkSys : etc. Darwish Ahmad Herati Router and Routing Basics
  • 26. 12/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Systems General Information : Net income: (2014) 7.9 Billion Dollar Number of Employees: About 74000 CEO of Cisco System: John T. Chambers Darwish Ahmad Herati Router and Routing Basics
  • 27. 13/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Systems Co-Founder Darwish Ahmad Herati Router and Routing Basics
  • 28. 14/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco System Training Courses: Darwish Ahmad Herati Router and Routing Basics
  • 29. 15/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Hierarchical Model: Divided into Three Layers: 1. Access Layer 2. Distribution Layer 3. Core Layer Darwish Ahmad Herati Router and Routing Basics
  • 30. 16/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Hierarchical Model: Access Layer Routers Access Layers Routers: Small Organizations, Also known as Desktop or Company Layer Routers. Router Series: 800, 1000, 1600, 1700, 1800,2500 Darwish Ahmad Herati Router and Routing Basics
  • 31. 17/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Hierarchical Model: Distribution Layer Routers Distribution Layers Routers: ISPs, Also known as ISP Layer Routers. Router Series: 2600, 3200, 3600, 3700, 3800 Darwish Ahmad Herati Router and Routing Basics
  • 32. 18/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Cisco Hierarchical Model: Core Layer Routers Core Layers Routers: Global ISPs, Also known as Backbone Routers. Router Series: 6400, 7200, 7300, 7400, 7500,7600,10000,12000 Darwish Ahmad Herati Router and Routing Basics
  • 33. 19/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: 1st: Cloonix 2nd: (CORE) Common Open Research Emulator 3rd: GNS3 4th: (IMUNES) Integrated Multi-protocol Network Emulator/Simulator 5th: Marionnet Darwish Ahmad Herati Router and Routing Basics
  • 34. 19/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: 1st: Cloonix 2nd: (CORE) Common Open Research Emulator 3rd: GNS3 4th: (IMUNES) Integrated Multi-protocol Network Emulator/Simulator 5th: Marionnet Darwish Ahmad Herati Router and Routing Basics
  • 35. 19/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: 1st: Cloonix 2nd: (CORE) Common Open Research Emulator 3rd: GNS3 4th: (IMUNES) Integrated Multi-protocol Network Emulator/Simulator 5th: Marionnet Darwish Ahmad Herati Router and Routing Basics
  • 36. 19/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: 1st: Cloonix 2nd: (CORE) Common Open Research Emulator 3rd: GNS3 4th: (IMUNES) Integrated Multi-protocol Network Emulator/Simulator 5th: Marionnet Darwish Ahmad Herati Router and Routing Basics
  • 37. 19/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: 1st: Cloonix 2nd: (CORE) Common Open Research Emulator 3rd: GNS3 4th: (IMUNES) Integrated Multi-protocol Network Emulator/Simulator 5th: Marionnet Darwish Ahmad Herati Router and Routing Basics
  • 38. 20/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: Cont... 6th: Netkit 7th: Psimulator2 8th: Packet Tracer 9th: etc. Darwish Ahmad Herati Router and Routing Basics
  • 39. 20/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: Cont... 6th: Netkit 7th: Psimulator2 8th: Packet Tracer 9th: etc. Darwish Ahmad Herati Router and Routing Basics
  • 40. 20/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: Cont... 6th: Netkit 7th: Psimulator2 8th: Packet Tracer 9th: etc. Darwish Ahmad Herati Router and Routing Basics
  • 41. 20/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Network Simulation Technologies: Cont... 6th: Netkit 7th: Psimulator2 8th: Packet Tracer 9th: etc. Darwish Ahmad Herati Router and Routing Basics
  • 42. 21/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation LAN Implementation using Cisco Packet Tracer: Darwish Ahmad Herati Router and Routing Basics
  • 43. 22/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation References Deepankar Medhi, Karthikeyan Ramasamy. (2007). Network Routing. December. Todd Lammle, (2009). (CCNA) Cisco Certified Network Associate Study Guide 5th Edition. April N2013 Shaun L. Hummel . (2013). Routing Protocol Selection Guide.June etc... Darwish Ahmad Herati Router and Routing Basics
  • 44. 23/23 Theoretical Section Practical Section Router Manufacturers Simulation Technologies LAN Implementation Thank You For Your Attention Darwish Ahmad Herati Router and Routing Basics