0% found this document useful (0 votes)
2 views

Network Lab Notes Final

The document provides detailed notes on computer networking experiments, covering topics such as network cables, routing, and commands used for network diagnostics. It explains the types of cables, the functions of routers, static and dynamic routing, and the OSI model layers. Additionally, it discusses the differences between various routing protocols and the concept of administrative distance in routing decisions.

Uploaded by

Eliaa Quraan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Network Lab Notes Final

The document provides detailed notes on computer networking experiments, covering topics such as network cables, routing, and commands used for network diagnostics. It explains the types of cables, the functions of routers, static and dynamic routing, and the OSI model layers. Additionally, it discusses the differences between various routing protocols and the concept of administrative distance in routing decisions.

Uploaded by

Eliaa Quraan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Computer Network Laboratory

- Notes from the first 8 Experiments -

Moath Abd Albaqi

ّ.ّ‫ّوزدناّعلما‬،‫ّوانفعناّبماّعلمّتنا‬،‫اللّهمّعلمناّماّينفعنا‬
Exp #1
❖ Network cables
• Unshielded twisted pair
• Shielded twisted pair
• Coaxial cable
• Fiber optic.

❖ Cable connections
❖ Straight through cable (for dissimilar devices e.g. switch-router, pc-switch …)
This would be an Ethernet- only cable and would not work with Voice, Token Ring, ISDN, etc.

Note that only pins 1, 2, 3, and 6 are used. Just connect 1 to 1, 2 to 2, 3 to 3, and 6 to 6, and you
will be up and networking.

❖ Cross-over cable (for similar devices and with some exceptions [switch and hub, Router and PC])

connect 1 with 3 and 2 with 6 in both sides.

❖ Roll-over cable (to connect the router/switch to the PC via console port for management purposes)

Notice that the left wire colors are the same as the Straight through cable.

1
This part is called an “RJ45” connecter.

➢ To check network interface card (NIC) in a pc → “Ping 127.0.0.1” This is the diagnostic or loopback
address, or type “Ping localhost”.

➢ Note that newly Operating systems and computers nowadays detect the cable types, so now there is no
need to care a lot about the cable type.

❖ Commands
❖ IPCONFIG Command
This command is used to get IP configurations present in your PC.

❖ PING Command
This command is used diagnostically to ensure that a host computer you are trying to reach is
exist, can accept requests and is actually operating.

❖ Mention the difference between fragmenting and non-fragmenting packets.


Fragmentation: Breaks down large packets into smaller fragments that are transmitted
separately and reassembled at the destination. It adds overhead and can degrade
performance.
Non-Fragmentation: Ensures packets are sent as a whole without being split, relying
on mechanisms like PMTUD to adjust packet size. It avoids fragmentation overhead
but requires careful management of packet sizes.

❖ TRACERT Command
This command is used to determine which way does the data (packet) goes and through which
devices.
In UNIX machines it is called traceroute, in Windows machines it is called tracert.

2
❖ Enhanced Ping
TJPing is a fast, multithreaded ping/lookup/traceroute utility for Windows
(95/98/Me/NT/2000/XP). It’s fully configurable, remembers settings between sessions, and
allows users to log results to a file of their choice.

❖ NETSTAT Command
This command is used to get information about the open connections on your system (ports,
protocols being used, etc.), incoming and outgoing data and also the ports of remote systems
to which you are connected.

❖ How can two computers be connected without using hub or switch?


Using cross-over cable.

3
Extra
❖ Subnetting

Watch this video for a good understanding: https://www.youtube.com/watch?v=ecCuyq-Wprc&t=544s


----------------------------------------------------------------------------------------------------------------------------
❖ Address classes

127.0.0.0/8 is reserved for loopback addresses - it is used for testing purposes.


----------------------------------------------------------------------------------------------------------------------------

There are 6 subnets in this topology.

4
OSI model layers.

Some examples of each layer should be known for exam.

❖ Why layering
❖ Troubleshooting: easier.
❖ Change: change in one-layer, other layers are not affected.
❖ Design: division into layers makes the solution much simple.
❖ Learning: understanding the network communication as layers is easier.

5
EXP #2 - Static Routing

When devices are connected through a switch (one network), packets are transferred without the need for
routing protocols. However, if routers are used to connect networks to each other, routing protocols are
required to transfer packets from one network to another.

❖ Router’s main job


Router’s main role is to route packets to the correct destination. Traditionally the router is called a
layer-3 device, therefore it uses the IP address (layer-3 address. Each network is called a segment
(subnet). May be the main reason for having subnets is to control the traffic. Based on routing
information (routing table) a router can determine the next node toward the destination. The router
uses the destination IP address of the packet to find the correct path.

❖ Cisco routers
The Cisco Internetwork Operating System (IOS) is the kernel of Cisco routers and most switches. IOS
was created to deliver network services and enable networked applications.
The important things that the Cisco router IOS software is responsible for:
• Carrying network protocols and functions.
• Connecting high-speed traffic between devices.
• Adding security to control access and stop unauthorized network use.
• Providing scalability for ease of network growth and redundancy.
• Supplying network reliability for connecting to network resources.

❖ Connecting to a Cisco Router


There are different ways to connect to a Cisco router to configure it, verify its configuration, and
check statistics.
• The console port
The console port is usually an RJ-45 connection located at the back of the router -by default,
there is no password set. A password can be set by “line console 0” command. The console
port is utilized when in close physical range of the router.
• Auxiliary port
A cisco router can be connected through an auxiliary port. it allows to configure modem
commands so that a modem can be connected to the router. Aux port is often used for
connecting a modem to provide remote access to the router.
• Telnet
The third way to connect to a Cisco router is in-band, through the program. Telnet is a
terminal emulation program that acts as though it is a dumb terminal. Telnet can be used to
connect to any active interface on a router like an Ethernet or serial port.
6
❖ Routing
The term routing is used for taking a packet from one device and sending it through the network to
another device on a different network. To be able to route packets, a router must know, at a minimum,
the following:
• Destination address.
• Neighbor routers.
• Possible routes to all remote networks.
• The best route to each remote network.
• How to maintain and verify routing information.

❖ Types of routing
There are two main types of routing protocols, static and dynamic.
In static routing, it is the role of the administrator to update the router with new routing information
(add segment or remove a segment).
• Pros of static routing:
➢ There is no overhead on the router's CPU, meaning a cheaper router can perform the job
effectively compared to using dynamic routing.
➢ There is no bandwidth usage between routers, this means that money could potentially be
saved on WAN links.
➢ It adds security because the administrator can choose to allow routing access to certain
networks only.

• Cons of static routing:


➢ The administrator must really understand the internetwork and how each router is connected
in order to configure routes correctly.
➢ If a network is added to the internetwork, the administrator has to add a route to it on all
routers -by hand.
➢ It is not feasible for large networks because maintaining it would be a full-time job in itself.

In Dynamic routing the routing information will be updated automatically. A protocol on one router
communicates with the same protocol running on neighbor routers.

❖ CLI modes

• User mode (Router>): is mostly used to view statistics, but it is also a stepping-stone to
logging into privileged mode by typing “enable”.
• privileged mode (Router#): is used to view and change the configuration of a Cisco router.
• global configuration mode (Router (config)#): At this point, you make changes that affect
the router as a whole.

7
❖ Telnet and passwords
As mentioned before, Telnet is a terminal emulation program that acts as though it is a
dumb terminal. Telnet can be used to connect to any active interface on a router like an
Ethernet or serial port.
Telnet is not enabled by default; to enable it with a password, the following commands
must be typed in configuration mode

Router(config)# line vty 0 4


Router(config-line)# password (any password)
Router(config-line)# login
Router(config-line)# exit
Router(config)# enable secret (password 2)

After this, Telnet will be enabled on the router’s interfaces, and the specified password will
be required for access. Password 2 is required when typing “enable”.

8
‫الجزءّالعملي‬

‫راحّيكونّالشرحّفيّاألجزاءّالعمليةّبالعربي؛ّعشانّأسرعّوأوضحّ‪.‬‬

‫ض‪ّ،‬طبّكيفّممكنّاعملّهيك؟ّعنّطريقّالراوتنجّبرتوكولز‪ّ.‬‬ ‫الفكرةّمنّهايّالتجربةّإنهّّنخليّالراوترزّيتواصلواّمعّبع ّ‬
‫إذاّكانّعناّأكثرّمنّشبكة‪ّ،‬البدّمنّاستخدامّطريقةّعشانّنعرّفّكلّراوترّإنهّإذاّأجىّالباكيتّالفالنيّمنّالراوترّالفالنيّ‬
‫وجهليّإياهّإلىّالمكانّالفالّني‪.‬‬

‫ي)ّلكلّجهازّمنّاألجهزة‪ّ،‬وكذلكّلكلّانترفيسّبديّ‬
‫طبعاّعشانّنبدأّفيّهايّالتجربة‪ّ،‬أولّاشيّالزمّأعملهّإنهّأعطيّ(ايّب ّ‬
‫أستخدمهّفيّالراوترزّوالزمّماّأنسىّإنهّأفعلّهذاّاالنترفيس‪.‬‬

‫هساّبديّأعرّفّال(راوتنجّبروتوكول)ّعلىّكلّالراوترزّ–ّفيّحالتناّهونّ(ستاتكّراوتنج)‪ّ،‬عنّطريقّهذاّالكوماندّ‪.‬‬

‫>‪Router(config)# ip route <destination_network> <mask> <next-hop_address‬‬

‫ّمعنىّهذاّالكوماندّ‪ّ:‬إذاّأجتّأيّباكيتّعلىّهذاّالراوترّبدهاّتروحّعلىّالشبكةّاليّهيّ‪destination_network‬‬
‫ّمعّال(سبنت)ّّتبعها‪ّ،‬ارسلهاّعنّطريّقّ‪ّّnext-hop_address‬إليّهوّبمثلّاالنترفيسّالقادمةّإليّراحّيتوجهلها‪.‬‬

‫موضوعّتفعيلّالّ(‪ّ)telnet‬ووضعّباسووردّوماّإلىّ ّذلك‪ّ،‬تمتّتغطيتهّفيّالصفحةّالسابقةّ‪.‬‬

‫‪9‬‬
‫ل‪ّrouting‬بحيثّإنكمّترسلواّمنّاليمينّللشمال‬
‫فيّمالحظةّمهمةّحاببّأّنوهلها‪ّ،‬إ ّذاّطلبّمنكمّإنوّتزبّطواّا ّ‬

‫ّهساّهونّفشّطريقّمباشرّبينّاليمينّوالشمال‪ّ،‬فاّبنضطرّأنهّنعملّال ‪ّRouting‬علىّأكثرّمنّمرحلة‬
‫أولّإشيّبحطّإنهّأيّبكتّمنّاليمينّاذاّبدهّيوصلّالشمال‪ّ،‬ارسلهّعنّطريقّاالنترفيسّالقريبةّعلىّاليمينّ(ّالراوترّاليّ‬
‫عنّطريقّاالّنترفيسّاليّعلىّ‬ ‫ص)‪ّ،‬ومنّثمّعلىّالراوترّاليّبالنص‪ّ،‬بحطّانهّايّبكتّبدهاّتوصلّإلىّالشمال‪ّ،‬تروحّ ّ‬‫بالن ّ‬
‫الشمالّ(الراوترّإليّعلىّالشمال)‪ّ،‬وبهيكّبصيرّايّبكتّمنّاليمينّبدهّيروحّعلىّالشمالّيمرّبالراوترّاليّبالنص‪ّ،‬وهذاّ‬
‫الراوترّبوجههّإلىّالطريقّالصحيحّ‪.‬‬

‫‪10‬‬
EXPs #3-4-5 - Dynamic Routing
❖ Dynamic routing classification
• Interior and exterior gateway routing protocols: Interior protocols include RIP, EIGRP and
OSPF. Exterior protocols include BGP.
• Distance vector, path vector and link state routing protocols: RIP and EIGRP are distance
vector. BGP is path vector. OSPF is link state.
• Classful and classless: RIP and EIGRP [1] are classful while OSPF is classless.

❖ Differences between Interior and exterior gateway routing protocols


Interior gateway routing protocols are used for routing inside the same autonomous system (AS),
while exterior gateway routing protocols are used for routing between different ASs.

❖ Differences between Distance vector, path vector and link state routing protocols
In distance vector routing Protocols at the beginning each node (router) has only routing information
about its direct neighbors. Each router broadcast periodically its routing information to its neighbors.
This way, eventually, each node will get information about the entire network. This is called routing
by rumor, because a router receiving an update from a neighbor router believes the information about
remote networks without finding out for itself.

link-state routing protocol calls for sending of link-state advertisements (LSAs) to all other routers
within the same area. As OSPF routers accumulate link-state information, they use the shortest path
first algorithm (SPF) -Dijkstra’s algorithm- to calculate the shortest path to each node. Then, they
share this information with the entire area.

Path vector protocols determine the best path based on the sequence of autonomous systems (ASs)
that data must pass through to reach a destination. The entire path (AS path) is considered when
making routing decisions.

❖ Differences between classful and classless


In classful routing, all subnet masks must be the same across all devices in the network. In classless
routing, the subnet masks can differ.

❖ Administrative distance (AD)


The administrative distance (AD) is used to rate the trustworthiness of routing information received on
a router from a neighbor router. It is an integer from 0 to 255, where 0 is the most trusted and 255 means
no traffic will be passed via this route. If a router receives two updates listing the same remote network,
the first thing the router checks is the AD. If one of the advertised routes has a lower AD than the other,
then the route with the lowest AD will be placed in the routing table. If both advertised routes to the
same network have the same AD, then routing protocol metrics (such as hop count or bandwidth of the
lines) will be used to find the best path to the remote network. The advertised route with the lowest metric
will be placed in the routing table. But if both advertised routes have the same AD as well as the same
metrics, then the routing protocol will load-balance to the remote network (which means that it sends
packets down each link).

[1]: According to Wikipedia, IGRP is classful while EIGRP is classless. However, the manual indicates that EIGRP is classful.
11
Administrative Distance table
Route Source Administrative Distance (AD)

Connected interface (directly) 0


Static route 1
External BGP 20
EIGRP 90
IGRP 100
OSPF 110
RIP 120
Internal BGP 200

The administrative distance of static routes can be changed.

❖ Routing Information Protocol (RIP)


It uses only hop count to determine the best path to a network. If RIP finds more than one link to the
same remote network with the same hop count, it will automatically perform round-robin load
balancing. RIP can perform load balancing across up to six equal-cost links (four by default). It has
a maximum hop count of 15 hops.

❖ Enhanced Interior Gateway Routing Protocol (EIGRP)


EIGRP is a Cisco-proprietary distance-vector routing protocol. This means that all your routers must
be Cisco routers to use EIGRP in your network.
Cisco created this routing protocol to overcome the problems associated with RIP. EIGRP has a
maximum hop count of 255 with a default of 100. This is helpful in larger networks and solves the
problem of 15 hops being the maximum possible in a RIP network.
EIGRP uses bandwidth and delay of the line by default as a metric for determining the best route to
an internetwork. This is called a composite metric. Reliability, load, and maximum transmission unit
(MTU) can also be used, although they are not used by default.
The main difference between RIP and EIGRP configuration is that when configuring EIGRP, the
autonomous system number is required. All routers must use the same number in order to share
routing table information.
Here is a list of EIGRP characteristics that you won’t find in RIP:
• EIGRP can be used in large Internetworks.
• EIGRP uses an Autonomous System number for activation.
• EIGRP gives a full route table update every 90 seconds.
• EIGRP uses bandwidth and delay of the line as metric (lowest composite metric).

12
❖ Open shortest path first (OSPF)
OSPF allows packet authentication and uses IP multicast when sending/receiving packets. it has two
primary characteristics, the first is that the protocol is open. The second is that it is based on SPF
algorithm (Dijkstra algorithm).
OSPF is the routing protocol of choice when:
• There are routers from vendors other that Cisco in the network.
• The network requires segmentation into areas or zones.

OSPF uses bandwidth as metric (cost). It uses a reference bandwidth of 100 Mbps for cost
calculation (fixed). The formula to calculate the cost is reference bandwidth divided by interface
100𝑀𝑏𝑝𝑠
bandwidth 𝑐𝑜𝑠𝑡 = 𝐵𝑎𝑛𝑑𝑊𝑖𝑑𝑡ℎ 𝑜𝑓 𝑡ℎ𝑒 𝑙𝑖𝑛𝑘 . Thus, a 100Mbps link has a metric of 1; a 10Mbps link has a
metric of 10; a 1Gbps (or faster) link also has a cost of 1 because the cost cannot be lower than 1.
The cost for each link in the path is added together to form a metric for the route.

➢ Route Summarization
Route summarization is the process of replacing a series of routes with a summary route and a
mask. This lessens the size of routing update packet itself and makes the routing table smaller,
yet still allow for complete IP connectivity when done correctly. In, the 6 more specific routes in
router 0 as shown in the Figure bellow (i.e. 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0 …. and
192.168.5.0/24) can be replaced by two summary routes which are 192.168.0.0/22 and
192.168.4.0/23.
Not that we cannot replace the 6 networks using 21 subnet mask and id 192.168.0.0/21 with one
subnet because this network includes smaller subnets that are not connected to router 1 as
192.168.6.0/24 and 192.168.7.0/24.

13
➢ Routing Hierarchy
Unlike RIP, OSPF can operate within a hierarchy. The largest entity within the hierarchy is the
autonomous system (AS), which is a collection of networks under a common administration that
share a common routing strategy.
An AS can be divided into a number of areas, which are groups of contiguous networks and
attached hosts. Routers with multiple interfaces can participate in multiple areas. These routers,
which are called Area Border Routers (ABRs), maintain separate topological databases for each
area.
An area's topology is hidden from entities outside it, reducing OSPF routing traffic. OSPF uses
intra-area routing when the source and destination are within the same area, and inter-area routing
when they are in different areas.
An OSPF backbone which is called area 0 is responsible for distributing routing information
between areas. It consists of all area border routers, networks not wholly contained in any area,
and their attached routers shows an area design diagram.
The backbone area forms the central hub of an OSPF network. All other areas are connected to
it, and inter-area routing happens via routers connected to the backbone area and to their own
non-backbone areas. The backbone must be adjacent to all other areas, but does not need to be
physically contiguous. All OSPF areas must connect to the backbone area. This connection,
however, can be through a virtual link.

➢ OSPF Neighbor Relationships


Hello messages are sent on chosen interfaces once every 10 seconds on broadcast/point to point networks.

➢ Router ID
If there are no loopback IPs on the router, the router ID will be the highest IP address of any active
interface. However, if the router has loopback IPs, the router ID will be the highest loopback IP address.

14
❖ Border Gateway Protocol (BGP)

BGP Version 4 (BGPv4) is the current standard deployment. it is the routing protocol of choice on the
Internet. Essentially, the Internet is a collection of interconnected Autonomous Systems. Its Autonomous
Systems are assigned an Autonomous System Number (ASN), which is a 16-bit number ranging from 1 –
65535. A specific subset of this range, 64512 – 65535, has been reserved for private (or internal) use.
BGP’s true benefit is in controlling how traffic enters the local AS, rather than how traffic exits it.

For BGP to function, BGP routers (called speakers) must form neighbor relationships (called peers).
There are two types of BGP neighbor relationships:
• iBGP Peers – BGP neighbors within the same autonomous system.
• eBGP Peers – BGP neighbors connecting separate autonomous systems.

Once BGP peers form a neighbor relationship, they share their full routing table. A Cisco router running BGP
can belong to only one AS. The IOS will only allow one BGP process to run on a router.

➢ BGP Peers Messages


BGP forms its peer relationships through a series of messages listed below:
▪ OPEN message: it is sent between peers to initiate the session. The OPEN message contains
several parameters:
• BGP Version – must be the same between BGP peers.
• Local AS Number.
• BGP Router ID.

▪ KEEPALIVE messages: these are sent periodically (every 60 seconds by default) to ensure that
the remote peer is still available. If a router does not receive a KEEPALIVE from a peer for a
Hold-time period (by default, 180 seconds), the router declares that peer dead. To globally adjust
the KEEPALIVE and Hold-time timers for all neighbors:

Router(config-router)# timers bgp <KEEP-ALIVE> <HOLD-TIME>

▪ UPDATE messages: these are used to exchange routes between peers.


▪ NOTIFICATION messages: are sent when there is a fatal error condition. If a notification
message is sent, the BGP peer session is torn down and reset.

➢ BGP Finite-State Machine (FSM)

If a peer session is stuck in an Active state, potential problems can include: no IP connectivity, an incorrect neighbor
statement, or an access-list filtering TCP port 179.

15
‫الجزءّالعمليّ‬

‫الفكرةّمنّالتجاربّهذولّانهّعناّ ‪ّDynamic Routing Protocols‬يعنيّفشّداعيّنعملّكلشيّمانيوال‪.‬‬

‫‪RIP and EIGRP -1‬‬

‫اذاّبدناّنعملّ ‪Dynamic routing‬باستخدامّهذولّال‪ّProtocols‬أولّاشيّالزمّاحطّهذاّالكوماندّحسبّايّنوعّبديّاستخدمه‬


‫‪Router(config)# router rip‬‬

‫>‪Router(config)# router EIGRP <AS‬‬

‫بعدينّبضيفّكلّالّ ‪Networks‬اليّمشبوكاتّعلىّهذاّالراوترّحتىّاالسالكّإليّبينّالراوترزّعنّطريقّهذاّالكومان ّد‬

‫>‪Router(config-router)#ّnetwork <ID-OF-CONNECTED-NETWORKS‬‬

‫‪16‬‬
‫‪OSPF -2‬‬

‫بدناّنعرفّهونّإنهّفيّاشيّاسمهّ‪Backbone area‬هايّإلهاّ‪ّ،ID = 0‬هايّهيّالمنطقةّإليّكلّالباكتسّبترجعلهاّعشانّتنتّقل‬


‫منّشبكةّإلىّشبكةّأخرى‪ّ،‬فاّهيّبتكونّالشبكةّاليّبتربطّكلّالشبكاتّببعض‪ّ،‬والشبكاتّالثانيةّبكونلهاّ‪ّID‬مختلفّعنّالصفر‬
‫أوّممكنّنحطّالشكلّكاملّفيّال ‪ّArea 0‬وخلصّ(هيكّالالبّمانيوالّعاملّفيّالتجاربّالقادم ّة)‪.‬‬

‫عشانّأطبقّال‪ّOSPF‬علىّالرواترزّبستخدمّهذاّالكوماندّ‬

‫>‪Router(config)#router ospf <PROCESS-ID‬‬

‫ت‪ّ،‬عنّطريقّهذاّالكوماندّ‬
‫بعدينّببلّشّأضيفّالشبكاتّالمجاورةّزيّالتجربةّإليّقبلّولكنّمعّإضافةّبعضّالمعلوما ّ‬

‫>‪Router(config-router)#network <NETWORK-ID> <OSPF-WILDCARD-BITS> area <AREA-ID‬‬

‫بّعكسّال‪ّSubnet mask‬‬
‫ّطبعاّزيّماّبتعرفواّإنهّال‪WILDCARD‬بّنكّتّ ّ‬

‫إذاّكانّفيّ‪ّloopback‬الزمّنضّيفهمّعلىّال‪ ّOSPF‬فيّنفسّالراوترّفقط‪.‬‬

‫طبيقّهذاّاألمر‬
‫لتغييرّا ّل ‪ّCost‬تبعّ ‪Link‬معين‪ّ،‬عنّطريقّأحسبّال ‪ّCost‬عنّطريقّالمعادلةّالتيّتمّذكرهاّسابقاّومنّثمّت ّ‬
‫علىّا ّل ‪ّInterface‬المرادّالتعديلّعليه‬

‫>‪Router(config-if)#bandwidth <BANDWIDTH-IN-KILOBITS‬‬

‫للا‪.‬‬
‫بالنسبةّلموضوعّالّ ‪ Summarization‬شوفوهّمنّالالبّمانيوال‪ّ،‬بسيطّّانّشاءّ ّ‬

‫‪17‬‬
‫‪BGP -3‬‬

‫هونّالنظامّمختلفّشوي‪ّ،‬أولّاشيّبدناّنعرفّ‪OSPF‬داخلّكلّ ‪antonyms systems‬وطبعاّماّبنّشملّال‪ link‬إليّبينّال‪antonyms systems‬‬


‫وهذاّبكونّللتخاطبّالداخليّزيّماّتعملناّسابقاّ‪.‬‬

‫بعدينّبروحّعلىّالراوترزّإليّعلىّاألطرافّعشانّأعرفّعليهمّال‪ّBGP‬عنّطريقّهذاّالكوماند‬

‫>‪Router (config)# router bgp <AS-NUMBER‬‬

‫‪AS-NUMBER‬هونّبتمثلّرقمّالّ‪ّAutonyms system‬إليّالراوترّبكونّفيها‪ّ.‬‬
‫بعدينّبدناّنعرفّالجيرانّتبعونهّعنّطريقّهذاّالكوماند‬

‫>‪Router(config-router)# neighbor <IP-ADDRESS-NEXT-INTERFACE> remote-as <AS-OF-REMOTE-NEIGHBOR‬‬

‫هساّالمفروضّإنهّاإلشيّيكونّجاهز‪ّ،‬ولكنّظلّإنهّنعملّطريقةّتواصلّبينّا ّل‪OSPF and BGP‬النهّهذول‪ّTwo different protocols‬الزمّيكون‬


‫ل‪OSPF‬‬‫طريقةّتواصلّبيهم‪ّ،‬عنّطريقّهذاّالكوماندّلماّنكونّداخلينّعلىّا ّ‬

‫‪Router(config-router)# redistribute bgp <AS-NUMBER> subnets‬‬

‫ل‪BGP‬‬
‫وهذاّالكوماندّلماّنكونّداخلينّعلىّا ّ‬

‫>‪Router(config-router)# redistribute ospf <PROCESS-ID‬‬

‫‪18‬‬
EXP #6 - Access Control Lists
For this experiment, Dr. Ibrahim sent us these slides:
(https://drive.google.com/file/d/1jaznkpEmGPIEAyNjC_eCTr4OUWNcMDGe/view?usp=sharing). They are
very useful and helpful, check them.

ّ‫الجزءّالعملي‬
‫ ببلشّتنفيذهمّمنّفوقّإلى‬Access control entries‫ّحطّفيّبالكّإنهّعندّتنفيذّال‬،‫هونّبديّبسّأنوهّعلىّمالحظةّمهمةّجدا‬
ّ.‫ّخلّيّاإلشيّالخاصّباألوّلّثمّّاإلشيّالعام‬،‫ّفاّالترتيبّهونّمهمّجدا‬،‫تحتّعلىّالترتيب‬

19
‫‪EXPs #7-8 - Vlans‬‬

‫‪For this experiment, only the practical part is included – check the theoretical part in the lab manual.‬‬

‫الجزءّالعمليّ‬
‫الخطواتّالعامةّإذاّكانّمطلوبّمنيّأعملّ‪:vlans‬‬
‫ّّّّّّّّّّّّّّّ‪.‬‬
‫‪ّ،ّTrunk‬وهمّأيّمدخلّمهوشّمشبوكّعلىّ‪End device‬‬
‫ّّّّّّّّّّّّّّّّ‬
‫‪portsّfor‬‬‫ّّّّّّّّ‬‫‪ّ-1‬أعرفّالّّّّّّّ‬
‫‪switches‬‬

‫‪ّ-2‬أعرفّالبورتسّالمستخدمةّفيّالراوترز‪ّ،‬إذاّكانّالبورتّبشبكّبينّراوترزّبس‪ّ،‬بنعطيهّ‪IP‬‬
‫ّّّعاديّزيّماّكناّنعملّ‬
‫ّّّّّّّّّّّّّّّّّّّّّّعنّطريقّكتابةّ‬
‫ّّّّّّّ‪ّ،‬بدخلّعلىّال‪Virtual interface‬‬
‫ّّّّّّّّّوعليهّ‪vlans‬‬
‫زمان‪ّ،‬ولكنّإذاّالبورتّكانّمشبوكّعلىّ‪switch‬‬

‫بعدهاّمهمّجداّّاكتبّمباشرةّهذاّالكوماندّ>‪encapsulation dot1Q <VLAN-ID‬‬ ‫‪ّ،ّInterface‬‬


‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّ‬
‫>‪<IntName>.<sub interface number‬‬

‫يّالّّّّّّّّّّّّّنفسّإليّموجودةّعلىّال‬
‫‪topology‬‬ ‫‪VLAN-ID‬‬ ‫والّّّّّّّّّّّّّّّّّّّّّّّّّّمشّشرطّيكونواّنفسّالرقم‪ّ،‬المهمّإنهّنخل‬
‫‪Sub interface number‬‬ ‫ّّّّّّّّّّّّ‬
‫الّ‪VLAN-ID‬‬

‫‪ّgateway‬‬
‫ّّّّّّّّّلبعضّاالجهزة‪ّ،‬فاّإنزلّوحطهّمكانّالّّّّّّّّّّ‬
‫‪ّIP‬راحّيكونّ‪gateway‬‬
‫ّّّّّّّّّّّّ‬
‫‪ّ،ّinterface‬هذاّال ‪address‬‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّ‬
‫وبعدينّبعطيّ‪IP address‬لهذاّال‬

‫ّّّّّّكشبكةّلحالّفيّهذاّ‬
‫ّّّّّّّّّّّّّّّّّّّّالمطلوبّزيّماّتعلمناّسابقا‪ّ،‬وماّتنسىّتحطّكلّ‪vlan‬‬
‫فيّهذهّاألجهزة‪ّ.‬ومنّثمّبعملّال‪Routing Protocol‬‬

‫البروتوكول‪.‬‬
‫ّّّّّّعلىّهذاّالسويتش‪ّ،‬‬
‫ّّّّّّّإليّبالشّبكةّكاملة‪ّ،‬عشانّممكنّيمرّباكيتّمنّهايّال‪vlan‬‬ ‫‪ّ-3‬بنزلّعلىّال ‪switches‬‬
‫ّّّّّّّّّّّ‪ّ،‬بعرفّكلّال ‪vlans‬‬
‫‪ّvlan‬‬
‫ّّّّّّّّّّّّللسويتشّايشّالّّّّّ‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّ‪ّ.‬وظلّأعرفّكلّ ‪interface‬‬
‫ّّّّّّّّّّّّّّ‪Vlan <vlanID> then exit and repeat for all vlansّ،‬‬
‫عنّطريقّال ‪commands‬‬
‫‪ّ.Switchport‬‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّ‬
‫المشبوكّعليهاّعنّطريقّهذاّالكوماندّ>‪access vlan <vlanID‬‬

‫خليّالجهازّ‬ ‫‪ّ-4‬فيّحالةّال ‪Multilayer switch‬‬


‫ّّّّّّّّّّّّّّّّّّّّّ‪ّ،‬بعملّنفسّالخطواتّإليّفوقّمعّشويةّفروقاتّأالّوهيّإنهّأولّاشيّبديّأ ّ‬
‫ّّّّّّّّّّّّّ‪ّ.‬ويكمنّ‬
‫ّّّّّّّّّّّّّّّّ‪ّ،‬وثمّأعطيهّ ‪IP address‬‬
‫ّّّّّّّّّّّالمعني‪ّ،‬وّأعطيهّهذاّاألمرّ‪No switchport‬‬
‫هذاّيشتغلّكراوترّعنّطريقّادخلّعلىّال‪Interface‬‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّوبعدينّبعطّيهّ‪ّ.ّّIP‬‬
‫ّّّّّّ‪ّ،‬بكتبّ>‪interface vlan <VlanID‬‬‫ريفّال‪vlans‬‬ ‫اختالفّبسيطةّفيّتع ّ‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّّ‪ّ.‬‬
‫ّّّّّّّّّّّّ‪ّ،‬ومنّثمّبعملّ‪Configuration to any Routing protocol‬‬
‫ّّّّّّّّّّّّّّّّّّّّّّّّعليه‪ّ،‬بكتبّأمرّواحدّوهوّ‪Ip routing‬‬
‫لتفعيلّال ‪Routing Protocols‬‬

‫وهيكّبكونّالتلخيصّجاهزّبإذنّللا‪ّ،‬بالنسبةّلّخرّتجربتينّسهالتّكثيرّانّشاءّللا‪ّ،‬يعنيّماّبوخذواّمعكمّ‬
‫وقتّفيّدراستهمّمنّالمانيوال‪ّ،‬الّتنسوناّمنّصالحّدعائكم‪ّ،‬بالتوفيق‪ّ.‬‬

‫والحمدهللّربّالعالمينّ‬

‫‪20‬‬

You might also like