Sl. No. List of Contents Page No. 3 4 5: 1 Department of Tce, Dsce
Sl. No. List of Contents Page No. 3 4 5: 1 Department of Tce, Dsce
6. 3.3. Advantages 7
1
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
2
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 1
COMPANY OVERVIEW
3
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 2
INTRODUCTION TO NETWORK
Neighbour table
Topology table
Routing table
4
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 3
SOFTWARE DESCRIPTION
3.1.GNS3 Tool
5
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
GNS3 combines the best features of existing emulation software (such as Dynamips and
Qemu) into a GU
Best of all, GNS3 is free. The open-source software is compatible with all Windows
machines, and comes in a bundle that includes additional tools such as Putty, SuperPutty,
Wireshark, and WinPcap.We can also access a free license for a Solarwinds toolset;
knowing how to use Solarwinds is becoming a more important skill, so it’s worth
checking out what GNS3 has to offer.
6
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
GNS3-2.1.9 Setup starting window will appear to welcome you. Nothing to do in this
window. Just click on Next button.
License Agreement window will appear. Accept the license agreement clicking the I
Agree button.
Choose Start Menu Folder window will appear. Keep default name (GNS3) or if you
wish you can change it. Click on Next button.
Choose Components window will appear where available GNS3 features will be listed.
Among these features uncheck only Wireshark, SolarWinds Response and Npcap
features because initially we don’t require these features. Now click Next button.
Choose Install Location window will appear. Keep default location or if you wish you
can change browsing destination folder. Now click Install button.
GNS3 features installation will be started and installation progress will be found on
progress bar. During GNS3 installation, WinPCAP installation will be appeared
separately. Follow some easy instructions as indicated. Also keep your internet
connection OK because virt-viewer will be downloaded during GNS3 installation.
Within a few minutes, GNS3 installation will be completed and Installation Complete
window will appear with success message. Click Next button from this window.
Solarwinds Standards Toolset window will appear. We don’t need any toolset now. So,
click on No radio button and then click on Next button.
GNS3 Setup close window will appear. Click Finish button. GNS3 installation will be
finished and GNS3 will start to run now.
3.3.ADVANTAGES
7
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 4
OSI LAYERS
Functions that are needed for proper communication can be divided into 2 types :-
1. Mandatory functions:
Here the implementation of the functions is not optional, i.e., it means these functions
must be implemented for proper communication.
Error Control.
Flow Control.
Access Control.
Multiplexing and De-Multiplexing.
Addressing etc
2. Optional functions:
Here the implementation of the functions are optional, i.e., it means these functions are
not must.
Encryption/Decryption.
Check pointing.
Routing etc
Routing is optional we can sustain in Computer networks even by using Flooding.
8
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
Now the reasons ISO-OSI model says to group together similar functions, here we will
be explaining why exactly we need different layer for efficient routing.
1. Every layer can implement the similar functions and every layer can perform some
specific tasks.
2. It would even help in grouping all the variables together used in those similar functions,
thus this would protect the variables in a layer and are not scattered all over the layers (so
it’s kind of Encapsulation).
3. Now as every layer is performing their some specific task so we are cornered about our
layer only and not in how under-lying layer is implemented (so its kind of Abstraction).
In simple words, we can say we are concerned only about what function we get from a
layer and not how we get that.
4. It helps in Testing, it means each layer can be tested separately thus it would be easy to
find errors if present any.
9
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
A layer serves the layer above it and is served by the layer below it. For example, a layer
that provides error-free communications across a network provides the path needed by
applications above it, while it calls the next lower layer to send and receive packets that
constitute the contents of that path. Two instances at the same layer are visualized as
connected by a horizontal connection in that layer.
10
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
11
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 5
INTERNET PROTOCOL SUITE
Internet Protocol, or just IP, is a TCP/IP network layer protocol for addressing and
routing packets of data between hosts on a TCP/IP network. Internet Protocol (IP) is a
connectionless protocol that provides best-effort delivery using packet-switching
services.
12
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
5.1.TELNET
Telnet, developed in 1969, is a protocol that provides a command line interface for
communication with a remote device or server, sometimes employed for remote
management but also for initial device setup like network hardware. Telnet stands for
Teletype Network, but it can also be used as a verb; 'to telnet' is to establish a connection
using the Telnet protocol.Because it was developed before the mainstream adaptation of
the internet, telnet on its own does not employ any form of encryption, making it
outdated in terms of modern security. It has largely been overlapped by Secure Shell
(SSH) protocol, at least on the public internet.
5.2.INTERNET PROTOCOL
IP has the task of delivering packets from the source host to the destination host solely
based on the IP addresses in the packet headers. It also defines addressing methods that
are used to label the datagram with source and destination information.
13
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
14
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CHAPTER 6
NARRATION
6.1.DIJKSTRA’S ALGORITHM
The algorithm exists in many variants. Dijkstra's original algorithm found the shortest
path between two given nodes,but a more common variant fixes a single node as the
"source" node and finds shortest paths from the source to all other nodes in the graph,
producing a shortest-path tree.
For a given source node in the graph, the algorithm finds the shortest path between that
node and every other. It can also be used for finding the shortest paths from a single node
to a single destination node by stopping the algorithm once the shortest path to the
destination node has been determined. For example, if the nodes of the graph represent
cities and edge path costs represent driving distances between pairs of cities connected by
a direct road (for simplicity, ignore red lights, stop signs, toll roads and other
obstructions), Dijkstra's algorithm can be used to find the shortest route between one city
and all other cities. A widely used application of shortest path algorithm is
network routing protocols, most notably IS-IS (Intermediate System to Intermediate
System) and Open Shortest Path First (OSPF). It is also employed as a subroutine in
other algorithms such as Johnson's.
The Dijkstra algorithm uses labels that are positive integers or real numbers, which
are totally ordered. It can be generalized to use any labels that are partially ordered,
provided the subsequent labels (a subsequent label is produced when traversing an edge)
are monotonically non-decreasing. This generalization is called the generic Dijkstra
shortest-path algorithm.
15
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
6.1.1Algorithm:
Let the node at which we are starting be called the initial node. Let the distance of
node Y be the distance from the initial node to Y. Dijkstra's algorithm will assign some
initial distance values and will try to improve them step by step.
Mark all nodes unvisited. Create a set of all the unvisited nodes called
the unvisited set.
Assign to every node a tentative distance value: set it to zero for our initial node
and to infinity for all other nodes. Set the initial node as current.
For the current node, consider all of its unvisited neighbours and calculate
their tentative distances through the current node. Compare the newly
calculated tentative distance to the current assigned value and assign the smaller
one. For example, if the current node A is marked with a distance of 6, and the
edge connecting it with a neighbour B has length 2, then the distance
to B through A will be 6 + 2 = 8. If B was previously marked with a distance
greater than 8 then change it to 8. Otherwise, the current value will be kept.
When we are done considering all of the unvisited neighbours of the current node,
mark the current node as visited and remove it from the unvisited set. A visited
node will never be checked again.
If the destination node has been marked visited (when planning a route between
two specific nodes) or if the smallest tentative distance among the nodes in
the unvisited set is infinity (when planning a complete traversal; occurs when
there is no connection between the initial node and remaining unvisited nodes),
then stop. The algorithm has finished.
Otherwise, select the unvisited node that is marked with the smallest tentative
distance, set it as the new "current node", and go back to step 3.
When planning a route, it is actually not necessary to wait until the destination
node is "visited" as above: the algorithm can stop once the destination node has
the smallest tentative distance among all "unvisited" nodes (and thus could be
selected as the next "current").
16
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
17
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
6.2.NETWORK
6.2.1.Problem Statement
18
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
19
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
CTY line- The CTY line-type is the console port. On any router, it appears in the router
configuration as line con 0 and in the output of the show line as cty. It is mainly used for
local system access using a console terminal.
TTY lines - TTY lines are asynchronous lines used for inbound or outbound modem and
terminal connections and can be seen in a router or access server configuration as line x.
The specific line numbers are a function of the hardware built into or installed on the
router or access server.
VTY lines -VTY line called the Virtual Terminal Lines of the router, used solely to
control inbound telnet connections. There is no hardware associated with them.
AUX line -It is the auxiliary port. Figure 4 shows line con 0, line aux 0 and line vty 0 4
and password protection on CTY and VTY lines. B. Telnet and ping Figure 5 shows the
effort to ping to IP address 10.1.56.5 from Chennai and was successful. It also shows an
effort by router at Chennai to telnet IP address 10.1.47.4 to get remote access to router at
Bhopal through VTY lines protected using password. After telnet an access to configure
the router at Bhopal is obtained. Ping is done to check the connectivity in a network by
sending 5 packets. If the ping is successful, meaning all 5 packets were successfully
echoed. There is proper network connection else there will be connection error and needs
to be taken care of. C. OSPF routing protocol [4] Figure 6 shows the router at Bhopal
configured with OSPF routing protocol using show run command. Similarlyall other
routers are configured in the same manner. Interface loopbacks are created to test the
advertisement by OSPF routing protocol configured on each router. Figure 7 shows an
effort by router at Bhopal to ping to interface loopback 0 (3.3.3.3/24) at R3 (Kolkata) to
check proper OSPF routing and route advertisement. We were successful in our attempt.
All 5 packets successfully sent and received with an average round trip time of 374ms
and with a 2 second timeout.
20
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
21
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
Fig 5. LINE CON 0, LINE AUX 0 AND LINE VTY 0 4 AND PASSWORD
PROTECTION ON CTY AND VTY LINES.
22
DEPARTMENT OF TCE, DSCE.
COMPUTER NETWORKS:
IMPLEMENTATION OF OSPF ON A NETWORK USING GNS3 TOOL
Self Evaluation:
23
DEPARTMENT OF TCE, DSCE.