COMPUTER SYSTEMS ASSIGNMENT

46
Limkokwing Inst of Creative Technology, Kuching Attempt 1 ANGLIA RUSKIN UNIVERSITY Assignment Coversheet STUDENT DETAILS Student Number: 0876164/1 FACULTY Faculty of Science and Technology ASSIGNMENT DETAILS Module Code / Occ / Year EJ215004S / LU1 / 2010/1 Module Title ROUTING PROTOCOL AND CONCEPTS Module Element 010 - PORTFOLIO PREPARATION 3000 WORDS To be marked by USMAN Submission date (by 5p.m.) 29/12/201 0 Submission of this assignment agrees to the following: I understand that the piece of work submitted will be considered as the final and complete version of my assignment of which I am otherwise the sole author. I understand both the meaning and consequences of plagiarism and that my work has been appropriately attributed unless otherwise stated. I have not knowingly allowed another to copy my work. Mitigation – you have 5 working days after the deadline to submit a claim for mitigating circumstances. If there are matters or circumstances which have had a serious adverse effect on your performance in any assessment, you are advised to seek advice from a Student Adviser. Forms are available from the iCentre. WORD COUNT Disk included (tick) ASSESSMENT FEEDBACK - LECTURER TO COMPLETE Signature of Marker _______________________ Date ________________ % Mark (Un-moderated)

Transcript of COMPUTER SYSTEMS ASSIGNMENT

Page 1: COMPUTER SYSTEMS ASSIGNMENT

Limkokwing Inst of Creative Technology, KuchingAttempt 1

ANGLIA RUSKIN UNIVERSITY

Assignment CoversheetSTUDENT DETAILS

Student Number: 0876164/1FACULTY

Faculty of Science and Technology

ASSIGNMENT DETAILS

Module Code / Occ / Year EJ215004S / LU1 / 2010/1

Module Title ROUTING PROTOCOL AND CONCEPTS

Module Element 010 - PORTFOLIO PREPARATION 3000 WORDS

To be marked by USMANSubmission date (by

5p.m.) 29/12/2010

Submission of this assignment agrees to the following:I understand that the piece of work submitted will be considered as the final and complete version of my assignment of which I am otherwise the sole author. I understand both the meaning and consequences of plagiarism and that my work has been appropriately attributed unless otherwise stated. I have not knowingly allowed another to copy my work.

Mitigation – you have 5 working days after the deadline to submit a claim for mitigating circumstances. If there are matters or circumstances which have had a serious adverse effect on your performance in any assessment, you are advised to seek advice from a Student Adviser. Forms are available from the iCentre.

WORD COUNT

Disk included (tick)

ASSESSMENT FEEDBACK - LECTURER TO COMPLETE

Signature of Marker _______________________ Date ________________

% Mark(Un-moderated)

 

Page 2: COMPUTER SYSTEMS ASSIGNMENT

Anglia Ruskin University Receipt

Student Name: IBECHIODO EMMANUEL SYLVANUS\ SID number: 0876164/1

Due date: 06/01/2011

Module title: ROUTING PROTOCOL AND CONCEPTS

Module Code: EJ215004S / LU1 / 2010/1 / 011 - ASSIGNMENT 4500 WORDS

Lecturer: (to be completed)

Date received – not valid without University stamp

PLEASE KEEP THIS RECEIPT IN A SAFE PLACE AS ASSIGNMENTS WILL ONLY BE RETURNED ON PRODUCTION OF THIS RECEIPT.

Anglia Ruskin University Receipt

Student Name: IBECHIODO EMMANUEL SYLVANUS SID number: 0876164/1

Due date: 06/01/2011

Module title: ROUTING PROTOCOL AND CONCEPTS

Module Code: EJ215004S / LU1 / 2010/1 / 011 - ASSIGNMENT 3000 WORDS

Lecturer: (to be completed)

Date received – not valid without University stamp

PLEASE KEEP THIS RECEIPT IN A SAFE PLACE AS ASSIGNMENTS WILL ONLY BE RETURNED ON PRODUCTION OF THIS RECEIPT.

Page 3: COMPUTER SYSTEMS ASSIGNMENT
Page 4: COMPUTER SYSTEMS ASSIGNMENT

TABLE OF CONTENT 1.0 INTRODUCTION...................................................................................................................................3

2.0 NETWORK DESIGN BACKGROUND.................................................................................................3

3.0 NETWORK DESIGN..............................................................................................................................4

4.0 CABLING................................................................................................................................................4

5.0 ADDRESSING SCHEME.......................................................................................................................5

6.0 NETWORK ADDRESSING SCHEME..................................................................................................6

7.0 ASSIGNED ADDRESS TO EACH PC..................................................................................................7

8.0 ROUTER CONFIGURATION................................................................................................................8

9.0 ROUTER CONFIGURATION FILE......................................................................................................9

9.1 ENABLING PASSWORD FOR ROUTERS......................................................................................9

9.2 CONFIGURATION OF EIGRP ON ROUTERS..............................................................................10

9.3 VIRTUE ROUTER EIGRP CONFIGURATION.............................................................................10

9.4 DUAL NEIGHBORS TABLE...........................................................................................................11

9.5 LOOPBACK CONFIGURATION....................................................................................................11

10.0 CONFIGURATION OF STATIC ROUTE.........................................................................................11

11.0 TESTING.............................................................................................................................................12

12.0 TEST LOG...........................................................................................................................................13

13.0 TEST LOG RESULT...........................................................................................................................14

14.0 TEST FOR EIGRP AND COVERGENCE.........................................................................................25

14.0 HQ ROUTER ROUTING TABLE......................................................................................................26

14.1 REMOTE 1 ROUTER ROUTING TABLE....................................................................................27

14.2 REMOTE 2 ROUTER ROUTING TABLE....................................................................................28

CONCLUSION............................................................................................................................................29

Page 5: COMPUTER SYSTEMS ASSIGNMENT

QUESTION 1

1.0 INTRODUCTIONThe design of this network implements the virtue connection of ISP router with the head quarter with

multiple locations, two to be précised. Communication within the routers is via enhanced interior gateway

routing protocol (EIGRP).

2.0 NETWORK DESIGN BACKGROUND This report is a routing design for UK based travel agency (UKTA). This report use enhanced interior

gateway routing protocol (EIGRP) for design and implementation of interconnected multiple locations

from single internet service provider. This network logical topology consist of four network directly

connected to the head quarter router. A total of three routers are used in this network, this routers are

configured to implement EIGRP routing protocol within the network.

Figure 1: network topology

From the network design above both the physical and logical network topology can be obtained. Using

the above topology an address scheme was created to accommodate the entire host in the network. For

achieving this, the private internetwork protocol provided 192.168.156.0/22 needs to be sub-netted.

Page 6: COMPUTER SYSTEMS ASSIGNMENT

3.0 NETWORK DESIGN The network design consists of three routers, HQ, REMOTE 1 and REMOTE 2. REMOTE 1 and

REMOTE 2 are connected to HQ via WAN. Other connected network is Fa0/0 and Fa0/1 on the HQ

router and same for REMOTE 1 and REMOTE 2.

Figure 2: network design

4.0 CABLING While design this network assumption where made based on the number of host of each subnet. Each

subnet where allocated required amount of switch necessary for connection of host. HQ Fa0/0 was

allocated 5 switches, Fa0/1 three switches, REMOTE1 Fa0/0 two switches, Fa0/1 three switches,

REMOTE2 Fa0/1 three switches and Fa0/0 six switches In most case extra port where left this is meant

for use in case of physical growth of the network topology. WAN connection is used for connection

within the router, straight through cable is used for connecting router to switch and switch to pc, while

cross over is used for connection between switch to switch.

Page 7: COMPUTER SYSTEMS ASSIGNMENT

5.0 ADDRESSING SCHEMEThe private network address of 192.168.156.0/22 has been given. EIGRP being a distance vector routing

protocol is used for routers packet transfer and communication. EIGRP being a classless routing protocol

support variable length subnet mask. Classless internetwork protocol was used to design the addressing

range for the devices in this network, helping in making maximum use of the ip and limiting ip wastage

as possible.

The addressing given was sub-netted to provide the eight available subnet address used for this network.

The first sub-netting starts from HQ Fa0/0 subnet. This reason why the subnet was start at the HQ Fa0/0

is because it had the highest number of host in the HQ, grouping them into the same sub-net will provide

sharing of resources.

Loopback interface address given 189.54.69.234/30 was assigned for it designated subnet. This is because

the ISP router is a virtual interface for management purpose. Unlike the proper loopback address that is

used for ping within system this is used within the network, it does not talk back at itself. The ISP router

is a virtue router because first it don not exist in the network topology but is used because most loopback

functionality is provided by ISP router.

Please see below table for address scheme.

Page 8: COMPUTER SYSTEMS ASSIGNMENT

6.0 NETWORK ADDRESSING SCHEME DEVICE INTERFACE NUMBER OF

HOST

SUBNET ADDRESS SUBNET MASK BROADCAST

ADDRESS

USEABLE ADDRESS DEFAULT GATEWAY

HQ Fa0/0 90/25 192.168.156.0 255.255.255.128 192.168.156.127 192.168.156.1 –

192.168.157.126

192.168.156.1

Fa0/1 60/26 192.168.156.128 255.255.255.192 192.168.156.191 192.168.156.129 -

192.168.156.190

192.168.156.129

S0/0/1 2/30 192.168.158.96 255.255.255.252 192.168.158.99 192.168.158.97 -

192.168.158.98

192.168.158.97

S0/0/0 2/30 192.168.158.100 255.255.255.252 192.168.158.103 192.168.158.101 –

192.168.158.102

192.168.158.101

REMOTE1 Fa0/0 30/27 192.168.158.64 255.255.255.224 192.168.158.95 192.168.158.65 -

192.168.158.94

192.168.158.65

Fa0/1 60 /26 192.168.156.192 255.255.255.192 192.168.156.225 192.168.156.193 -

192.168.156.224

192.168.156.193

S0/0/1 2/30 192.168.158.96 255.255.255.252 192.168.158.99 192.168.158.97 -

192.168.158.98

192.168.158.97

REMOTE Fa0/0 128/24 192.168.157.0 255.255.255.0 192.168.157.255 198.168.157.1 -

198.168.157.244

198.168.157.1

Fa0/1 60/26 192.168.158.0 255.255.255.192 192.168.158.63 192.168.158.1 -

192.168.158.62

192.168.158.1

S0/0/0 2/30 192.168.158.100 255.255.255.252 192.168.158.103 192.168.158.101 –

192.168.158.102

192.168.158.101

Page 9: COMPUTER SYSTEMS ASSIGNMENT

7.0 ASSIGNED ADDRESS TO EACH PCDEVICE INTERFACE IP ADDRESS SUBNET MASK DEFAULT GATEWAY

HQ Fa0/0 192.168.156.1 255.255.255.128 0.0.0.127

Fa0/1 192.168.156.129 255.255.255.192 0.0.0.63

S0/0/1 192.168.158.97 255.255.255.252 0.0.0.3

S0/0/0 192.168.158.101 255.255.255.252 0.0.0.3

Lo0 189.54.69.254 255.255.255.252 0.0.0.3

REMOTE 1 Fa0/0 192.168.158.65 255.255.255.224 0.0.0.31

Fa0/1 192.168.156.193 255.255.255.192 0.0.0.63

S0/0/1 192.168.158.98 255.255.255.252 0.0.0.3

REMOTE 2 Fa0/0 192.168.157.1 255.255.255.0 0.0.0.255

Fa0/1 192.168.158.1 255.255.255.192 0.0.0.63

S0/0/0 192.168.158.102 255.255.255.252 0.0.0.3

PC1 Ethernet 192.168.156.126 255.255.255.128 192.168.156.1

PC2 Ethernet 192.168.156.190 255.255.255.192 192.168.156.129

PC3 Ethernet 192.168.158.94 255.255.255.224 192.168.158.65

PC4 Ethernet 192.168.156.254 255.255.255.192 192.168.156.193

PC5 Ethernet 192.168.158.62 255.255.255.192 192.168.158.1

PC6 Ethernet 192.168.157.128 255.255.255.0 192.168.157.1

Page 10: COMPUTER SYSTEMS ASSIGNMENT

QUESTION 2

8.0 ROUTER CONFIGURATION Using Cisco packet tracer environment, a network topology was create as shown below. This network

comprises of HQ router, REMOTE 1 and REMOTE 2 routers interconnected by WAN.

Figure 3: router connection

The router was all configured using EIGRP process 1. All connected networks were advertised except the

loopback interface, this was done to ensure communication throughout the network using EIGRP. Default

route was configured on the HQ router as a static route which was distributed through EIGRP to

REMOTE 1 and REMOTE 2. REMOTE1 is connected to the HQ router via S0/0/1 and S0/0/1 on

REMOTE1 on router. REMOTE 1 subnet is connecting via Fa0/1 and Fa0/0 to the REMOTE1 router.

REMOTE 2 subnets are connected via Fa0/0 and Fa0/1 on the REMOTE2 router. HQ router are connect

through Fa0/0 and Fa0/1 on the HQ router.

Due the router were not configured with password be EIGRP was configured. Secret password was set to

‘emmanuel’ for all three routers. This was done for security purpose. To prevent unauthorized up set of

router configuration. Configuration of EIGRP on the three router forms an autonomous systems.

Page 11: COMPUTER SYSTEMS ASSIGNMENT

9.0 ROUTER CONFIGURATION FILE

9.1 ENABLING PASSWORD FOR ROUTERSHQ ROUTER

HQ#config tEnter configuration commands, one per line. End with CNTL/Z.HQ(config)#hostname HQHQ(config)#enable secret emmanuelHQ(config)#HQ(config)#line console 0HQ(config-line)#password emmanuelHQ(config-line)#loginHQ(config-line)#line vty 0 4HQ(config-line)#password emmanuelHQ(config-line)#loginHQ(config-line)#exitREMOTE 1

REMOTE 1#config tEnter configuration commands, one per line. End with CNTL/Z.REMOTE 1(config)#enable secret emmanuelREMOTE 1(config)#REMOTE 1(config)#line console 0REMOTE 1(config-line)#password emmanuelREMOTE 1(config-line)#loginREMOTE 1(config-line)#line vty 0 4REMOTE 1(config-line)#password emmanuelREMOTE 1(config-line)#loginREMOTE 1(config-line)#exitREMOTE 1(config)#REMOTE 2

REMOTE2(config)#hostname REMOTE2REMOTE2(config)#enable secret emmanuelREMOTE2(config)#REMOTE2(config)#line console 0REMOTE2(config-line)#password emmanuelREMOTE2(config-line)#loginREMOTE2(config-line)#line vty 0 4REMOTE2(config-line)#password emmanuelREMOTE2(config-line)#loginREMOTE2(config-line)#exitREMOTE2(config)#

Page 12: COMPUTER SYSTEMS ASSIGNMENT

9.2 CONFIGURATION OF EIGRP ON ROUTERSHQ ROUTERHQ(config)#route eigrp 1HQ(config-router)#network 192.168.156.0 0.0.0.127HQ(config-router)#network 192.168.156.128 0.0.0.63HQ(config-router)#network 192.168.158.96 0.0.0.3HQ(config-router)#network 192.168.158.100 0.0.0.3HQ(config-router)#endHQ#%SYS-5-CONFIG_I: Configured from console by consoleREMOTE 1 ROUTER

REMOTE 1#config tEnter configuration commands, one per line. End with CNTL/Z.REMOTE 1(config)#route eigrp 1REMOTE 1(config-router)#no auto-summaryREMOTE 1(config-router)#network 192.168.158.64 0.0.0.31REMOTE 1(config-router)#network 192.168.156.192 0.0.0.63REMOTE 1(config-router)#network 192.168.158.96 0.0.0.3REMOTE 1(config-router)#%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 192.168.158.97 (Serial0/0/1) is up: new adjacencyRouter(config-router)#endRouter#%SYS-5-CONFIG_I: Configured from console by consoleREMOTE 2 ROUTER

Router>enRouter#config tEnter configuration commands, one per line. End with CNTL/Z.Router(config)#route eigrp 1Router(config-router)#no auto-summaryRouter(config-router)#network 192.168.157.0 0.0.0.255Router(config-router)#network 192.168.158.0 0.0.0.63Router(config-router)#network 192.168.158.100 0.0.0.3Router(config-router)#%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 192.168.158.101 (Serial0/0/0) is up: new adjacencyRouter(config-router)#endRouter#%SYS-5-CONFIG_I: Configured from console by console

9.3 VIRTUE ROUTER EIGRP CONFIGURATION

Router#config tEnter configuration commands, one per line. End with CNTL/Z.Router(config)#route eigrp 1Router(config-router)#no auto-summaryRouter(config-router)#network 189.54.69.253 0.0.0.3Router(config-router)#%DUAL-5-NBRCHANGE: IP-EIGRP 1: Neighbor 189.54.69.254 (Serial0/0) is up: new adjacency

Page 13: COMPUTER SYSTEMS ASSIGNMENT

9.4 DUAL NEIGHBORS TABLE DUAL NEIGHBORS TABLE FOR HQ

HQ#show ip eigrp neighborsIP-EIGRP neighbors for process 1H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num0 192.168.158.98 Se0/0/1 10 00:21:38 40 1000 0 91 192.168.158.102 Se0/0/0 14 00:10:14 40 1000 0 9DUAL NEIGHBORS TABLE FOR REMOTE 1

REMOTE 1>enREMOTE 1#show ip eigrp neighborsIP-EIGRP neighbors for process 1H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num0 192.168.158.97 Se0/0/1 14 00:38:27 40 1000 0 9REMOTE 1#DUAL NEIGHBORS TABLE FOR REMOTE 2

Router>enRouter#show ip eigrp neighborsIP-EIGRP neighbors for process 1H Address Interface Hold Uptime SRTT RTO Q Seq ( sec) (ms) Cnt Num0 192.168.158.101 Se0/0/0 13 00:41:16 40 1000 0 14Router#

9.5 LOOPBACK CONFIGURATION

HQ(config)# interface loopback0%LINK-5-CHANGED: Interface Loopback0, changed state to up%LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback0, changed state to upHQ(config-if)#ip address 189.54.69.254 255.255.255.252% 189.54.69.252 overlaps with Serial0/1/0HQ(config-if)#no shutHQ(config-if)#endHQ#%SYS-5-CONFIG_I: Configured from console by console

QUESTION 3

10.0 CONFIGURATION OF STATIC ROUTE CONFIGURATION OF STATIC ROUTEHQ>en

Page 14: COMPUTER SYSTEMS ASSIGNMENT

Password:HQ#config tEnter configuration commands, one per line. End with CNTL/Z.HQ(config)#ip route 0.0.0.0 0.0.0.0 loopback0HQ(config)#router eigrp 1HQ(config-router)#redistribute staticHQ(config-router)#endHQ#%SYS-5-CONFIG_I: Configured from console by console

11.0 TESTING Test plan have been developed to check the network device ability to communicate with each other. Basic

ping is to be carried out, pinging each interface from each location. EIGRP specific test are carried out to

ensure EIGRP protocol used on the router is functioning correctly. This includes testing convergence and

cdp.

Test no Description Source Destination address Expected output

1 Ping HQ Lo0 PC3 189.54.69.254 Ping should be successful

2 Ping HQ Fa0/0 PC4 192.168.156.1 Ping should be successful

3 Ping HQ Fa0/1 REMOTE1 router 192.168.156.129 Ping should be successful

4 Ping ISP virtue router HQ router 189.54.69.253 Ping should be successful

5 Ping REMOTE1 router HQ router 192.168.158.98 Ping should be successful

6 Ping REMOTE1 Fa0/0 PC 5 192.168.158.94 Ping should be successful

7 Ping REMOTE1 Fa0/1 PC2 192.168.156.254 Ping should be successful

8 Ping REMOTE1 router REMOTE2 router 192.168.158.98 Ping should be successful

9 Ping REMOTE1 router PC1 192.168.158.98 Ping should be successful

10 Ping REMOTE2 router PC3 192.168.158.102 Ping should be successful

11 Ping REMOTE2 Fa0/0 PC2 192.168.157.128 Ping should be successful

12 Ping REMOTE2 Fa0/1 PC1 192.168.158.62 Ping should be successful

13 Ping REMOTE2 router HQ router 192.168.158.102 Ping should be successful

14 Ping REMOTE2 router REMOTE1 router 192.168.158.102 Ping should be successful

15 Ping REMOTE2 router ISP virtue router 192.168.158.102 Ping should be successful

16 Ping HQ router PC3 192.168.158.101 Ping should be successful

17 Ping HQ router PC2 192.168.156.129 Ping should be successful

18 PC4 ISP virtue router 192.168.156.254 Ping should be successful

19 PC3 PC6 192.168.158.94 Ping should be successful

Page 15: COMPUTER SYSTEMS ASSIGNMENT

20 PC6 PC1 192.168.157.128 Ping should be successful

21 PC1 PC5 192.168.156.126 Ping should be successful

22 PC5 PC3 192.168.158.62 Ping should be successful

12.0 TEST LOG

Test no Description Expected result Actual result Successful/fail

1 Ping HQ Lo0 ping should be successful See figure 4 below successful

2 Ping HQ Fa0/0 ping should be successful See figure 5 below successful

3 Ping HQ Fa0/1 ping should be successful See figure 6 below successful

4 Ping ISP virtue router ping should be successful See figure 7 below successful

5 Ping REMOTE1 router ping should be successful See figure 8 below successful

6 Ping REMOTE1 Fa0/0 ping should be successful See figure 9 below successful

7 Ping REMOTE1 Fa0/1 ping should be successful See figure 10 below successful

8 Ping REMOTE1 router ping should be successful See figure 11 below successful

9 Ping REMOTE1 router ping should be successful See figure 12 below successful

10 Ping REMOTE2 router ping should be successful See figure 13 below successful

11 Ping REMOTE2 Fa0/0 ping should be successful See figure 14 below successful

12 Ping REMOTE2 Fa0/1 ping should be successful See figure 15 below successful

13 Ping REMOTE2 router ping should be successful See figure 16 below successful

14 Ping REMOTE2 router ping should be successful See figure 17 below successful

15 Ping REMOTE2 router ping should be successful See figure 18 below successful

16 Ping HQ router ping should be successful See figure 19 below successful

17 Ping HQ router ping should be successful See figure 20 below successful

18 Ping PC4 ping should be successful See figure 21 below successful

19 Ping PC3 ping should be successful See figure 22below successful

20 Ping PC6 ping should be successful See figure 23 below successful

21 Ping PC1 ping should be successful See figure 24 below successful

22 Ping PC5 ping should be successful See figure 25 below successful

Page 16: COMPUTER SYSTEMS ASSIGNMENT

13.0 TEST LOG RESULT PING 1

Figure 4: ping HQ Lo0

PING 2

Figure 5: Ping HQ Fa0/0

Ping 3

Page 17: COMPUTER SYSTEMS ASSIGNMENT

Figure 6: Ping HQ Fa0/1

PING 4

Figure 7: Ping ISP virtue router

Page 18: COMPUTER SYSTEMS ASSIGNMENT

PING 5

Figure 8: Ping REMOTE1 router

PING 6

Figure 9: Ping REMOTE1 Fa0/0

Page 19: COMPUTER SYSTEMS ASSIGNMENT

PING 7

Figure 10: Ping REMOTE1 Fa0/1

PING 8

Figure 11: Ping REMOTE1 router

Page 20: COMPUTER SYSTEMS ASSIGNMENT

PING 9

Figure 12: Ping REMOTE1 router

PING 10

Figure 13: Ping REMOTE2 router

Page 21: COMPUTER SYSTEMS ASSIGNMENT

PING 11

Figure 14: Ping REMOTE2 Fa0/0

PING 12

Figure 15: Ping REMOTE2 Fa0/1

Page 22: COMPUTER SYSTEMS ASSIGNMENT

PING 13

Figure 16: Ping REMOTE2 router

PING 14

Figure 17: Ping REMOTE2 router

Page 23: COMPUTER SYSTEMS ASSIGNMENT

PING 15

Figure 18: Ping REMOTE2 router

PING 16

Figure 19: Ping HQ router

Page 24: COMPUTER SYSTEMS ASSIGNMENT

PING 17

Figure 20: Ping HQ router

PING 18

Figure 20: Ping PC4

Page 25: COMPUTER SYSTEMS ASSIGNMENT

PING 19

Figure 21: Ping PC3

PING 20

Page 26: COMPUTER SYSTEMS ASSIGNMENT

Figure 22: Ping PC6

PING 21

Figure 23: Ping PC1

PING 22

Page 27: COMPUTER SYSTEMS ASSIGNMENT

Figure 24: Ping PC5

Page 28: COMPUTER SYSTEMS ASSIGNMENT

14.0 TEST FOR EIGRP AND COVERGENCE Test no Description Expected result Actual result Successful/fail

1 Routing update should be sent around the network Using EIGRP packet should be sent

to connected and configured routers

See routing tables below successful

2 Testing convergence All devices so be able converge See routing tables below successful

Page 29: COMPUTER SYSTEMS ASSIGNMENT

14.0 HQ ROUTER ROUTING TABLE

Figure 25: HQ routing table

29

Page 30: COMPUTER SYSTEMS ASSIGNMENT

14.1 REMOTE 1 ROUTER ROUTING TABLE

Figure 26: REMOTE1 routing table

30

Page 31: COMPUTER SYSTEMS ASSIGNMENT

14.2 REMOTE 2 ROUTER ROUTING TABLE

Figure 27: REMOTE2 routing table

31

Page 32: COMPUTER SYSTEMS ASSIGNMENT

CONCLUSION UKTA network is design to conform to all network standards. The network topology support high level of

scalability, Qos and security within the network. Extra port on the router was left to support physical

scalability within each subnet for logical increase internwork protocol could be sub-netted to get required

IPs. Based on the UKTA scenario routers were successfully configured to use EIGRP protocol for

communication within the network forming an autonomous group. The HQ was configured with loopback

address meant for the network and a static route was also configured for a virtue communication with the

network.

32

Page 33: COMPUTER SYSTEMS ASSIGNMENT

REFERENCE

Imagestream.com, nd; Leading the Router Revolution (Online)

Available at: http://www.imagestream.com/

[Accessed on December 18, 2010]

Serverfault.com, 2009; When/why to start subnetting a network?(Online)Available at:http://serverfault.com/questions/2591/when-why-to-start-subnetting-a-network

[Accessed on December 18, 2010]

petri.co.il, 2010: Trouble Configuring EIGRP with 2503(Online 1st May)

Available at: http://www.petri.co.il/forums/showthread.php?t=32593

[Accessed on December 12, 2010]

cisco.iphelp.ru , nd: EIGRP Summarization (Online)

Available at: http://cisco.iphelp.ru/faq/5/ch06lev1sec8.html

[Accessed on December 8, 2010]

fengnet.com, nd: Case Study: Troubleshooting EIGRP Neighbor Relationships (Online)

Available at: http://fengnet.com/book/Optimal%20Routing%20Design/ch03lev1sec7.html[Accessed on December 8, 2010]

informit.com, nd: Configuring Advanced EIGRP and Redistribution (Online)Available at: http://www.informit.com/library/content.aspx?b=CCNP_Studies_Routing&seqNum=66[Accessed on December 22, 2010]

33

Page 34: COMPUTER SYSTEMS ASSIGNMENT

34