SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Introduction To
    ROUTER
 Farhan Noor Galib (09.01.04.015)
 Zahidul islam george
  (09.01.04.023)
What is Router?
       ‱ A router is a device that acts as a
         medium for interconnecting several
         PCs. If a PC named compA wants to
         send data to compB, the router will
         choose the best path within the network
         and send data.

       ‱ A router is a device that forwards data
         packets between computer networks
Router is one kind of a Computer


A router is a computer, just like any other
computer including a PC. The very first
router, used for the Advanced Research
Projects Agency Network (ARPANET),
was the Interface Message Processor
(IMP). The IMP was a Honeywell 316
minicomputer; this computer brought the
ARPANET to life on August 30, 1969.

                                              Interface Message Processor (IMP) – The First Internet Router
Router Classification


 Non Upgradeable          Upgradeable
 Cannot add and           Can add and remove
  remove the Ethernet       interfaces as per
  or serial interfaces.     requirement.
 Doesn’t have any         Number of slots
  slot.                     available.
Some other Router types
 Wireless router
                      It combines a number of base stations (wireless access point) as well as a number of wired LAN switch


                      It connects more than one computer to a single DSL line for Internet access. Modem Routers provides the network
  Modem router        address translation (NAT) which is required to support several computers


     Brouter          A Bridge Router or brouter is a network device that works as a bridge and as a router


                      This router interfaces with an ATM (Asynchronous Transfer Mode) network
   Edge router


                      Access routers are used in 'small office/home office' (SOHO) networking models. Typically, they are optimized for low
  Access router
                      cost

Distribution router   Distribution routers aggregate traffic from multiple access routers. . They are often responsible for enforcing quality of
                      service across a WAN

                      A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings
   Core router        of a campus, or large enterprise locations
Some other Router types
(Cont’d)
Wireless router         Modem router                   Brouter             Edge router




   Access router                 Distribution router             Core router
Forwarding Packets
(Cont’d)
Internal Components of a Router



CPU                      RAM                          ROM                        Flash                    NVRAM
                                                                                                         NVRAM
                                                                                 Memory
CPU executes             RAM is volatile              ROM does not lose its                              This is volatile RAM,
                                                                                                           Non an example
operating system         memory and it loses its      content when the           Internetwork              similar to Hard Disk.
                                                                                                         text. Go ahead and
instructions, such as    content when the             router is powered          Operating System        replaceknown as
                                                                                                           Also it with your
system initialization,   router is restarted. It is   down or restarted. A       (IOS) developed by        permanent storage and
                                                                                                         own text
routing functions and    also known as                bootstrap program is       Cisco is stored here.     is used to load startup
switching functions.     temporary storage and        located here. It is same   IOS is Command line       configuration file.
                         is used to store running     as the bios of the PC.     interface.
                         configuration file.
Inside view of a router
External Ports (Interfaces) of Router
                          ‱WAN interfaces
                      1

                          ‱LAN interfaces - Ethernet
                      2

                          ‱Administration
                      3    interfaces(Configuration)




              Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)
              ISDN interface(BRI0 etc) – RJ45
   WAN        WAN interfaces are used to connect routers to external networks, usually
Interfaces     over a larger geographical distance. Similar to LAN interfaces, each WAN
               interface has its own IP address and subnet mask, which identifies it as a
               member of a specific network.
Interfaces of router
(Cont’d)
                  AUI (Attachment Unit Interface) (E0)15 pin
                  10baseT – RJ45
   LAN            As the name indicates, LAN interfaces are used to connect the router to the LAN, similar to how a PC Ethernet
Interfaces         NIC is used to connect the PC to the Ethernet LAN. Like a PC Ethernet NIC, a router Ethernet interface also
                   has a Layer 2 MAC address and participates in the Ethernet LAN in the same way as any other hosts on that
                   LAN.




                  Console – RJ45 – Local Administration
                  Auxiliary – RJ45 – Remote Administration.
Administration    The console port is used to connect a terminal, or most often a PC running terminal emulator software, to
  Interfaces       configure the router without the need for network access to that router. The console port must be used during
                   initial configuration of the router.
                  At times the auxiliary port can be used in ways similar to a console port. It can also be used to attach a modem.
Interfaces of router
(Cont’d)

      Iterfaces along with their Ports
Router acting as Firewall
Why do we need firewall:

When our PC is directly connected to the internet, a globally unique IP address is
assigned to our PC by the Internet Service Provider (ISP), this address is public i.e. it
can be known to anyone anywhere on the internet. In such cases, anyone can use the
IP address of user machine to do some mischievous work.
How router act as firewall:

 What happens in such cases is,the IP address is assigned to the router by ISP
  (Internet Service Provider) and not to the PC, now it’s the work of router to assign
  private address to the PC.
 When we send any packet, router removes the source IP address and attaches its
  own public IP address, in turn stores the information about all the changes which
  were made.
 When any packet comes to the PC , router gets information which it has stored and
  accordingly routes the packet to the source machine.
 In this way our PC is not visible on the net, but our PC can see the internet.
Router acting as Firewall
(Cont’d)


                     Lets take a
                     closer look
Router plane
A router has two stages of operation called planes:
 Control Plane
 Forwarding Plane
Control plane                                               Forwarding plane

  1                                                          2
      A router records a routing table listing what route        The router forwards data packets between
      should be used to forward a data packet, and               incoming and outgoing interface connections. It
      through which physical interface connection. It            routes it to the correct network type using
      does this using internal pre-configured addresses,         information that the packet header contains. It uses
      called static routes.                                      data recorded in the routing table control plane.
Cisco IOS


A router cannot function without an operating system. Without an operating system, the hardware does not have any capabilities.
The Cisco Internetwork Operating System (Cisco IOS) is the system software in Cisco devices. Different company uses different
IOS for their devices i.e Juniper uses JUNOS for their devices.

The Cisco IOS provides devices with the following network services:
 Basic routing and switching functions
 Reliable and secure access to networked resources
 Network scalability

The services provided by the Cisco IOS are generally accessed using a command line interface (CLI). The IOS file itself is several
megabytes in size and is stored in flash. Flash memory provides non-volatile storage. This means that the contents of the memory
are not lost when the device loses power.
Accessing command line interface(CLI)

There are several ways to access the CLI environment. The most
usual methods are:
 Console
 Telnet or SSH
 AUX port


Console:
The CLI can be accessed through a console session, also known as
the CTY line. A console uses a low speed serial connection to
directly connect a computer or terminal to the console port
on the router or switch. The console port is accessible even if
Accessing CLI
.(Cont’d)
Telnet and SSH:
‱   A method for remotely accessing a CLI
    session is to telnet to the router. Unlike
    the console connection, Telnet sessions
    require active networking services on the
    device.
‱   The Secure Shell (SSH) protocol is a more
    secure method for remote device access.
    This protocol provides the structure for a
    remote login similar to Telnet, except that
    it utilizes more secure network services.
    SSH      provides   stronger     password
    authentication than Telnet and uses
    encryption when transporting session data.
AUX port:
Another way to establish a CLI session
remotely is via a telephone dialup connection
Router configuration files

          1   The startup configuration file   2   The running configuration file


1    The startup configuration file


     The startup configuration file (startup-config) is used
      during system startup to configure the device.
     The startup configuration file is stored in non-volatile
      RAM (NVRAM). Since NVRAM is non-volatile, when the
      Cisco device is turned off, the file remains intact.
     The startup-config files are loaded into RAM each time
Configuration files
(Cont’d)
2    The running configuration file


     Once the startup configuration file is loaded into RAM, it
      is considered the running configuration or running-config.
     The running configuration is modified when the network
      administrator performs device configuration.
     Because the running configuration file is in RAM, it is lost
      if the power to the device is turned off or if the device is
      restarted.
     Changes made to the running-config file will also be
      lost if they are not saved to the startup-config file
Configuration files
(Cont’d)
Router boot-up process
Step        1              2                3              4
                                        locating
                                        and
                                        loading the
       Performing                       configurati
                      Loading the   Locating and      Locating and
                                        on file
       the Power-     bootstrap     loading Cisco     loading the
       On Self Test   program       IOS               configuration
       (POST).                                        file
Router boot-up process
(Cont’d)
 Performing the Power-On Self Test (POST):


 The Router Performs A POST which is a series of Hardware Test that verify whether all components of the device are
  functional.

 Loading the bootstrap program:


 After the POST process, the router copies the bootstrap program from ROM into RAM.
 The main purpose of the bootstrap program is to locate the Cisco IOS and load it into RAM.

Locating and loading Cisco IOS:


 The Bootstrap Attempts To Load The IOS From Flash.
 Usually, the IOS is located in the flash memory, but it can also be stored in a TFTP server
 If a full IOS image can not be located, a scaled-down version of the IOS is copied from ROM into RAM.
Router boot-up process
(Cont’d)

 Locating and loading the configuration file:



After the IOS is loaded, the bootstrap program searches for the startup configuration file (startup-config) in
  the NVRAM.
If the file exists, it is copied into RAM as the running configuration file (running-config). if the file does not
  exists, the router may serach for a TFTP server.
if the startup configuration file can not be located, the router prompts the user to enter setup mode. setup
  mode is a series of questions prompting the user for basic configurations information.
 if the setup mode is not used, the IOS creates a default running-config. this file is a basic configuration file
Block diagram of router boot-up process
Worldwide market leaders of router
Router advantages and issues
Advantages of router:
    ability to share a network connection with multiple machines, which increases productivity.
    Routers deliver the packets of data in an organized way, thus lowering the data load.
    Routers enable a steady and reliable connection between network hosts.
    Routers make use of alternative parts incase the main parts fail to transfer data packets


Router issues:

 Connections can become slow when multiple computers are using a network. This situation is
  described as "connection lag ".
 A router basically allows multiple computers to share the same network, which means that the
  resources of the network are distributed among the machines, and they may run slower as a result.
Any
Question
  ???

Weitere Àhnliche Inhalte

Was ist angesagt?

Network switch
Network switchNetwork switch
Network switchRavinder Kaur
 
Routing ppt
Routing pptRouting ppt
Routing pptArpiSaxena1
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSamiteshg
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridgeskeyur Nandaniya
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressingvssnsarma
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their workingrockingprashik
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of GatewayNaveen Karn
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Varinder Singh Walia
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on NetworkingGayan Geethanjana
 
Networking devices
Networking devicesNetworking devices
Networking devicesfrestoadi
 
Router configuration
Router configurationRouter configuration
Router configurationChoyonBonik
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 
Networking devices
Networking devicesNetworking devices
Networking devicesTayyab Hussain
 

Was ist angesagt? (20)

Network switch
Network switchNetwork switch
Network switch
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Detailed description about Hubs Switches Modems and their working
Detailed description about  Hubs Switches Modems and their workingDetailed description about  Hubs Switches Modems and their working
Detailed description about Hubs Switches Modems and their working
 
PPT on Basic of Gateway
PPT on Basic of GatewayPPT on Basic of Gateway
PPT on Basic of Gateway
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Router and routing
Router  and routingRouter  and routing
Router and routing
 
HUB Device
HUB Device HUB Device
HUB Device
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Networking devices
Networking devicesNetworking devices
Networking devices
 

Ähnlich wie Introduction to Routers

Pemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfPemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfAyesMuharam1
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glanceVikas Raut
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesSubhajit Sahu
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Netwax Lab
 
1164 Routers
1164 Routers1164 Routers
1164 Routerstechbed
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptbirhanugebisa1
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routersKevin Bhola
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : NotesSubhajit Sahu
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to routerMuhammadUsman1853
 
Routerfundaments gurwinder
Routerfundaments gurwinderRouterfundaments gurwinder
Routerfundaments gurwinderCYBERINTELLIGENTS
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSVarinder Singh Walia
 

Ähnlich wie Introduction to Routers (20)

Exp2
Exp2Exp2
Exp2
 
Pemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfPemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdf
 
Chapter5
Chapter5Chapter5
Chapter5
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
 
Cis82 e2-1-packet forwarding
Cis82 e2-1-packet forwardingCis82 e2-1-packet forwarding
Cis82 e2-1-packet forwarding
 
Networking
NetworkingNetworking
Networking
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routers
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : Notes
 
Ccna2 ass
Ccna2 assCcna2 ass
Ccna2 ass
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Routerfundaments gurwinder
Routerfundaments gurwinderRouterfundaments gurwinder
Routerfundaments gurwinder
 
H n q & a
H n q & aH n q & a
H n q & a
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 

KĂŒrzlich hochgeladen

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

KĂŒrzlich hochgeladen (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Introduction to Routers

  • 2.  Farhan Noor Galib (09.01.04.015)  Zahidul islam george (09.01.04.023)
  • 3. What is Router? ‱ A router is a device that acts as a medium for interconnecting several PCs. If a PC named compA wants to send data to compB, the router will choose the best path within the network and send data. ‱ A router is a device that forwards data packets between computer networks
  • 4. Router is one kind of a Computer A router is a computer, just like any other computer including a PC. The very first router, used for the Advanced Research Projects Agency Network (ARPANET), was the Interface Message Processor (IMP). The IMP was a Honeywell 316 minicomputer; this computer brought the ARPANET to life on August 30, 1969. Interface Message Processor (IMP) – The First Internet Router
  • 5. Router Classification  Non Upgradeable  Upgradeable  Cannot add and  Can add and remove remove the Ethernet interfaces as per or serial interfaces. requirement.  Doesn’t have any  Number of slots slot. available.
  • 6. Some other Router types Wireless router It combines a number of base stations (wireless access point) as well as a number of wired LAN switch It connects more than one computer to a single DSL line for Internet access. Modem Routers provides the network Modem router address translation (NAT) which is required to support several computers Brouter A Bridge Router or brouter is a network device that works as a bridge and as a router This router interfaces with an ATM (Asynchronous Transfer Mode) network Edge router Access routers are used in 'small office/home office' (SOHO) networking models. Typically, they are optimized for low Access router cost Distribution router Distribution routers aggregate traffic from multiple access routers. . They are often responsible for enforcing quality of service across a WAN A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings Core router of a campus, or large enterprise locations
  • 7. Some other Router types
(Cont’d) Wireless router Modem router Brouter Edge router Access router Distribution router Core router
  • 8.
  • 10. Internal Components of a Router CPU RAM ROM Flash NVRAM NVRAM Memory CPU executes RAM is volatile ROM does not lose its This is volatile RAM, Non an example operating system memory and it loses its content when the Internetwork similar to Hard Disk. text. Go ahead and instructions, such as content when the router is powered Operating System replaceknown as Also it with your system initialization, router is restarted. It is down or restarted. A (IOS) developed by permanent storage and own text routing functions and also known as bootstrap program is Cisco is stored here. is used to load startup switching functions. temporary storage and located here. It is same IOS is Command line configuration file. is used to store running as the bios of the PC. interface. configuration file.
  • 11. Inside view of a router
  • 12. External Ports (Interfaces) of Router ‱WAN interfaces 1 ‱LAN interfaces - Ethernet 2 ‱Administration 3 interfaces(Configuration)  Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)  ISDN interface(BRI0 etc) – RJ45 WAN  WAN interfaces are used to connect routers to external networks, usually Interfaces over a larger geographical distance. Similar to LAN interfaces, each WAN interface has its own IP address and subnet mask, which identifies it as a member of a specific network.
  • 13. Interfaces of router
(Cont’d)  AUI (Attachment Unit Interface) (E0)15 pin  10baseT – RJ45 LAN  As the name indicates, LAN interfaces are used to connect the router to the LAN, similar to how a PC Ethernet Interfaces NIC is used to connect the PC to the Ethernet LAN. Like a PC Ethernet NIC, a router Ethernet interface also has a Layer 2 MAC address and participates in the Ethernet LAN in the same way as any other hosts on that LAN.  Console – RJ45 – Local Administration  Auxiliary – RJ45 – Remote Administration. Administration  The console port is used to connect a terminal, or most often a PC running terminal emulator software, to Interfaces configure the router without the need for network access to that router. The console port must be used during initial configuration of the router.  At times the auxiliary port can be used in ways similar to a console port. It can also be used to attach a modem.
  • 14. Interfaces of router
(Cont’d) Iterfaces along with their Ports
  • 15. Router acting as Firewall Why do we need firewall: When our PC is directly connected to the internet, a globally unique IP address is assigned to our PC by the Internet Service Provider (ISP), this address is public i.e. it can be known to anyone anywhere on the internet. In such cases, anyone can use the IP address of user machine to do some mischievous work. How router act as firewall:  What happens in such cases is,the IP address is assigned to the router by ISP (Internet Service Provider) and not to the PC, now it’s the work of router to assign private address to the PC.  When we send any packet, router removes the source IP address and attaches its own public IP address, in turn stores the information about all the changes which were made.  When any packet comes to the PC , router gets information which it has stored and accordingly routes the packet to the source machine.  In this way our PC is not visible on the net, but our PC can see the internet.
  • 16. Router acting as Firewall
(Cont’d) Lets take a closer look
  • 17. Router plane A router has two stages of operation called planes:  Control Plane  Forwarding Plane Control plane Forwarding plane 1 2 A router records a routing table listing what route The router forwards data packets between should be used to forward a data packet, and incoming and outgoing interface connections. It through which physical interface connection. It routes it to the correct network type using does this using internal pre-configured addresses, information that the packet header contains. It uses called static routes. data recorded in the routing table control plane.
  • 18. Cisco IOS A router cannot function without an operating system. Without an operating system, the hardware does not have any capabilities. The Cisco Internetwork Operating System (Cisco IOS) is the system software in Cisco devices. Different company uses different IOS for their devices i.e Juniper uses JUNOS for their devices. The Cisco IOS provides devices with the following network services:  Basic routing and switching functions  Reliable and secure access to networked resources  Network scalability The services provided by the Cisco IOS are generally accessed using a command line interface (CLI). The IOS file itself is several megabytes in size and is stored in flash. Flash memory provides non-volatile storage. This means that the contents of the memory are not lost when the device loses power.
  • 19. Accessing command line interface(CLI) There are several ways to access the CLI environment. The most usual methods are:  Console  Telnet or SSH  AUX port Console: The CLI can be accessed through a console session, also known as the CTY line. A console uses a low speed serial connection to directly connect a computer or terminal to the console port on the router or switch. The console port is accessible even if
  • 20. Accessing CLI
.(Cont’d) Telnet and SSH: ‱ A method for remotely accessing a CLI session is to telnet to the router. Unlike the console connection, Telnet sessions require active networking services on the device. ‱ The Secure Shell (SSH) protocol is a more secure method for remote device access. This protocol provides the structure for a remote login similar to Telnet, except that it utilizes more secure network services. SSH provides stronger password authentication than Telnet and uses encryption when transporting session data. AUX port: Another way to establish a CLI session remotely is via a telephone dialup connection
  • 21. Router configuration files 1 The startup configuration file 2 The running configuration file 1 The startup configuration file  The startup configuration file (startup-config) is used during system startup to configure the device.  The startup configuration file is stored in non-volatile RAM (NVRAM). Since NVRAM is non-volatile, when the Cisco device is turned off, the file remains intact.  The startup-config files are loaded into RAM each time
  • 22. Configuration files
(Cont’d) 2 The running configuration file  Once the startup configuration file is loaded into RAM, it is considered the running configuration or running-config.  The running configuration is modified when the network administrator performs device configuration.  Because the running configuration file is in RAM, it is lost if the power to the device is turned off or if the device is restarted.  Changes made to the running-config file will also be lost if they are not saved to the startup-config file
  • 24. Router boot-up process Step 1 2 3 4 locating and loading the Performing configurati Loading the Locating and Locating and on file the Power- bootstrap loading Cisco loading the On Self Test program IOS configuration (POST). file
  • 25. Router boot-up process
(Cont’d) Performing the Power-On Self Test (POST):  The Router Performs A POST which is a series of Hardware Test that verify whether all components of the device are functional. Loading the bootstrap program:  After the POST process, the router copies the bootstrap program from ROM into RAM.  The main purpose of the bootstrap program is to locate the Cisco IOS and load it into RAM. Locating and loading Cisco IOS:  The Bootstrap Attempts To Load The IOS From Flash.  Usually, the IOS is located in the flash memory, but it can also be stored in a TFTP server  If a full IOS image can not be located, a scaled-down version of the IOS is copied from ROM into RAM.
  • 26. Router boot-up process
(Cont’d) Locating and loading the configuration file: After the IOS is loaded, the bootstrap program searches for the startup configuration file (startup-config) in the NVRAM. If the file exists, it is copied into RAM as the running configuration file (running-config). if the file does not exists, the router may serach for a TFTP server. if the startup configuration file can not be located, the router prompts the user to enter setup mode. setup mode is a series of questions prompting the user for basic configurations information.  if the setup mode is not used, the IOS creates a default running-config. this file is a basic configuration file
  • 27. Block diagram of router boot-up process
  • 29. Router advantages and issues Advantages of router:  ability to share a network connection with multiple machines, which increases productivity.  Routers deliver the packets of data in an organized way, thus lowering the data load.  Routers enable a steady and reliable connection between network hosts.  Routers make use of alternative parts incase the main parts fail to transfer data packets Router issues:  Connections can become slow when multiple computers are using a network. This situation is described as "connection lag ".  A router basically allows multiple computers to share the same network, which means that the resources of the network are distributed among the machines, and they may run slower as a result.