SlideShare uma empresa Scribd logo
1 de 30
Introduction To
    ROUTER
 Farhan Noor Galib (09.01.04.015)
 Zahidul islam george
  (09.01.04.023)
What is Router?
       • A router is a device that acts as a
         medium for interconnecting several
         PCs. If a PC named compA wants to
         send data to compB, the router will
         choose the best path within the network
         and send data.

       • A router is a device that forwards data
         packets between computer networks
Router is one kind of a Computer


A router is a computer, just like any other
computer including a PC. The very first
router, used for the Advanced Research
Projects Agency Network (ARPANET),
was the Interface Message Processor
(IMP). The IMP was a Honeywell 316
minicomputer; this computer brought the
ARPANET to life on August 30, 1969.

                                              Interface Message Processor (IMP) – The First Internet Router
Router Classification


 Non Upgradeable          Upgradeable
 Cannot add and           Can add and remove
  remove the Ethernet       interfaces as per
  or serial interfaces.     requirement.
 Doesn’t have any         Number of slots
  slot.                     available.
Some other Router types
 Wireless router
                      It combines a number of base stations (wireless access point) as well as a number of wired LAN switch


                      It connects more than one computer to a single DSL line for Internet access. Modem Routers provides the network
  Modem router        address translation (NAT) which is required to support several computers


     Brouter          A Bridge Router or brouter is a network device that works as a bridge and as a router


                      This router interfaces with an ATM (Asynchronous Transfer Mode) network
   Edge router


                      Access routers are used in 'small office/home office' (SOHO) networking models. Typically, they are optimized for low
  Access router
                      cost

Distribution router   Distribution routers aggregate traffic from multiple access routers. . They are often responsible for enforcing quality of
                      service across a WAN

                      A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings
   Core router        of a campus, or large enterprise locations
Some other Router types…(Cont’d)
Wireless router         Modem router                   Brouter             Edge router




   Access router                 Distribution router             Core router
Forwarding Packets…(Cont’d)
Internal Components of a Router



CPU                      RAM                          ROM                        Flash                    NVRAM
                                                                                                         NVRAM
                                                                                 Memory
CPU executes             RAM is volatile              ROM does not lose its                              This is volatile RAM,
                                                                                                           Non an example
operating system         memory and it loses its      content when the           Internetwork              similar to Hard Disk.
                                                                                                         text. Go ahead and
instructions, such as    content when the             router is powered          Operating System        replaceknown as
                                                                                                           Also it with your
system initialization,   router is restarted. It is   down or restarted. A       (IOS) developed by        permanent storage and
                                                                                                         own text
routing functions and    also known as                bootstrap program is       Cisco is stored here.     is used to load startup
switching functions.     temporary storage and        located here. It is same   IOS is Command line       configuration file.
                         is used to store running     as the bios of the PC.     interface.
                         configuration file.
Inside view of a router
External Ports (Interfaces) of Router
                          •WAN interfaces
                      1

                          •LAN interfaces - Ethernet
                      2

                          •Administration
                      3    interfaces(Configuration)




              Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)
              ISDN interface(BRI0 etc) – RJ45
   WAN        WAN interfaces are used to connect routers to external networks, usually
Interfaces     over a larger geographical distance. Similar to LAN interfaces, each WAN
               interface has its own IP address and subnet mask, which identifies it as a
               member of a specific network.
Interfaces of router…(Cont’d)
                  AUI (Attachment Unit Interface) (E0)15 pin
                  10baseT – RJ45
   LAN            As the name indicates, LAN interfaces are used to connect the router to the LAN, similar to how a PC Ethernet
Interfaces         NIC is used to connect the PC to the Ethernet LAN. Like a PC Ethernet NIC, a router Ethernet interface also
                   has a Layer 2 MAC address and participates in the Ethernet LAN in the same way as any other hosts on that
                   LAN.




                  Console – RJ45 – Local Administration
                  Auxiliary – RJ45 – Remote Administration.
Administration    The console port is used to connect a terminal, or most often a PC running terminal emulator software, to
  Interfaces       configure the router without the need for network access to that router. The console port must be used during
                   initial configuration of the router.
                  At times the auxiliary port can be used in ways similar to a console port. It can also be used to attach a modem.
Interfaces of router…(Cont’d)

      Iterfaces along with their Ports
Router acting as Firewall
Why do we need firewall:

When our PC is directly connected to the internet, a globally unique IP address is
assigned to our PC by the Internet Service Provider (ISP), this address is public i.e. it
can be known to anyone anywhere on the internet. In such cases, anyone can use the
IP address of user machine to do some mischievous work.
How router act as firewall:

 What happens in such cases is,the IP address is assigned to the router by ISP
  (Internet Service Provider) and not to the PC, now it’s the work of router to assign
  private address to the PC.
 When we send any packet, router removes the source IP address and attaches its
  own public IP address, in turn stores the information about all the changes which
  were made.
 When any packet comes to the PC , router gets information which it has stored and
  accordingly routes the packet to the source machine.
 In this way our PC is not visible on the net, but our PC can see the internet.
Router acting as Firewall…(Cont’d)


                     Lets take a
                     closer look
Router plane
A router has two stages of operation called planes:
 Control Plane
 Forwarding Plane
Control plane                                               Forwarding plane

  1                                                          2
      A router records a routing table listing what route        The router forwards data packets between
      should be used to forward a data packet, and               incoming and outgoing interface connections. It
      through which physical interface connection. It            routes it to the correct network type using
      does this using internal pre-configured addresses,         information that the packet header contains. It uses
      called static routes.                                      data recorded in the routing table control plane.
Cisco IOS


A router cannot function without an operating system. Without an operating system, the hardware does not have any capabilities.
The Cisco Internetwork Operating System (Cisco IOS) is the system software in Cisco devices. Different company uses different
IOS for their devices i.e Juniper uses JUNOS for their devices.

The Cisco IOS provides devices with the following network services:
 Basic routing and switching functions
 Reliable and secure access to networked resources
 Network scalability

The services provided by the Cisco IOS are generally accessed using a command line interface (CLI). The IOS file itself is several
megabytes in size and is stored in flash. Flash memory provides non-volatile storage. This means that the contents of the memory
are not lost when the device loses power.
Accessing command line interface(CLI)

There are several ways to access the CLI environment. The most
usual methods are:
 Console
 Telnet or SSH
 AUX port


Console:
The CLI can be accessed through a console session, also known as
the CTY line. A console uses a low speed serial connection to
directly connect a computer or terminal to the console port
on the router or switch. The console port is accessible even if
Accessing CLI….(Cont’d)
Telnet and SSH:
•   A method for remotely accessing a CLI
    session is to telnet to the router. Unlike
    the console connection, Telnet sessions
    require active networking services on the
    device.
•   The Secure Shell (SSH) protocol is a more
    secure method for remote device access.
    This protocol provides the structure for a
    remote login similar to Telnet, except that
    it utilizes more secure network services.
    SSH      provides   stronger     password
    authentication than Telnet and uses
    encryption when transporting session data.
AUX port:
Another way to establish a CLI session
remotely is via a telephone dialup connection
Router configuration files

          1   The startup configuration file   2   The running configuration file


1    The startup configuration file


     The startup configuration file (startup-config) is used
      during system startup to configure the device.
     The startup configuration file is stored in non-volatile
      RAM (NVRAM). Since NVRAM is non-volatile, when the
      Cisco device is turned off, the file remains intact.
     The startup-config files are loaded into RAM each time
Configuration files…(Cont’d)
2    The running configuration file


     Once the startup configuration file is loaded into RAM, it
      is considered the running configuration or running-config.
     The running configuration is modified when the network
      administrator performs device configuration.
     Because the running configuration file is in RAM, it is lost
      if the power to the device is turned off or if the device is
      restarted.
     Changes made to the running-config file will also be
      lost if they are not saved to the startup-config file
Configuration files…(Cont’d)
Router boot-up process
Step        1              2                3              4
                                        locating
                                        and
                                        loading the
       Performing                       configurati
                      Loading the   Locating and      Locating and
                                        on file
       the Power-     bootstrap     loading Cisco     loading the
       On Self Test   program       IOS               configuration
       (POST).                                        file
Router boot-up process…(Cont’d)
 Performing the Power-On Self Test (POST):


 The Router Performs A POST which is a series of Hardware Test that verify whether all components of the device are
  functional.

 Loading the bootstrap program:


 After the POST process, the router copies the bootstrap program from ROM into RAM.
 The main purpose of the bootstrap program is to locate the Cisco IOS and load it into RAM.

Locating and loading Cisco IOS:


 The Bootstrap Attempts To Load The IOS From Flash.
 Usually, the IOS is located in the flash memory, but it can also be stored in a TFTP server
 If a full IOS image can not be located, a scaled-down version of the IOS is copied from ROM into RAM.
Router boot-up process…(Cont’d)

 Locating and loading the configuration file:



After the IOS is loaded, the bootstrap program searches for the startup configuration file (startup-config) in
  the NVRAM.
If the file exists, it is copied into RAM as the running configuration file (running-config). if the file does not
  exists, the router may serach for a TFTP server.
if the startup configuration file can not be located, the router prompts the user to enter setup mode. setup
  mode is a series of questions prompting the user for basic configurations information.
 if the setup mode is not used, the IOS creates a default running-config. this file is a basic configuration file
Block diagram of router boot-up process
Worldwide market leaders of router
Router advantages and issues
Advantages of router:
    ability to share a network connection with multiple machines, which increases productivity.
    Routers deliver the packets of data in an organized way, thus lowering the data load.
    Routers enable a steady and reliable connection between network hosts.
    Routers make use of alternative parts incase the main parts fail to transfer data packets


Router issues:

 Connections can become slow when multiple computers are using a network. This situation is
  described as "connection lag ".
 A router basically allows multiple computers to share the same network, which means that the
  resources of the network are distributed among the machines, and they may run slower as a result.
Any
Question
  ???

Mais conteúdo relacionado

Mais procurados

networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridgeskeyur Nandaniya
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSamiteshg
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTNishant Goel
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 

Mais procurados (20)

networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Modes of router
Modes of routerModes of router
Modes of router
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Router switch and hub
Router switch and hubRouter switch and hub
Router switch and hub
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Switch & hub
Switch & hubSwitch & hub
Switch & hub
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 

Semelhante a Introduction to Routers

Pemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfPemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfAyesMuharam1
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glanceVikas Raut
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesSubhajit Sahu
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Netwax Lab
 
1164 Routers
1164 Routers1164 Routers
1164 Routerstechbed
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptbirhanugebisa1
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routersKevin Bhola
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : NotesSubhajit Sahu
 

Semelhante a Introduction to Routers (20)

Exp2
Exp2Exp2
Exp2
 
Pemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdfPemrograman Jaringan. Routing Concept.pdf
Pemrograman Jaringan. Routing Concept.pdf
 
Chapter5
Chapter5Chapter5
Chapter5
 
CCNA at a glance
CCNA at a glanceCCNA at a glance
CCNA at a glance
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
CCNA FUNDAMENTAL
CCNA FUNDAMENTALCCNA FUNDAMENTAL
CCNA FUNDAMENTAL
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
 
Cis82 e2-1-packet forwarding
Cis82 e2-1-packet forwardingCis82 e2-1-packet forwarding
Cis82 e2-1-packet forwarding
 
Networking
NetworkingNetworking
Networking
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
 
Wa ns and routers
Wa ns and routersWa ns and routers
Wa ns and routers
 
Router (computing) : Notes
Router (computing) : NotesRouter (computing) : Notes
Router (computing) : Notes
 
Ccna2 ass
Ccna2 assCcna2 ass
Ccna2 ass
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Routerfundaments gurwinder
Routerfundaments gurwinderRouterfundaments gurwinder
Routerfundaments gurwinder
 
H n q & a
H n q & aH n q & a
H n q & a
 

Último

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Introduction to Routers

  • 2.  Farhan Noor Galib (09.01.04.015)  Zahidul islam george (09.01.04.023)
  • 3. What is Router? • A router is a device that acts as a medium for interconnecting several PCs. If a PC named compA wants to send data to compB, the router will choose the best path within the network and send data. • A router is a device that forwards data packets between computer networks
  • 4. Router is one kind of a Computer A router is a computer, just like any other computer including a PC. The very first router, used for the Advanced Research Projects Agency Network (ARPANET), was the Interface Message Processor (IMP). The IMP was a Honeywell 316 minicomputer; this computer brought the ARPANET to life on August 30, 1969. Interface Message Processor (IMP) – The First Internet Router
  • 5. Router Classification  Non Upgradeable  Upgradeable  Cannot add and  Can add and remove remove the Ethernet interfaces as per or serial interfaces. requirement.  Doesn’t have any  Number of slots slot. available.
  • 6. Some other Router types Wireless router It combines a number of base stations (wireless access point) as well as a number of wired LAN switch It connects more than one computer to a single DSL line for Internet access. Modem Routers provides the network Modem router address translation (NAT) which is required to support several computers Brouter A Bridge Router or brouter is a network device that works as a bridge and as a router This router interfaces with an ATM (Asynchronous Transfer Mode) network Edge router Access routers are used in 'small office/home office' (SOHO) networking models. Typically, they are optimized for low Access router cost Distribution router Distribution routers aggregate traffic from multiple access routers. . They are often responsible for enforcing quality of service across a WAN A core router may provide a "collapsed backbone" interconnecting the distribution tier routers from multiple buildings Core router of a campus, or large enterprise locations
  • 7. Some other Router types…(Cont’d) Wireless router Modem router Brouter Edge router Access router Distribution router Core router
  • 8.
  • 10. Internal Components of a Router CPU RAM ROM Flash NVRAM NVRAM Memory CPU executes RAM is volatile ROM does not lose its This is volatile RAM, Non an example operating system memory and it loses its content when the Internetwork similar to Hard Disk. text. Go ahead and instructions, such as content when the router is powered Operating System replaceknown as Also it with your system initialization, router is restarted. It is down or restarted. A (IOS) developed by permanent storage and own text routing functions and also known as bootstrap program is Cisco is stored here. is used to load startup switching functions. temporary storage and located here. It is same IOS is Command line configuration file. is used to store running as the bios of the PC. interface. configuration file.
  • 11. Inside view of a router
  • 12. External Ports (Interfaces) of Router •WAN interfaces 1 •LAN interfaces - Ethernet 2 •Administration 3 interfaces(Configuration)  Serial interface (S0, S1 etc) – 60 pin/26 pin(smart serial)  ISDN interface(BRI0 etc) – RJ45 WAN  WAN interfaces are used to connect routers to external networks, usually Interfaces over a larger geographical distance. Similar to LAN interfaces, each WAN interface has its own IP address and subnet mask, which identifies it as a member of a specific network.
  • 13. Interfaces of router…(Cont’d)  AUI (Attachment Unit Interface) (E0)15 pin  10baseT – RJ45 LAN  As the name indicates, LAN interfaces are used to connect the router to the LAN, similar to how a PC Ethernet Interfaces NIC is used to connect the PC to the Ethernet LAN. Like a PC Ethernet NIC, a router Ethernet interface also has a Layer 2 MAC address and participates in the Ethernet LAN in the same way as any other hosts on that LAN.  Console – RJ45 – Local Administration  Auxiliary – RJ45 – Remote Administration. Administration  The console port is used to connect a terminal, or most often a PC running terminal emulator software, to Interfaces configure the router without the need for network access to that router. The console port must be used during initial configuration of the router.  At times the auxiliary port can be used in ways similar to a console port. It can also be used to attach a modem.
  • 14. Interfaces of router…(Cont’d) Iterfaces along with their Ports
  • 15. Router acting as Firewall Why do we need firewall: When our PC is directly connected to the internet, a globally unique IP address is assigned to our PC by the Internet Service Provider (ISP), this address is public i.e. it can be known to anyone anywhere on the internet. In such cases, anyone can use the IP address of user machine to do some mischievous work. How router act as firewall:  What happens in such cases is,the IP address is assigned to the router by ISP (Internet Service Provider) and not to the PC, now it’s the work of router to assign private address to the PC.  When we send any packet, router removes the source IP address and attaches its own public IP address, in turn stores the information about all the changes which were made.  When any packet comes to the PC , router gets information which it has stored and accordingly routes the packet to the source machine.  In this way our PC is not visible on the net, but our PC can see the internet.
  • 16. Router acting as Firewall…(Cont’d) Lets take a closer look
  • 17. Router plane A router has two stages of operation called planes:  Control Plane  Forwarding Plane Control plane Forwarding plane 1 2 A router records a routing table listing what route The router forwards data packets between should be used to forward a data packet, and incoming and outgoing interface connections. It through which physical interface connection. It routes it to the correct network type using does this using internal pre-configured addresses, information that the packet header contains. It uses called static routes. data recorded in the routing table control plane.
  • 18. Cisco IOS A router cannot function without an operating system. Without an operating system, the hardware does not have any capabilities. The Cisco Internetwork Operating System (Cisco IOS) is the system software in Cisco devices. Different company uses different IOS for their devices i.e Juniper uses JUNOS for their devices. The Cisco IOS provides devices with the following network services:  Basic routing and switching functions  Reliable and secure access to networked resources  Network scalability The services provided by the Cisco IOS are generally accessed using a command line interface (CLI). The IOS file itself is several megabytes in size and is stored in flash. Flash memory provides non-volatile storage. This means that the contents of the memory are not lost when the device loses power.
  • 19. Accessing command line interface(CLI) There are several ways to access the CLI environment. The most usual methods are:  Console  Telnet or SSH  AUX port Console: The CLI can be accessed through a console session, also known as the CTY line. A console uses a low speed serial connection to directly connect a computer or terminal to the console port on the router or switch. The console port is accessible even if
  • 20. Accessing CLI….(Cont’d) Telnet and SSH: • A method for remotely accessing a CLI session is to telnet to the router. Unlike the console connection, Telnet sessions require active networking services on the device. • The Secure Shell (SSH) protocol is a more secure method for remote device access. This protocol provides the structure for a remote login similar to Telnet, except that it utilizes more secure network services. SSH provides stronger password authentication than Telnet and uses encryption when transporting session data. AUX port: Another way to establish a CLI session remotely is via a telephone dialup connection
  • 21. Router configuration files 1 The startup configuration file 2 The running configuration file 1 The startup configuration file  The startup configuration file (startup-config) is used during system startup to configure the device.  The startup configuration file is stored in non-volatile RAM (NVRAM). Since NVRAM is non-volatile, when the Cisco device is turned off, the file remains intact.  The startup-config files are loaded into RAM each time
  • 22. Configuration files…(Cont’d) 2 The running configuration file  Once the startup configuration file is loaded into RAM, it is considered the running configuration or running-config.  The running configuration is modified when the network administrator performs device configuration.  Because the running configuration file is in RAM, it is lost if the power to the device is turned off or if the device is restarted.  Changes made to the running-config file will also be lost if they are not saved to the startup-config file
  • 24. Router boot-up process Step 1 2 3 4 locating and loading the Performing configurati Loading the Locating and Locating and on file the Power- bootstrap loading Cisco loading the On Self Test program IOS configuration (POST). file
  • 25. Router boot-up process…(Cont’d) Performing the Power-On Self Test (POST):  The Router Performs A POST which is a series of Hardware Test that verify whether all components of the device are functional. Loading the bootstrap program:  After the POST process, the router copies the bootstrap program from ROM into RAM.  The main purpose of the bootstrap program is to locate the Cisco IOS and load it into RAM. Locating and loading Cisco IOS:  The Bootstrap Attempts To Load The IOS From Flash.  Usually, the IOS is located in the flash memory, but it can also be stored in a TFTP server  If a full IOS image can not be located, a scaled-down version of the IOS is copied from ROM into RAM.
  • 26. Router boot-up process…(Cont’d) Locating and loading the configuration file: After the IOS is loaded, the bootstrap program searches for the startup configuration file (startup-config) in the NVRAM. If the file exists, it is copied into RAM as the running configuration file (running-config). if the file does not exists, the router may serach for a TFTP server. if the startup configuration file can not be located, the router prompts the user to enter setup mode. setup mode is a series of questions prompting the user for basic configurations information.  if the setup mode is not used, the IOS creates a default running-config. this file is a basic configuration file
  • 27. Block diagram of router boot-up process
  • 29. Router advantages and issues Advantages of router:  ability to share a network connection with multiple machines, which increases productivity.  Routers deliver the packets of data in an organized way, thus lowering the data load.  Routers enable a steady and reliable connection between network hosts.  Routers make use of alternative parts incase the main parts fail to transfer data packets Router issues:  Connections can become slow when multiple computers are using a network. This situation is described as "connection lag ".  A router basically allows multiple computers to share the same network, which means that the resources of the network are distributed among the machines, and they may run slower as a result.