Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Abstract – Routing Information Protocol version 2 adjacent routers at the address 224.0.0.9, as opposed to
(RIPv2) is one of the most common and easiest routing RIPv1 which uses broadcast.
protocols to configure. This paper discusses the steps
taken to implement this protocol to create a network In addition, RIPv2 automatically summarizes networks
design for Asia Pacific College. The group utilized a at major network boundaries by default. When automatic
hybrid topology and used a class B network with a summarization has been disabled, RIPv2 no longer
main network address of 172.16.0.0/16. summarizes networks to their classful address ate
boundary routers. RIP v2 also allows more information
Key words: RIPv2, VLSM, Subnet Mask carried in RIP update packets, such as support for Route
summarization, Classless interdomain routing (CIDR),
I. INTRODUCTION Variable-length subnet masks (VLSMs), Autonomous
systems and the use of redistribution, and Multicast
Routing Information Protocol (RIP) is a classic address 224.0.0.9 for RIP advertisements.
distance vector Interior Gateway Protocol (IGP) designed
to interchange network topology information within an II. BACKGROUND OF THE STUDY
autonomous system (AS) of a small network. According
to Netgear, this works with a router running RIP sends the A. Star-Ring Topology
contents of its routing table to each of its adjacent routers
every 30 seconds. When a route is removed from the
routing table, it is flagged as unusable by the receiving
routers after 180 seconds, and removed from their tables
after an additional 120 seconds [1]. The maximum
number of hops allowed for RIP is 15. This hop limit,
however, also limits the size of networks that RIP can
support. In 1993, Routing Information Protocol version 2
(RIPv2) was developed due to the deficiencies of the
original RIP and standardized in 1998. RIPv2 is actually
an enhancement of RIPv1's features and extensions rather
than an entirely new protocol [2]. Fig. 1 Star-Ring Topology
Moreover, RIPv2 has the ability to carry subnet A star-ring topology is a hybrid topology that combines
information. It multicasts the entire routing table to all the star and ring configurations. This topology was
designed as a reliable and practical topology. In star-ring ● Network IP addressing through empty subnet
topology, the computers are connected to a central filling
component as in a star network. These components, ● Greater efficiency than fixed-length subnet
however, are wired to form a ring network. Moreover, masks (FLSM)
only one cable connects each node to central ring hub ● Streamlined routing, where a router functions
called MAU (Multistation Access Unit). The hub only with a VLSM sequence, versus a full IP
provides two basic functions. First, it checks if the node is address
answering. The hub creates a bypass so that the loop is
not interrupted and the network does not collapse in case C. Subnetting
of a node failure. Lastly, it provides a bridge to other
rings and supports interconnection of several ring This is the process wherein it divides a single network
topologies. into multiple networks. It is done by converting host's
bits into network's bits. It can also be done by three (3)
The star-ring topology is physically a star but data are ways: Requirement of network, Requirement of hosts,
logically transmitted from one node to the other in a and Cisco/ Notation [5].
circle. When it comes to actual implementation, Star-ring
topology is often built using twisted pairs, both shielded Advantages of Subnetting:
and unshielded. [6] ● Reduced network traffic
● Optimized network management
B. Variable Length Subnet Mask ● Simplified network management
Variable Length Subnet Mask is also known as a The following are the steps in subnetting:
classless Internet Protocol (IP) address.This is defined as Step 1: Determine the number of subnets needed
a numerical masking sequence, or IP address subset, Step 2: Determine the number of bits you can borrow
based on overall network requirements. A VLSM allows a For Class B addresses, you have 16 host ID bits, but you
network administrator to use long masks for networks must have a minimum of two host bits; therefore, you can
with few hosts and short masks for networks with borrow 14 bits.
multiple hosts. A VLSM is used with a VLSM router and Step 3: Determine the number of bits you must borrow to
must have routing protocol support. Also, VLSMs are get needed number of subnets
used by a variety of network systems and services, Step 4: Turning On Borrowed Bits and Determining
including IS-IS, BGP, EIGRP, and OSPF [3]. Decimal Value
Step 5: Determining New Subnet Mask
VLSM provides many benefits for real networks, Step 6: Finding Host/Subnet Variable
mainly related to how you allocate and use your IP Step 7: Determining Range of Addresses
address space. Because a mask defines the size of the
subnet, VLSM allows engineers to better match the need D. Classless Inter-Domain Routing
for addresses with the size of the subnet. This flexibility
reduces the number of wasted IP addresses in each subnet. Classless Inter-Domain Routing is developed to slow
By wasting fewer addresses, more space remains to the exhaustion of IP addresses. It is based on assigning IP
allocate more subnets. addresses on criteria other than octet boundaries. CIDR
addressing method allows the use of a prefix to
VLSM can be helpful for both public and private IP designated the number of network bits in the mask. The
addresses, but the benefits are more dramatic with public prefix can be longer than the default subnet mask or it can
networks. With public networks, the address savings help be shorter than the default mask [5].
engineers avoid having to obtain another registered IP
network number from regional IP address assignment E. Route Summarization
authorities. With private networks, as defined in RFC
1918, running out of addresses is not as big a negative, Route Summarization is also known as route
because you can always grab another private network aggregation or supernetting. It allows many IP subnets to
from RFC 1918 if you run out [4]. be advertised as one whereas it reduces the number of
entries in the router's routing table. Also, this
The following are the key features of the VLSM: summarizes a group of subnets. With that, count the
● Simple network configuration number of bits that are common to all of the networks you
want to advertise. Then, use the prefix that identifies the variety of electrical interfaces when used with the
number of common bits [5]. appropriate transition cable. Two cables are required to
support the two ports on the WIC. Each port on a WIC is
a different physical interface and can support different
III. METHODOLOGY protocols such as Point-to-Point protocol (PPP) or Frame
Relay and Data Terminal Equipment/Data
The first thing to do in creating the design is to Communications Equipment (DTE/DCE).
determine the required number of routers and hosts for Server: Generic Server-PT
the network. The next step is to organize the routers. The
group chose to categorize them by department for easier Computer IP Addresses (All Departments)
determination of network priority. One of the most
important parts of the process is subnetting the network,
where the IP Address must be identified based on the total
number of required hosts, and for this project, a class B
network with a main network address of 172.16.0.0/16
was used. Once this is done, setting up the network
topology can now take place. The star-ring topology was
utilized for redundancy purposes, where there is a central
router (for the star portion) in which all the department
routers are directly connected to it, including the servers.
The ring portion connects the department routers to their
immediate neighboring routers, resulting in numerous
alternative paths for the information to travel in case a
router fails.
A. Group Assignment
General Code:
Running Configuration:
IV. RESULTS AND DISCUSSION
REFERENCES