Advanced Routing
Advanced Routing
Contents
Ver 12.1 1
1 Multicast Routing Protocols
Note: Multicast routing protocols can be configured and run only if licenses for component 3 (advanced
routing) is available
Multicasting is one source sending a packet to multiple destinations. Group formation and
management is an integral part of multicasting.
IP Class D Addresses: IP multicast addresses have been assigned to the IPv4 Class D
address space by IANA. The high-order four bits of a Class D address are 1110. Therefore,
host group addresses can be in the range 224.0.0.0 to 239.255.255.255. A multicast address
is chosen at the source (sender) for the receivers in a multicast group.
• IGMP is used between hosts on a LAN and the routers on that LAN to track the
multicast groups of which hosts are members.
• Protocol Independent Multicast (PIM) is used between routers so that they can
track which multicast packets to forward to each other and to their directly connected
LANs.
1.1 IGMP
1.1.1 Introduction
About Multicasting
Multicasting is a data delivery method where one sender sends data to thousands of recipients
across a routed network. Multicasting is controlled-broadcasting; the sender transmits data to
specific recipients only.
Ver 12.1 2
With IP multicasting, a host sends packets to a multicast group of hosts anywhere within the
IP network by using a special form of IP address called the IP multicast group address. A
multicast group is made of an arbitrary number of hosts who join a group to receive packets
from the source. To ensure that a host receives data, the host must join the multicast group to
which the sender is sending data.
Note: You can configure and simulate multicast routing protocols such as IGMP and PIM, only if you have
licenses for component 3 (advanced routing).
About IGMP
The Internet Group Management Protocol (IGMP) is a communication protocol that hosts and
adjacent multicast routers on IPv4 networks use, to establish and manage the membership of
hosts and routing devices in multicast groups. Hosts and multicast routers use IGMP as
follows:
• The hosts use IGMP to report their multicast group memberships to neighboring
multicast routers.
• The multicast routers use IGMP to know the members in multicast groups, for every
physical network the multicast router is connected.
The multicast routers maintain a list of multicast group memberships for every network
to which the multicast routers are connected, and a timer for each membership.
The messages that IGMP uses are encapsulated in IP datagrams, with an IP protocol number
of 2. All IGMP messages are sent with an IP TTL of 1 and contain the IP Router Alert option
in their IP header. All IGMP messages sent between a host and the multicast router use the
following format:
• Type: There are three types of IGMP messages that hosts and multicast routers
exchange, when they interact:
Ver 12.1 3
• General Query: The multicast router sends a General Query to all hosts to
collect and update multicast group membership information for the hosts on
all networks to which the multicast router is connected.
Version 2 Membership Report is a message that a host sends to all other hosts
in the group or all hosts on the network, in response to a General Query or a
Group-Specific Query message from the multicast router.
Hosts use the Leave Group message to tell the multicast router that they intend
to leave the group.
• Max Response Time: Maximum Response Time is a random-value delay timer which
a host sets, for the host to send a Version 2 Membership Report to other hosts in the
group, after the host receives a Group-Specific Query message.
• Checksum: The Checksum is the 16-bit one's complement of the one's complement
sum of the whole IGMP message (the entire IP payload).
• Group Address: The multicast router sets the Group Address to zero when it sends
a General Query and sets to the Group Address to the address of the multicast group
when it sends a Group-Specific Query.
If a router has multiple physical interfaces on a single network, IGMP runs only on one of
physical interfaces. Hosts, on the other hand, need to use all interfaces that have
memberships associated with them.
For every network the multicast router is connected to, the multicast router performs one of
the following roles: Querier or Non-Querier. There is normally only one Querier per physical
network.
Ver 12.1 4
At startup, all multicast routers start as a Querier on every network to which the multicast
routers are connected. If a multicast router hears a Query message from another multicast
router with a lower IP address, the first multicast router must perform the role of a Non-Querier
on the network which has the multicast router with a lower IP address. If a multicast router
does not hear a Query message from another multicast router for a time duration defined by
the Other Querier Present Interval, the multicast router persists with the role of the Querier.
Now, the multicast router sends one of the two Membership Query messages:
• General Query to all hosts to collect and update multicast group membership
information: The multicast router sends the General Query to the all-systems
multicast group (224.0.0.1), with a Group Address field set to 0, and with a Max
Response Time for the Query Response Interval.
When a host receives the General Query, the host sets the delay timers for every group
(excluding the all-systems group) to which the host belongs, on the interface on which
it received the query.
The host sets every timer to a different random value, by using the highest clock
granularity available on the host, and by choosing a value between 0 and the Max
Response Time. The Max Response Time is specified in the General Query packet.
When a host receives the Group-Specific Query, the host sets the delay timers for
every group to which the host belongs, on the interface on which it received the query.
The host sets every timer to a different random value by choosing a value between 0
and the Max Response Time. The Max Response Time is specified in the Group-
Specific Query packet.
If the delay timer for a group has started, the host resets the delay time to a random value only
if the requested Max Response Time is less than the time left in the active delay timer.
When a group's delay timer expires, the host multicasts a Version 2 Membership Report to
other hosts in the group, with an IP TTL of 1. If the host receives a Version 2 Membership
Ver 12.1 5
Report (version 1 or 2) from another host in the same group, when the host’s timer is active,
the host stops the timer for the group from which it received the report. The host also does
send a report to other hosts, to avoid duplicate reports and conserve the bandwidth on the
network.
When a multicast router receives a Version 2 Membership Report, it does the following:
• Adds the multicast group from which it received the Version 2 Membership Report, to
the list of multicast group memberships on the network on which it received the Version
2 Membership Report.
• Sets the timer for the membership to the Group Membership Interval.
• Refreshes the timer, when the multicast router receives another Version 2 Membership
Report from the same group.
If the multicast router does not receive any Version 2 Membership Reports from a multicast
group before the Group Membership Interval timer expires, the multicast router assumes that
the group has no members and that it need not forward multicast data for that group.
The multicast router may also receive an unsolicited Version 2 Membership Report from a
host when the hosts intends to join a multicast group.
This example explains how IGMP works to multicast data in interconnected networks.
• A subnet with 4 wired nodes, a multicast router, and a multicast application running
on one of the wired nodes.
• IGMP is running on all the wired nodes.
• IGMP is running on the multicast router.
• Only a few nodes receive multicast traffic.
Ver 12.1 6
• Leave Group message
• IGMP v1 compatibility
The following network diagram illustrates what the NetSim UI displays when you open
the example configuration file for IGMP.
1. See that by default, NetSim has enabled IGMP on the router, as follows:
a. Right-click the router and click Properties.
Ver 12.1 7
The Router pop-up window appears.
b. Click NETWORK LAYER in the left area.
c. IGMP_Status drop-down list is set to TRUE.
d. Click OK.
2. See that by default, NetSim has enabled IGMP on a node, as follows:
a. Right-click a wired node (say Wired_Node_2) and click Properties.
The Wired node pop-up window appears.
b. Click NETWORK LAYER in the left area.
c. IGMP_Status drop-down list is set to TRUE.
The Wired node pop-up window displays the following parameters you can
configure for IGMP, on the node:
The following image illustrates the wired node pop-up window and the
parameters you can configure for IGMP, on the node.
Ver 12.1 8
d. Click OK.
NetSim does not allow you to enter a value that is less than 2. If you enter a
value that is less than 2, NetSim resets the value to 2.
Ver 12.1 9
Fine-tune the Query_Interval(s) parameter to control the number of IGMP
messages on the subnet.
4. Repeat steps 3 on other nodes to see that NetSim has enabled IGMP and step 4 on
other nodes, if you to modify the IGMP parameters.
b. See that by default, NetSim has set the following properties for the multicast
application:
i. Application_Method = MULTICAST.
Ver 12.1 10
iv. Destination_ID = 3, 4, which means, Wired_Node_3 and
Wired_Node_4 nodes must receive multicast traffic from the multicast
application.
Note: You add more than one destination IDs, by separating two successive
numbers by a “,” (comma). The following image illustrates the properties of the
multicast application.
d. Click OK.
6. See that by default, NetSim has enabled the Packet Trace and Event Trace icons
located in the toolbar.
b. Enter a numerical value in the Simulation Time text box, say 50s.
Ver 12.1 11
c. Click OK.
1.1.3 Results
• Print the results that NetSim displays in the Simulation Results window.
• View the packet trace details in a .CSV file and save the .CSV file to your computer.
• View the event trace details in a .CSV file and save the .CSV file to your computer.
• Export the results that NetSim displays in the Simulation Results window, in a
spreadsheet.
• Close the Simulation Results window and return to your simulation.
NetSim also saves the last instance of your simulation for you to view, analyse, and
download the results.
Before you analyse the packet trace and event trace results, we recommend that you first
interpret how IGMP worked with the parameters you specified. So, you must first view the
simulation.
The details of the packet traversing in your network appear as table located below the
simulation window.
4. (Optional) To fine-tune the speed of the animation, use the Animation Speed slider
located on the toolbar.
Ver 12.1 12
i. Initially, all nodes (Wired_Node_2, 3, 4 and 5) receive the
IGMP_Memebership_Query message from Router_1.
iii. Router_1 makes an entry for the membership in its routing table.
When NetSim completes the simulation, the Simulation Results window appears.
Now that you have seen the simulation for IGMP, we will analyze the communication between
the nodes and the router.
1. On the Simulation Results window, click Open Packet Trace located in the left area.
Ver 12.1 13
A .CSV appears.
2. Open the .CSV file and filter the PACKET_ID column by 0 and 1.
Ver 12.1 14
IGMP Event Trace Analysis:
Now that you have seen the results of packet trace, we will analyze the event trace for this
IGMP simulation.
1. On the Simulation Results window, click Open Event Trace located in the left area.
A .CSV appears.
2. Open the .CSV file and filter the Event_Type column by NETWORK_OUT and
TIMER_EVENT.
a. IGMP_DelayTimer: This sub-event occurs when a node sets the delay timers
for every group (excluding the all-systems group) to which the node belongs,
on the interface on which it received the query, after the node receives a
General Query from the multicast router.
b. IGMP_GroupMembershipTimer: This sub-event occurs when the multicast
router refreshes the group membership interval timer, every time it receives a
membership report for a multicast group. If this timer expires, the multicast
router removes this group from the list of destinations for multicast traffic.
c. IGMP_SendQuery: This sub-event occurs when the multicast router
periodically (based on Query Interval) sends a Query message on every
network to which the multicast router is connected, to solicit multicast group
membership information.
Ver 12.1 15
d. IGMP_SendStartupQuery: This subevent occurs when the multicast router
sends the Startup query count to quickly and reliably determine the multicast
group membership information, at startup.
e. IGMP_UnsolicitedReportTimer: If the initial membership report is lost or
damaged, this timer repeats once or twice after short delays, after every
Unsolicited Report Interval.
f. JOIN_MULTICAST_GROUP: This sub-event occurs when a node sends the
join multicast group message, when the node decides to join a multicast
group on an interface.
In NetSim, a node joins a multicast group only after 5 seconds in to the simulation.
The following image illustrates that hosts join the multicast group after 5 seconds.
1.2 PIM
1.2.1 Introduction
PIM is termed protocol-independent because PIM does not include its own topology discovery
mechanism; PIM uses routing information available from other routing protocols such as
Enhanced Interior Gateway Routing Protocol (EIGRP), Open Shortest Path First (OSPF), and
static routes.
PIM also does not build its own routing tables. PIM uses the unicast routing table that IGP
creates, to create a loop free MDT and uses the unicast routing table to perform the reverse
path forwarding (RPF). Unlike other routing protocols, PIM does not send and receive routing
updates between routers.
Ver 12.1 16
In a PIM-enabled network, a Rendezvous Point (RP) router is the point where other routers in
the PIM protocol’s domain exchange information. All routers in the PIM protocol’s domain must
provide a mapping to the RP router. In a PIM enabled network, only the RP router knows the
active sources for the entire PIM protocol’s domain. The other routers just need to know how
to reach the RP router. This way, the RP router matches the receivers with the sources in the
PIM protocol’s domain.
The RP router is downstream from the source and forms one end of the Shortest Path Tree
(SPT). The RP router is upstream from the receiver and forms one end of the Rendezvous
Point Tree (RPT).
The following figure illustrates a PIM-enabled network with the routers, source node, and the
destination node.
Ver 12.1 17
Set PIM status as TRUE in all routers as shown below:
Configure the PIM properties as per the below screenshot and click on Add.
Ver 12.1 18
Then click on Accept
Configure the same PIM properties for all routers in the network
Application Properties:
Set the application properties as per the screenshot below – Multicast application with source
5 and destinations 6, 7, 8, 9, 10
Ver 12.1 19
Set IGMP_Status to TRUE in all wired nodes since we are running multicast application
Enable packet Trace and run simulation for 10s. Open Packet trace and filter PACKET_ID to
1. Users can observe there is no formation of loops between source and destinations.
Ver 12.1 20
2 Access Control Lists (ACLs)
2.1 Introduction
Access Control Lists or ACLs are filters that routers use to control which routing updates or
packets are permitted or denied in or out of a network. An ACL contains a sequential list of
“permit” or deny statements (rules) that apply to IP packets originating or destined to hosts, IP
addresses and upper-layer IP protocols.
An ACL tells the router what types of packets to: permit or deny. The router using the ACL
does the following when it finds packets inbound to or outbound from a network:
• If the router finds packets inbound or outbound categorized against the permit
statements, the router forwards the packets to the next hop in the network.
• If the router finds packets inbound or outbound categorized against the deny
statements, the router blocks and drops the packets at the router’s interface. The
packets cannot reach the intended destination host or IP address.
ACLs control traffic in one direction at a time, on an interface. To allow inbound and outbound
traffic from a host, IP address, or for a protocol, you must create two ACLs, one for each
direction, one for inbound and one for outbound traffic.
• A subnet with 3 wired nodes, a router, and 4 applications running on one of the wired
nodes.
• ACLs with both permit and deny rules are defined on the interfaces of the router.
• The direction of the ACL is set to both. This means the ACL applies to both inbound
and outbound traffic.
Ver 12.1 21
1. Open NetSim, Select Examples->Advanced-routing->ACL-Configuration as
shown below:
The following network diagram illustrates what the NetSim UI displays when you open the
example configuration file for ACL.
2. See that by default, NetSim has enabled ACL on the router, as follows:
a. Right-click the router and click Properties.
The Router pop-up window appears.
Ver 12.1 22
b. Click NETWORK LAYER in the left area.
c. ACL_Status drop-down list is set to Enable.
d. Click OK.
4. Set Transport Protocol to UDP in Application icon present in the top ribbon/toolbar
b. Enter a numerical value in the Simulation Time text box, say 10.
c. Click OK.
NetSim simulates ACL for the time you asked NetSim to run the simulation.
The throughput for first application is zero, since the ACL blocks OUTBOUND UDP traffic flow
in Router1 from Wired Node 2 to Wired Node 4
Ver 12.1 23
Note: If Device name is changed it has to be updated in both .txt file and GUI
• This file is loaded into GUI with text fields and contents
Ver 12.1 24
3 Virtual LAN (VLAN)
3.1 Introduction
VLAN is called as virtual local area network, used in Switches and it operates at layer2 and
Layer3. A VLAN, is a group of hosts which communicate as if they were attached to the same
broadcast domain, regardless of their physical location.
For example, all workstations and servers used by a particular workgroup team can be
connected to the same VLAN, regardless of their physical connections to the network or the
fact that they might be intermingled with other teams. VLANs have the same attributes as
physical LANs, but you can group end stations even if they are not physically located on the
same LAN segment.
A VLAN behaves just like a LAN in all respects but with additional flexibility. By using VLAN
technology, it is possible to subdivide a single physical switch into several logical switches.
VLANs are implemented by using the appropriate switch configuration commands to create
the VLANs and assign specific switch interfaces to the desired VLAN.
10
Switches implement VLANs by adding a VLAN tag to the Ethernet frames as they enter the
switch. The VLAN tag contains the VLAN ID and other information, which is determined by the
interface from which the frame enters the switch. The switch uses VLAN tags to ensure that
each Ethernet frame is confined to the VLAN to which it belongs based on the VLAN ID
contained in the VLAN tag. The VLAN tags are removed as the frames exit the switch on the
way to their destination.
Ver 12.1 25
Any port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded
and flooded only to end stations in that VLAN. Each VLAN is considered a logical network.
Packets destined for stations that do not belong to the VLAN must be forwarded through a
router. In the below screenshot, the stations in the development department are assigned to
one VLAN, the stations in the marketing department are assigned to another VLAN, and the
stations in the testing department are assigned to another VLAN.
VLAN 1
VLAN 2
VLAN 3
3.1.1.1 VLAN ID
Ver 12.1 26
VLANs are identified by a VLAN ID (a number between 0 – 4095), with the default VLAN on
any network being VLAN 2. Each port on a switch or router can be assigned to be a member
of a VLAN (i.e., to allow receiving and sending traffic on that VLAN).
For example: On a switch, traffic that is sent to a port that is a member of VLAN2, may be
forwarded to any other VLAN2 port on the switch, and it can also travel across a trunk port
(connections between switches) to another switch and forwarded to all VLAN2 ports on that
switch. Traffic will not be forwarded to ports that are on a different VLAN ID.
The links connecting the end devices are called access links. These are the links usually
carrying the Data VLAN information
The link between the switches is called trunk link. It carries packets from all the VLANs.
Ver 12.1 27
Access Link Access Link
Access Link
Trunk Link Access Link
Access link connection is the connection where switch port is connected with a device that
has a standardized Ethernet NIC. Standard NIC only understand IEEE 802.3 or Ethernet II
frames. Access link connection can only be assigned with single VLAN. That means all
devices connected to this port will be in same broadcast domain.
For example, twenty users are connected to a hub, and we connect that hub with an access
link port on switch, then all of these users belong to same VLAN. If we want to keep ten users
in another VLAN, then we need to plug in those ten users to another hub and then connect it
with another access link port on switch.
Trunk link connection is the connection where switch port is connected with a device that is
capable to understand multiple VLANs. Usually trunk link connection is used to connect two
switches. Trunking allows us to send or receive VLAN information across the network. To
support trunking, original Ethernet frame is modified to carry VLAN information.
Ver 12.1 28
Trunk Line Trunk Line
The following network diagram illustrates what the NetSim UI displays when you open the
example configuration file for Intra VLAN.
Ver 12.1 29
VLAN 2
VLAN 3
L2 Switch 1
Interface ID VLAN Status VLAN ID VLAN Port
Type
Ver 12.1 30
Then click Configure VLAN under VLAN_GUI parameter. The following window will open.
Now set the properties as shown below and after changing the properties click on Add button
to add it in the VLAN table
Similarly change the VLAN properties for Interface ID 2 and click on ADD
Ver 12.1 31
To add another VLAN click plus icon, after that add the VLAN properties for Interface ID 3
Set the VLAN ID’s for the L2_Switch Interface_1 as shown below:
Ver 12.1 32
Similarly set VLAN_ID as 2 for L2_Switch Interface_2 and VLAN_ID as 3 for L2_Switch
Interface_3
Throughput (Mbps)
Application 1 0.58
Application 2 0
The throughput for 2nd application is zero because the source and destination are in different
VLANs, thereby traffic flow or communication between 2 VLANs using Layer2 switch is not
possible. To overcome this problem, an L3 switch is used.
3.2.2 Inter-VLAN
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need
to communicate with hosts in another VLAN, the traffic must be routed between them. This is
known as Inter-VLAN routing. This can be possible by using L3 switch.
Layer 3 switch (also known as a multi-layer switch) is a multi-functional device that have the
same functionality like a layer 2 switch, but behaves like a router when necessary. It’s
Ver 12.1 33
generally faster than a router due to its hardware based routing functions, but it’s also more
expensive than a normal switch.
The following network diagram illustrates what the NetSim UI displays when you open the
example configuration file for Inter VLAN.
Ver 12.1 34
VLAN 2 VLAN 3
Create a network as per the above screenshot. Edit all the wired node properties shown
below:
Wired Node Wired Node Wired Node Wired Node Wired Node
Node 2 3 4 5 6
I/f1_Ethernet I/f1_Ethernet I/f1_Ethernet I/f1_Ethernet I/f1_Ethernet
L3 Switch 1
Interface ID VLAN Status VLAN ID VLAN Port
Type
Ver 12.1 35
Interface_2 TRUE 2 Access _Port
Ver 12.1 36
Run simulation for 10 seconds and observe the throughputs.
Throughput (Mbps)
Application 1 0.58
Application 2 0.58
Application 3 0.58
3.2.3 Trunking
Ver 12.1 37
The following network diagram illustrates what the NetSim UI displays when you open the
example configuration file for Access and Trunk links.
VLAN 2
VLAN 3
Create a network and edit the properties as per the above screenshot. Edit all the wired node
properties shown below:
Ver 12.1 38
Node Wired Node Wired Node Wired Node Wired Node
3 4 5 6
I/f1_Ethernet I/f1_Ethernet I/f1_Ethernet I/f1_Ethernet
Ver 12.1 39
L3 Switch 1
Interface ID VLAN Status VLAN ID VLAN Port
Type
L3 Switch 2
Interface ID VLAN Status VLAN ID VLAN Port
Type
Ver 12.1 40
Click on Configure VLAN in L3_Switch_1 and set the properties for VLAN 2 as per the
screenshot shown below
Ver 12.1 41
Go to L3_Switch_1 properties -> Network_Layer -> Configure Static Route IP
Set the properties in Static Route IP window as per the screenshot below and click on Add.
Click on Accept
Note: Set Transport Protocol to UDP in Application icon present in the top ribbon/toolbar
Throughput (Mbps)
Application 1 0.58
Application 2 0.58
The above results conclude that Trunking allows us to send or receive any VLAN information
across the network.
Ver 12.1 42
4 Public IP Address & NAT (Network
Address Translation)
4.1 Introduction
4.1.1 Public Address
A public IP address is assigned to every computer that connects to the Internet where
each IP is unique. Hence there cannot exist two computers with the same public IP address
all over the Internet. This addressing scheme makes it possible for the computers to “find each
other” online and exchange information. User has no control over the IP address (public) that
is assigned to the computer. The public IP address is assigned to the computer by the Internet
Service Provider as soon as the computer is connected to the Internet gateway.
An IP address is considered private if the IP number falls within one of the IP address ranges
reserved for private networks such as a Local Area Network (LAN). The Internet Assigned
Numbers Authority (IANA) has reserved the following three blocks of the IP address space for
private networks (local networks):
Private IP addresses are used for numbering the computers in a private network including
home, school and business LANs in airports and hotels which makes it possible for the
computers in the network to communicate with each other. For example, if a network A
consists of 30 computers each of them can be given an IP starting from 192.168.0.1 to
192.168.0.30.
Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers
outside the local network cannot connect directly to a device with a private IP. It is possible to
Ver 12.1 43
interconnect two private networks with the help of a router or a similar device that supports
Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP) then
each computer will have a private IP as well as a public IP. Private IP is used for
communication within the network whereas the public IP is used for communication over the
Internet.
A device that is configured with NAT will have at least one interface to the inside network and
one to the outside network. In a typical environment, NAT is configured at the exit device
between a stub domain (inside network) and the backbone. When a packet leaves the domain,
NAT translates the locally significant source address into a globally unique address. When a
packet enters the domain, NAT translates the globally unique destination address into a local
address. If more than one exit point exists, each NAT must have the same translation table.
NAT can be configured to advertise to the outside world only one address for the entire
network. This ability provides additional security by effectively hiding the entire internal
network behind that one address. If NAT cannot allocate an address because it has run out of
addresses, it drops the packet and sends an Internet Control Message Protocol (ICMP) host
unreachable packet to the destination.
Ver 12.1 44
192.168.0.2
192.168.0.3
192.168.0.1(Private IP address) 203.31.220.134 (Public IP)
Network
Internet
192.168.0.4
Network router
(Gateway)
192.168.0.5
NAT is secure since it hides network from the Internet. All communications from internal
private network are handled by the NAT device, which will ensure all the appropriate
translations are performed and provide a flawless connection between internal devices and
the Internet.
In the above figure, a simple network of 4 hosts and one router that connects this network to
the Internet. All hosts in the network have a private Class C IP Address, including the router's
private interface (192.168.0.1), while the public interface that's connected to the Internet has
a real IP Address (203.31.220.134). This is the IP address the Internet sees as all internal IP
addresses are hidden.
Ver 12.1 45
The following network diagram illustrates what the NetSim UI displays when you open the
example configuration file for NAT.
Ver 12.1 46
Wired node Properties:
8 10.0.0.3 255.0.0.0
Inside
9 10.0.0.4 255.0.0.0
I/F
10 172.16.0.2 255.255.0.0
11 172.16.0.3 255.255.0.0
12 172.16.0.4 255.255.0.0
Router Properties:
Ver 12.1 47
Enable Packet trace and run simulation for 100 seconds.
Source node 7 (10.0.0.2) wouldn’t know how to route to the destination and hence its default
gateway is Router 1 with interface IP (10.0.0.1). The first line in the above screenshot specifies
Ver 12.1 48
packet flow from Source Node 7 to L2 Switch 5 with SOURCE_IP (10.0.0.2),
DESTINATION_IP (10.0.0.1), GATEWAY_IP (10.0.0.2) and NEXT_HOP_IP (10.0.0.1). Since
Switch is Layer2 device there is no change in the IPs in second line. Third line specifies the
packet flow from Router 1 to Router 2 with SOURCE_IP (10.0.0.2), DESTINATION_IP
(13.1.1.1- IP of the router connected to destination. Since OSPF is running, the router is looks
up the route to its destination from routing table), GATEWAY_IP (11.1.1.1) and
NEXT_HOP_IP (11.1.1.2) and so on.
5 Reference Documents
1. IEEE802.1Q for Virtual LAN
2. IETF 7761 for Protocol Independent Multicast – Sparse Mode (PIM-SM)
3. RFC 2236 for Internet Group Management Protocol, Version 2
6 Latest FAQs
https://tetcos.freshdesk.com/support/solutions/folders/14000113123
Ver 12.1 49