RIP with DHCP configuration | ICSS Student | Swastick Raj Chatterjee

RIP with DHCP configuration

RIP (Routing Information Protocol) defines a way for routers, which connect networks using the Internet Protocol (IP), to share information about how to route traffic among networks.

RIP is classified by the Internet Engineering Task Force (IETF) as an Interior Gateway Protocol (IGP), one of several protocols for routers moving traffic around within a larger autonomous system network.

RIP with DHCP configuration project done by ICSS student Swastick Raj Chatterjee. Here discussed the process below of the configuration.


Project NameRIP with DHCP configuration

Author NameSwastick Raj Chatterjee

Publish Date:  27-06-2018


Before starting the configuration Let’s discuss about RIP

The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from source to destination. The largest number of hops allowed for RIP is 15, which limits the size of networks that RIP can support. RIP is a Distance Vector.

RIPv1/2 – Route cost is calculated on Hop Counts. On the basis of subnet mask advertisements Classful – RIPv1 – Protocol can only work with Fixed Length Subnet Mask (FLSM) Auto Summarizes classless subnets. Classless – Ripv2, OSPF, EIGRP, BGP – Protocol can work with both FLSM and VLSM (Variable Length Subnet Mask). No auto summarization for classless subnets.


STEPS ARE GIVEN BELOW to make this configuration

Draw the model as per the requirements of the configuration in step 1.








We will create 4 types of configuration for each router in 2nd step.  4 types of configuration are mentioned below:


-1st type of configuration is fast Ethernet port configuration;

-2nd type of configuration is serial port configuration;

-3rd type of configuration is IP DHCP configuration; and

-4th type of configuration is RIP configuration.


Now Let’s start with the 1st router which is known as ROUTER 0


Router 0


Router 0


Router 0




Now check whether the DHCP request successfully came or not in the first router;





Now come to the second router configuration which is known as ROUTER 1


Router 1


Router 1


Router 1


Router 1


Check whether the DHCP request successfully came or not to make sure for the corrections of the configuration;




Third router configuration described below by the snapshot. Third router known as ROUTER 2.


Router 2



Router 2



Router 2



Router 2


Now make sure the DHCP request has came.


DHCP configuration


In the last step of the configuration I have shown by the snapshot of packet sending from one laptop to another laptop and the packet sending result should be in a successful mode.

User can confirm that the configuration has created in a right way by showing the successful packet sending confirmation message.


Last Step


See the full Configuration:






Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Ethical Hacking Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Certified Ethical Hacker Training in Hyderabad

Ethical Hacking Training in Hyderabad

Python Training in Bangalore

Python Training in Hyderabad

Python Training in Bhubaneswar

Microsoft Azure Training in Hyderabad

Microsoft Azure Training in Bangalore

Microsoft Azure Training in Bhubaneswar

Networking Training in Bangalore

Networking Training in Hyderabad

Networking Training in Bhubaneswar

Advance Python Training in Hyderabad

Advance Python Training in Bangalore

Advance Python Training in Bhubaneswar

Amazon Web Services Training in Hyderabad

Amazon Web Services Training in Bangalore

Amazon Web Services Training in Bhubaneswar

Certified Ethical Hacker Certification – C | EH v10

Computer Forensic Training in Kolkata

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Testing training

Ethical Hacking  training

Internet Of Things Training

Internet Of Things Training Hyderabad

Embedded System Training

Digital Marketing Training

Machine Learning Training

Python Programming training

Android Training in Bangalore

Android Training in Hyderabad

Android Training in Bhubaneswar

Diploma in Network Security Training

Android Development  training

Secured Coding in Java

Certified Network Penetration Tester 

Diploma in Web Application Security 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

Reverse Engineering Training  

Amazon Web Services Training  

VMware Training 


Cybersecurity services that can protect your company:

Web Security | Web Penetration Testing

Network Penetration Testing – NPT

Android App Penetration Testing

Source Web Development

Source Code Review

Android App Development

Digital Marketing Consultancy

Data Recovery


Other Location for Online Courses: