SlideShare a Scribd company logo
CCNA Guide to Cisco Networking Fundamentals  Chapter 8 Advanced Routing Protocols
Objectives Describe classful and classless routing protocols Describe and configure RIPv2 Describe and configure EIGRP Describe and configure OSPF Control routing traffic CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols Classful routing protocols Summarize networks to their major network boundaries (Class A, B, or C) Do not carry subnet mask information in their routing table updates Cannot be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM) Examples: RIPv1 and IGRP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) Classless routing protocols Allow dynamic routing in discontiguous networks Carry subnet mask information in the routing table updates Examples: RIPv2, EIGRP, OSPF, and BGP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 RIPv2 is a set of extensions to RIPv1 Still a distance-vector routing protocol that uses the normal measures of hold-down timers and split horizon to prevent routing loops Suffers from RIPv1’s major drawback The major change from RIPv1 is RIPv2’s ability to carry subnet mask information RIPv2 multicasts its updates using the multicast address of 224.0.0.9 RIPv2 provides a way to authenticate routing peers to provide enhanced security to a network CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 (continued) Another enhancement of RIPv2: ability to authenticate routing peers Configuring RIPv2 authentication requires the following steps: Define a key chain Define keys in the key chain Enable authentication on the interface by specifying the key chain to be used Enable either clear text or MD5 authentication Manage the keys (optional key lifetimes) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol (EIGRP) A Cisco proprietary classless protocol designed to overcome the limitations found in IGRP Still a distance-vector routing protocol at its core Protocol Dependent Modules (PDMs) Allow EIGRP to carry multiple routed protocols within their own native packet formats EIGRP uses nonperiodic, partial, and bounded routing table updates CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Enhanced Interior Gateway Routing Protocol (continued) EIGRP makes use of a composite metric comprised of six different factors: Hops, Load, Bandwidth, Reliability, Delay, MTU By default, the formula used for metric calculation in EIGRP is: Metric = [(K1*Bandwidth + (K2*Bandwidth)/(256-load) + K3*Delay)*K5/(reliability + K4)]*256 CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components Protocol Dependent Modules (PDM) Allow EIGRP to support multiple Network layer routed protocols Neighbor discovery and maintenance Allow EIGRP to discover neighbors and keep track of their status EIGRP must be able to keep updates bounded, sent only to those peers that need the information EIGRP must build a neighbor table of directly connected peers CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) Reliable Transport Protocol (RTP) Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types Instead, Cisco developed an entirely new layer 4 protocol RTP can actually provide both reliable and unreliable delivery Routing table updates are an example of an EIGRP packet type that uses reliable multicast via RTP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) Diffusing Update Algorithm (DUAL) The heart and soul of EIGRP Allows EIGRP to quickly recover from a link outage and route around network problems Key terms associated with DUAL Successor Feasible distance (FD) Reported distance (RD) Feasible successor Feasibility condition Adjacency CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) DUAL uses the EIGRP topology table to track the status of all links in a network The EIGRP topology table contains information about all the networks a router can reach The  show ip eigrp topology  command Displays information garnered from the DUAL process CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Configuration EIGRP configuration is nearly identical to IGRP configuration EIGRP is classless However, it summarizes to classful network boundaries by default The  no auto-summary  command turns off this default behavior Highly recommended to use the  bandwidth  command to set the actual bandwidth on serial links CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Configuration (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
EIGRP Configuration (continued) EIGRP supports optional authentication of routing peers Configuring EIGRP authentication requires the following steps: Define a key chain Define keys in the key chain Enable authentication on the interface by specifying the key chain to be used Manage the keys (optional key lifetimes) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Open Shortest Path First Open Shortest Path First (OSPF) An open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication Link-state routing protocols allow routers to share a common view of the entire network Each router sends out link-state advertisements (LSAs) describing its attached links to all routers in an area Each router needs to hold a topological database of the entire area CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Open Shortest Path First (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Open Shortest Path First (continued) OSPF is ideally suited for large networks Uses a concept known as areas to bound link-state advertisements An  area  is the portion of a network within which LSAs are contained All OSPF routers configured with the same area identification will accept LSAs from one another CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts Link A router’s interface Link-state The status of a link on a router Area Defines the confines within which LSAs are contained Cost The default metric for OSPF CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) Adjacencies database Contains information about all OSPF peers with which a router has successfully exchanged Hello packets Topological database Holds the common view of the network formed from the link-state advertisements that are received Designated routers (DRs) Backup designated routers (BDRs) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Operation Steps An OSPF router forms adjacencies with neighbors A DR and BDR are elected in OSPF Routers will flood their link-state advertisements and go through the process of selecting the best route to each network OSPF uses  Dijkstra’s Shortest Path First  algorithm   to find the best path Each router sees itself as the central point from which a loop-free, best-cost path to each network is determined CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Single-Area OSPF Configuration OSPF offers a huge number of configuration options Including multiple areas of different types CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Single-Area OSPF Configuration (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Authentication Routing update authentication is a basic security requirement for all modern routing protocols OSPF provides authentication of routing table updates via several methods No authentication (the default) Authentication with passwords sent in clear text Authentication using MD5 hashing of a shared secret key CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Authentication (continued) To perform MD5 authentication of routing updates in OSPF, two steps must be completed: Configuration of authentication keys on each OSPF interface Configuration of area authentication CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
OSPF Authentication (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Controlling Route Traffic passive-interface  command An important entry-level command for controlling route traffic Disrupts the function of EIGRP and OSPF The command causes a router to listen only on the passive interface Therefore, if used with EIGRP or OSPF, the router will not send Hellos out the interface The result is a link that is seen as having no neighbors on it Therefore, it will not be used to form adjacencies CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Controlling Route Traffic (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Summary Large, complex internetworks using variable-length subnet masks require routing protocols that can handle the task RIPv2 is a classless routing protocol built as an extension to RIPv1 EIGRP is a Cisco proprietary protocol designed to incorporate some of the features of link-state routing protocols The open standards protocol OSPF is the link-state protocol of choice in many networks CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
Ad

More Related Content

What's hot (20)

MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Ccna notes
Ccna notesCcna notes
Ccna notes
Ramesh Kumar
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
Reetesh Gupta
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
Devang Doshi
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
Manoj Gharate
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
Kashif Latif
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
MohamedJafar5
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
Ajaigururaj R
 
Bgp
BgpBgp
Bgp
Febrian ‎
 
Static Routing
Static RoutingStatic Routing
Static Routing
Kishore Kumar
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
Martin Bratina
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
Jothi Lakshmi
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
Mukesh Gautam
 
Rip presentation
Rip presentationRip presentation
Rip presentation
Ebrahim AlRahawe
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
Alan Mark
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
Manoj Gharate
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
Kashif Latif
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 

Viewers also liked (20)

CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
Aisu
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
Vuz Dở Hơi
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
Aisu
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
Vuz Dở Hơi
 
Ad

Similar to CCNA Advanced Routing Protocols (20)

CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
Chaing Ravuth
 
ENARSI_Chapter_2 in PPTX format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understandENARSI_Chapter_2 in PPTX format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understand
2023125673
 
ENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PDF format easy to understandENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PDF format easy to understand
2023125673
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
Chaing Ravuth
 
Ospf
OspfOspf
Ospf
Joshua Fonseca
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Đồng Quốc Vương
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
Chaing Ravuth
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
Vuz Dở Hơi
 
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptxRS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
FutureTechnologies3
 
MPLS-based Layer 3 VPNs.pdf
MPLS-based Layer 3 VPNs.pdfMPLS-based Layer 3 VPNs.pdf
MPLS-based Layer 3 VPNs.pdf
Huynh MVT
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
aryan532920
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
teknetir
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
Vuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_finalKPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_final
Fisal Anwari
 
Ccna new syllabus
Ccna new syllabusCcna new syllabus
Ccna new syllabus
thetechnicalzone
 
Routing in Internet Protocol networks.ppt
Routing in Internet Protocol networks.pptRouting in Internet Protocol networks.ppt
Routing in Internet Protocol networks.ppt
ShahidMehmood285010
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
ENARSI_Chapter_2 in PPTX format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understandENARSI_Chapter_2 in PPTX format easy to understand
ENARSI_Chapter_2 in PPTX format easy to understand
2023125673
 
ENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PDF format easy to understandENARSI_Chapter_2 in PDF format easy to understand
ENARSI_Chapter_2 in PDF format easy to understand
2023125673
 
CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6CCNA3 Verson6 Chapter6
CCNA3 Verson6 Chapter6
Chaing Ravuth
 
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014Ccnav5.org ccna 3-v50_practice_final_exam_2014
Ccnav5.org ccna 3-v50_practice_final_exam_2014
Đồng Quốc Vương
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
Vuz Dở Hơi
 
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptxRS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
RS_InstructorPPT_Chapter7RS_InstructorPPT_Chapter7.pptx
FutureTechnologies3
 
MPLS-based Layer 3 VPNs.pdf
MPLS-based Layer 3 VPNs.pdfMPLS-based Layer 3 VPNs.pdf
MPLS-based Layer 3 VPNs.pdf
Huynh MVT
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
aryan532920
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
teknetir
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
Vuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_finalKPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_final
Fisal Anwari
 
Routing in Internet Protocol networks.ppt
Routing in Internet Protocol networks.pptRouting in Internet Protocol networks.ppt
Routing in Internet Protocol networks.ppt
ShahidMehmood285010
 
CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3CCNA2 Verson6 Chapter3
CCNA2 Verson6 Chapter3
Chaing Ravuth
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 
Ad

More from Dsunte Wilson (18)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
Dsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
Dsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
Dsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
Dsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 

Recently uploaded (20)

AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdfAre Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Are Cloud PBX Providers in India Reliable for Small Businesses (1).pdf
Telecoms Supermarket
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Vaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without HallucinationsVaibhav Gupta BAML: AI work flows without Hallucinations
Vaibhav Gupta BAML: AI work flows without Hallucinations
john409870
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Build 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHSBuild 3D Animated Safety Induction - Tech EHS
Build 3D Animated Safety Induction - Tech EHS
TECH EHS Solution
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 

CCNA Advanced Routing Protocols

  • 1. CCNA Guide to Cisco Networking Fundamentals Chapter 8 Advanced Routing Protocols
  • 2. Objectives Describe classful and classless routing protocols Describe and configure RIPv2 Describe and configure EIGRP Describe and configure OSPF Control routing traffic CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 3. Classful and Classless Routing Protocols Classful routing protocols Summarize networks to their major network boundaries (Class A, B, or C) Do not carry subnet mask information in their routing table updates Cannot be used in networks with either discontiguous subnets or networks using variable length subnet masks (VLSM) Examples: RIPv1 and IGRP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 4. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 5. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 6. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 7. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 8. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 9. Classful and Classless Routing Protocols (continued) Classless routing protocols Allow dynamic routing in discontiguous networks Carry subnet mask information in the routing table updates Examples: RIPv2, EIGRP, OSPF, and BGP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 10. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 11. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 12. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 13. Classful and Classless Routing Protocols (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 14. Routing Information Protocol version 2 RIPv2 is a set of extensions to RIPv1 Still a distance-vector routing protocol that uses the normal measures of hold-down timers and split horizon to prevent routing loops Suffers from RIPv1’s major drawback The major change from RIPv1 is RIPv2’s ability to carry subnet mask information RIPv2 multicasts its updates using the multicast address of 224.0.0.9 RIPv2 provides a way to authenticate routing peers to provide enhanced security to a network CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 15. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 16. Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 17. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 18. Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 19. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 20. Routing Information Protocol version 2 (continued) Another enhancement of RIPv2: ability to authenticate routing peers Configuring RIPv2 authentication requires the following steps: Define a key chain Define keys in the key chain Enable authentication on the interface by specifying the key chain to be used Enable either clear text or MD5 authentication Manage the keys (optional key lifetimes) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 21. Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 22. Routing Information Protocol version 2 (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 23. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 24. Enhanced Interior Gateway Routing Protocol Enhanced Interior Gateway Routing Protocol (EIGRP) A Cisco proprietary classless protocol designed to overcome the limitations found in IGRP Still a distance-vector routing protocol at its core Protocol Dependent Modules (PDMs) Allow EIGRP to carry multiple routed protocols within their own native packet formats EIGRP uses nonperiodic, partial, and bounded routing table updates CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 25. Enhanced Interior Gateway Routing Protocol (continued) EIGRP makes use of a composite metric comprised of six different factors: Hops, Load, Bandwidth, Reliability, Delay, MTU By default, the formula used for metric calculation in EIGRP is: Metric = [(K1*Bandwidth + (K2*Bandwidth)/(256-load) + K3*Delay)*K5/(reliability + K4)]*256 CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 26. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 27. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 28. EIGRP Components Protocol Dependent Modules (PDM) Allow EIGRP to support multiple Network layer routed protocols Neighbor discovery and maintenance Allow EIGRP to discover neighbors and keep track of their status EIGRP must be able to keep updates bounded, sent only to those peers that need the information EIGRP must build a neighbor table of directly connected peers CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 29. EIGRP Components (continued) Reliable Transport Protocol (RTP) Because EIGRP is protocol-independent, it cannot use existing Transport layer protocols to carry its various packet types Instead, Cisco developed an entirely new layer 4 protocol RTP can actually provide both reliable and unreliable delivery Routing table updates are an example of an EIGRP packet type that uses reliable multicast via RTP CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 30. EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 31. EIGRP Components (continued) Diffusing Update Algorithm (DUAL) The heart and soul of EIGRP Allows EIGRP to quickly recover from a link outage and route around network problems Key terms associated with DUAL Successor Feasible distance (FD) Reported distance (RD) Feasible successor Feasibility condition Adjacency CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 32. EIGRP Components (continued) DUAL uses the EIGRP topology table to track the status of all links in a network The EIGRP topology table contains information about all the networks a router can reach The show ip eigrp topology command Displays information garnered from the DUAL process CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 33. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 34. EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 35. EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 36. EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 37. EIGRP Components (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 38. EIGRP Configuration EIGRP configuration is nearly identical to IGRP configuration EIGRP is classless However, it summarizes to classful network boundaries by default The no auto-summary command turns off this default behavior Highly recommended to use the bandwidth command to set the actual bandwidth on serial links CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 39. EIGRP Configuration (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 40. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 41. EIGRP Configuration (continued) EIGRP supports optional authentication of routing peers Configuring EIGRP authentication requires the following steps: Define a key chain Define keys in the key chain Enable authentication on the interface by specifying the key chain to be used Manage the keys (optional key lifetimes) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 42. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 43. Open Shortest Path First Open Shortest Path First (OSPF) An open standards, link-state routing protocol that supports classless routing, variable-length subnet masks, and authentication Link-state routing protocols allow routers to share a common view of the entire network Each router sends out link-state advertisements (LSAs) describing its attached links to all routers in an area Each router needs to hold a topological database of the entire area CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 44. Open Shortest Path First (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 45. Open Shortest Path First (continued) OSPF is ideally suited for large networks Uses a concept known as areas to bound link-state advertisements An area is the portion of a network within which LSAs are contained All OSPF routers configured with the same area identification will accept LSAs from one another CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 46. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 47. OSPF Concepts Link A router’s interface Link-state The status of a link on a router Area Defines the confines within which LSAs are contained Cost The default metric for OSPF CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 48. OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 49. OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 50. OSPF Concepts (continued) Adjacencies database Contains information about all OSPF peers with which a router has successfully exchanged Hello packets Topological database Holds the common view of the network formed from the link-state advertisements that are received Designated routers (DRs) Backup designated routers (BDRs) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 51. OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 52. OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 53. OSPF Concepts (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 54. OSPF Operation Steps An OSPF router forms adjacencies with neighbors A DR and BDR are elected in OSPF Routers will flood their link-state advertisements and go through the process of selecting the best route to each network OSPF uses Dijkstra’s Shortest Path First algorithm to find the best path Each router sees itself as the central point from which a loop-free, best-cost path to each network is determined CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 55. OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 56. OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 57. OSPF Operation (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 58. Single-Area OSPF Configuration OSPF offers a huge number of configuration options Including multiple areas of different types CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 59. Single-Area OSPF Configuration (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 60. OSPF Authentication Routing update authentication is a basic security requirement for all modern routing protocols OSPF provides authentication of routing table updates via several methods No authentication (the default) Authentication with passwords sent in clear text Authentication using MD5 hashing of a shared secret key CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 61. OSPF Authentication (continued) To perform MD5 authentication of routing updates in OSPF, two steps must be completed: Configuration of authentication keys on each OSPF interface Configuration of area authentication CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 62. OSPF Authentication (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 63. CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 64. Controlling Route Traffic passive-interface command An important entry-level command for controlling route traffic Disrupts the function of EIGRP and OSPF The command causes a router to listen only on the passive interface Therefore, if used with EIGRP or OSPF, the router will not send Hellos out the interface The result is a link that is seen as having no neighbors on it Therefore, it will not be used to form adjacencies CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 65. Controlling Route Traffic (continued) CCNA Guide to Cisco Networking Fundamentals, Fourth Edition
  • 66. Summary Large, complex internetworks using variable-length subnet masks require routing protocols that can handle the task RIPv2 is a classless routing protocol built as an extension to RIPv1 EIGRP is a Cisco proprietary protocol designed to incorporate some of the features of link-state routing protocols The open standards protocol OSPF is the link-state protocol of choice in many networks CCNA Guide to Cisco Networking Fundamentals, Fourth Edition