Enviar pesquisa
Carregar
1
•
Transferir como PPT, PDF
•
1 gostou
•
591 visualizações
Wael Walid
Seguir
Tecnologia
Educação
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 83
Baixar agora
Recomendados
Exploration routing chapter_6
Exploration routing chapter_6
Joshua Torres
Exploration routing chapter_9
Exploration routing chapter_9
Joshua Torres
Exploration routing chapter_10
Exploration routing chapter_10
Joshua Torres
Exploration routing chapter_7
Exploration routing chapter_7
Joshua Torres
Exploration routing chapter_4
Exploration routing chapter_4
Joshua Torres
Exploration routing chapter_11
Exploration routing chapter_11
Joshua Torres
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Irsandi Hasan
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
Irsandi Hasan
Recomendados
Exploration routing chapter_6
Exploration routing chapter_6
Joshua Torres
Exploration routing chapter_9
Exploration routing chapter_9
Joshua Torres
Exploration routing chapter_10
Exploration routing chapter_10
Joshua Torres
Exploration routing chapter_7
Exploration routing chapter_7
Joshua Torres
Exploration routing chapter_4
Exploration routing chapter_4
Joshua Torres
Exploration routing chapter_11
Exploration routing chapter_11
Joshua Torres
CCNA Exploration 2 - Chapter 6
CCNA Exploration 2 - Chapter 6
Irsandi Hasan
CCNA Exploration 2 - Chapter 10
CCNA Exploration 2 - Chapter 10
Irsandi Hasan
Exploration routing chapter_5
Exploration routing chapter_5
Joshua Torres
Exploration routing chapter_3
Exploration routing chapter_3
Joshua Torres
Exploration routing chapter_8
Exploration routing chapter_8
Joshua Torres
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
Irsandi Hasan
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
Irsandi Hasan
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
ip v6
ip v6
Sachii Dosti
Ethernet
Ethernet
Sachii Dosti
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
Sachii Dosti
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
Exploration routing chapter_1
Exploration routing chapter_1
Joshua Torres
100822 the pharisee and the tax collector luke 18 9-14
100822 the pharisee and the tax collector luke 18 9-14
Palm Desert Church of Christ
The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)
Mark Wickersham
Mais conteúdo relacionado
Mais procurados
Exploration routing chapter_5
Exploration routing chapter_5
Joshua Torres
Exploration routing chapter_3
Exploration routing chapter_3
Joshua Torres
Exploration routing chapter_8
Exploration routing chapter_8
Joshua Torres
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
Irsandi Hasan
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
Irsandi Hasan
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
Irsandi Hasan
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
Irsandi Hasan
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
Nil Menon
ip v6
ip v6
Sachii Dosti
Ethernet
Ethernet
Sachii Dosti
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Irsandi Hasan
Exploration routing chapter_2
Exploration routing chapter_2
Joshua Torres
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Irsandi Hasan
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
Sachii Dosti
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Nil Menon
Exploration routing chapter 4
Exploration routing chapter 4
Sachii Dosti
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Irsandi Hasan
Exploration routing chapter_1
Exploration routing chapter_1
Joshua Torres
Mais procurados
(20)
Exploration routing chapter_5
Exploration routing chapter_5
Exploration routing chapter_3
Exploration routing chapter_3
Exploration routing chapter_8
Exploration routing chapter_8
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 9
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 8
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 5
CCNA Exploration 2 - Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
ip v6
ip v6
Ethernet
Ethernet
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
Exploration routing chapter_2
Exploration routing chapter_2
CCNA Exploration 2 - Chapter 1
CCNA Exploration 2 - Chapter 1
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
Exploration routing chapter 4
Exploration routing chapter 4
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
Exploration routing chapter_1
Exploration routing chapter_1
Destaque
100822 the pharisee and the tax collector luke 18 9-14
100822 the pharisee and the tax collector luke 18 9-14
Palm Desert Church of Christ
The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)
Mark Wickersham
13. eigrp and ospf
13. eigrp and ospf
Swarndeep Singh
The parable of the sower
The parable of the sower
Lilian Po
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
sushmil123
CCNA/Networking
CCNA/Networking
Nettech India Thane @ 9870803004/5
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
Mark Wickersham
The Prodigal Son
The Prodigal Son
Vernetta
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching IT Certifications
Muhammad Qasim
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
Eigrp
Eigrp
firey
CCNP Route EIGRP Overview
CCNP Route EIGRP Overview
Visalini Kumaraswamy
Eigrp.ppt
Eigrp.ppt
Edgardo Scrimaglia
Cisco ospf
Cisco ospf
sarasanandam
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Nil Menon
Ospf.ppt
Ospf.ppt
Edgardo Scrimaglia
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
CCNA IP Addressing
CCNA IP Addressing
Dsunte Wilson
The Parable of Prodigal Son
The Parable of Prodigal Son
Eunice Torre
Destaque
(19)
100822 the pharisee and the tax collector luke 18 9-14
100822 the pharisee and the tax collector luke 18 9-14
The Parable of the Lost Son (Luke 15:11-32)
The Parable of the Lost Son (Luke 15:11-32)
13. eigrp and ospf
13. eigrp and ospf
The parable of the sower
The parable of the sower
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA Routing Fundamentals - EIGRP, OSPF and RIP
CCNA/Networking
CCNA/Networking
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
How Can I Be A Neighbor? The Parable of the Good Samaritan (Luke 10:25-37)
The Prodigal Son
The Prodigal Son
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching IT Certifications
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Eigrp
Eigrp
CCNP Route EIGRP Overview
CCNP Route EIGRP Overview
Eigrp.ppt
Eigrp.ppt
Cisco ospf
Cisco ospf
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
Ospf.ppt
Ospf.ppt
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CCNA IP Addressing
CCNA IP Addressing
The Parable of Prodigal Son
The Parable of Prodigal Son
Semelhante a 1
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
Sunny1710
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
Week3 part 2
Week3 part 2
trayyoo
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
Irsandi Hasan
ccna lec 1.pdf
ccna lec 1.pdf
MahmoudSayed691389
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
Chapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
Chapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
Hamza Malik
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
Irsandi Hasan
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
OSI Network Layer
OSI Network Layer
Sachii Dosti
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Irsandi Hasan
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning Networking
brainxMagic
Chapter 08 - IP Addressing
Chapter 08 - IP Addressing
Yaser Rahmati
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
Vuz Dở Hơi
Chapter 8 : IP addressing
Chapter 8 : IP addressing
teknetir
Semelhante a 1
(20)
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
Cisco Router Basic Configuration
Cisco Router Basic Configuration
Week3 part 2
Week3 part 2
CCNA Exploration 2 - Chapter 3
CCNA Exploration 2 - Chapter 3
ccna lec 1.pdf
ccna lec 1.pdf
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Addressing the Network – IPv4
Addressing the Network – IPv4
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Chapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Chapter 15 : routing concepts
Chapter 15 : routing concepts
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
CCNA RS_ITN - Chapter 8
CCNA RS_ITN - Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
OSI Network Layer
OSI Network Layer
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 7
Exploration_Routing_Chapter_1 ppt for learning Networking
Exploration_Routing_Chapter_1 ppt for learning Networking
Chapter 08 - IP Addressing
Chapter 08 - IP Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
CCNAv5 - S1: Chapter 8 - Ip Addressing
Chapter 8 : IP addressing
Chapter 8 : IP addressing
Último
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
LoriGlavin3
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
mohitsingh558521
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Último
(20)
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
1
1.
© 2007 Cisco
Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 1 VLSM and CIDR
2.
ITE PC v4.0 Chapter
1 2© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Compare and contrast classful and classless IP addressing. Review VLSM and explain the benefits of classless IP addressing. Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making efficient use of scarce IPv4 addresses
3.
ITE PC v4.0 Chapter
1 3© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the address In 1981, RFC 791 modified the IPv4 32-bit address to allow for three different classes IP address space was depleting rapidly the Internet Engineering Task Force (IETF) introduced Classless Inter-Domain Routing (CIDR) –CIDR uses Variable Length Subnet Masking (VLSM) to help conserve address space. -VLSM is simply subnetting a subnet
4.
ITE PC v4.0 Chapter
1 4© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Classful IP addressing As of January 2007, there are over 433 million hosts on internet Initiatives to conserve IPv4 address space include: -VLSM & CIDR notation (1993, RFC 1519) -Network Address Translation (1994, RFC 1631) -Private Addressing (1996, RFC 1918)
5.
ITE PC v4.0 Chapter
1 5© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing The High Order Bits These are the leftmost bits in a 32 bit address
6.
ITE PC v4.0 Chapter
1 6© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Classes of IP addresses are identified by the decimal number of the 1st octet Class A address begin with a 0 bit Range of class A addresses = 0.0.0.0 to 127.255.255.255 Class B address begin with a 1 bit and a 0 bit Range of class B addresses = 128.0.0.0 to 191.255.255.255 Class C addresses begin with two 1 bits & a 0 bit Range of class C addresses = 192.0.0.0 to 223.255.255.255.
7.
ITE PC v4.0 Chapter
1 7© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing The IPv4 Classful Addressing Structure (RFC 790) An IP address has 2 parts: -The network portion Found on the left side of an IP address -The host portion Found on the right side of an IP address
8.
ITE PC v4.0 Chapter
1 8© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing
9.
ITE PC v4.0 Chapter
1 9© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Purpose of a subnet mask It is used to determine the network portion of an IP address
10.
ITE PC v4.0 Chapter
1 10© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Classful Routing Updates -Recall that classful routing protocols (i.e. RIPv1) do not send subnet masks in their routing updates The reason is that the Subnet mask is directly related to the network address
11.
ITE PC v4.0 Chapter
1 11© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Classless Inter-domain Routing (CIDR – RFC 1517) Advantage of CIDR : -More efficient use of IPv4 address space -Route summarization Requires subnet mask to be included in routing update because address class is meaningless Recall purpose of a subnet mask: -To determine the network and host portion of an IP address
12.
ITE PC v4.0 Chapter
1 12© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Classless Routing Protocol Characteristics of classless routing protocols: -Routing updates include the subnet mask -Supports VLSM Supports Route Summarization
13.
ITE PC v4.0 Chapter
1 13© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classful and Classless IP Addressing Routing Protocol Routing updates Include subnet Mask Supports VLSM Ability to send Supernet routes Classful No No No Classless Yes Yes Yes Classless Routing Protocol
14.
ITE PC v4.0 Chapter
1 14© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classless Inter-Domain Routing (CIDR) Route summarization done by CIDR -Routes are summarized with masks that are less than that of the default classful mask -Example: 172.16.0.0 / 13 is the summarized route for the 172.16.0.0 / 16 to 172.23.0.0 / 16 classful networks
15.
ITE PC v4.0 Chapter
1 15© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Classless Inter-Domain Routing (CIDR) Steps to calculate a route summary -List networks in binary format -Count number of left most matching bits to determine summary route’s mask -Copy the matching bits and add zero bits to determine the summarized network address
16.
© 2007 Cisco
Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 16 Distance Vector Routing Protocols
17.
ITE PC v4.0 Chapter
1 17© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process of distance vector routing protocols using Routing Information Protocol (RIP). Describe the processes to maintain accurate routing tables used by distance vector routing protocols. Identify the conditions leading to a routing loop and explain the implications for router performance.
18.
ITE PC v4.0 Chapter
1 18© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Why dynamic routing protocol
19.
ITE PC v4.0 Chapter
1 19© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Examples of Distance Vector routing protocols: Routing Information Protocol (RIP) v1,2 Interior Gateway Routing Protocol (IGRP) Enhanced Interior Gateway Routing Protocol (EIGRP)
20.
ITE PC v4.0 Chapter
1 20© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Distance Vector Technology –The Meaning of Distance Vector: •A router using distance vector routing protocols knows 2 things: Distance to final destination Vector, or direction, traffic should be directed
21.
ITE PC v4.0 Chapter
1 21© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Characteristics of Distance Vector routing protocols: Periodic updates Broadcast updates Entire routing table is included into routing update
22.
ITE PC v4.0 Chapter
1 22© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Routing Protocol Algorithm: -Defined as a procedure for accomplishing a certain task
23.
ITE PC v4.0 Chapter
1 23© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols Routing Protocol Characteristics –Criteria used to compare routing protocols includes Time to convergence Scalability Resource usage Implementation & maintenance
24.
ITE PC v4.0 Chapter
1 24© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Distance Vector Routing Protocols
25.
ITE PC v4.0 Chapter
1 25© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery Router initial start up -Initial network discovery Directly connected networks are initially placed in routing table
26.
ITE PC v4.0 Chapter
1 26© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery Initial Exchange of Routing Information –If a routing protocol is configured then -Routers will exchange routing information Routing updates received from other routers -Router checks update for new information If there is new information: -Metric is updated -New information is stored in routing table
27.
ITE PC v4.0 Chapter
1 27© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery Exchange of Routing Information –Router convergence is reached when -All routing tables in the network contain the same network information –Routers continue to exchange routing information -If no new information is found then Convergence is reached
28.
ITE PC v4.0 Chapter
1 28© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Network Discovery Convergence must be reached before a network is considered completely operable Speed of achieving convergence consists of 2 independent categories -Speed of broadcasting routing information -Speed of calculating routes
29.
ITE PC v4.0 Chapter
1 29© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance Periodic Updates: RIPv1 & RIPv2 These are time intervals in which a router sends out its entire routing table.
30.
ITE PC v4.0 Chapter
1 30© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance RIP uses 4 timers -Update timer -Invalid timer -Hold-down timer -Flush timer
31.
ITE PC v4.0 Chapter
1 31© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance Invalid Timer:- If an update has not been received to refresh an existing route after 180 seconds (the default), the route is marked as invalid by setting the metric to 16. The route is retained in the routing table until the flush timer expires. Flush Timer:- By default, the flush timer is set for 240 seconds, which is 60 seconds longer than the invalid timer. When the flush timer expires, the route is removed from the routing table.
32.
ITE PC v4.0 Chapter
1 32© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance EIGRP routing updates are -Partial updates (The Update Contain only the changed Routes) -Triggered by topology changes (Once a change happen, Update is sent) -Bounded (Update sent only to Routers who need it ) -Non periodic
33.
ITE PC v4.0 Chapter
1 33© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Table Maintenance Triggered Updates –Conditions in which triggered updates are sent -Interface changes state -Route becomes unreachable -Route is placed in routing table
34.
ITE PC v4.0 Chapter
1 34© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops Routing loops are A condition in which a packet is continuously transmitted within a series of routers without ever reaching its destination.
35.
ITE PC v4.0 Chapter
1 35© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops Routing loops may be caused by: -Incorrectly configured static routes -Incorrectly configured route redistribution -Slow convergence -Incorrectly configured discard routes Routing loops can create the following issues -Excess use of bandwidth -CPU resources may be strained -Network convergence is degraded -Routing updates may be lost or not processed in a timely manner
36.
ITE PC v4.0 Chapter
1 36© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops problems Count to Infinity This is a routing loop whereby packets bounce infinitely around a network.
37.
ITE PC v4.0 Chapter
1 37© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops problems Distance Vector routing protocols set a specified metric value to indicate infinity Once a router “counts to infinity” it marks the route as unreachable
38.
ITE PC v4.0 Chapter
1 38© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops Preventing loops with holddown timers -Holddown timers allow a router to not accept any changes to a route for a specified period of time. -Point of using holddown timers Allows routing updates to propagate through network with the most current information. Holddown timers are used to prevent regular update messages from inappropriately reinstaling a route that may have gone bad.
39.
ITE PC v4.0 Chapter
1 39© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops Holddown Timer. This timer stabilizes routing information and helps prevent routing loops during periods when the topology is converging on new information. Once a route is marked as unreachable (Invalid), it must stay in holddown long enough for all routers in the topology to learn about the unreachable network. By default, the holddown timer is set for 180 seconds.
40.
ITE PC v4.0 Chapter
1 40© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Update, holddown & flush timers Last update about certain network Invalid timer Flush timerHolddown timer 180 sec 180 sec 240 sec
41.
ITE PC v4.0 Chapter
1 41© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Update, holddown & flush timers Last update about certain network Update about the same network with metric=16 Invalid timer Flush timerHolddown timer 180 sec 180 sec 240 sec
42.
ITE PC v4.0 Chapter
1 42© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops The Split Horizon Rule is used to prevent routing loops Split Horizon rule: A router should not advertise a network through the interface from which the update came.
43.
ITE PC v4.0 Chapter
1 43© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops Split horizon with poison reverse The rule states that once a router learns of an unreachable route through an interface, advertise it as unreachable back through the same interface
44.
ITE PC v4.0 Chapter
1 44© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Route poisoning & Poison reverse Route poisoning: sending update about the unreachable network with setting the metric (hop count) to 16 Poison reverse: after receiving the poisoned update the router will suspend the split horizon rule and send the same poisoned update again across the same interface then resume split horizon rule again
45.
ITE PC v4.0 Chapter
1 45© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Loops IP & TTL –Purpose of the TTL field The TTL field is found in an IP header and is used to prevent packets from endlessly traveling on a network How the TTL field works -TTL field contains a numeric value The numeric value is decreased by one by every router on the route to the destination. If numeric value reaches 0 then Packet is discarded.
46.
ITE PC v4.0 Chapter
1 46© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Protocols Today Factors used to determine whether to use RIP or EIGRP include -Network size -Compatibility between models of routers -Administrative knowledge
47.
ITE PC v4.0 Chapter
1 47© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Routing Protocols Today RIP Features of RIP: -Supports split horizon & split horizon with poison reverse -Capable of load balancing -Easy to configure -Works in a multi vendor router environment
48.
© 2007 Cisco
Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 48 RIP version 1
49.
ITE PC v4.0 Chapter
1 49© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Describe the functions, characteristics, and operation of the RIPv1 protocol. Configure a device for using RIPv1. Verify proper RIPv1 operation. Describe how RIPv1 performs automatic summarization. Configure, verify, and troubleshoot default routes propagated in a routed network implementing RIPv1. Use recommended techniques to solve problems related to RIPv1
50.
ITE PC v4.0 Chapter
1 50© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1 RIP Characteristics -A classful, Distance Vector (DV) routing protocol -Metric = hop count -Routes with a hop count > 15 are unreachable -Updates are broadcast every 30 seconds
51.
ITE PC v4.0 Chapter
1 51© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIP v1 message
52.
ITE PC v4.0 Chapter
1 52© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1 RIP Operation –RIP uses 2 message types: Request message -This is sent out on startup by each RIP enabled interface -Requests all RIP enabled neighbors to send routing table Response message -Message sent to requesting router containing routing table
53.
ITE PC v4.0 Chapter
1 53© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Basic RIPv1 Configuration Router RIP Command –To enable RIP enter: -Router rip at the global configuration prompt -Prompt will look like R1(config-router)#
54.
ITE PC v4.0 Chapter
1 54© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Basic RIPv1 Configuration Specifying Networks –Use the network command to: -Enable RIP on all interfaces that belong to this network -Advertise this network in RIP updates sent to other routers every 30 seconds
55.
ITE PC v4.0 Chapter
1 55© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting To verify and troubleshoot routing -Use the following commands: -show ip route -show ip protocols -debug ip rip
56.
ITE PC v4.0 Chapter
1 56© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Interpreting RIP route
57.
ITE PC v4.0 Chapter
1 57© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting show ip protocols command -Displays routing protocol configured on router
58.
ITE PC v4.0 Chapter
1 58© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting Debug ip rip command -Used to display RIP routing updates as they are happening
59.
ITE PC v4.0 Chapter
1 59© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting Passive interface command -Used to prevent a router from sending updates through an interface -Example: Router(config-router)#passive-interface interface-type interface-number
60.
ITE PC v4.0 Chapter
1 60© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verification and Troubleshooting Passive interfaces
61.
ITE PC v4.0 Chapter
1 61© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Boundary Routers –RIP automatically summarizes classful networks –Boundary routers summarize RIP subnets from one major network to another.
62.
ITE PC v4.0 Chapter
1 62© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Processing RIP Updates 2 rules govern RIPv1 updates: -If a routing update and the interface it’s received on belong to the same network then The subnet mask of the interface is applied to the network in the routing update -If a routing update and the interface it’s received on belong to a different network then The classful subnet mask of the network is applied to the network in the routing update.
63.
ITE PC v4.0 Chapter
1 63© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Sending RIP Updates –RIP uses automatic summarization to reduce the size of a routing table.
64.
ITE PC v4.0 Chapter
1 64© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Advantages of automatic summarization: –The size of routing updates is reduced –Single routes are used to represent multiple routes which results in faster lookup in the routing table. –Stability in routing table
65.
ITE PC v4.0 Chapter
1 65© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Disadvantage of Automatic Summarization: -Does not support discontiguous networks
66.
ITE PC v4.0 Chapter
1 66© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Automatic Summarization Discontiguous Topologies do not converge with RIPv1 A router will only advertise major network addresses out interfaces that do not belong to the advertised route.
67.
ITE PC v4.0 Chapter
1 67© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Default Route and RIPv1 Default routes Packets that are not defined specifically in a routing table will go to the specified interface for the default route Example: Customer routers use default routes to connect to an ISP router. Command used to configure a default route is ip route 0.0.0.0 0.0.0.0 s0/0/1
68.
ITE PC v4.0 Chapter
1 68© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Default Route and RIPv1 Propagating the Default Route in RIPv1 Default-information originate command -This command is used to specify that the router is to originate default information, by propagating the static default route in RIP update.
69.
ITE PC v4.0 Chapter
1 69© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary: Commands used by RIP Command Command’s purpose Rtr(config)#router rip Enables RIP routing process Rtr(config-router)#network Associates a network with a RIP routing process Rtr#debug ip rip used to view real time RIP routing updates Rtr(config-router)#passive-interface fa0/0 Prevent RIP updates from going out an interface Rtr(config-router)#default-information originate Used by RIP to propagate default routes Rtr#show ip protocols Used to display timers used by RIP
70.
© 2007 Cisco
Systems, Inc. All rights reserved. Cisco Public ITE PC v4.0 Chapter 1 70 RIPv2
71.
ITE PC v4.0 Chapter
1 71© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction Chapter focus -Difference between RIPv1 & RIPv2 RIPv1 -A classful distance vector routing protocol -Does not support discontiguous subnets -Does not support VLSM -Does not send subnet mask in routing update -Routing updates are broadcast RIPv2 -A classless distance vector routing protocol that is an enhancement of RIPv1’s features. -Next hop address is included in updates -Routing updates are multicast -The use of authentication is an option
72.
ITE PC v4.0 Chapter
1 72© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Introduction Similarities between RIPv1 & RIPv2 -Use of timers to prevent routing loops -Use of split horizon or split horizon with poison reverse -Use of triggered updates -Maximum hop count of 15
73.
ITE PC v4.0 Chapter
1 73© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public RIPv1 Limitations Examining the routing tables -To examine the contents of routing updates use the debug ip rip command -If RIPv1 is configured then Subnet masks will not be included with the network address
74.
ITE PC v4.0 Chapter
1 74© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2 Enabling and Verifying RIPv2 Configuring RIP on a Cisco router By default it is running RIPv1
75.
ITE PC v4.0 Chapter
1 75© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2 Configuring RIPv2 on a Cisco router -Requires using the version 2 command -RIPv2 ignores RIPv1 updates To verify RIPv2 is configured use the show ip protocols command
76.
ITE PC v4.0 Chapter
1 76© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Configuring RIPv2 Auto-Summary & RIPv2 RIPv2 will automatically summarize routes at major network boundaries and can also summarize routes with a subnet mask that is smaller than the classful subnet mask
77.
ITE PC v4.0 Chapter
1 77© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Disabling Auto- Summary in RIPv2 To disable automatic summarization issue the no auto-summary command Configuring RIPv2
78.
ITE PC v4.0 Chapter
1 78© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public VLSM & CIDR Networks using a VLSM IP addressing scheme Use classless routing protocols (i.e. RIPv2) to disseminate network addresses and their subnet masks
79.
ITE PC v4.0 Chapter
1 79© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2 Basic Troubleshooting steps -Check the status of all links -Check cabling -Check IP address & subnet mask configuration -Remove any unneeded configuration commands Commands used to verify proper operation of RIPv2 –Show ip interfaces brief –Show ip protocols –Debug ip rip –Show ip route
80.
ITE PC v4.0 Chapter
1 80© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2 Common RIPv2 Issues When trouble shooting RIPv2 examine the following issues: Version Check to make sure you are using version 2 Network statements Network statements may be incorrectly typed or missing Automatic summarization If summarized routes are not needed then disable automatic summarization
81.
ITE PC v4.0 Chapter
1 81© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Verifying & Troubleshooting RIPv2 Reasons why it’s good to authenticate routing information -Prevent the possibility of accepting invalid routing updates -Contents of routing updates are encrypted Types of routing protocols that can use authentication -RIPv2 -EIGRP -OSPF -IS-IS -BGP
82.
ITE PC v4.0 Chapter
1 82© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Summary Routing Protocol Distance Vector Classless Routing Protocol Uses Hold- Down Timers Use of Split Horizon or Split Horizon w/ Poison Reverse Max Hop count = 15 Auto Summary Support CIDR Supports VLSM Uses Authen- tication RIPv1 Yes No Yes Yes Yes Yes No No No RIPv2 Yes Yes Yes Yes Yes Yes Yes Yes Yes
83.
ITE PC v4.0 Chapter
1 83© 2007 Cisco Systems, Inc. All rights reserved. Cisco Public
Baixar agora