SlideShare une entreprise Scribd logo
1  sur  39
www.professordkinney.com
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Lessons Summary:
Introducing WAN Technologies
Introducing Dynamic Routing Protocol
Implementing OSPF
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Introducing WAN Technologies
Wide Area Networks
A WAN is a data communications network that operates beyond the geographic scope
of a LAN. WAN allows the transmission of data across greater geographic distances
WANs use facilities provided by a service provider, or carrier. WANs use serial
connections. An enterprise must subscribe to a WAN service provider to use WAN
carrier network services.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Point-to-Point Links
A point-to-point link provides a single, pre-established WAN communications path from
the customer premises through a carrier network, such as a telephone company, to a
remote network. Point-to-point lines are usually leased from a carrier and thus are often
called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility
hardware to your line only. These circuits are generally priced based on bandwidth
required and distance between the two connected points. Point-to-point links are
generally more expensive than shared services such as Frame Relay. Figure below
illustrates a typical point-to-point link through a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Circuit Switching
Switched circuits allow data connections that can be initiated when needed and terminated
when communication is complete. This works much like a normal telephone line works
for voice communication. Integrated Services Digital Network (ISDN) is a good example
of circuit switching. When a router has data for a remote site, the switched circuit is
initiated with the circuit number of the remote network. In the case of ISDN circuits, the
device actually places a call to the telephone number of the remote ISDN circuit. When
the two networks are connected and authenticated, they can transfer data. When the
data transmission is complete, the call can be terminated. Figure below illustrates an
example of this type of circuit.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Packet Switching
Packet switching is a WAN technology in which users share common carrier resources.
Because this allows the carrier to make more efficient use of its infrastructure, the cost
to the customer is generally much better than with point-to-point lines. In a packet
switching setup, networks have connections into the carrier’s network, and many
customers share the carrier’s network. The carrier can then create virtual circuits
between customers’ sites by which packets of data are delivered from one to the other
through the network. The section of the carrier’s network that is shared is often referred
to as a cloud. Some examples of packet-switching networks include Asynchronous
Transfer Mode (ATM), Frame Relay, Switched Multimegabit Data Services (SMDS), and
X.25. Figure below shows an example packet-switched circuit.
The virtual connections between customer sites are often referred to as a virtual circuit.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Virtual Circuits
A virtual circuit is a logical circuit created within a shared network between two network
devices. Two types of virtual circuits exist: switched virtual circuits (SVCs) and
permanent virtual circuits (PVCs).SVCs are virtual circuits that are dynamically
established on demand and terminated when transmission is complete. Communication
over an SVC consists of three phases: circuit establishment, data transfer,and circuit
termination. The establishment phase involves creating the virtual circuit between the
source and destination devices. Data transfer involves transmitting data between the
devices over the virtual circuit, and the circuit termination phase involves tearing down
the virtual circuit between the source and destination devices. SVCs are used in
situations in which data transmission between devices is sporadic, largely because SVCs
increase bandwidth used due to the circuit establishment and termination phases, but
they decrease the cost associated with constant virtual circuit availability.
PVC is a permanently established virtual circuit that consists of one mode: data transfer.
PVCs are used in situations in which data transfer between devices is constant. PVCs
decrease the bandwidth use associated with the establishment and termination of virtual
circuits, but they increase costs due to constant virtual circuit availability. PVCs are
generally configured by the service provider when an order is placed for service.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Dialup Services
Dialup services offer cost-effective methods for connectivity across WANs. Two popular
dialup implementations are dial-on-demand routing (DDR) and dial backup.DDR is a
technique whereby a router can dynamically initiate a call on a switched circuit when it
needs to send data. In a DDR setup, the router is configured to initiate the call when
certain criteria are met, such as a particular type of network traffic needing to be
transmitted. When the connection is made, traffic passes over the line. The router
configuration specifies an idle timer that tells the router to drop the connection when
the circuit has remained idle for a certain period. Dial backup is another way of
configuring DDR. However, in dial backup, the switched circuit is used to provide
backup service for another type of circuit, such as point-to-point or packet switching.
The router is configured so that when a failure is detected on the primary circuit, the dial
backup line is initiated. The dial backup line then supports the WAN connection until
the primary circuit is restored. When this occurs, the dial backup connection is
terminated.
WAN Devices
WANs use numerous types of devices that are specific to WAN environments. WAN
switches, access servers, modems, CSU/DSUs, and ISDN terminal adapters are discussed
in the following sections. Other devices found in WAN environments that are used in
WAN implementations include routers, ATM switches, and multiplexers.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Switch
A WAN switch is a multiport internetworking device used in carrier networks. These
devices typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the
data link layer of the OSI reference model. Figure below illustrates two routers at remote
ends of a WAN that are connected by WAN switches.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Access Server
An access server acts as a concentration point for dial-in and dial-out connections. Figure
below illustrates an access server concentrating dial-out connections into a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Modem
A modem is a device that interprets digital and analog signals, enabling data to be
transmitted over voice-grade telephone lines. At the source, digital signals are converted
to a form suitable for transmission over analog communication facilities. At the
destination, these analog signals are returned to their digital form. Figure below
illustrates a simple modem-to-modem connection through a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
CSU/DSU
A channel service unit/digital service unit (CSU/DSU) is a digital-interface device used to
connect a router to a digital circuit like a T1. The CSU/DSU also provides signal timing
for communication between these devices. Figure below illustrates the placement of the
CSU/DSU in a WAN implementation.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
ISDN Terminal Adapter
An ISDN terminal adapter is a device used to connect ISDN Basic Rate Interface (BRI)
connections to other interfaces, such as EIA/TIA-232 on a router. A terminal adapter is
essentially an ISDN modem, although it is called a terminal adapter because it does not
actually convert analog to digital signals. Figure below illustrates the placement of the
terminal adapter in an ISDN environment.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Introducing Dynamic Routing Protocol
Dynamic routing protocols play an important role in today’s networks. The
following sections describe several important benefits that dynamic routing
protocols provide. In many networks, dynamic routing protocols are typically
used with static routes.
Role of Dynamic Routing Protocol
What exactly are dynamic routing protocols? Routing protocols are used to facilitate the
exchange of routing information between routers. Routing protocols allow routers to
dynamically learn information about remote networks and automatically add this
information to their own routing tables, as shown below
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Routing protocols determine the best path to each network, which is then added to the
routing table. One of the primary benefits of using a dynamic routing protocol is that
routers exchange routing information whenever there is a topology change. This
exchange allows routers to automatically learn about new networks and also to find
alternate paths if there is a link failure to a current network.
Dynamic Routing Protocol Operation
All routing protocols have the same purpose: to learn about remote networks and to quickly
adapt whenever there is a change in the topology. The method that a routing protocol uses
to accomplish this depends on the algorithm it uses and the operational characteristics
of that protocol. The operations of a dynamic routing protocol vary depending on the
type of routing protocol and the specific operations of that routing protocol. The specific
operations of RIP, EIGRP, and OSPF are examined in later chapters. In general, the
operations of a dynamic routing protocol can be described as follows:
1. The router sends and receives routing messages on its interfaces.
2. The router shares routing messages and routing information with other routers that are
using the same routing protocol.
3. Routers exchange routing information to learn about remote networks.
4. When a router detects a topology change, the routing protocol can advertise this change
to other routers.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classifying Dynamic Routing Protocols
Routing protocols can be classified into different groups according to their characteristics:
■ IGP or EGP
■ Distance vector or link-state
■ Classful or classless
The sections that follow discuss these classification schemes in more detail.
The most commonly used routing protocols are as follows:
■ RIP: A distance vector interior routing protocol
■ IGRP: The distance vector interior routing protocol developed by Cisco (deprecated
from Cisco IOS Release 12.2 and later)
■
OSPF: A link-state interior routing protocol
■ IS-IS: A link-state interior routing protocol
■ EIGRP: The advanced distance vector interior routing protocol developed by Cisco
■ BGP: A path vector exterior routing protocol
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
IGP and EGP
An autonomous system (AS)—otherwise known as a routing domain—is a collection of
routers under a common administration. Typical examples are a company’s internal
network
and an ISP’s network. Because the Internet is based on the autonomous system concept,
two types of routing protocols are required: interior and exterior routing protocols. These
protocols are
■ Interior gateway protocols (IGP): Used for intra-autonomous system routing, that is,
routing inside an autonomous system
■ Exterior gateway protocols (EGP): Used for inter-autonomous system routing, that is,
routing between autonomous systems
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Distance Vector and Link-State Routing Protocols
Interior gateway protocols (IGP) can be classified as two types:
■ Distance vector routing protocols
■ Link-state routing protocols
Distance vector protocols work best in situations where
■ The network is simple and flat and does not require a hierarchical design.
■ The administrators do not have enough knowledge to configure and troubleshoot
linkstate protocols.
■ Specific types of networks, such as hub-and-spoke networks, are being implemented.
■Worst-case convergence times in a network are not a concern.
Link-state protocols work best in situations where
■ The network design is hierarchical, usually occurring in large networks.
■ The administrators have a good knowledge of the implemented link-state routing
protocol.
■ Fast convergence of the network is crucial.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classful and Classless Routing Protocols
All routing protocols can also be classified as either
■ Classful routing protocols
■ Classless routing protocols
Classful Routing Protocols
Classful routing protocols do not send subnet mask information in routing updates. The
first routing protocols, such as RIP, were classful. This was at a time when network
addresses were allocated based on classes: Class A, B, or C. A routing protocol did not
need to include the subnet mask in the routing update because the network mask could be
determined based on the first octet of the network address. Classful routing protocols can
still be used in some of today’s networks, but because they do not include the subnet
mask, they cannot be used in all situations. Classful routing protocols cannot be used
when a network is subnetted using more than one subnet mask. In other words, classful
routing protocols do not support variable-length subnet masks (VLSM).
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classless Routing Protocols
Classless routing protocols include the subnet mask with the network address in routing
updates. Today’s networks are no longer allocated based on classes, and the subnet mask
cannot be determined by the value of the first octet. Classless routing protocols are required
in most networks today because of their support for VLSM, discontinuous network.
Convergence
when the routing tables of all routers are at a state of consistency. The network has
converged when all routers have complete and accurate information about the network.
Convergence time is the time it takes routers to share information, calculate best
paths, and update their routing tables. A network is not completely operable until the
network has converged; therefore, most networks require short convergence times.
Metrics
Metrics are a way to measure or compare. Routing protocols use metrics to determine
which route is the best path.
Purpose of a Metric
There are cases when a routing protocol learns of more than one route to the same
destination. To select the best path, the routing protocol must be able to evaluate and
Differentiate among the available paths.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Metrics and Routing Protocols
Different routing protocols use different metrics. The metric used by one routing protocol
is
not comparable to the metric used by an
Metric Parameters
Two different routing protocols might choose different paths to the same destination
because of using different metrics. other routing protocol.
Metrics used in IP routing protocols include the following:
Hop count: A simple metric that counts the number of routers a packet must traverse.
Bandwidth: Influences path selection by preferring the path with the highest
bandwidth.
Load: Considers the traffic utilization of a certain link.
Delay: Considers the time a packet takes to traverse a path.
Reliability: Assesses the probability of a link failure, calculated from the interface
error count or previous link failures.
Cost: A value determined either by the IOS or by the network administrator to indicate
preference for a route. Cost can represent a metric, a combination of metrics, or a policy.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Metric Field in the Routing Table
The routing table displays the metric for each dynamic and static route
Remember that static routes always have a metric of 0.
The list that follows defines the metric for each routing protocol:
■ RIP: Hop count: Best path is chosen by the route with the lowest hop count.
■ IGRP and EIGRP: Bandwidth, delay, reliability, and load: Best path is chosen by
the route with the smallest composite metric value calculated from these
multiple
parameters. By default, only bandwidth and delay are used.
■ IS-IS and OSPF: Cost: Best path is chosen by the route with the lowest cost.
The
Cisco implementation of OSPF uses bandwidth to determine the cost. IS-IS is
discussed in CCNP.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
The metric associated with a certain route can be best viewed
using the show ip route command. The metric value is the
second
value in the brackets for a routing table entry
Building a Medium-Sized Network
Load Balancing
You now know that individual routing protocols use metrics to determine the
best route to reach remote networks. But what happens when two or more
routes to the same destination have identical metric values? How will the
router decide which path to use for packet forwarding? In this case, the router
does not choose only one route. Instead, the router load balances between
these equal-cost paths. The packets are forwarded using all equal-cost paths.
Purpose of Administrative Distance
Before the routing process can determine which route to use when forwarding a packet, it
must first determine which routes to include in the routing table. There can be times
when a router learns a route to a remote network from more than one routing source.
The routing process will need to determine which routing source to use. Administrative
distance is used for this purpose.
Administrative distance (AD) defines the preference of a routing source. Each routing
source—including specific routing protocols, static routes, and even directly connected
networks—is prioritized in order of most to least preferable using an administrative
distance value. Cisco routers use the AD feature to select the best path when they learn
about the same destination network from two or more different routing sources.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
The AD value can also be verified with the show ip protocols command. This command
displays all pertinent information about routing protocols operating on the router.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Default Administrative Distances
Implementing OSPF
OSPF typically requires coordination among many internal routers, area border routers
(routers connected to multiple areas), and autonomous system boundary routers. At a
minimum, OSPF-based routers or access servers can be configured with all default
parameter values, no authentication, and interfaces assigned to areas. If you intend to
customize your environment, you must ensure coordinated configurations of all routers.
To configure OSPF, complete the tasks in the following sections. Enabling OSPF is
mandatory; the other tasks are optional, but might be required for your application.
Enable OSPF
• Configure OSPF Interface Parameters
• Configure OSPF over Different Physical Networks
• Configure OSPF Area Parameters
• Configure OSPF Not So Stubby Area (NSSA)
• Configure Route Summarization between OSPF Areas
• Configure Route Summarization when Redistributing Routes into OSPF
• Create Virtual Links
• Generate a Default Route
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
• Configure Lookup of DNS Names
• Force the Router ID Choice with a Loopback Interface
• Control Default Metrics
• Configure OSPF on Simplex Ethernet Interfaces
• Configure Route Calculation Timers
• Configure OSPF over On Demand Circuits
• Log Neighbor Changes
• Monitor and Maintain OSPF
Enable OSPF
As with other routing protocols, enabling OSPF requires that you create an OSPF routing
process, specify the range of IP addresses to be associated with the routing process, and
assign area IDs to be associated with that range of IP addresses. Perform the following
tasks, starting in global configuration mode.
Step 1 Enable OSPF routing. router ospf process-id
Step 2 Define an interface on which OSPF runs and define the area ID for that interface.
network address wildcard-mask area area-id
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Configure OSPF Interface Parameters
Our OSPF implementation allows you to alter certain interface-specific OSPF parameters,
as
needed. You are not required to alter any of these parameters, but some interface
parameters
must be consistent across all routers in an attached network. Those parameters are
controlled by the ip ospf hello-interval, ip ospf dead-interval, and ip ospf authentication
key. commands. Therefore, be sure that if you do configure any of these parameters, the
configurations for all routers on your network have compatible values.
Step 1: Explicitly specify the cost of sending a packet on an OSPF interface.
ip ospf cost cost.
Step 2: Specify the number of seconds between link state advertisement retransmissions for
adjacencies belonging to an OSPF interface.
ip ospf retransmit-intervalseconds.
Step 3: Set the estimated number of seconds it takes to transmit a link state update packet
on an OSPF interface.
ip ospf transmit-delay seconds
Strep:4 Set priority to help determine the OSPF designated router for a network.
ip ospf priority number
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Step 5: Specify the length of time, in seconds, between
the hello packets that the Cisco IOS software sends on an OSPF interface.
ip ospf hello-intervalseconds
Step 6: Set the number of seconds that a device’s hello packets must not have been seen
before its neighbors declare the OSPF router down.
ip ospf dead-intervalseconds
Step 7: Assign a specific password to be used by neighboring OSPF routers on a network
segment that is using OSPF’s simple password authentication.
ip ospf authentication-key key
Step 8: Enable OSPF MD5 authentication. ip ospf message-digest-key keyid md5 key
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Configure Your OSPF Network Type
You have the choice of configuring your OSPF network type as either broadcast or
nonbroadcast multiaccess, regardless of the default media type. Using this feature, you
can configure broadcast networks as nonbroadcast multiaccess networks when, for
example, you have routers in your network that do not support multicast addressing.
You also can configure nonbroadcast multiaccess networks (such as X.25, Frame Relay,
and SMDS) as broadcast networks. Configuring nonbroadcast, multiaccess networks as
either broadcast or nonbroadcast assumes that there are virtual circuits from every
router to every router or fully meshed network. This is not true for some cases, for
example, because of cost constraints, or when you have only a partially meshed network.
In these cases, you can configure the OSPF network type as a point-to-multipoint
network.
Routing between two routers not directly connected will go through the router that has
virtual circuits to both routers. Note that you must not configure neighbors when using
this feature.
Configure the OSPF network type for a
ip ospf network {broadcast | non-broadcast |
point-to-multipoint} specified interface
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Configure OSPF for Nonbroadcast Networks
Because there might be many routers attached to an OSPF network, a designated router is
selected for the network. It is necessary to use special configuration parameters in the
designated router selection if broadcast capability is not configured.
Configure routers or access servers interconnecting to nonbroadcast networks
neighbor ip-address[priority number] [poll-interval
seconds]
You can specify the following neighbor parameters, as required:
• Priority for a neighboring router
• Nonbroadcast poll interval
• Interface through which the neighbor is reachable
Configure OSPF Not So Stubby Area (NSSA)
NSSA area is similar to OSPF stub area. NSSA does not flood Type 5 external link state
advertisements (LSAs) from the core into the area, but it has the ability of importing AS
external routes in a limited fashion within the area.
NSSA allows importing of Type 7 AS external routes within NSSA area by redistribution.
These Type 7 LSAs are translated into Type 5 LSAs by NSSA ABR which are flooded
throughout the whole routing domain. Summarization and filtering are supported
during the translation.Use NSSA to simplify administration if you are an Internet service
provider (ISP), or a network administrator that must connect a central site using OSPF
to a remote site that is using a different routing protocol.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Define an area to be NSSA
area area-id nssa [no-redistribution]
[default-information-originate]
Configure Route Summarization between OSPF Areas
Route summarization is the consolidation of advertised addresses. This feature causes a
single summary route to be advertised to other areas by an ABR. In OSPF, an ABR will
advertise networks in one area into another area. If the network numbers in an area are
assigned in a way such that they are contiguous, you can configure the ABR to advertise
a summary route that covers all the individual networks within the area that fall into the
specified range.To specify an address range, perform the following task in router
configuration mode:
Specify an address range for which a single route will be advertised
area area-id range address mask
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Generate a Default Route
You can force an autonomous system boundary router to generate a default route into an
OSPF routing domain. Whenever you specifically configure redistribution of routes into
an OSPF routing domain, the router automatically becomes an autonomous system
boundary router. However, an autonomous system boundary router does not, by default,
generate a default route into the OSPF routing domain.
To force the autonomous system boundary router to generate a default route, perform the
following task in router configuration mode:
Force the autonomous system boundary router to generate a default route into the OSPF
routing domain- default-information originate [always] [metric metric-value] [metric-type
type-value] [route-map map-name]
Configure Lookup of DNS Names
You can configure OSPF to look up Domain Naming System (DNS) names for use in all
OSPF show command displays. This feature makes it easier to identify a router, because
it is displayed by name rather than by its router ID or neighbor ID.
To configure DNS name lookup, perform the following task in global configuration mode:
Configure DNS name lookup. - ip ospf name-lookup
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Control Default Metrics
In Cisco IOS Release 10.3 and later, by default, OSPF calculates the OSPF metric for an
interface according to the bandwidth of the interface. For example, a 64K link gets a
metric of 1562, while a T1 link gets a metric of 64.The OSPF metric is calculated asref-bw
divided by bandwidth, with ref-bw equal to 108 by default,and bandwidth determined by
the bandwidth command. The calculation gives FDDI a metric of 1.
If you have multiple links with high bandwidth, you might want to specify a larger number
to differentiate the cost on those links. To do so, perform the following task in router
configuration mode:
Differentiate high bandwidth links - ospf auto-cost reference-bandwidth ref-bw
Monitor and Maintain OSPF
You can display specific statistics such as the contents of IP routing tables, caches, and
databases. Information provided can be used to determine resource utilization and solve
network problems. You can also display information about node reachability and
discover the routing path your device’s packets are taking through the network.
To display various
routing statistics, perform the following tasks in EXEC mode:
Display general information about OSPF routing processes- show ip ospf [process-id]
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Display lists of information related to the OSPF database
show ip ospf [process-id area-id] database
show ip ospf [process-id area-id] database [router]
[link-state-id]
show ip ospf [process-id area-id] database [network]
[link-state-id]
show ip ospf [process-id area-id] database [summary]
[link-state-id]
show ip ospf [process-id area-id] database
[asb-summary] [link-state-id]
show ip ospf [process-id] database [external]
[link-state-id]
show ip ospf [process-id area-id] database
[database-summary]
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Display the internal OSPF routing table entries to Area Border Router (ABR) and
Autonomous System Boundary Router (ASBR).
show ip ospf border-routers
Display OSPF-related interface information
show ip ospf interface [interface-name]
Display OSPF-neighbor infrmation on a per-interface basis.
show ip ospf neighbor [interface-name] [neighbor-id]
Detail
Display OSPF-related virtual links information
show ip ospf virtual-links
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Lessons learned:
WAN technologies.
What is dynamic protocols and their different parameters
and functions.
Configuring OSPF.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network

Contenu connexe

Tendances (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Virtual networking computing
Virtual networking computingVirtual networking computing
Virtual networking computing
 
Campus Network Design version 8
Campus Network Design version 8Campus Network Design version 8
Campus Network Design version 8
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Vpn
VpnVpn
Vpn
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
Introduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureIntroduction to Data Center Network Architecture
Introduction to Data Center Network Architecture
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
802.11ac Technology Introduction
802.11ac Technology Introduction802.11ac Technology Introduction
802.11ac Technology Introduction
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
SD WAN
SD WANSD WAN
SD WAN
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
VPN
VPNVPN
VPN
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerations
 
vlan
vlanvlan
vlan
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 

En vedette

Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comArnold Derrick Kinney
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionArnold Derrick Kinney
 
Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Silvester Van Koten
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solutionArnold Derrick Kinney
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
 
Lesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyLesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyrinzell02
 
EdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's ToolEdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's Toolbhanj_10
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Alyssa Denise Valino
 

En vedette (20)

Wan networks
Wan networksWan networks
Wan networks
 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
 
IPV6
IPV6 IPV6
IPV6
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
 
Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06
 
Thiết kế mạng LAN cho công ty 2 tầng
Thiết kế mạng LAN cho công ty 2 tầng Thiết kế mạng LAN cho công ty 2 tầng
Thiết kế mạng LAN cho công ty 2 tầng
 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
Computer as a tutor
Computer as a tutorComputer as a tutor
Computer as a tutor
 
Multimedia
MultimediaMultimedia
Multimedia
 
Lesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyLesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technology
 
EdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's ToolEdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's Tool
 
Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor Educational Technology 2: The computer as a tutor
Educational Technology 2: The computer as a tutor
 

Similaire à Building a medium sized network

Intro to-wan
Intro to-wanIntro to-wan
Intro to-wanmjrshare
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wanmjrshare
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesSubhajit Sahu
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Susan Cox
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology optionsmicailalouise
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio networkfdr1975
 

Similaire à Building a medium sized network (20)

Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
 
Suleiman's
Suleiman'sSuleiman's
Suleiman's
 
Lecture 7.pdf
Lecture 7.pdfLecture 7.pdf
Lecture 7.pdf
 
Wan asignment
Wan asignmentWan asignment
Wan asignment
 
Wide area networks
Wide area networksWide area networks
Wide area networks
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
 
Ch08
Ch08Ch08
Ch08
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Data communications
Data communicationsData communications
Data communications
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
 
Connection technology options
Connection technology optionsConnection technology options
Connection technology options
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio network
 

Plus de Arnold Derrick Kinney (9)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Network device management
Network device managementNetwork device management
Network device management
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Building a medium sized network

  • 2. Building a Medium-Sized Network 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Building a Medium-Sized Network Lessons Summary: Introducing WAN Technologies Introducing Dynamic Routing Protocol Implementing OSPF 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 4. Introducing WAN Technologies Wide Area Networks A WAN is a data communications network that operates beyond the geographic scope of a LAN. WAN allows the transmission of data across greater geographic distances WANs use facilities provided by a service provider, or carrier. WANs use serial connections. An enterprise must subscribe to a WAN service provider to use WAN carrier network services. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 5. Point-to-Point Links A point-to-point link provides a single, pre-established WAN communications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only. These circuits are generally priced based on bandwidth required and distance between the two connected points. Point-to-point links are generally more expensive than shared services such as Frame Relay. Figure below illustrates a typical point-to-point link through a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 6. Circuit Switching Switched circuits allow data connections that can be initiated when needed and terminated when communication is complete. This works much like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network. In the case of ISDN circuits, the device actually places a call to the telephone number of the remote ISDN circuit. When the two networks are connected and authenticated, they can transfer data. When the data transmission is complete, the call can be terminated. Figure below illustrates an example of this type of circuit. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 7. Packet Switching Packet switching is a WAN technology in which users share common carrier resources. Because this allows the carrier to make more efficient use of its infrastructure, the cost to the customer is generally much better than with point-to-point lines. In a packet switching setup, networks have connections into the carrier’s network, and many customers share the carrier’s network. The carrier can then create virtual circuits between customers’ sites by which packets of data are delivered from one to the other through the network. The section of the carrier’s network that is shared is often referred to as a cloud. Some examples of packet-switching networks include Asynchronous Transfer Mode (ATM), Frame Relay, Switched Multimegabit Data Services (SMDS), and X.25. Figure below shows an example packet-switched circuit. The virtual connections between customer sites are often referred to as a virtual circuit. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 8. WAN Virtual Circuits A virtual circuit is a logical circuit created within a shared network between two network devices. Two types of virtual circuits exist: switched virtual circuits (SVCs) and permanent virtual circuits (PVCs).SVCs are virtual circuits that are dynamically established on demand and terminated when transmission is complete. Communication over an SVC consists of three phases: circuit establishment, data transfer,and circuit termination. The establishment phase involves creating the virtual circuit between the source and destination devices. Data transfer involves transmitting data between the devices over the virtual circuit, and the circuit termination phase involves tearing down the virtual circuit between the source and destination devices. SVCs are used in situations in which data transmission between devices is sporadic, largely because SVCs increase bandwidth used due to the circuit establishment and termination phases, but they decrease the cost associated with constant virtual circuit availability. PVC is a permanently established virtual circuit that consists of one mode: data transfer. PVCs are used in situations in which data transfer between devices is constant. PVCs decrease the bandwidth use associated with the establishment and termination of virtual circuits, but they increase costs due to constant virtual circuit availability. PVCs are generally configured by the service provider when an order is placed for service. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 9. WAN Dialup Services Dialup services offer cost-effective methods for connectivity across WANs. Two popular dialup implementations are dial-on-demand routing (DDR) and dial backup.DDR is a technique whereby a router can dynamically initiate a call on a switched circuit when it needs to send data. In a DDR setup, the router is configured to initiate the call when certain criteria are met, such as a particular type of network traffic needing to be transmitted. When the connection is made, traffic passes over the line. The router configuration specifies an idle timer that tells the router to drop the connection when the circuit has remained idle for a certain period. Dial backup is another way of configuring DDR. However, in dial backup, the switched circuit is used to provide backup service for another type of circuit, such as point-to-point or packet switching. The router is configured so that when a failure is detected on the primary circuit, the dial backup line is initiated. The dial backup line then supports the WAN connection until the primary circuit is restored. When this occurs, the dial backup connection is terminated. WAN Devices WANs use numerous types of devices that are specific to WAN environments. WAN switches, access servers, modems, CSU/DSUs, and ISDN terminal adapters are discussed in the following sections. Other devices found in WAN environments that are used in WAN implementations include routers, ATM switches, and multiplexers. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 10. WAN Switch A WAN switch is a multiport internetworking device used in carrier networks. These devices typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the data link layer of the OSI reference model. Figure below illustrates two routers at remote ends of a WAN that are connected by WAN switches. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 11. Access Server An access server acts as a concentration point for dial-in and dial-out connections. Figure below illustrates an access server concentrating dial-out connections into a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 12. Modem A modem is a device that interprets digital and analog signals, enabling data to be transmitted over voice-grade telephone lines. At the source, digital signals are converted to a form suitable for transmission over analog communication facilities. At the destination, these analog signals are returned to their digital form. Figure below illustrates a simple modem-to-modem connection through a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 13. CSU/DSU A channel service unit/digital service unit (CSU/DSU) is a digital-interface device used to connect a router to a digital circuit like a T1. The CSU/DSU also provides signal timing for communication between these devices. Figure below illustrates the placement of the CSU/DSU in a WAN implementation. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 14. ISDN Terminal Adapter An ISDN terminal adapter is a device used to connect ISDN Basic Rate Interface (BRI) connections to other interfaces, such as EIA/TIA-232 on a router. A terminal adapter is essentially an ISDN modem, although it is called a terminal adapter because it does not actually convert analog to digital signals. Figure below illustrates the placement of the terminal adapter in an ISDN environment. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 15. Introducing Dynamic Routing Protocol Dynamic routing protocols play an important role in today’s networks. The following sections describe several important benefits that dynamic routing protocols provide. In many networks, dynamic routing protocols are typically used with static routes. Role of Dynamic Routing Protocol What exactly are dynamic routing protocols? Routing protocols are used to facilitate the exchange of routing information between routers. Routing protocols allow routers to dynamically learn information about remote networks and automatically add this information to their own routing tables, as shown below 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 16. Routing protocols determine the best path to each network, which is then added to the routing table. One of the primary benefits of using a dynamic routing protocol is that routers exchange routing information whenever there is a topology change. This exchange allows routers to automatically learn about new networks and also to find alternate paths if there is a link failure to a current network. Dynamic Routing Protocol Operation All routing protocols have the same purpose: to learn about remote networks and to quickly adapt whenever there is a change in the topology. The method that a routing protocol uses to accomplish this depends on the algorithm it uses and the operational characteristics of that protocol. The operations of a dynamic routing protocol vary depending on the type of routing protocol and the specific operations of that routing protocol. The specific operations of RIP, EIGRP, and OSPF are examined in later chapters. In general, the operations of a dynamic routing protocol can be described as follows: 1. The router sends and receives routing messages on its interfaces. 2. The router shares routing messages and routing information with other routers that are using the same routing protocol. 3. Routers exchange routing information to learn about remote networks. 4. When a router detects a topology change, the routing protocol can advertise this change to other routers. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 17. Classifying Dynamic Routing Protocols Routing protocols can be classified into different groups according to their characteristics: ■ IGP or EGP ■ Distance vector or link-state ■ Classful or classless The sections that follow discuss these classification schemes in more detail. The most commonly used routing protocols are as follows: ■ RIP: A distance vector interior routing protocol ■ IGRP: The distance vector interior routing protocol developed by Cisco (deprecated from Cisco IOS Release 12.2 and later) ■ OSPF: A link-state interior routing protocol ■ IS-IS: A link-state interior routing protocol ■ EIGRP: The advanced distance vector interior routing protocol developed by Cisco ■ BGP: A path vector exterior routing protocol 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 18. IGP and EGP An autonomous system (AS)—otherwise known as a routing domain—is a collection of routers under a common administration. Typical examples are a company’s internal network and an ISP’s network. Because the Internet is based on the autonomous system concept, two types of routing protocols are required: interior and exterior routing protocols. These protocols are ■ Interior gateway protocols (IGP): Used for intra-autonomous system routing, that is, routing inside an autonomous system ■ Exterior gateway protocols (EGP): Used for inter-autonomous system routing, that is, routing between autonomous systems 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 19. Distance Vector and Link-State Routing Protocols Interior gateway protocols (IGP) can be classified as two types: ■ Distance vector routing protocols ■ Link-state routing protocols Distance vector protocols work best in situations where ■ The network is simple and flat and does not require a hierarchical design. ■ The administrators do not have enough knowledge to configure and troubleshoot linkstate protocols. ■ Specific types of networks, such as hub-and-spoke networks, are being implemented. ■Worst-case convergence times in a network are not a concern. Link-state protocols work best in situations where ■ The network design is hierarchical, usually occurring in large networks. ■ The administrators have a good knowledge of the implemented link-state routing protocol. ■ Fast convergence of the network is crucial. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 20. Classful and Classless Routing Protocols All routing protocols can also be classified as either ■ Classful routing protocols ■ Classless routing protocols Classful Routing Protocols Classful routing protocols do not send subnet mask information in routing updates. The first routing protocols, such as RIP, were classful. This was at a time when network addresses were allocated based on classes: Class A, B, or C. A routing protocol did not need to include the subnet mask in the routing update because the network mask could be determined based on the first octet of the network address. Classful routing protocols can still be used in some of today’s networks, but because they do not include the subnet mask, they cannot be used in all situations. Classful routing protocols cannot be used when a network is subnetted using more than one subnet mask. In other words, classful routing protocols do not support variable-length subnet masks (VLSM). 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 21. Classless Routing Protocols Classless routing protocols include the subnet mask with the network address in routing updates. Today’s networks are no longer allocated based on classes, and the subnet mask cannot be determined by the value of the first octet. Classless routing protocols are required in most networks today because of their support for VLSM, discontinuous network. Convergence when the routing tables of all routers are at a state of consistency. The network has converged when all routers have complete and accurate information about the network. Convergence time is the time it takes routers to share information, calculate best paths, and update their routing tables. A network is not completely operable until the network has converged; therefore, most networks require short convergence times. Metrics Metrics are a way to measure or compare. Routing protocols use metrics to determine which route is the best path. Purpose of a Metric There are cases when a routing protocol learns of more than one route to the same destination. To select the best path, the routing protocol must be able to evaluate and Differentiate among the available paths. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 22. Metrics and Routing Protocols Different routing protocols use different metrics. The metric used by one routing protocol is not comparable to the metric used by an Metric Parameters Two different routing protocols might choose different paths to the same destination because of using different metrics. other routing protocol. Metrics used in IP routing protocols include the following: Hop count: A simple metric that counts the number of routers a packet must traverse. Bandwidth: Influences path selection by preferring the path with the highest bandwidth. Load: Considers the traffic utilization of a certain link. Delay: Considers the time a packet takes to traverse a path. Reliability: Assesses the probability of a link failure, calculated from the interface error count or previous link failures. Cost: A value determined either by the IOS or by the network administrator to indicate preference for a route. Cost can represent a metric, a combination of metrics, or a policy. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 23. Metric Field in the Routing Table The routing table displays the metric for each dynamic and static route Remember that static routes always have a metric of 0. The list that follows defines the metric for each routing protocol: ■ RIP: Hop count: Best path is chosen by the route with the lowest hop count. ■ IGRP and EIGRP: Bandwidth, delay, reliability, and load: Best path is chosen by the route with the smallest composite metric value calculated from these multiple parameters. By default, only bandwidth and delay are used. ■ IS-IS and OSPF: Cost: Best path is chosen by the route with the lowest cost. The Cisco implementation of OSPF uses bandwidth to determine the cost. IS-IS is discussed in CCNP. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 24. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group The metric associated with a certain route can be best viewed using the show ip route command. The metric value is the second value in the brackets for a routing table entry Building a Medium-Sized Network
  • 25. Load Balancing You now know that individual routing protocols use metrics to determine the best route to reach remote networks. But what happens when two or more routes to the same destination have identical metric values? How will the router decide which path to use for packet forwarding? In this case, the router does not choose only one route. Instead, the router load balances between these equal-cost paths. The packets are forwarded using all equal-cost paths. Purpose of Administrative Distance Before the routing process can determine which route to use when forwarding a packet, it must first determine which routes to include in the routing table. There can be times when a router learns a route to a remote network from more than one routing source. The routing process will need to determine which routing source to use. Administrative distance is used for this purpose. Administrative distance (AD) defines the preference of a routing source. Each routing source—including specific routing protocols, static routes, and even directly connected networks—is prioritized in order of most to least preferable using an administrative distance value. Cisco routers use the AD feature to select the best path when they learn about the same destination network from two or more different routing sources. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 26. The AD value can also be verified with the show ip protocols command. This command displays all pertinent information about routing protocols operating on the router. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 27. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network Default Administrative Distances
  • 28. Implementing OSPF OSPF typically requires coordination among many internal routers, area border routers (routers connected to multiple areas), and autonomous system boundary routers. At a minimum, OSPF-based routers or access servers can be configured with all default parameter values, no authentication, and interfaces assigned to areas. If you intend to customize your environment, you must ensure coordinated configurations of all routers. To configure OSPF, complete the tasks in the following sections. Enabling OSPF is mandatory; the other tasks are optional, but might be required for your application. Enable OSPF • Configure OSPF Interface Parameters • Configure OSPF over Different Physical Networks • Configure OSPF Area Parameters • Configure OSPF Not So Stubby Area (NSSA) • Configure Route Summarization between OSPF Areas • Configure Route Summarization when Redistributing Routes into OSPF • Create Virtual Links • Generate a Default Route 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 29. • Configure Lookup of DNS Names • Force the Router ID Choice with a Loopback Interface • Control Default Metrics • Configure OSPF on Simplex Ethernet Interfaces • Configure Route Calculation Timers • Configure OSPF over On Demand Circuits • Log Neighbor Changes • Monitor and Maintain OSPF Enable OSPF As with other routing protocols, enabling OSPF requires that you create an OSPF routing process, specify the range of IP addresses to be associated with the routing process, and assign area IDs to be associated with that range of IP addresses. Perform the following tasks, starting in global configuration mode. Step 1 Enable OSPF routing. router ospf process-id Step 2 Define an interface on which OSPF runs and define the area ID for that interface. network address wildcard-mask area area-id 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 30. Configure OSPF Interface Parameters Our OSPF implementation allows you to alter certain interface-specific OSPF parameters, as needed. You are not required to alter any of these parameters, but some interface parameters must be consistent across all routers in an attached network. Those parameters are controlled by the ip ospf hello-interval, ip ospf dead-interval, and ip ospf authentication key. commands. Therefore, be sure that if you do configure any of these parameters, the configurations for all routers on your network have compatible values. Step 1: Explicitly specify the cost of sending a packet on an OSPF interface. ip ospf cost cost. Step 2: Specify the number of seconds between link state advertisement retransmissions for adjacencies belonging to an OSPF interface. ip ospf retransmit-intervalseconds. Step 3: Set the estimated number of seconds it takes to transmit a link state update packet on an OSPF interface. ip ospf transmit-delay seconds Strep:4 Set priority to help determine the OSPF designated router for a network. ip ospf priority number 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 31. Step 5: Specify the length of time, in seconds, between the hello packets that the Cisco IOS software sends on an OSPF interface. ip ospf hello-intervalseconds Step 6: Set the number of seconds that a device’s hello packets must not have been seen before its neighbors declare the OSPF router down. ip ospf dead-intervalseconds Step 7: Assign a specific password to be used by neighboring OSPF routers on a network segment that is using OSPF’s simple password authentication. ip ospf authentication-key key Step 8: Enable OSPF MD5 authentication. ip ospf message-digest-key keyid md5 key 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 32. Configure Your OSPF Network Type You have the choice of configuring your OSPF network type as either broadcast or nonbroadcast multiaccess, regardless of the default media type. Using this feature, you can configure broadcast networks as nonbroadcast multiaccess networks when, for example, you have routers in your network that do not support multicast addressing. You also can configure nonbroadcast multiaccess networks (such as X.25, Frame Relay, and SMDS) as broadcast networks. Configuring nonbroadcast, multiaccess networks as either broadcast or nonbroadcast assumes that there are virtual circuits from every router to every router or fully meshed network. This is not true for some cases, for example, because of cost constraints, or when you have only a partially meshed network. In these cases, you can configure the OSPF network type as a point-to-multipoint network. Routing between two routers not directly connected will go through the router that has virtual circuits to both routers. Note that you must not configure neighbors when using this feature. Configure the OSPF network type for a ip ospf network {broadcast | non-broadcast | point-to-multipoint} specified interface 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 33. Configure OSPF for Nonbroadcast Networks Because there might be many routers attached to an OSPF network, a designated router is selected for the network. It is necessary to use special configuration parameters in the designated router selection if broadcast capability is not configured. Configure routers or access servers interconnecting to nonbroadcast networks neighbor ip-address[priority number] [poll-interval seconds] You can specify the following neighbor parameters, as required: • Priority for a neighboring router • Nonbroadcast poll interval • Interface through which the neighbor is reachable Configure OSPF Not So Stubby Area (NSSA) NSSA area is similar to OSPF stub area. NSSA does not flood Type 5 external link state advertisements (LSAs) from the core into the area, but it has the ability of importing AS external routes in a limited fashion within the area. NSSA allows importing of Type 7 AS external routes within NSSA area by redistribution. These Type 7 LSAs are translated into Type 5 LSAs by NSSA ABR which are flooded throughout the whole routing domain. Summarization and filtering are supported during the translation.Use NSSA to simplify administration if you are an Internet service provider (ISP), or a network administrator that must connect a central site using OSPF to a remote site that is using a different routing protocol. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 34. Define an area to be NSSA area area-id nssa [no-redistribution] [default-information-originate] Configure Route Summarization between OSPF Areas Route summarization is the consolidation of advertised addresses. This feature causes a single summary route to be advertised to other areas by an ABR. In OSPF, an ABR will advertise networks in one area into another area. If the network numbers in an area are assigned in a way such that they are contiguous, you can configure the ABR to advertise a summary route that covers all the individual networks within the area that fall into the specified range.To specify an address range, perform the following task in router configuration mode: Specify an address range for which a single route will be advertised area area-id range address mask 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 35. Generate a Default Route You can force an autonomous system boundary router to generate a default route into an OSPF routing domain. Whenever you specifically configure redistribution of routes into an OSPF routing domain, the router automatically becomes an autonomous system boundary router. However, an autonomous system boundary router does not, by default, generate a default route into the OSPF routing domain. To force the autonomous system boundary router to generate a default route, perform the following task in router configuration mode: Force the autonomous system boundary router to generate a default route into the OSPF routing domain- default-information originate [always] [metric metric-value] [metric-type type-value] [route-map map-name] Configure Lookup of DNS Names You can configure OSPF to look up Domain Naming System (DNS) names for use in all OSPF show command displays. This feature makes it easier to identify a router, because it is displayed by name rather than by its router ID or neighbor ID. To configure DNS name lookup, perform the following task in global configuration mode: Configure DNS name lookup. - ip ospf name-lookup 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 36. Control Default Metrics In Cisco IOS Release 10.3 and later, by default, OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. For example, a 64K link gets a metric of 1562, while a T1 link gets a metric of 64.The OSPF metric is calculated asref-bw divided by bandwidth, with ref-bw equal to 108 by default,and bandwidth determined by the bandwidth command. The calculation gives FDDI a metric of 1. If you have multiple links with high bandwidth, you might want to specify a larger number to differentiate the cost on those links. To do so, perform the following task in router configuration mode: Differentiate high bandwidth links - ospf auto-cost reference-bandwidth ref-bw Monitor and Maintain OSPF You can display specific statistics such as the contents of IP routing tables, caches, and databases. Information provided can be used to determine resource utilization and solve network problems. You can also display information about node reachability and discover the routing path your device’s packets are taking through the network. To display various routing statistics, perform the following tasks in EXEC mode: Display general information about OSPF routing processes- show ip ospf [process-id] 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 37. Display lists of information related to the OSPF database show ip ospf [process-id area-id] database show ip ospf [process-id area-id] database [router] [link-state-id] show ip ospf [process-id area-id] database [network] [link-state-id] show ip ospf [process-id area-id] database [summary] [link-state-id] show ip ospf [process-id area-id] database [asb-summary] [link-state-id] show ip ospf [process-id] database [external] [link-state-id] show ip ospf [process-id area-id] database [database-summary] 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 38. Display the internal OSPF routing table entries to Area Border Router (ABR) and Autonomous System Boundary Router (ASBR). show ip ospf border-routers Display OSPF-related interface information show ip ospf interface [interface-name] Display OSPF-neighbor infrmation on a per-interface basis. show ip ospf neighbor [interface-name] [neighbor-id] Detail Display OSPF-related virtual links information show ip ospf virtual-links 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 39. Lessons learned: WAN technologies. What is dynamic protocols and their different parameters and functions. Configuring OSPF. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network