SlideShare une entreprise Scribd logo
1  sur  60
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 19: Single-Area
OSPF
Routing & Switching
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8
8.1 Characteristics of OSPF
8.2 Configuring Single-area OSPFv2
8.3 Configure Single-area OSPFv3
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Objectives
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Evolution of OSPF
Interior Gateway Protocols
1988
1989
updated in
2008
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Features of OSPF
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Components of OSPF
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Components of OSPF (cont.)
OSPF Routers Exchange Packets - These packets are
used to discover neighboring routers and also to
exchange routing information to maintain accurate
information about the network.
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Link-State Operation
If a neighbor is present,
the OSPF-enabled
router attempts to
establish a neighbor
adjacency with that
neighbor
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Link-State Operation (cont.)
 LSAs contain the state
and cost of each directly
connected link.
 Routers flood their LSAs
to adjacent neighbors.
 Adjacent neighbors
receiving the LSA
immediately flood the LSA
to other directly connected
neighbors, until all routers
in the area have all LSAs.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Link-State Operation
 Build the topology table
based on the received
LSAs.
 This database eventually
holds all the information
about the topology of the
network.
 Execute the SPF
Algorithm.
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Link-State Operation (cont.)
From the SPF tree,
the best paths are
inserted into the
routing table.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Single-area and Multiarea OSPF
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Open Shortest Path First
Single-area and Multiarea OSPF (cont.)
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Encapsulating OSPF Messages
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Types of OSPF Packets
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Hello Packet
OSPF Type 1 packet = Hello packet:
 Discover OSPF neighbors and establish
neighbor adjacencies.
 Advertise parameters on which two routers
must agree to become neighbors.
 Elect the Designated Router (DR) and
Backup Designated Router (BDR) on
multiaccess networks like Ethernet and
Frame Relay.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Hello Packet (cont.)
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Hello Packet Intervals
OSPF Hello packets are transmitted:
 To 224.0.0.5 in IPv4 and FF02::5 in IPv6 (all OSPF
routers)
 Every 10 seconds (default on multiaccess and point-to-
point networks)
 Every 30 seconds (default on non-broadcast
multiaccess [NBMA] networks)
 Dead interval is the period that the router waits to
receive a Hello packet before declaring the neighbor
down
 Router floods the LSDB with information about down
neighbors out all OSPF enabled interfaces
 Cisco’s default is 4 times the Hello interval
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Messages
Link-State Updates
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
OSPF Operational States
When an OSPF router is
initially connected to a
network, it attempts to:
 Create adjacencies
with neighbors
 Exchange routing
information
 Calculate the best
routes
 Reach convergence
 OSPF progresses
through several states
while attempting to
reach convergence.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
Establish Neighbor Adjacencies
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
Establish Neighbor Adjacencies (cont.)
DR and BDR election only occurs on multi-access networks such as Ethernet LANs.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
OSPF DR and BDR
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
Synchronizing OSPF Database
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Operation
Synchronizing OSPF Database (cont.)
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Router ID
OSPF Network Topology
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Router ID
Router IDs
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Single-area OSPFv2
The network Command
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 By default, OSPF messages are forwarded out all OSPF-enabled
interfaces. However, these messages really only need to be sent
out interfaces connecting to other OSPF-enabled routers.
 Sending out unneeded messages on a LAN affects the network in
three ways:
 Inefficient Use of Bandwidth
 Inefficient Use of Resources
 Increased Security Risk
 The Passive Interface feature helps limiting the scope of routing
updates advertisements.
Configure Single-Area OSPFv2
Passive Interface
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Single-area OSPFv2
Configuring Passive Interfaces
Use the passive-interface router
configuration mode command to prevent the
transmission of routing messages through a
router interface, but still allow that network to
be advertised to other routers.
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
OSPF Metric = Cost
Cost = reference bandwidth / interface bandwidth
(default reference bandwidth is 10^8)
Cost = 100,000,000 bps / interface bandwidth in bps
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
OSPF Accumulates Costs
Cost of an OSPF route is the accumulated value from one router to the
destination network.
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
Adjusting the Reference Bandwidth
 Use the command - auto-cost reference-bandwidth
 Must be configured on every router in the OSPF domain
 Notice that the value is expressed in Mb/s:
 Gigabit Ethernet - auto-cost reference-bandwidth 1000
 10 Gigabit Ethernet - auto-cost reference-bandwidth 10000
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
Default Interface Bandwidths
On Cisco routers, the default bandwidth on most serial interfaces is set to
1.544 Mb/s.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
Adjusting the Interface Bandwidths
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Cost
Manually Setting the OSPF Cost
Both the bandwidth interface command and the ip ospf cost interface
command achieve the same result, which is to provide an accurate
value for use by OSPF in determining the best route.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPF
Verify OSPF Neighbors
Verify that the router has formed an adjacency with
its neighboring routers.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPF
Verify OSPF Protocol Settings
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPF
Verify OSPF Process Information
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPF
Verify OSPF Interface Settings
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPFv2 vs. OSPFv3
OSPFv3
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPFv2 vs. OSPFv3
Similarities Between OSPFv2 to OSPFv3
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPFv2 vs. OSPFv3
Differences Between OSPFv2 to OSPFv3
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPFv2 vs. OSPFv3
Link-Local Addresses
FF02::5 address is the all OSPF router address
FF02::6 is the DR/BDR multicast address
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
OSPFv3 Network Topology
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
OSPFv3 Network Topology (cont.)
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
Link-Local
Addresses
 Link-local addresses are automatically created when an IPv6 global unicast
address is assigned to the interface (required).
 Global unicast addresses are not required.
 Cisco routers create the link-local address using FE80::/10 prefix and the
EUI-64 process unless the router is configured manually,
 EUI-64 involves using the 48-bit Ethernet MAC address, inserting FFFE in
the middle and flipping the seventh bit. For serial interfaces, Cisco uses the
MAC address of an Ethernet interface.
 Notice in the figure that all three interfaces are using the same link-local
address.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
Assigning Link-Local Addresses
Manually
configuring the link-
local address
provides the ability
to create an
address that is
recognizable and
easier to remember.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
Configuring the OSPFv3 Router ID
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
Configuring the OSPFv3 Router ID (cont.)
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configuring OSFPv3
Modifying an OSPFv3 Router ID
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
OSPF Configuring OSFPv3
Enabling OSPFv3 on Interfaces
Instead of using the network router configuration mode
command to specify matching interface addresses,
OSPFv3 is configured directly on the interface.
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPFv3
Verify OSPFv3 Neighbors/Protocol Settings
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPFv3
Verify OSPFv3 Interfaces
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify OSPFv3
Verify IPv6 Routing Table
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary
OSPF:
 For IPv4 is OSPFv2
 For IPv6 is OSPFv3
 Classless, link-state routing protocol with a default administrative
distance of 110, and is denoted in the routing table with a route
source code of O
 OSPFv2 is enabled with the router ospf process-id global
configuration mode command. The process-id value is locally
significant, which means that it does not need to match other OSPF
routers to establish adjacencies with those neighbors.
 Network command uses the wildcard-mask value which is the
inverse of the subnet mask, and the area-id value
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary (cont.)
OSPF:
 By default, OSPF Hello packets are sent every 10 seconds on
multiaccess and point-to-point segments and every 30 seconds on
NBMA segments (Frame Relay, X.25, ATM), and are used by OSPF
to establish neighbor adjacencies. The Dead interval is four times the
Hello interval, by default.
 For routers to become adjacent, their Hello interval, Dead interval,
network types, and subnet masks must match. Use the show ip ospf
neighborscommand to verify OSPF adjacencies.
 In a multiaccess network, OSPF elects a DR to act as collection and
distribution point for LSAs sent and received. A BDR is elected to
assume the role of the DR should the DR fail. All other routers are
known as DROTHERs. All routers send their LSAs to the DR, which
then floods the LSA to all other routers in the multiaccess network.
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary (cont.)
OSPF:
 In multiaccess networks, the router with the highest router ID is the
DR, and the router with the second highest router ID is the BDR. This
can be superseded by the ip ospf priority command on that
interface. The router with the highest priority value is the DR, and
next-highest the BDR.
 The show ip protocols command is used to verify important OSPF
configuration information, including the OSPF process ID, the router
ID, and the networks the router is advertising.
 OSPFv3 is enabled on an interface and not under router
configuration mode. OSPFv3 needs link-local addresses to be
configured. IPv6 Unicast routing must be enabled for OSPFv3. A 32-
bit router-ID is required before an interface can be enabled for
OSPFv3.
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8: Summary (cont.)
OSPF:
 The show ip protocols command is used to verify important
OSPFv2 configuration information, including the OSPF process ID,
the router ID, and the networks the router is advertising.
 OSPFv3
• Enabled on an interface and not under router configuration
mode
• Needs link-local addresses to be configured. IPv6
• Unicast routing must be enabled for OSPFv3
• 32-bit router-ID is required before an interface can be enabled
for OSPFv3
• show ipv6 protocols command is a quick way to verify
configuration information (OSPF process ID, the router ID, and
the interfaces enabled for OSPFv3)
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Contenu connexe

Tendances

CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8Nil Menon
 
CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3Andy Juan Sarango Veliz
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsVuz Dở Hơi
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access Vuz Dở Hơi
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsVuz Dở Hơi
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10Nil Menon
 

Tendances (20)

CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4CCNP ROUTE V7 CH4
CCNP ROUTE V7 CH4
 
CCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static RoutingCCNAv5 - S2: Chapter 6 Static Routing
CCNAv5 - S2: Chapter 6 Static Routing
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3CCNP v6 Route: Implementing IP Routing Chapter 3
CCNP v6 Route: Implementing IP Routing Chapter 3
 
CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5CCNP ROUTE V7 CH5
CCNP ROUTE V7 CH5
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7CCNP ROUTE V7 CH7
CCNP ROUTE V7 CH7
 
CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
CCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband SolutionsCCMAv5 - S4: Chapter 6: Broadband Solutions
CCMAv5 - S4: Chapter 6: Broadband Solutions
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 07
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 

Similaire à Chapter 19 : single-area ospf

RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxjagali
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFVuz Dở Hơi
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfVuz Dở Hơi
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Sachii Dosti
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6Irsandi Hasan
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11Irsandi Hasan
 
Week9(1)
Week9(1)Week9(1)
Week9(1)trayyoo
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6Irsandi Hasan
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11Joshua Torres
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsYaser Rahmati
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalFisal Anwari
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6Nil Menon
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6Irsandi Hasan
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1Waqas Ahmed Nawaz
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1Chaing Ravuth
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8Chaing Ravuth
 

Similaire à Chapter 19 : single-area ospf (20)

RS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptxRS_InstructorPPT_Chapter8.pptx
RS_InstructorPPT_Chapter8.pptx
 
CCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPFCCNAv5 - S3: Chapter6 Multiarea OSPF
CCNAv5 - S3: Chapter6 Multiarea OSPF
 
Chapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospfChapter5 adjust and troubleshoot single area ospf
Chapter5 adjust and troubleshoot single area ospf
 
Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11Exploration routing chapter 10 & 11
Exploration routing chapter 10 & 11
 
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 6
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
Week9(1)
Week9(1)Week9(1)
Week9(1)
 
CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6CCNA RS_ITN - Chapter 6
CCNA RS_ITN - Chapter 6
 
Exploration routing chapter_11
Exploration routing chapter_11Exploration routing chapter_11
Exploration routing chapter_11
 
Itn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layerItn instructor ppt_chapter6_network_layer
Itn instructor ppt_chapter6_network_layer
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6CCNA Discovery 3 - Chapter 6
CCNA Discovery 3 - Chapter 6
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
 

Plus de teknetir

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapteknetir
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyteknetir
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingteknetir
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsteknetir
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksteknetir
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsteknetir
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionteknetir
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsteknetir
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversteknetir
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingteknetir
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceteknetir
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringteknetir
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingteknetir
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsteknetir
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingteknetir
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksteknetir
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceteknetir
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingteknetir
 
Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4teknetir
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCPteknetir
 

Plus de teknetir (20)

آموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmapآموزش کوتاه و کاربردی Nmap
آموزش کوتاه و کاربردی Nmap
 
CEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptographyCEHv9 : module 18 - cryptography
CEHv9 : module 18 - cryptography
 
CEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computingCEHv9 : module 17 - cloud computing
CEHv9 : module 17 - cloud computing
 
CEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypotsCEHv9 : module 16 - evading ids firewalls and honeypots
CEHv9 : module 16 - evading ids firewalls and honeypots
 
CEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networksCEHv9 : module 14 - hacking wireless networks
CEHv9 : module 14 - hacking wireless networks
 
CEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platformsCEHv9 : module 15 - hacking mobile platforms
CEHv9 : module 15 - hacking mobile platforms
 
CEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injectionCEHv9 : module 13 - SQL injection
CEHv9 : module 13 - SQL injection
 
CEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applicationsCEHv9 : module 12 - hacking web applications
CEHv9 : module 12 - hacking web applications
 
CEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web serversCEHv9 : module 11 - hacking web servers
CEHv9 : module 11 - hacking web servers
 
CEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijackingCEHv9 : module 10 - session hijacking
CEHv9 : module 10 - session hijacking
 
CEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of serviceCEHv9 : module 09 : denial of service
CEHv9 : module 09 : denial of service
 
CEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineeringCEHv9 : module 08 - social engineering
CEHv9 : module 08 - social engineering
 
CEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffingCEHv9 : module 07 - sniffing
CEHv9 : module 07 - sniffing
 
CEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threatsCEHv9 : module 06 - malware threats
CEHv9 : module 06 - malware threats
 
CEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hackingCEHv9 : module 05 - system hacking
CEHv9 : module 05 - system hacking
 
CEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networksCEHv9 : module 03 - scanning networks
CEHv9 : module 03 - scanning networks
 
CEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissanceCEHv9 : module 02 - footprinting and reconnaissance
CEHv9 : module 02 - footprinting and reconnaissance
 
CEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hackingCEHv9 : module 01 - introduction to ethical hacking
CEHv9 : module 01 - introduction to ethical hacking
 
Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4Chapter 22 : network address translation for IPv4
Chapter 22 : network address translation for IPv4
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCP
 

Dernier

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 

Dernier (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 

Chapter 19 : single-area ospf

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 19: Single-Area OSPF Routing & Switching
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8 8.1 Characteristics of OSPF 8.2 Configuring Single-area OSPFv2 8.3 Configure Single-area OSPFv3
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Objectives
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Evolution of OSPF Interior Gateway Protocols 1988 1989 updated in 2008
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Features of OSPF
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Components of OSPF
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Components of OSPF (cont.) OSPF Routers Exchange Packets - These packets are used to discover neighboring routers and also to exchange routing information to maintain accurate information about the network.
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Link-State Operation If a neighbor is present, the OSPF-enabled router attempts to establish a neighbor adjacency with that neighbor
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Link-State Operation (cont.)  LSAs contain the state and cost of each directly connected link.  Routers flood their LSAs to adjacent neighbors.  Adjacent neighbors receiving the LSA immediately flood the LSA to other directly connected neighbors, until all routers in the area have all LSAs.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Link-State Operation  Build the topology table based on the received LSAs.  This database eventually holds all the information about the topology of the network.  Execute the SPF Algorithm.
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Link-State Operation (cont.) From the SPF tree, the best paths are inserted into the routing table.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Single-area and Multiarea OSPF
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Open Shortest Path First Single-area and Multiarea OSPF (cont.)
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Encapsulating OSPF Messages
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Types of OSPF Packets
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Hello Packet OSPF Type 1 packet = Hello packet:  Discover OSPF neighbors and establish neighbor adjacencies.  Advertise parameters on which two routers must agree to become neighbors.  Elect the Designated Router (DR) and Backup Designated Router (BDR) on multiaccess networks like Ethernet and Frame Relay.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Hello Packet (cont.)
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Hello Packet Intervals OSPF Hello packets are transmitted:  To 224.0.0.5 in IPv4 and FF02::5 in IPv6 (all OSPF routers)  Every 10 seconds (default on multiaccess and point-to- point networks)  Every 30 seconds (default on non-broadcast multiaccess [NBMA] networks)  Dead interval is the period that the router waits to receive a Hello packet before declaring the neighbor down  Router floods the LSDB with information about down neighbors out all OSPF enabled interfaces  Cisco’s default is 4 times the Hello interval
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Messages Link-State Updates
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation OSPF Operational States When an OSPF router is initially connected to a network, it attempts to:  Create adjacencies with neighbors  Exchange routing information  Calculate the best routes  Reach convergence  OSPF progresses through several states while attempting to reach convergence.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation Establish Neighbor Adjacencies
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation Establish Neighbor Adjacencies (cont.) DR and BDR election only occurs on multi-access networks such as Ethernet LANs.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation OSPF DR and BDR
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation Synchronizing OSPF Database
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Operation Synchronizing OSPF Database (cont.)
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Router ID OSPF Network Topology
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Router ID Router IDs
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Single-area OSPFv2 The network Command
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  By default, OSPF messages are forwarded out all OSPF-enabled interfaces. However, these messages really only need to be sent out interfaces connecting to other OSPF-enabled routers.  Sending out unneeded messages on a LAN affects the network in three ways:  Inefficient Use of Bandwidth  Inefficient Use of Resources  Increased Security Risk  The Passive Interface feature helps limiting the scope of routing updates advertisements. Configure Single-Area OSPFv2 Passive Interface
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Single-area OSPFv2 Configuring Passive Interfaces Use the passive-interface router configuration mode command to prevent the transmission of routing messages through a router interface, but still allow that network to be advertised to other routers.
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost OSPF Metric = Cost Cost = reference bandwidth / interface bandwidth (default reference bandwidth is 10^8) Cost = 100,000,000 bps / interface bandwidth in bps
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost OSPF Accumulates Costs Cost of an OSPF route is the accumulated value from one router to the destination network.
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost Adjusting the Reference Bandwidth  Use the command - auto-cost reference-bandwidth  Must be configured on every router in the OSPF domain  Notice that the value is expressed in Mb/s:  Gigabit Ethernet - auto-cost reference-bandwidth 1000  10 Gigabit Ethernet - auto-cost reference-bandwidth 10000
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost Default Interface Bandwidths On Cisco routers, the default bandwidth on most serial interfaces is set to 1.544 Mb/s.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost Adjusting the Interface Bandwidths
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Cost Manually Setting the OSPF Cost Both the bandwidth interface command and the ip ospf cost interface command achieve the same result, which is to provide an accurate value for use by OSPF in determining the best route.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPF Verify OSPF Neighbors Verify that the router has formed an adjacency with its neighboring routers.
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPF Verify OSPF Protocol Settings
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPF Verify OSPF Process Information
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPF Verify OSPF Interface Settings
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPFv2 vs. OSPFv3 OSPFv3
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPFv2 vs. OSPFv3 Similarities Between OSPFv2 to OSPFv3
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPFv2 vs. OSPFv3 Differences Between OSPFv2 to OSPFv3
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPFv2 vs. OSPFv3 Link-Local Addresses FF02::5 address is the all OSPF router address FF02::6 is the DR/BDR multicast address
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 OSPFv3 Network Topology
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 OSPFv3 Network Topology (cont.)
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 Link-Local Addresses  Link-local addresses are automatically created when an IPv6 global unicast address is assigned to the interface (required).  Global unicast addresses are not required.  Cisco routers create the link-local address using FE80::/10 prefix and the EUI-64 process unless the router is configured manually,  EUI-64 involves using the 48-bit Ethernet MAC address, inserting FFFE in the middle and flipping the seventh bit. For serial interfaces, Cisco uses the MAC address of an Ethernet interface.  Notice in the figure that all three interfaces are using the same link-local address.
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 Assigning Link-Local Addresses Manually configuring the link- local address provides the ability to create an address that is recognizable and easier to remember.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 Configuring the OSPFv3 Router ID
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 Configuring the OSPFv3 Router ID (cont.)
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configuring OSFPv3 Modifying an OSPFv3 Router ID
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential OSPF Configuring OSFPv3 Enabling OSPFv3 on Interfaces Instead of using the network router configuration mode command to specify matching interface addresses, OSPFv3 is configured directly on the interface.
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPFv3 Verify OSPFv3 Neighbors/Protocol Settings
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPFv3 Verify OSPFv3 Interfaces
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify OSPFv3 Verify IPv6 Routing Table
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary OSPF:  For IPv4 is OSPFv2  For IPv6 is OSPFv3  Classless, link-state routing protocol with a default administrative distance of 110, and is denoted in the routing table with a route source code of O  OSPFv2 is enabled with the router ospf process-id global configuration mode command. The process-id value is locally significant, which means that it does not need to match other OSPF routers to establish adjacencies with those neighbors.  Network command uses the wildcard-mask value which is the inverse of the subnet mask, and the area-id value
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary (cont.) OSPF:  By default, OSPF Hello packets are sent every 10 seconds on multiaccess and point-to-point segments and every 30 seconds on NBMA segments (Frame Relay, X.25, ATM), and are used by OSPF to establish neighbor adjacencies. The Dead interval is four times the Hello interval, by default.  For routers to become adjacent, their Hello interval, Dead interval, network types, and subnet masks must match. Use the show ip ospf neighborscommand to verify OSPF adjacencies.  In a multiaccess network, OSPF elects a DR to act as collection and distribution point for LSAs sent and received. A BDR is elected to assume the role of the DR should the DR fail. All other routers are known as DROTHERs. All routers send their LSAs to the DR, which then floods the LSA to all other routers in the multiaccess network.
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary (cont.) OSPF:  In multiaccess networks, the router with the highest router ID is the DR, and the router with the second highest router ID is the BDR. This can be superseded by the ip ospf priority command on that interface. The router with the highest priority value is the DR, and next-highest the BDR.  The show ip protocols command is used to verify important OSPF configuration information, including the OSPF process ID, the router ID, and the networks the router is advertising.  OSPFv3 is enabled on an interface and not under router configuration mode. OSPFv3 needs link-local addresses to be configured. IPv6 Unicast routing must be enabled for OSPFv3. A 32- bit router-ID is required before an interface can be enabled for OSPFv3.
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8: Summary (cont.) OSPF:  The show ip protocols command is used to verify important OSPFv2 configuration information, including the OSPF process ID, the router ID, and the networks the router is advertising.  OSPFv3 • Enabled on an interface and not under router configuration mode • Needs link-local addresses to be configured. IPv6 • Unicast routing must be enabled for OSPFv3 • 32-bit router-ID is required before an interface can be enabled for OSPFv3 • show ipv6 protocols command is a quick way to verify configuration information (OSPF process ID, the router ID, and the interfaces enabled for OSPFv3)
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential