This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Multilayer switching allows a single device to perform both layer 2 switching and layer 3 routing. It uses application-specific integrated circuits (ASICs) to store routing and forwarding information in hardware tables, allowing traffic to be forwarded at line speed with little delay. Multilayer switches can create a switched virtual interface (SVI) for each VLAN to allow routing between VLANs, functioning similarly to a router but with the ports remaining at layer 2. Cisco Express Forwarding (CEF) further improves efficiency by building forwarding tables to store layer 2 and layer 3 information, allowing very fast lookups and transmission of traffic through the switch.
Route authentication allows routers to authenticate routing updates by exchanging passwords or keys. It prevents routers without the correct authentication from participating in the routing process. There are two main types: simple password authentication uses a shared password, while MD5 authentication uses cryptographic hashes to authenticate packets without sending the key over the wire, making it more secure. The document provides sample configurations for enabling simple password authentication on RIPv2, EIGRP and OSPF routing protocols. It also explains how to configure MD5 authentication which involves additional commands to change the authentication mode.
Spanning Tree Protocol (STP) is standardized as IEEE 802.1D.
Is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
Basically it contains information about the OSPF routing protocol. As much as possible the information was tried to be summarized and a slideshow of visual weight was made.
The document compares Layer 2 and Layer 3 switching. Layer 2 switching uses MAC addresses to forward frames within a broadcast domain, while Layer 3 switching uses IP addresses to forward packets, allowing for greater scalability and security. Some benefits of Layer 2 switching include hardware-based bridging and high speeds, while benefits of Layer 3 switching include scalability, security, QoS, and lower latency.
This document discusses routing protocols including RIP, OSPF, and BGP. It describes the differences between intradomain and interdomain routing. RIP uses distance vector routing, while OSPF uses link state routing based on Dijkstra's algorithm. BGP is an interdomain routing protocol that uses path vector routing to exchange routing information between autonomous systems.
Multilayer switching allows a single device to perform both layer 2 switching and layer 3 routing. It uses application-specific integrated circuits (ASICs) to store routing and forwarding information in hardware tables, allowing traffic to be forwarded at line speed with little delay. Multilayer switches can create a switched virtual interface (SVI) for each VLAN to allow routing between VLANs, functioning similarly to a router but with the ports remaining at layer 2. Cisco Express Forwarding (CEF) further improves efficiency by building forwarding tables to store layer 2 and layer 3 information, allowing very fast lookups and transmission of traffic through the switch.
Route authentication allows routers to authenticate routing updates by exchanging passwords or keys. It prevents routers without the correct authentication from participating in the routing process. There are two main types: simple password authentication uses a shared password, while MD5 authentication uses cryptographic hashes to authenticate packets without sending the key over the wire, making it more secure. The document provides sample configurations for enabling simple password authentication on RIPv2, EIGRP and OSPF routing protocols. It also explains how to configure MD5 authentication which involves additional commands to change the authentication mode.
Spanning Tree Protocol (STP) is standardized as IEEE 802.1D.
Is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
Basically it contains information about the OSPF routing protocol. As much as possible the information was tried to be summarized and a slideshow of visual weight was made.
The document compares Layer 2 and Layer 3 switching. Layer 2 switching uses MAC addresses to forward frames within a broadcast domain, while Layer 3 switching uses IP addresses to forward packets, allowing for greater scalability and security. Some benefits of Layer 2 switching include hardware-based bridging and high speeds, while benefits of Layer 3 switching include scalability, security, QoS, and lower latency.
This document discusses routing protocols including RIP, OSPF, and BGP. It describes the differences between intradomain and interdomain routing. RIP uses distance vector routing, while OSPF uses link state routing based on Dijkstra's algorithm. BGP is an interdomain routing protocol that uses path vector routing to exchange routing information between autonomous systems.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
This document provides an overview of Overlay Transport Virtualization (OTV) including:
OTV allows extending VLANs across multiple sites to provide same IP subnet reachability without needing routing protocols between sites. It uses MAC routing and encapsulates frames with multicast or unicast to remote sites.
OTV edge devices run IS-IS to exchange MAC addresses and build adjacencies. Frames are encapsulated at ingress edge device and decapsulated at egress, caching ARP entries for remote MACs.
Considerations for OTV include using M-Series cards, IGMPv3 on join interfaces, defining multiple data groups, and localizing FHRP protocols to avoid suboptimal routing. OTV
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
OSPF is a link-state routing protocol that uses link-state information to make routing decisions. Each router running OSPF floods link-state advertisements (LSAs) throughout the area or autonomous system that contain information about that router's attached interfaces and metrics. Routers then use the information in LSAs to calculate the shortest path to each network and build routing tables. OSPF supports different network types including broadcast, point-to-point, non-broadcast multi-access (NBMA), and point-to-multipoint. It elects a designated router on broadcast networks to reduce the number of adjacencies formed and amount of routing information exchanged.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
A WAN connects sites over long distances using leased lines or circuits to exchange information between locations. Key WAN technologies include T1/E1 circuits, frame relay, ATM, and MPLS. Circuit-switched technologies like ISDN provide temporary connections when bandwidth is needed, while dedicated leased lines offer constant connectivity but are more expensive. Common WAN protocols are HDLC, PPP, Frame Relay, and ATM used with CSU/DSU equipment to connect to telephone networks.
This document discusses layer 2 switching fundamentals, including communication methods in LANs such as unicast, broadcast, and multicast. It describes how switches operate including forwarding frames based on the destination address and address table lookups. The document also covers collision domains, broadcast domains, and how switches help segment networks to reduce collisions and broadcast traffic.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Each router using a link-state routing protocol builds a complete and synchronized view of the network topology. This is achieved by routers flooding the network with link-state advertisements (LSAs) that describe the state of their links. With a complete view of the network, routing loops are difficult to occur since each router can independently calculate the optimal path to each destination.
vPC allows links connected to two Nexus switches to appear as a single port channel to a third device. It provides advantages like eliminating STP blocked ports, using all available uplink bandwidth, and fast convergence upon failures. Configuring vPC involves the vPC peer switches, peer link, domain, and member ports. vPC avoids loops at the data plane layer. It can be used within a single data center for active-active server connectivity or between two data centers to extend VLANs across sites at layer 2. Object tracking allows vPC to modify its state based on peer link states.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
This document discusses configuring point-to-point WAN links in Packet Tracer using different encapsulation types such as HDLC, PPP, and Frame Relay. It provides configuration examples for HDLC and PPP links which were successfully implemented. Frame Relay configuration posed more challenges to troubleshoot due to static routing requirements and Packet Tracer limitations. The author learned about Frame Relay configuration but was unable to fully implement it in this lab.
The concept of the spanning tree protocol was devised to address broadcast storming. The spanning tree algorithm itself is defined by the IEEE standard 802.1D and its later revisions.
The IEEE Standard 802.1 uses the term bridge to define the spanning tree operation, and uses terms such as Bridge Protocol Data Units and Root Bridge when defining spanning tree protocol functions.
When a bridge receives a frame, it reads the source and destination address fields. The bridge then enters the frame’s source address in its forwarding database. In doing this the bridge associates the frame’s source address with the network attached to the por t on which the frame was received. The bridge also reads the destination address and if it can find this address in its forwarding database, it forwards the frame to the appropriate port. If the bridge does not recognize the destination address, it forwards the frame out from all its por ts except for the one on which the frame was received, and then waits for a reply. This process is known as “flooding”. Similarly, packets with broadcast or multicast destination MAC addresses will be flooded by a bridge.
A significant problem arises where bridges connect via multiple paths. A frame that arrives with an unknown or broadcast/multicast destination address is flooded over all available paths. The arrival of these frames at another network via different paths and bridges produces major problems. The bridges find the same source MAC address arriving on
multiple different por ts, making it impossible to maintain a reliable forwarding database. As a result, increasing numbers of packets will be forwarded to multiple paths. This process is selfperpetuating and produces a condition known as a packet storm, where the increase of circulating frames can eventually overload the network.
Routers connect different computer networks and forward data packets between them by reading the address information in each packet to determine the ultimate destination. A router contains a routing table with information about connected networks and uses this to determine the best path for packets to travel through multiple networks to reach their destination. There are two main types of routers: core routers connect different cities while edge routers connect users and hosts to networks.
This document summarizes circuit switching and packet switching techniques in communications networks. It discusses how circuit switching establishes a dedicated physical path between communicating nodes but is inefficient for bursty traffic. Packet switching breaks messages into packets that are transmitted over shared links, improving efficiency. Key aspects covered include virtual circuits, datagrams, packet switching advantages, X.25 standards, and how Frame Relay improved on X.25 by reducing overhead.
This document outlines the machine requirements, prerequisites, and expected outcomes for courses on Linux fundamentals, system administration, networking, shell scripting, and internals.
For the fundamentals course, a Pentium 2 500MHz computer with 32MB RAM is recommended. The system administration course requires completion of fundamentals first. After completing fundamentals and system administration, the equivalent of a junior administrator would be achieved. Additional courses build on this knowledge towards senior roles.
The document discusses the history and development of artificial intelligence over the past 70 years. It outlines some of the key milestones in AI research from the early work in the 1950s to modern advances in deep learning. While progress has been made, fully general artificial intelligence that can match or exceed human levels of intelligence remains an ongoing challenge that researchers continue working to achieve.
This document summarizes port channels, virtual port channels (vPC), and multi-chassis etherchannel (MCEC) technologies. It discusses the basic design of vPC including components, initialization stages, best practices, and failure scenarios. Key points covered include vPC domains, roles, peer links, consistency checks, and configuration examples on Nexus 5000/7000/FEX platforms. Enhanced vPC (EvPC) and interactions with first hop redundancy protocols are also summarized.
This document provides an overview of Overlay Transport Virtualization (OTV) including:
OTV allows extending VLANs across multiple sites to provide same IP subnet reachability without needing routing protocols between sites. It uses MAC routing and encapsulates frames with multicast or unicast to remote sites.
OTV edge devices run IS-IS to exchange MAC addresses and build adjacencies. Frames are encapsulated at ingress edge device and decapsulated at egress, caching ARP entries for remote MACs.
Considerations for OTV include using M-Series cards, IGMPv3 on join interfaces, defining multiple data groups, and localizing FHRP protocols to avoid suboptimal routing. OTV
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
OSPF is a link-state routing protocol that uses link-state information to make routing decisions. Each router running OSPF floods link-state advertisements (LSAs) throughout the area or autonomous system that contain information about that router's attached interfaces and metrics. Routers then use the information in LSAs to calculate the shortest path to each network and build routing tables. OSPF supports different network types including broadcast, point-to-point, non-broadcast multi-access (NBMA), and point-to-multipoint. It elects a designated router on broadcast networks to reduce the number of adjacencies formed and amount of routing information exchanged.
Virtual port channels (vPC) allow links that are physically connected to two different switches to appear as a single port channel, avoiding STP blocking. Two switches are considered vPC peers and form a vPC domain. A peer link connects the two switches to synchronize information. A peer keepalive link provides a backup communication path if the peer link fails. VLANs allowed on the peer link are considered vPC VLANs.
A WAN connects sites over long distances using leased lines or circuits to exchange information between locations. Key WAN technologies include T1/E1 circuits, frame relay, ATM, and MPLS. Circuit-switched technologies like ISDN provide temporary connections when bandwidth is needed, while dedicated leased lines offer constant connectivity but are more expensive. Common WAN protocols are HDLC, PPP, Frame Relay, and ATM used with CSU/DSU equipment to connect to telephone networks.
This document discusses layer 2 switching fundamentals, including communication methods in LANs such as unicast, broadcast, and multicast. It describes how switches operate including forwarding frames based on the destination address and address table lookups. The document also covers collision domains, broadcast domains, and how switches help segment networks to reduce collisions and broadcast traffic.
Layer 3 Protocols
This document provides an overview of various layer 3 protocols and techniques, including routing protocols (BGP, IS-IS, OSPF, RIP), multicasting protocols (IGMP), and loop avoidance techniques. It describes the purpose and key features of each protocol. BGP exchanges routing information between autonomous systems. IS-IS and OSPF are intra-AS routing protocols that use link-state algorithms. RIP is a distance vector protocol best suited to small networks. IGMP manages multicast group membership. NDP provides address resolution and neighbor discovery for IPv6. HIP separates host identity from IP addresses to enable mobility.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
Switching – A Process of using the MAC address on LAN is called Layer 2 Switching.
Layer 2 Switching is the process of using hardware address of devices on a LAN to segment a network.
Switching breaks up large collision domains into smaller ones and that a collision domain is a network
segment with two or more devices sharing the same bandwidth.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Each router using a link-state routing protocol builds a complete and synchronized view of the network topology. This is achieved by routers flooding the network with link-state advertisements (LSAs) that describe the state of their links. With a complete view of the network, routing loops are difficult to occur since each router can independently calculate the optimal path to each destination.
vPC allows links connected to two Nexus switches to appear as a single port channel to a third device. It provides advantages like eliminating STP blocked ports, using all available uplink bandwidth, and fast convergence upon failures. Configuring vPC involves the vPC peer switches, peer link, domain, and member ports. vPC avoids loops at the data plane layer. It can be used within a single data center for active-active server connectivity or between two data centers to extend VLANs across sites at layer 2. Object tracking allows vPC to modify its state based on peer link states.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to another VLAN using a
router.
VLANs divide broadcast domains in a LAN environment. Whenever hosts in one VLAN need to
communicate with hosts in another VLAN, the traffic must be routed between them. This is known as
inter-VLAN routing. On Catalyst switches it is accomplished by creating Layer 3 interfaces (Switch virtual
interfaces (SVI)).
This document discusses configuring point-to-point WAN links in Packet Tracer using different encapsulation types such as HDLC, PPP, and Frame Relay. It provides configuration examples for HDLC and PPP links which were successfully implemented. Frame Relay configuration posed more challenges to troubleshoot due to static routing requirements and Packet Tracer limitations. The author learned about Frame Relay configuration but was unable to fully implement it in this lab.
The concept of the spanning tree protocol was devised to address broadcast storming. The spanning tree algorithm itself is defined by the IEEE standard 802.1D and its later revisions.
The IEEE Standard 802.1 uses the term bridge to define the spanning tree operation, and uses terms such as Bridge Protocol Data Units and Root Bridge when defining spanning tree protocol functions.
When a bridge receives a frame, it reads the source and destination address fields. The bridge then enters the frame’s source address in its forwarding database. In doing this the bridge associates the frame’s source address with the network attached to the por t on which the frame was received. The bridge also reads the destination address and if it can find this address in its forwarding database, it forwards the frame to the appropriate port. If the bridge does not recognize the destination address, it forwards the frame out from all its por ts except for the one on which the frame was received, and then waits for a reply. This process is known as “flooding”. Similarly, packets with broadcast or multicast destination MAC addresses will be flooded by a bridge.
A significant problem arises where bridges connect via multiple paths. A frame that arrives with an unknown or broadcast/multicast destination address is flooded over all available paths. The arrival of these frames at another network via different paths and bridges produces major problems. The bridges find the same source MAC address arriving on
multiple different por ts, making it impossible to maintain a reliable forwarding database. As a result, increasing numbers of packets will be forwarded to multiple paths. This process is selfperpetuating and produces a condition known as a packet storm, where the increase of circulating frames can eventually overload the network.
Routers connect different computer networks and forward data packets between them by reading the address information in each packet to determine the ultimate destination. A router contains a routing table with information about connected networks and uses this to determine the best path for packets to travel through multiple networks to reach their destination. There are two main types of routers: core routers connect different cities while edge routers connect users and hosts to networks.
This document summarizes circuit switching and packet switching techniques in communications networks. It discusses how circuit switching establishes a dedicated physical path between communicating nodes but is inefficient for bursty traffic. Packet switching breaks messages into packets that are transmitted over shared links, improving efficiency. Key aspects covered include virtual circuits, datagrams, packet switching advantages, X.25 standards, and how Frame Relay improved on X.25 by reducing overhead.
This document outlines the machine requirements, prerequisites, and expected outcomes for courses on Linux fundamentals, system administration, networking, shell scripting, and internals.
For the fundamentals course, a Pentium 2 500MHz computer with 32MB RAM is recommended. The system administration course requires completion of fundamentals first. After completing fundamentals and system administration, the equivalent of a junior administrator would be achieved. Additional courses build on this knowledge towards senior roles.
The document discusses the history and development of artificial intelligence over the past 70 years. It outlines some of the key milestones in AI research from the early work in the 1950s to modern advances in deep learning. While progress has been made, fully general artificial intelligence that can match or exceed human levels of intelligence remains an ongoing challenge that researchers continue working to achieve.
This document provides instructions for basic Linux commands and administration tasks. It begins by listing commands for checking directory contents and properties, navigating the file system, creating and modifying files and directories. It then covers user administration like adding, modifying and deleting users. Next it discusses group administration and managing permissions on files and directories. Finally it covers partitioning, creating a new partition on /dev/sda, and activating the changes.
This course covers all aspects of RHCE certification and Linux administration skills. It will teach students to administer a Linux system through topics like user management, filesystems, backups, networking services and security tools. The course is taught by experienced system engineers and includes hands-on training on a live domain with public IP addresses.
This document provides guidance for Linux administration practicals, including:
- An index of 17 practical topics ranging from basic Linux commands to configuring mail services.
- Detailed instructions for Practical 1 on basic commands like cat, mkdir, cp, and editors like vi. It provides an example directory and file structure to create.
- An overview of Practical 2 on installing Red Hat Linux, including selecting installation options and partitioning the hard drive to make space.
- Descriptions of changing file permissions using both binary and symbolic modes with chmod, and decoding permission codes from the ls command.
- An explanation of the different modes in the vi editor like command, insert, and ex modes,
The document discusses the history and development of artificial intelligence over the past 70 years, from the earliest concepts and experiments in computer-based problem solving to recent advances in machine learning using neural networks. It outlines some of the key milestones in AI research and highlights areas that still present challenges for researchers today.
Trust relationships allow secure communication between domains by authenticating objects in one domain for use in another. There are default trusts between parent and child domains as well as forest root domains. Other trusts can be manually created. Forest-to-forest trusts allow transitive trust relationships between Windows Server 2003 or later forests.
This document is a chapter from a Linux manual that provides an overview of Linux and its history. It defines Linux as a free, open-source operating system developed by volunteers. It discusses advantages of Linux like being free, stable, and efficient. It also summarizes the differences between Linux, Unix, and Windows. The chapter then provides a brief history of Linux, noting that it was started in 1991 by Linus Torvalds as a hobbyist project to create a free operating system.
Packet switching provides virtual circuits between sites with contracted traffic rates. It shares bandwidth across these circuits more cost effectively than dedicated lines. Frame relay uses packet switching to multiplex logical data conversations over a single physical link using connection identifiers (DLCIs) assigned to each pair of connected devices. It establishes permanent or switched virtual circuits (PVCs or SVCs) between sites connected through a frame relay switch, which routes frames based on their DLCIs.
This document provides an overview of wide area networks (WANs) and common WAN technologies. It defines WAN terminology like customer premises equipment and demarcation. It describes different WAN connection types and protocols like HDLC, PPP, Frame Relay and VPNs. PPP is examined in detail, including its components, establishment process and authentication methods. Frame Relay is also covered in depth, discussing its encapsulation, DLCI addressing, subinterfaces, mapping and monitoring. Troubleshooting tips are provided for common Frame Relay issues. Finally, an introduction to VPN technologies is given for remote access, site-to-site and extranet deployments.
1. A Frame Relay switch may perform three actions when detecting excessive frame buildup: put a hold on accepting frames in excess of the CIR, drop frames from the queue that have the DE bit set, and set the BECN bit on all frames it places on the congested link.
2. The benefit of Frame Relay over leased lines or ISDN is that customers only pay for the bandwidth they purchase from the network provider.
3. For routers R1, R2, and R3 to ping each other successfully over Frame Relay, R2 and R3 would need the frame-relay map commands configuring the correct DLCIs to establish connectivity between all routers.
This document discusses Frame Relay networking concepts. It describes how Frame Relay uses virtual circuits over leased lines to connect multiple sites cost effectively. Key terms explained include virtual circuits, DLCI numbers to identify circuits, LMI for circuit status, and FECN/BECN for congestion notification. Frame Relay provides scalable connectivity at lower prices than dedicated leased lines by allowing multiple logical circuits over a single physical connection.
A WAN (Wide Area Network) is a network that covers a broad area (i.e., any telecommunications
network that links across metropolitan, regional, national or international boundaries) using leased
telecommunication lines. Business and government entities utilize WANs to relay data among
employees, clients, buyers, and suppliers from various geographical locations. In essence, this mode of
telecommunication allows a business to effectively carry out its daily function regardless of location. The
Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and
individuals for almost any purpose imaginable.
CCNA 4 Answers, CCNA 1 Version 4.0 Answers, CCNA 2 Version 4.0 Answers, CCNA 3 Version 4.0 Answers, CCNA 4 Version 4.0 Answers, CCNA 1 Final Version 4.0 Answers, CCNA 2 Final Version 4.0 Answers, CCNA 3 Final Version 4.0 Answers, CCNA 4 Final Version 4.0 Answers
This chapter discusses wide area network (WAN) technologies including HDLC, PPP, Frame Relay, and virtual private networks (VPNs). It defines WAN terminology and components. PPP is described as a protocol used to transport network layer packets over point-to-point links. Frame Relay is introduced as a high-performance WAN protocol that uses virtual circuits to transmit data between network devices. Finally, VPNs are summarized as secured connections used for remote access, site-to-site networking, and business partnerships over public networks like the Internet.
This chapter discusses wide area network (WAN) technologies including HDLC, PPP, Frame Relay, and virtual private networks (VPNs). It defines WAN terminology and components. PPP is described as a protocol used to transport layer 3 packets across point-to-point links. Frame Relay is introduced as a high-performance WAN encapsulation method that provides a connection-oriented data link layer. VPNs allow remote access, site-to-site, and extranet connectivity over public networks like the internet.
The document contains multiple choice questions about network configuration and protocols. Based on the options provided, the correct answers are:
- The missing information for Blank 1 is the command show ip route.
- Addition of hosts to a physical segment and increasing use of bandwidth intensive network applications contribute to congestion on an Ethernet LAN.
- The SwA port has IEEE 802.1Q trunking enabled and the SwB port has ISL trunking enabled.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Frame Relay is a WAN technology that uses virtual circuits (VCs) to connect multiple remote sites over a single serial interface on a router in a more cost-effective way than leased lines. There are two types of VCs - permanent VCs that remain active and switched VCs that are dynamically created. Each VC is identified by a unique data-link connection identifier (DLCI). Frame Relay uses these VCs to create logical connections between devices on a physical circuit.
The document discusses service provider networks and frame relay. It provides instructions on building a frame relay network with hub and spoke routers using dynamic and static frame relay mappings. It also covers configurations for loopback interfaces, RIP routing protocol, and route redistribution between protocols to share routes.
The document discusses establishing Frame Relay WAN connections. Frame Relay uses virtual circuits (PVCs) identified by DLCIs, and the Link Management Interface (LMI) protocol is used to report PVC status. Frame Relay subinterfaces can be configured in either point-to-point or multipoint mode, with different addressing requirements for each. The show commands frame-relay lmi, frame-relay pvc, and frame-relay map can be used to verify Frame Relay connectivity and map entries.
This document discusses static routing and router configuration. It describes the general role of routers in forwarding packets using the best path. Static routes can be configured on routers to specify the next hop and exit interface for particular networks. The routing table only contains directly connected networks when static routing is used. CDP is a Cisco protocol that provides information about directly connected devices to help troubleshoot connectivity issues.
R1 is configured to use SNMP version 2 to communicate with a management station at IP address 192.168.1.3. However, the administrator is unable to get any information from R1. The problem is likely due to an issue with the ACL configuration that was applied to limit access to the SNMP community. The ACL permits traffic from 192.168.10.3 but it is unclear if this is the correct IP address for the management station.
This document discusses managed device deployment at branch offices using Aruba branch controllers. It provides an overview of how branch controllers connect to a master controller via an internet modem and establish communication. It also covers branch controller and VPN concentrator configuration in Aruba OS versions 6.x and 8.x, including initial setup, zero touch provisioning, and debugging tools. Additional topics include address pool management for VLANs, tunnels, NAT, and DHCP to allow for dynamic IP assignment at branch office deployments.
Network Design on cisco packet tracer 6.0Saurav Pandey
This document proposes a network design using access controls and VoIP. It includes configuration of routers, switches, VLANs, DHCP, RIP routing protocol, frame relay, telnet, ACLs and VoIP protocols like Call Manager Express. The network connects three locations - a head office and two branch offices - using routers, switches, frame relay, VLANs and access controls to filter unauthorized traffic and allow only genuine users. VoIP is implemented using protocols like DHCP, Call Manager Express, phone directory and dial peer configuration to enable voice calls between the locations over the IP network.
This document contains a Cisco training module on Wide Area Networks (WAN). It discusses common WAN technologies like routers, terminal servers, modems, and WAN networking devices. Specific WAN protocols covered include HDLC, PPP, Frame Relay, and their configuration on Cisco routers. The document provides configuration examples and show commands to display interface and protocol status information for troubleshooting WAN connections.
Multilayer switching allows a single device to perform both layer 2 switching and layer 3 routing. It uses application-specific integrated circuits (ASICs) to store routing and forwarding information in hardware tables, allowing traffic to be forwarded at line speed with little delay. Multilayer switches can create a switched virtual interface (SVI) for each VLAN to allow routing between VLANs, functioning similarly to a router but with the ports remaining at layer 2. Cisco Express Forwarding (CEF) further improves efficiency by building forwarding tables to store layer 2 and layer 3 information, allowing very fast lookups and transmission of traffic through the switch.
The document discusses various common security threats and how to mitigate them using Cisco's IOS Firewall features. It describes application-layer attacks, autorooters, backdoors, denial of service attacks, IP spoofing, man-in-the-middle attacks, network reconnaissance, packet sniffers, password attacks, port redirection attacks, Trojan horse attacks and viruses, and trust exploitation attacks. It then outlines Cisco IOS Firewall features like stateful inspection, intrusion detection, firewall voice traversal, ICMP inspection, authentication proxy, destination URL policy management, per-user firewalls, router provisioning, DoS prevention, dynamic port mapping, Java applet blocking, traffic filtering, multi-interface support, NAT, time-
This document provides instructions and configuration examples for practicing CCNA exam simulations. It includes 15 practice exam simulations focused on configuring and troubleshooting routing protocols, VLANs, ACLs, and other networking topics. For each simulation, the document describes the network topology and objectives that must be met to complete the simulation successfully. It stresses the importance of fully understanding configuration topics in the author's CCNA study guide before attempting the practice exams.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document describes an OSPF network configuration across three routers - Hyderabad, Chennai and Bangalore. Chennai is configured as the backbone Area 0 router connecting two other areas - Area 1 between Hyderabad and Area 2 between Bangalore. Each router is configured with OSPF and associated networks and area IDs.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This document discusses IP addressing and subnetting. It covers:
- The basics of IP version 4 and 6 addressing, including dotted decimal and colon-hex notation.
- How IP addresses are divided into classes A, B, C, D and E based on the priority bit in the first octet. This determines the number of available networks and hosts for each class.
- The concepts of network and broadcast addresses. Subnet masks are used to differentiate the network and host portions of an IP address.
- How subnetting can be used to divide a single network into multiple subnets to better utilize available addresses and bandwidth.
A router is a networking device that connects different networks together and allows communication between them. It uses logical addressing like IP addresses to direct traffic between the networks. The document discusses different types of routers from Cisco including access layer routers for small networks, distribution layer routers for ISPs, and core layer routers for large backbones. It describes the various ports on a router like Ethernet, serial, console, and auxiliary ports and their purposes. The boot process of a router is also summarized where the ROM loads a bootstrap program from flash memory which then loads the IOS software and configuration from NVRAM into RAM.
The document discusses various WAN connection types including dedicated lines, circuit switching, and packet switching. It then describes specific connection types like DSL lines, ISDN, and Frame Relay. Protocols like PPP and HDLC are covered as well as authentication methods, NAT, routing, and configurations for ISDN internet and site-to-site connections.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
The document discusses dynamic routing and the Routing Information Protocol (RIP). It provides details on RIP including that it is a distance vector protocol that uses hop count as its metric. RIP routers exchange their full routing tables every 30 seconds and routers learn routes to networks that are up to 15 hops away. The document also includes configuration examples for three routers to establish RIP routing between networks and verify connectivity between the routers.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNA, nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
How to Create a Stage or a Pipeline in Odoo 17 CRMCeline George
Using CRM module, we can manage and keep track of all new leads and opportunities in one location. It helps to manage your sales pipeline with customizable stages. In this slide let’s discuss how to create a stage or pipeline inside the CRM module in odoo 17.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Decolonizing Universal Design for LearningFrederic Fovet
UDL has gained in popularity over the last decade both in the K-12 and the post-secondary sectors. The usefulness of UDL to create inclusive learning experiences for the full array of diverse learners has been well documented in the literature, and there is now increasing scholarship examining the process of integrating UDL strategically across organisations. One concern, however, remains under-reported and under-researched. Much of the scholarship on UDL ironically remains while and Eurocentric. Even if UDL, as a discourse, considers the decolonization of the curriculum, it is abundantly clear that the research and advocacy related to UDL originates almost exclusively from the Global North and from a Euro-Caucasian authorship. It is argued that it is high time for the way UDL has been monopolized by Global North scholars and practitioners to be challenged. Voices discussing and framing UDL, from the Global South and Indigenous communities, must be amplified and showcased in order to rectify this glaring imbalance and contradiction.
This session represents an opportunity for the author to reflect on a volume he has just finished editing entitled Decolonizing UDL and to highlight and share insights into the key innovations, promising practices, and calls for change, originating from the Global South and Indigenous Communities, that have woven the canvas of this book. The session seeks to create a space for critical dialogue, for the challenging of existing power dynamics within the UDL scholarship, and for the emergence of transformative voices from underrepresented communities. The workshop will use the UDL principles scrupulously to engage participants in diverse ways (challenging single story approaches to the narrative that surrounds UDL implementation) , as well as offer multiple means of action and expression for them to gain ownership over the key themes and concerns of the session (by encouraging a broad range of interventions, contributions, and stances).
Brand Guideline of Bashundhara A4 Paper - 2024khabri85
It outlines the basic identity elements such as symbol, logotype, colors, and typefaces. It provides examples of applying the identity to materials like letterhead, business cards, reports, folders, and websites.
3. Frame Relay
• Frame Relay is a data link layer
packet-switching protocol that uses digital circuits.
• It is used for medium to longer distances and for
longer connectivity.
• Leased lines also provide longer connectivity but a
physical circuit is used to make connection between
2 sites and the same circuit path is used always.
• Frame Relay connections use logical circuits to make
connections between 2 sites. These logical circuits are
referred to as Virtual Circuits(VCs).
• Multiple VCs can exist on the same physical
connection.
• VCs are Full duplex.
3
4. Advantages of Frame Relay
• VCs overcome the scalability problems of
leased lines by providing multiple logical circuits
over the same physical connection.
• Only one serial interface of a router is needed to
handle the VC connections to multiple sites Whereas
using leased lines multiple serial interfaces are needed
to connect to multiple sites.
• VCs provide full connectivity at a much lower price
compared to leased lines.
4
5. Frame Relay Terminology
• Sub-interfaces
• Uses Shared bandwidth
• Local Management interface(LMI):
– used between the Frame relay DTE(eg.Router) and the
Frame Relay DCE(eg. Frame Relay switch)
– Defines how the DTE interacts with the DCE
– Locally significant
– Provides VCs status information(a keep-alive
mechanism)
– LMI standards : Cisco, ANSI, Q933a
The DTE and DCE must have the same LMI signaling type
5
6. Frame Relay Terminology
• Data Link Connection Identifier(DLCI) :
– used to identify each VC on a physical interface
(i.e.) Each VC has a unique local address called a DLCI
number.
– switch will map to the destination depending on the
DLCI number
– Inverse ARP is used to map DLCIs to next hop
addresses.
– Mapping can also be done manually.
– Its Locally significant.
– These numbers are given by the Frame relay
service providers, Service providers assign DLCIs in
the range of 16 to 1007.
6
7. Frame Relay Terminology
• Virtual circuits are of two types:
– Permanent Virtual Circuits – PVCs
– Switched Virtual Circuits –SVCs
• Permanent Virtual Circuit :
– similar to a dedicated leased line , permanent
connection.
– used when constant data is being generated.
• Switched Virtual Circuit :
– also called as Semi-permanent virtual circuit
– similar to a circuit switched connection where the
VC is dynamically built and then torn down once the
data has been sent.
– used when data has to be sent in small amounts
7
and at periodic intervals.
8. Frame Relay Terminology
• Committed Information Rate(CIR) :
– Average data rate measured over a fixed period
of time that the carrier guarantees for a VC.
– committed bandwidth
• Burst Rate(BR) :
– Average data rate provider guarantees for a VC.
– Excess bandwidth
8
9. Frame Relay Terminology
• FECN and BECN :
– Forward Explicit Congestion Notification
– Backward Explicit Congestion Notification
• When congestion occurs switch marks the FECN and
BECN bits in the frame header.
• FECN is sent to the destination
• BECN is sent to the source
• Thereby notifying both source and destination
about the congestion.
• FECN = 0 and BECN =0 implies no congestion.
9
10. Frame-Relay - Network Diagram
FRAME-RELAY
SWICH
10.0.0.1/8
S0
HYD
11.0.0.1/8
S0
S1
10.0.0.2/8
E0
192.168.1.150/24
DLCI NO : 100
LAN - 192.168.1.0/24
CHE
S1
11.0.0.2/8
E0
192.168.2.150/24
BAN
E0
192.168.3.150/2
DLCI NO : 200
LAN - 192.168.2.0/24
LAN - 192.168.3.0/24
10
11. Frame-Relay - Network Diagram
FRAME-RELAY
SWICH
10.0.0.1/8
S0
HYD
CHE
E0
192.168.1.150/24
DLCI NO : 100
LAN - 192.168.1.0/24
S1
10.0.0.2/8
E0
192.168.2.150/24
BAN
E0
192.168.3.150/2
DLCI NO : 200
LAN - 192.168.2.0/24
LAN - 192.168.3.0/24
11
17. Hyderabad# show frame-relay pvc
PVC Statistics for interface Serial0 (Frame Relay DTE)
DLCI = 100, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0
input pkts 0
output pkts 2
in bytes 0
out bytes 60
dropped pkts 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 2
out bcast bytes 60
pvc create time 00:12:03, last time pvc status changed 00:00:20
Hyderabad#
PVC STATUS = ACTIVE
PVC STATUS = ACTIVE
Implies, all configurations and the connectivity are
Implies, all configurations and the connectivity are
fine.
fine.
17
18. Hyderabad# show frame-relay pvc
PVC Statistics for interface Serial0 (Frame Relay DTE)
DLCI = 100, DLCI USAGE = LOCAL,PVC STATUS = INACTIVE,INTERFACE = Serial0
input pkts 0
output pkts 2
in bytes 0
out bytes 60
dropped pkts 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 2
out bcast bytes 60
pvc create time 00:12:03, last time pvc status changed 00:00:20
Hyderabad#
PVC STATUS = INACTIVE
PVC STATUS = INACTIVE
Implies, Configuration or Connectivity Problem with
Implies, Configuration or Connectivity Problem with
Remote LMI
Remote LMI
18
19. Hyderabad# show frame-relay pvc
PVC Statistics for interface Serial0 (Frame Relay DTE)
DLCI = 100, DLCI USAGE = LOCAL,PVC STATUS = DELETED,INTERFACE = Serial0
input pkts 0
output pkts 2
in bytes 0
out bytes 60
dropped pkts 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 2
out bcast bytes 60
pvc create time 00:12:03, last time pvc status changed 00:00:20
Hyderabad#
PVC STATUS = DELETED
PVC STATUS = DELETED
Implies, Configuration or Connectivity Problem with
Implies, Configuration or Connectivity Problem with
Local LMI
Local LMI
19
20. Banglore# show frame-relay pvc
PVC Statistics for interface Serial1 (Frame Relay DTE)
DLCI = 200, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial1
input pkts 8
output pkts 7
in bytes 570
out bytes 586
dropped pkts 2
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 7
out bcast bytes 586
pvc create time 00:12:26, last time pvc status changed 00:02:06
Banglore#
20
21. Chennai# show frame-relay pvc
PVC Statistics for interface Serial0 (Frame Relay DCE)
DLCI = 200, DLCI USAGE = SWITCHED,PVC STATUS = ACTIVE,INTERFACE = Serial0
input pkts 0
output pkts 0
in bytes 0
out bytes 0
dropped pkts 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 0
out bcast bytes 0
pvc create time 00:02:07, last time pvc status changed 00:00:56
Num Pkts Switched 0
PVC Statistics for interface Serial1 (Frame Relay DCE)
DLCI = 100, DLCI USAGE = SWITCHED,PVC STATUS = ACTIVE,INTERFACE = Serial1
input pkts 4
output pkts 3
in bytes 186
out bytes 202
dropped pkts 0
in FECN pkts 0
in BECN pkts 0
out FECN pkts 0
out BECN pkts 0
in DE pkts 0
out DE pkts 0
out bcast pkts 0
out bcast bytes 0
pvc create time 00:02:21, last time pvc status changed 00:01:04
Num Pkts Switched 4
Chennai#
21
22. Hyderabad# show frame-relay map
Serial0 (up): ip 10.0.0.2, dlci 100(0x64,0x1840), dynamic,
broadcast, status defined, active
Hyderabad#
22
23. Banglore# show frame-relay map
Serial1 (up): ip 10.0.0.1, dlci 200(0xC8,0x3080), dynamic,
broadcast, status defined, active
Banglore#
23
25. Hyderabad(config)# no ip routing
Hyderabad(config)# ip routing
Hyderabad(config)# router rip
Hyderabad(config-router)# network 192.168.1.0
Hyderabad(config-router)# network 10.0.0.0
Hyderabad(config-router)# ^Z
Configuring RIP
Hyderabad# show ip route
Configuring RIP
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
Router(config)# router rip
Router(config)# router rip
D - EIGRP, EX - EIGRP external, O - OSPF, <Network ID> area
Router(config-router)# network IA - OSPF inter
Router(config-router)# network <Network ID>
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i- IS-IS, L1-IS-IS level-1, L2-IS-IS level-2,*- candidate default
U - per-user static route, o - ODR
Gateway of last resort is not set
C
10.0.0.0/8 is directly connected, Serial0
C
192.168.1.0/24 is directly connected, Ethernet0
R
192.168.3.0/24 [120/1] via 10.0.0.2, 00:00:25, Serial0
Hyderabad# ping 192.168.3.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.3.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 40/43/44 ms
Hyderabad#
25
26. Banglore(config)# no ip routing
Banglore(config)# ip routing
Banglore(config)# router rip
Banglore(config-router)# network 192.168.3.0
Banglore(config-router)# network 10.0.0.0
Banglore(config-router)# ^Z
Configuring RIP
Banglore# show ip route
Configuring RIP
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
Router(config)# router rip
Router(config)# router rip
D - EIGRP, EX - EIGRP external, O - OSPF, <Network ID> area
Router(config-router)# network IA - OSPF inter
Router(config-router)# network <Network ID>
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i- IS-IS, L1-IS-IS level-1, L2-IS-IS level-2,*- candidate default
U - per-user static route, o - ODR
Gateway of last resort is not set
C
10.0.0.0/8 is directly connected, Serial1
R
192.168.1.0/24 [120/1] via 10.0.0.1, 00:00:04, Serial1
C
192.168.3.0/24 is directly connected, Ethernet0
Banglore# ping 192.168.1.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 40/43/44 ms
Banglore#
26