SlideShare a Scribd company logo
1 of 39
www.professordkinney.com
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Lessons Summary:
ļ‚—Introducing WAN Technologies
ļ‚—Introducing Dynamic Routing Protocol
ļ‚—Implementing OSPF
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Introducing WAN Technologies
Wide Area Networks
A WAN is a data communications network that operates beyond the geographic scope
of a LAN. WAN allows the transmission of data across greater geographic distances
WANs use facilities provided by a service provider, or carrier. WANs use serial
connections. An enterprise must subscribe to a WAN service provider to use WAN
carrier network services.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Point-to-Point Links
A point-to-point link provides a single, pre-established WAN communications path from
the customer premises through a carrier network, such as a telephone company, to a
remote network. Point-to-point lines are usually leased from a carrier and thus are often
called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility
hardware to your line only. These circuits are generally priced based on bandwidth
required and distance between the two connected points. Point-to-point links are
generally more expensive than shared services such as Frame Relay. Figure below
illustrates a typical point-to-point link through a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Circuit Switching
Switched circuits allow data connections that can be initiated when needed and terminated
when communication is complete. This works much like a normal telephone line works
for voice communication. Integrated Services Digital Network (ISDN) is a good example
of circuit switching. When a router has data for a remote site, the switched circuit is
initiated with the circuit number of the remote network. In the case of ISDN circuits, the
device actually places a call to the telephone number of the remote ISDN circuit. When
the two networks are connected and authenticated, they can transfer data. When the
data transmission is complete, the call can be terminated. Figure below illustrates an
example of this type of circuit.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Packet Switching
Packet switching is a WAN technology in which users share common carrier resources.
Because this allows the carrier to make more efficient use of its infrastructure, the cost
to the customer is generally much better than with point-to-point lines. In a packet
switching setup, networks have connections into the carrierā€™s network, and many
customers share the carrierā€™s network. The carrier can then create virtual circuits
between customersā€™ sites by which packets of data are delivered from one to the other
through the network. The section of the carrierā€™s network that is shared is often referred
to as a cloud. Some examples of packet-switching networks include Asynchronous
Transfer Mode (ATM), Frame Relay, Switched Multimegabit Data Services (SMDS), and
X.25. Figure below shows an example packet-switched circuit.
The virtual connections between customer sites are often referred to as a virtual circuit.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Virtual Circuits
A virtual circuit is a logical circuit created within a shared network between two network
devices. Two types of virtual circuits exist: switched virtual circuits (SVCs) and
permanent virtual circuits (PVCs).SVCs are virtual circuits that are dynamically
established on demand and terminated when transmission is complete. Communication
over an SVC consists of three phases: circuit establishment, data transfer,and circuit
termination. The establishment phase involves creating the virtual circuit between the
source and destination devices. Data transfer involves transmitting data between the
devices over the virtual circuit, and the circuit termination phase involves tearing down
the virtual circuit between the source and destination devices. SVCs are used in
situations in which data transmission between devices is sporadic, largely because SVCs
increase bandwidth used due to the circuit establishment and termination phases, but
they decrease the cost associated with constant virtual circuit availability.
PVC is a permanently established virtual circuit that consists of one mode: data transfer.
PVCs are used in situations in which data transfer between devices is constant. PVCs
decrease the bandwidth use associated with the establishment and termination of virtual
circuits, but they increase costs due to constant virtual circuit availability. PVCs are
generally configured by the service provider when an order is placed for service.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Dialup Services
Dialup services offer cost-effective methods for connectivity across WANs. Two popular
dialup implementations are dial-on-demand routing (DDR) and dial backup.DDR is a
technique whereby a router can dynamically initiate a call on a switched circuit when it
needs to send data. In a DDR setup, the router is configured to initiate the call when
certain criteria are met, such as a particular type of network traffic needing to be
transmitted. When the connection is made, traffic passes over the line. The router
configuration specifies an idle timer that tells the router to drop the connection when
the circuit has remained idle for a certain period. Dial backup is another way of
configuring DDR. However, in dial backup, the switched circuit is used to provide
backup service for another type of circuit, such as point-to-point or packet switching.
The router is configured so that when a failure is detected on the primary circuit, the dial
backup line is initiated. The dial backup line then supports the WAN connection until
the primary circuit is restored. When this occurs, the dial backup connection is
terminated.
WAN Devices
WANs use numerous types of devices that are specific to WAN environments. WAN
switches, access servers, modems, CSU/DSUs, and ISDN terminal adapters are discussed
in the following sections. Other devices found in WAN environments that are used in
WAN implementations include routers, ATM switches, and multiplexers.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
WAN Switch
A WAN switch is a multiport internetworking device used in carrier networks. These
devices typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the
data link layer of the OSI reference model. Figure below illustrates two routers at remote
ends of a WAN that are connected by WAN switches.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Access Server
An access server acts as a concentration point for dial-in and dial-out connections. Figure
below illustrates an access server concentrating dial-out connections into a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Modem
A modem is a device that interprets digital and analog signals, enabling data to be
transmitted over voice-grade telephone lines. At the source, digital signals are converted
to a form suitable for transmission over analog communication facilities. At the
destination, these analog signals are returned to their digital form. Figure below
illustrates a simple modem-to-modem connection through a WAN.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
CSU/DSU
A channel service unit/digital service unit (CSU/DSU) is a digital-interface device used to
connect a router to a digital circuit like a T1. The CSU/DSU also provides signal timing
for communication between these devices. Figure below illustrates the placement of the
CSU/DSU in a WAN implementation.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
ISDN Terminal Adapter
An ISDN terminal adapter is a device used to connect ISDN Basic Rate Interface (BRI)
connections to other interfaces, such as EIA/TIA-232 on a router. A terminal adapter is
essentially an ISDN modem, although it is called a terminal adapter because it does not
actually convert analog to digital signals. Figure below illustrates the placement of the
terminal adapter in an ISDN environment.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Introducing Dynamic Routing Protocol
Dynamic routing protocols play an important role in todayā€™s networks. The
following sections describe several important benefits that dynamic routing
protocols provide. In many networks, dynamic routing protocols are typically
used with static routes.
Role of Dynamic Routing Protocol
What exactly are dynamic routing protocols? Routing protocols are used to facilitate the
exchange of routing information between routers. Routing protocols allow routers to
dynamically learn information about remote networks and automatically add this
information to their own routing tables, as shown below
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Routing protocols determine the best path to each network, which is then added to the
routing table. One of the primary benefits of using a dynamic routing protocol is that
routers exchange routing information whenever there is a topology change. This
exchange allows routers to automatically learn about new networks and also to find
alternate paths if there is a link failure to a current network.
Dynamic Routing Protocol Operation
All routing protocols have the same purpose: to learn about remote networks and to quickly
adapt whenever there is a change in the topology. The method that a routing protocol uses
to accomplish this depends on the algorithm it uses and the operational characteristics
of that protocol. The operations of a dynamic routing protocol vary depending on the
type of routing protocol and the specific operations of that routing protocol. The specific
operations of RIP, EIGRP, and OSPF are examined in later chapters. In general, the
operations of a dynamic routing protocol can be described as follows:
1. The router sends and receives routing messages on its interfaces.
2. The router shares routing messages and routing information with other routers that are
using the same routing protocol.
3. Routers exchange routing information to learn about remote networks.
4. When a router detects a topology change, the routing protocol can advertise this change
to other routers.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classifying Dynamic Routing Protocols
Routing protocols can be classified into different groups according to their characteristics:
ā–  IGP or EGP
ā–  Distance vector or link-state
ā–  Classful or classless
The sections that follow discuss these classification schemes in more detail.
The most commonly used routing protocols are as follows:
ā–  RIP: A distance vector interior routing protocol
ā–  IGRP: The distance vector interior routing protocol developed by Cisco (deprecated
from Cisco IOS Release 12.2 and later)
ā– 
OSPF: A link-state interior routing protocol
ā–  IS-IS: A link-state interior routing protocol
ā–  EIGRP: The advanced distance vector interior routing protocol developed by Cisco
ā–  BGP: A path vector exterior routing protocol
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
IGP and EGP
An autonomous system (AS)ā€”otherwise known as a routing domainā€”is a collection of
routers under a common administration. Typical examples are a companyā€™s internal
network
and an ISPā€™s network. Because the Internet is based on the autonomous system concept,
two types of routing protocols are required: interior and exterior routing protocols. These
protocols are
ā–  Interior gateway protocols (IGP): Used for intra-autonomous system routing, that is,
routing inside an autonomous system
ā–  Exterior gateway protocols (EGP): Used for inter-autonomous system routing, that is,
routing between autonomous systems
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Distance Vector and Link-State Routing Protocols
Interior gateway protocols (IGP) can be classified as two types:
ā–  Distance vector routing protocols
ā–  Link-state routing protocols
Distance vector protocols work best in situations where
ā–  The network is simple and flat and does not require a hierarchical design.
ā–  The administrators do not have enough knowledge to configure and troubleshoot
linkstate protocols.
ā–  Specific types of networks, such as hub-and-spoke networks, are being implemented.
ā– Worst-case convergence times in a network are not a concern.
Link-state protocols work best in situations where
ā–  The network design is hierarchical, usually occurring in large networks.
ā–  The administrators have a good knowledge of the implemented link-state routing
protocol.
ā–  Fast convergence of the network is crucial.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classful and Classless Routing Protocols
All routing protocols can also be classified as either
ā–  Classful routing protocols
ā–  Classless routing protocols
Classful Routing Protocols
Classful routing protocols do not send subnet mask information in routing updates. The
first routing protocols, such as RIP, were classful. This was at a time when network
addresses were allocated based on classes: Class A, B, or C. A routing protocol did not
need to include the subnet mask in the routing update because the network mask could be
determined based on the first octet of the network address. Classful routing protocols can
still be used in some of todayā€™s networks, but because they do not include the subnet
mask, they cannot be used in all situations. Classful routing protocols cannot be used
when a network is subnetted using more than one subnet mask. In other words, classful
routing protocols do not support variable-length subnet masks (VLSM).
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Classless Routing Protocols
Classless routing protocols include the subnet mask with the network address in routing
updates. Todayā€™s networks are no longer allocated based on classes, and the subnet mask
cannot be determined by the value of the first octet. Classless routing protocols are required
in most networks today because of their support for VLSM, discontinuous network.
Convergence
when the routing tables of all routers are at a state of consistency. The network has
converged when all routers have complete and accurate information about the network.
Convergence time is the time it takes routers to share information, calculate best
paths, and update their routing tables. A network is not completely operable until the
network has converged; therefore, most networks require short convergence times.
Metrics
Metrics are a way to measure or compare. Routing protocols use metrics to determine
which route is the best path.
Purpose of a Metric
There are cases when a routing protocol learns of more than one route to the same
destination. To select the best path, the routing protocol must be able to evaluate and
Differentiate among the available paths.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Metrics and Routing Protocols
Different routing protocols use different metrics. The metric used by one routing protocol
is
not comparable to the metric used by an
Metric Parameters
Two different routing protocols might choose different paths to the same destination
because of using different metrics. other routing protocol.
Metrics used in IP routing protocols include the following:
Hop count: A simple metric that counts the number of routers a packet must traverse.
Bandwidth: Influences path selection by preferring the path with the highest
bandwidth.
Load: Considers the traffic utilization of a certain link.
Delay: Considers the time a packet takes to traverse a path.
Reliability: Assesses the probability of a link failure, calculated from the interface
error count or previous link failures.
Cost: A value determined either by the IOS or by the network administrator to indicate
preference for a route. Cost can represent a metric, a combination of metrics, or a policy.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Metric Field in the Routing Table
The routing table displays the metric for each dynamic and static route
Remember that static routes always have a metric of 0.
The list that follows defines the metric for each routing protocol:
ā–  RIP: Hop count: Best path is chosen by the route with the lowest hop count.
ā–  IGRP and EIGRP: Bandwidth, delay, reliability, and load: Best path is chosen by
the route with the smallest composite metric value calculated from these
multiple
parameters. By default, only bandwidth and delay are used.
ā–  IS-IS and OSPF: Cost: Best path is chosen by the route with the lowest cost.
The
Cisco implementation of OSPF uses bandwidth to determine the cost. IS-IS is
discussed in CCNP.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
The metric associated with a certain route can be best viewed
using the show ip route command. The metric value is the
second
value in the brackets for a routing table entry
Building a Medium-Sized Network
Load Balancing
You now know that individual routing protocols use metrics to determine the
best route to reach remote networks. But what happens when two or more
routes to the same destination have identical metric values? How will the
router decide which path to use for packet forwarding? In this case, the router
does not choose only one route. Instead, the router load balances between
these equal-cost paths. The packets are forwarded using all equal-cost paths.
Purpose of Administrative Distance
Before the routing process can determine which route to use when forwarding a packet, it
must first determine which routes to include in the routing table. There can be times
when a router learns a route to a remote network from more than one routing source.
The routing process will need to determine which routing source to use. Administrative
distance is used for this purpose.
Administrative distance (AD) defines the preference of a routing source. Each routing
sourceā€”including specific routing protocols, static routes, and even directly connected
networksā€”is prioritized in order of most to least preferable using an administrative
distance value. Cisco routers use the AD feature to select the best path when they learn
about the same destination network from two or more different routing sources.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
The AD value can also be verified with the show ip protocols command. This command
displays all pertinent information about routing protocols operating on the router.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Default Administrative Distances
Implementing OSPF
OSPF typically requires coordination among many internal routers, area border routers
(routers connected to multiple areas), and autonomous system boundary routers. At a
minimum, OSPF-based routers or access servers can be conļ¬gured with all default
parameter values, no authentication, and interfaces assigned to areas. If you intend to
customize your environment, you must ensure coordinated conļ¬gurations of all routers.
To conļ¬gure OSPF, complete the tasks in the following sections. Enabling OSPF is
mandatory; the other tasks are optional, but might be required for your application.
Enable OSPF
ā€¢ Conļ¬gure OSPF Interface Parameters
ā€¢ Conļ¬gure OSPF over Different Physical Networks
ā€¢ Conļ¬gure OSPF Area Parameters
ā€¢ Conļ¬gure OSPF Not So Stubby Area (NSSA)
ā€¢ Conļ¬gure Route Summarization between OSPF Areas
ā€¢ Conļ¬gure Route Summarization when Redistributing Routes into OSPF
ā€¢ Create Virtual Links
ā€¢ Generate a Default Route
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
ā€¢ Conļ¬gure Lookup of DNS Names
ā€¢ Force the Router ID Choice with a Loopback Interface
ā€¢ Control Default Metrics
ā€¢ Conļ¬gure OSPF on Simplex Ethernet Interfaces
ā€¢ Conļ¬gure Route Calculation Timers
ā€¢ Conļ¬gure OSPF over On Demand Circuits
ā€¢ Log Neighbor Changes
ā€¢ Monitor and Maintain OSPF
Enable OSPF
As with other routing protocols, enabling OSPF requires that you create an OSPF routing
process, specify the range of IP addresses to be associated with the routing process, and
assign area IDs to be associated with that range of IP addresses. Perform the following
tasks, starting in global conļ¬guration mode.
Step 1 Enable OSPF routing. router ospf process-id
Step 2 Deļ¬ne an interface on which OSPF runs and deļ¬ne the area ID for that interface.
network address wildcard-mask area area-id
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Conļ¬gure OSPF Interface Parameters
Our OSPF implementation allows you to alter certain interface-speciļ¬c OSPF parameters,
as
needed. You are not required to alter any of these parameters, but some interface
parameters
must be consistent across all routers in an attached network. Those parameters are
controlled by the ip ospf hello-interval, ip ospf dead-interval, and ip ospf authentication
key. commands. Therefore, be sure that if you do conļ¬gure any of these parameters, the
conļ¬gurations for all routers on your network have compatible values.
Step 1: Explicitly specify the cost of sending a packet on an OSPF interface.
ip ospf cost cost.
Step 2: Specify the number of seconds between link state advertisement retransmissions for
adjacencies belonging to an OSPF interface.
ip ospf retransmit-intervalseconds.
Step 3: Set the estimated number of seconds it takes to transmit a link state update packet
on an OSPF interface.
ip ospf transmit-delay seconds
Strep:4 Set priority to help determine the OSPF designated router for a network.
ip ospf priority number
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Step 5: Specify the length of time, in seconds, between
the hello packets that the Cisco IOS software sends on an OSPF interface.
ip ospf hello-intervalseconds
Step 6: Set the number of seconds that a deviceā€™s hello packets must not have been seen
before its neighbors declare the OSPF router down.
ip ospf dead-intervalseconds
Step 7: Assign a speciļ¬c password to be used by neighboring OSPF routers on a network
segment that is using OSPFā€™s simple password authentication.
ip ospf authentication-key key
Step 8: Enable OSPF MD5 authentication. ip ospf message-digest-key keyid md5 key
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Conļ¬gure Your OSPF Network Type
You have the choice of conļ¬guring your OSPF network type as either broadcast or
nonbroadcast multiaccess, regardless of the default media type. Using this feature, you
can conļ¬gure broadcast networks as nonbroadcast multiaccess networks when, for
example, you have routers in your network that do not support multicast addressing.
You also can conļ¬gure nonbroadcast multiaccess networks (such as X.25, Frame Relay,
and SMDS) as broadcast networks. Conļ¬guring nonbroadcast, multiaccess networks as
either broadcast or nonbroadcast assumes that there are virtual circuits from every
router to every router or fully meshed network. This is not true for some cases, for
example, because of cost constraints, or when you have only a partially meshed network.
In these cases, you can conļ¬gure the OSPF network type as a point-to-multipoint
network.
Routing between two routers not directly connected will go through the router that has
virtual circuits to both routers. Note that you must not conļ¬gure neighbors when using
this feature.
Conļ¬gure the OSPF network type for a
ip ospf network {broadcast | non-broadcast |
point-to-multipoint} speciļ¬ed interface
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Conļ¬gure OSPF for Nonbroadcast Networks
Because there might be many routers attached to an OSPF network, a designated router is
selected for the network. It is necessary to use special conļ¬guration parameters in the
designated router selection if broadcast capability is not conļ¬gured.
Conļ¬gure routers or access servers interconnecting to nonbroadcast networks
neighbor ip-address[priority number] [poll-interval
seconds]
You can specify the following neighbor parameters, as required:
ā€¢ Priority for a neighboring router
ā€¢ Nonbroadcast poll interval
ā€¢ Interface through which the neighbor is reachable
Conļ¬gure OSPF Not So Stubby Area (NSSA)
NSSA area is similar to OSPF stub area. NSSA does not ļ¬‚ood Type 5 external link state
advertisements (LSAs) from the core into the area, but it has the ability of importing AS
external routes in a limited fashion within the area.
NSSA allows importing of Type 7 AS external routes within NSSA area by redistribution.
These Type 7 LSAs are translated into Type 5 LSAs by NSSA ABR which are ļ¬‚ooded
throughout the whole routing domain. Summarization and ļ¬ltering are supported
during the translation.Use NSSA to simplify administration if you are an Internet service
provider (ISP), or a network administrator that must connect a central site using OSPF
to a remote site that is using a different routing protocol.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Deļ¬ne an area to be NSSA
area area-id nssa [no-redistribution]
[default-information-originate]
Conļ¬gure Route Summarization between OSPF Areas
Route summarization is the consolidation of advertised addresses. This feature causes a
single summary route to be advertised to other areas by an ABR. In OSPF, an ABR will
advertise networks in one area into another area. If the network numbers in an area are
assigned in a way such that they are contiguous, you can conļ¬gure the ABR to advertise
a summary route that covers all the individual networks within the area that fall into the
speciļ¬ed range.To specify an address range, perform the following task in router
conļ¬guration mode:
Specify an address range for which a single route will be advertised
area area-id range address mask
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Generate a Default Route
You can force an autonomous system boundary router to generate a default route into an
OSPF routing domain. Whenever you speciļ¬cally conļ¬gure redistribution of routes into
an OSPF routing domain, the router automatically becomes an autonomous system
boundary router. However, an autonomous system boundary router does not, by default,
generate a default route into the OSPF routing domain.
To force the autonomous system boundary router to generate a default route, perform the
following task in router conļ¬guration mode:
Force the autonomous system boundary router to generate a default route into the OSPF
routing domain- default-information originate [always] [metric metric-value] [metric-type
type-value] [route-map map-name]
Conļ¬gure Lookup of DNS Names
You can conļ¬gure OSPF to look up Domain Naming System (DNS) names for use in all
OSPF show command displays. This feature makes it easier to identify a router, because
it is displayed by name rather than by its router ID or neighbor ID.
To conļ¬gure DNS name lookup, perform the following task in global conļ¬guration mode:
Conļ¬gure DNS name lookup. - ip ospf name-lookup
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Control Default Metrics
In Cisco IOS Release 10.3 and later, by default, OSPF calculates the OSPF metric for an
interface according to the bandwidth of the interface. For example, a 64K link gets a
metric of 1562, while a T1 link gets a metric of 64.The OSPF metric is calculated asref-bw
divided by bandwidth, with ref-bw equal to 108 by default,and bandwidth determined by
the bandwidth command. The calculation gives FDDI a metric of 1.
If you have multiple links with high bandwidth, you might want to specify a larger number
to differentiate the cost on those links. To do so, perform the following task in router
conļ¬guration mode:
Differentiate high bandwidth links - ospf auto-cost reference-bandwidth ref-bw
Monitor and Maintain OSPF
You can display speciļ¬c statistics such as the contents of IP routing tables, caches, and
databases. Information provided can be used to determine resource utilization and solve
network problems. You can also display information about node reachability and
discover the routing path your deviceā€™s packets are taking through the network.
To display various
routing statistics, perform the following tasks in EXEC mode:
Display general information about OSPF routing processes- show ip ospf [process-id]
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Display lists of information related to the OSPF database
show ip ospf [process-id area-id] database
show ip ospf [process-id area-id] database [router]
[link-state-id]
show ip ospf [process-id area-id] database [network]
[link-state-id]
show ip ospf [process-id area-id] database [summary]
[link-state-id]
show ip ospf [process-id area-id] database
[asb-summary] [link-state-id]
show ip ospf [process-id] database [external]
[link-state-id]
show ip ospf [process-id area-id] database
[database-summary]
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Display the internal OSPF routing table entries to Area Border Router (ABR) and
Autonomous System Boundary Router (ASBR).
show ip ospf border-routers
Display OSPF-related interface information
show ip ospf interface [interface-name]
Display OSPF-neighbor infrmation on a per-interface basis.
show ip ospf neighbor [interface-name] [neighbor-id]
Detail
Display OSPF-related virtual links information
show ip ospf virtual-links
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network
Lessons learned:
ļ‚—WAN technologies.
ļ‚—What is dynamic protocols and their different parameters
and functions.
ļ‚—Configuring OSPF.
08/18/13
Instructional Design-Computer Networking -
Bridges Educational Group
Building a Medium-Sized Network

More Related Content

What's hot

Client server technology main
Client server technology mainClient server technology main
Client server technology mainAnwar Kamal
Ā 
Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basicSanoj Kumar
Ā 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.pptImXaib
Ā 
Creating CentOS Template For CloudStack
Creating CentOS Template For CloudStackCreating CentOS Template For CloudStack
Creating CentOS Template For CloudStackShanker Balan
Ā 
A critique of snapshot isolation: eurosys 2012
A critique of snapshot isolation: eurosys 2012A critique of snapshot isolation: eurosys 2012
A critique of snapshot isolation: eurosys 2012Maysam Yabandeh
Ā 
A modern IoT data processing toolbox
A modern IoT data processing toolboxA modern IoT data processing toolbox
A modern IoT data processing toolboxDataWorks Summit
Ā 
Cloud Computing and Vertualization
Cloud Computing and VertualizationCloud Computing and Vertualization
Cloud Computing and VertualizationReach Chirag
Ā 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
Ā 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshareYogesh Kumar
Ā 
Advantages of Cloud Computing for Business
Advantages of Cloud Computing for BusinessAdvantages of Cloud Computing for Business
Advantages of Cloud Computing for BusinessGrazitti Interactive
Ā 
Virtualization
VirtualizationVirtualization
VirtualizationKumar Harsha
Ā 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is VirtualizationDhrupesh Kotadiya
Ā 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
Ā 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloudAshok Kumar
Ā 

What's hot (20)

Client server technology main
Client server technology mainClient server technology main
Client server technology main
Ā 
Hardware virtualization basic
Hardware virtualization basicHardware virtualization basic
Hardware virtualization basic
Ā 
Fullandparavirtualization.ppt
Fullandparavirtualization.pptFullandparavirtualization.ppt
Fullandparavirtualization.ppt
Ā 
Creating CentOS Template For CloudStack
Creating CentOS Template For CloudStackCreating CentOS Template For CloudStack
Creating CentOS Template For CloudStack
Ā 
Grid computing
Grid computingGrid computing
Grid computing
Ā 
A critique of snapshot isolation: eurosys 2012
A critique of snapshot isolation: eurosys 2012A critique of snapshot isolation: eurosys 2012
A critique of snapshot isolation: eurosys 2012
Ā 
A modern IoT data processing toolbox
A modern IoT data processing toolboxA modern IoT data processing toolbox
A modern IoT data processing toolbox
Ā 
Virtualization
VirtualizationVirtualization
Virtualization
Ā 
Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
Ā 
Cloud Computing and Vertualization
Cloud Computing and VertualizationCloud Computing and Vertualization
Cloud Computing and Vertualization
Ā 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Ā 
Virtualization concept slideshare
Virtualization concept slideshareVirtualization concept slideshare
Virtualization concept slideshare
Ā 
Advantages of Cloud Computing for Business
Advantages of Cloud Computing for BusinessAdvantages of Cloud Computing for Business
Advantages of Cloud Computing for Business
Ā 
Virtualization
VirtualizationVirtualization
Virtualization
Ā 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
Ā 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
Ā 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Ā 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ā 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Ā 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
Ā 

Viewers also liked

Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal pptFrankNitty II
Ā 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comArnold Derrick Kinney
Ā 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionArnold Derrick Kinney
Ā 
Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Silvester Van Koten
Ā 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solutionArnold Derrick Kinney
Ā 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized networkArnold Derrick Kinney
Ā 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
Ā 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networksArnold Derrick Kinney
Ā 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercisejoelavery
Ā 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal PresentationJan Aldrich Dorado
Ā 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comPawan Sharma
Ā 
Computer as a tutor
Computer as a tutorComputer as a tutor
Computer as a tutorReybert Dalisay
Ā 
Multimedia
MultimediaMultimedia
MultimediaSean Chia
Ā 
Lesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyLesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyrinzell02
Ā 
EdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's ToolEdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's Toolbhanj_10
Ā 

Viewers also liked (20)

Wan networks
Wan networksWan networks
Wan networks
Ā 
Network proposal ppt
Network proposal pptNetwork proposal ppt
Network proposal ppt
Ā 
IPV6
IPV6 IPV6
IPV6
Ā 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
Ā 
Presentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.comPresentation 4 for students of professordkinney.com
Presentation 4 for students of professordkinney.com
Ā 
Implementing an EGIRP Based Solution
Implementing an EGIRP Based SolutionImplementing an EGIRP Based Solution
Implementing an EGIRP Based Solution
Ā 
Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06Principles of transmission, applied to the eu transmission network 2011.12.06
Principles of transmission, applied to the eu transmission network 2011.12.06
Ā 
Thiįŗæt kįŗæ mįŗ”ng LAN cho cĆ“ng ty 2 tįŗ§ng
Thiįŗæt kįŗæ mįŗ”ng LAN cho cĆ“ng ty 2 tįŗ§ng Thiįŗæt kįŗæ mįŗ”ng LAN cho cĆ“ng ty 2 tįŗ§ng
Thiįŗæt kįŗæ mįŗ”ng LAN cho cĆ“ng ty 2 tįŗ§ng
Ā 
Implementing a scalable ospf based solution
Implementing a scalable ospf based solutionImplementing a scalable ospf based solution
Implementing a scalable ospf based solution
Ā 
Vlan configuration in medium sized network
Vlan configuration in medium sized networkVlan configuration in medium sized network
Vlan configuration in medium sized network
Ā 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
Ā 
Troubleshooting basic networks
Troubleshooting basic networksTroubleshooting basic networks
Troubleshooting basic networks
Ā 
A University Network Design Exercise
A University Network Design ExerciseA University Network Design Exercise
A University Network Design Exercise
Ā 
Group 3 (Revised) Network Design Proposal Presentation
Group 3   (Revised) Network Design Proposal PresentationGroup 3   (Revised) Network Design Proposal Presentation
Group 3 (Revised) Network Design Proposal Presentation
Ā 
Top Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.comTop Down Network Design - ebrahma.com
Top Down Network Design - ebrahma.com
Ā 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
Ā 
Computer as a tutor
Computer as a tutorComputer as a tutor
Computer as a tutor
Ā 
Multimedia
MultimediaMultimedia
Multimedia
Ā 
Lesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technologyLesson 9: computer as information in communication technology
Lesson 9: computer as information in communication technology
Ā 
EdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's ToolEdTech2 Lesson 11: The Computer as Teacher's Tool
EdTech2 Lesson 11: The Computer as Teacher's Tool
Ā 

Similar to Building a medium sized network

Intro to-wan
Intro to-wanIntro to-wan
Intro to-wanmjrshare
Ā 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wanmjrshare
Ā 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR ProtocolRajesh Karumanchi
Ā 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide showNavleshKumar singh
Ā 
Frame Relay
Frame RelayFrame Relay
Frame RelayNetwax Lab
Ā 
Data communications
Data communicationsData communications
Data communicationsUMaine
Ā 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesSubhajit Sahu
Ā 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
Ā 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On EthernetJennifer Wood
Ā 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Susan Cox
Ā 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...IOSR Journals
Ā 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksIRJET Journal
Ā 
Connection technology options
Connection technology optionsConnection technology options
Connection technology optionsmicailalouise
Ā 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio networkfdr1975
Ā 

Similar to Building a medium sized network (20)

Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
Ā 
Intro to-wan
Intro to-wanIntro to-wan
Intro to-wan
Ā 
Suleiman's
Suleiman'sSuleiman's
Suleiman's
Ā 
Lecture 7.pdf
Lecture 7.pdfLecture 7.pdf
Lecture 7.pdf
Ā 
Wan asignment
Wan asignmentWan asignment
Wan asignment
Ā 
Wide area networks
Wide area networksWide area networks
Wide area networks
Ā 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Ā 
WAN Technologies slide show
WAN Technologies slide showWAN Technologies slide show
WAN Technologies slide show
Ā 
Ch08
Ch08Ch08
Ch08
Ā 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
Ā 
Frame Relay
Frame RelayFrame Relay
Frame Relay
Ā 
Data communications
Data communicationsData communications
Data communications
Ā 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
Ā 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
Ā 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
Ā 
Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...Advantages And Disadvantages Of ATM Is A Deterministic...
Advantages And Disadvantages Of ATM Is A Deterministic...
Ā 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
Ā 
Consistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular NetworksConsistent Access of Internet in Vehicular Networks
Consistent Access of Internet in Vehicular Networks
Ā 
Connection technology options
Connection technology optionsConnection technology options
Connection technology options
Ā 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio network
Ā 

More from Arnold Derrick Kinney

More from Arnold Derrick Kinney (9)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
Ā 
Network device management
Network device managementNetwork device management
Network device management
Ā 
Basics of unix
Basics of unixBasics of unix
Basics of unix
Ā 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
Ā 
Cisco data center
Cisco data centerCisco data center
Cisco data center
Ā 
Ccnp route
Ccnp routeCcnp route
Ccnp route
Ā 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
Ā 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
Ā 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
Ā 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...gurkirankumar98700
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationRadu Cotescu
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024BookNet Canada
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service šŸø 8923113531 šŸŽ° Avail...
Ā 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Ā 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organization
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
Ā 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 

Building a medium sized network

  • 2. Building a Medium-Sized Network 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 3. Building a Medium-Sized Network Lessons Summary: ļ‚—Introducing WAN Technologies ļ‚—Introducing Dynamic Routing Protocol ļ‚—Implementing OSPF 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group
  • 4. Introducing WAN Technologies Wide Area Networks A WAN is a data communications network that operates beyond the geographic scope of a LAN. WAN allows the transmission of data across greater geographic distances WANs use facilities provided by a service provider, or carrier. WANs use serial connections. An enterprise must subscribe to a WAN service provider to use WAN carrier network services. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 5. Point-to-Point Links A point-to-point link provides a single, pre-established WAN communications path from the customer premises through a carrier network, such as a telephone company, to a remote network. Point-to-point lines are usually leased from a carrier and thus are often called leased lines. For a point-to-point line, the carrier allocates pairs of wire and facility hardware to your line only. These circuits are generally priced based on bandwidth required and distance between the two connected points. Point-to-point links are generally more expensive than shared services such as Frame Relay. Figure below illustrates a typical point-to-point link through a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 6. Circuit Switching Switched circuits allow data connections that can be initiated when needed and terminated when communication is complete. This works much like a normal telephone line works for voice communication. Integrated Services Digital Network (ISDN) is a good example of circuit switching. When a router has data for a remote site, the switched circuit is initiated with the circuit number of the remote network. In the case of ISDN circuits, the device actually places a call to the telephone number of the remote ISDN circuit. When the two networks are connected and authenticated, they can transfer data. When the data transmission is complete, the call can be terminated. Figure below illustrates an example of this type of circuit. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 7. Packet Switching Packet switching is a WAN technology in which users share common carrier resources. Because this allows the carrier to make more efficient use of its infrastructure, the cost to the customer is generally much better than with point-to-point lines. In a packet switching setup, networks have connections into the carrierā€™s network, and many customers share the carrierā€™s network. The carrier can then create virtual circuits between customersā€™ sites by which packets of data are delivered from one to the other through the network. The section of the carrierā€™s network that is shared is often referred to as a cloud. Some examples of packet-switching networks include Asynchronous Transfer Mode (ATM), Frame Relay, Switched Multimegabit Data Services (SMDS), and X.25. Figure below shows an example packet-switched circuit. The virtual connections between customer sites are often referred to as a virtual circuit. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 8. WAN Virtual Circuits A virtual circuit is a logical circuit created within a shared network between two network devices. Two types of virtual circuits exist: switched virtual circuits (SVCs) and permanent virtual circuits (PVCs).SVCs are virtual circuits that are dynamically established on demand and terminated when transmission is complete. Communication over an SVC consists of three phases: circuit establishment, data transfer,and circuit termination. The establishment phase involves creating the virtual circuit between the source and destination devices. Data transfer involves transmitting data between the devices over the virtual circuit, and the circuit termination phase involves tearing down the virtual circuit between the source and destination devices. SVCs are used in situations in which data transmission between devices is sporadic, largely because SVCs increase bandwidth used due to the circuit establishment and termination phases, but they decrease the cost associated with constant virtual circuit availability. PVC is a permanently established virtual circuit that consists of one mode: data transfer. PVCs are used in situations in which data transfer between devices is constant. PVCs decrease the bandwidth use associated with the establishment and termination of virtual circuits, but they increase costs due to constant virtual circuit availability. PVCs are generally configured by the service provider when an order is placed for service. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 9. WAN Dialup Services Dialup services offer cost-effective methods for connectivity across WANs. Two popular dialup implementations are dial-on-demand routing (DDR) and dial backup.DDR is a technique whereby a router can dynamically initiate a call on a switched circuit when it needs to send data. In a DDR setup, the router is configured to initiate the call when certain criteria are met, such as a particular type of network traffic needing to be transmitted. When the connection is made, traffic passes over the line. The router configuration specifies an idle timer that tells the router to drop the connection when the circuit has remained idle for a certain period. Dial backup is another way of configuring DDR. However, in dial backup, the switched circuit is used to provide backup service for another type of circuit, such as point-to-point or packet switching. The router is configured so that when a failure is detected on the primary circuit, the dial backup line is initiated. The dial backup line then supports the WAN connection until the primary circuit is restored. When this occurs, the dial backup connection is terminated. WAN Devices WANs use numerous types of devices that are specific to WAN environments. WAN switches, access servers, modems, CSU/DSUs, and ISDN terminal adapters are discussed in the following sections. Other devices found in WAN environments that are used in WAN implementations include routers, ATM switches, and multiplexers. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 10. WAN Switch A WAN switch is a multiport internetworking device used in carrier networks. These devices typically switch such traffic as Frame Relay, X.25, and SMDS, and operate at the data link layer of the OSI reference model. Figure below illustrates two routers at remote ends of a WAN that are connected by WAN switches. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 11. Access Server An access server acts as a concentration point for dial-in and dial-out connections. Figure below illustrates an access server concentrating dial-out connections into a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 12. Modem A modem is a device that interprets digital and analog signals, enabling data to be transmitted over voice-grade telephone lines. At the source, digital signals are converted to a form suitable for transmission over analog communication facilities. At the destination, these analog signals are returned to their digital form. Figure below illustrates a simple modem-to-modem connection through a WAN. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 13. CSU/DSU A channel service unit/digital service unit (CSU/DSU) is a digital-interface device used to connect a router to a digital circuit like a T1. The CSU/DSU also provides signal timing for communication between these devices. Figure below illustrates the placement of the CSU/DSU in a WAN implementation. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 14. ISDN Terminal Adapter An ISDN terminal adapter is a device used to connect ISDN Basic Rate Interface (BRI) connections to other interfaces, such as EIA/TIA-232 on a router. A terminal adapter is essentially an ISDN modem, although it is called a terminal adapter because it does not actually convert analog to digital signals. Figure below illustrates the placement of the terminal adapter in an ISDN environment. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 15. Introducing Dynamic Routing Protocol Dynamic routing protocols play an important role in todayā€™s networks. The following sections describe several important benefits that dynamic routing protocols provide. In many networks, dynamic routing protocols are typically used with static routes. Role of Dynamic Routing Protocol What exactly are dynamic routing protocols? Routing protocols are used to facilitate the exchange of routing information between routers. Routing protocols allow routers to dynamically learn information about remote networks and automatically add this information to their own routing tables, as shown below 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 16. Routing protocols determine the best path to each network, which is then added to the routing table. One of the primary benefits of using a dynamic routing protocol is that routers exchange routing information whenever there is a topology change. This exchange allows routers to automatically learn about new networks and also to find alternate paths if there is a link failure to a current network. Dynamic Routing Protocol Operation All routing protocols have the same purpose: to learn about remote networks and to quickly adapt whenever there is a change in the topology. The method that a routing protocol uses to accomplish this depends on the algorithm it uses and the operational characteristics of that protocol. The operations of a dynamic routing protocol vary depending on the type of routing protocol and the specific operations of that routing protocol. The specific operations of RIP, EIGRP, and OSPF are examined in later chapters. In general, the operations of a dynamic routing protocol can be described as follows: 1. The router sends and receives routing messages on its interfaces. 2. The router shares routing messages and routing information with other routers that are using the same routing protocol. 3. Routers exchange routing information to learn about remote networks. 4. When a router detects a topology change, the routing protocol can advertise this change to other routers. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 17. Classifying Dynamic Routing Protocols Routing protocols can be classified into different groups according to their characteristics: ā–  IGP or EGP ā–  Distance vector or link-state ā–  Classful or classless The sections that follow discuss these classification schemes in more detail. The most commonly used routing protocols are as follows: ā–  RIP: A distance vector interior routing protocol ā–  IGRP: The distance vector interior routing protocol developed by Cisco (deprecated from Cisco IOS Release 12.2 and later) ā–  OSPF: A link-state interior routing protocol ā–  IS-IS: A link-state interior routing protocol ā–  EIGRP: The advanced distance vector interior routing protocol developed by Cisco ā–  BGP: A path vector exterior routing protocol 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 18. IGP and EGP An autonomous system (AS)ā€”otherwise known as a routing domainā€”is a collection of routers under a common administration. Typical examples are a companyā€™s internal network and an ISPā€™s network. Because the Internet is based on the autonomous system concept, two types of routing protocols are required: interior and exterior routing protocols. These protocols are ā–  Interior gateway protocols (IGP): Used for intra-autonomous system routing, that is, routing inside an autonomous system ā–  Exterior gateway protocols (EGP): Used for inter-autonomous system routing, that is, routing between autonomous systems 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 19. Distance Vector and Link-State Routing Protocols Interior gateway protocols (IGP) can be classified as two types: ā–  Distance vector routing protocols ā–  Link-state routing protocols Distance vector protocols work best in situations where ā–  The network is simple and flat and does not require a hierarchical design. ā–  The administrators do not have enough knowledge to configure and troubleshoot linkstate protocols. ā–  Specific types of networks, such as hub-and-spoke networks, are being implemented. ā– Worst-case convergence times in a network are not a concern. Link-state protocols work best in situations where ā–  The network design is hierarchical, usually occurring in large networks. ā–  The administrators have a good knowledge of the implemented link-state routing protocol. ā–  Fast convergence of the network is crucial. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 20. Classful and Classless Routing Protocols All routing protocols can also be classified as either ā–  Classful routing protocols ā–  Classless routing protocols Classful Routing Protocols Classful routing protocols do not send subnet mask information in routing updates. The first routing protocols, such as RIP, were classful. This was at a time when network addresses were allocated based on classes: Class A, B, or C. A routing protocol did not need to include the subnet mask in the routing update because the network mask could be determined based on the first octet of the network address. Classful routing protocols can still be used in some of todayā€™s networks, but because they do not include the subnet mask, they cannot be used in all situations. Classful routing protocols cannot be used when a network is subnetted using more than one subnet mask. In other words, classful routing protocols do not support variable-length subnet masks (VLSM). 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 21. Classless Routing Protocols Classless routing protocols include the subnet mask with the network address in routing updates. Todayā€™s networks are no longer allocated based on classes, and the subnet mask cannot be determined by the value of the first octet. Classless routing protocols are required in most networks today because of their support for VLSM, discontinuous network. Convergence when the routing tables of all routers are at a state of consistency. The network has converged when all routers have complete and accurate information about the network. Convergence time is the time it takes routers to share information, calculate best paths, and update their routing tables. A network is not completely operable until the network has converged; therefore, most networks require short convergence times. Metrics Metrics are a way to measure or compare. Routing protocols use metrics to determine which route is the best path. Purpose of a Metric There are cases when a routing protocol learns of more than one route to the same destination. To select the best path, the routing protocol must be able to evaluate and Differentiate among the available paths. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 22. Metrics and Routing Protocols Different routing protocols use different metrics. The metric used by one routing protocol is not comparable to the metric used by an Metric Parameters Two different routing protocols might choose different paths to the same destination because of using different metrics. other routing protocol. Metrics used in IP routing protocols include the following: Hop count: A simple metric that counts the number of routers a packet must traverse. Bandwidth: Influences path selection by preferring the path with the highest bandwidth. Load: Considers the traffic utilization of a certain link. Delay: Considers the time a packet takes to traverse a path. Reliability: Assesses the probability of a link failure, calculated from the interface error count or previous link failures. Cost: A value determined either by the IOS or by the network administrator to indicate preference for a route. Cost can represent a metric, a combination of metrics, or a policy. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 23. Metric Field in the Routing Table The routing table displays the metric for each dynamic and static route Remember that static routes always have a metric of 0. The list that follows defines the metric for each routing protocol: ā–  RIP: Hop count: Best path is chosen by the route with the lowest hop count. ā–  IGRP and EIGRP: Bandwidth, delay, reliability, and load: Best path is chosen by the route with the smallest composite metric value calculated from these multiple parameters. By default, only bandwidth and delay are used. ā–  IS-IS and OSPF: Cost: Best path is chosen by the route with the lowest cost. The Cisco implementation of OSPF uses bandwidth to determine the cost. IS-IS is discussed in CCNP. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 24. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group The metric associated with a certain route can be best viewed using the show ip route command. The metric value is the second value in the brackets for a routing table entry Building a Medium-Sized Network
  • 25. Load Balancing You now know that individual routing protocols use metrics to determine the best route to reach remote networks. But what happens when two or more routes to the same destination have identical metric values? How will the router decide which path to use for packet forwarding? In this case, the router does not choose only one route. Instead, the router load balances between these equal-cost paths. The packets are forwarded using all equal-cost paths. Purpose of Administrative Distance Before the routing process can determine which route to use when forwarding a packet, it must first determine which routes to include in the routing table. There can be times when a router learns a route to a remote network from more than one routing source. The routing process will need to determine which routing source to use. Administrative distance is used for this purpose. Administrative distance (AD) defines the preference of a routing source. Each routing sourceā€”including specific routing protocols, static routes, and even directly connected networksā€”is prioritized in order of most to least preferable using an administrative distance value. Cisco routers use the AD feature to select the best path when they learn about the same destination network from two or more different routing sources. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 26. The AD value can also be verified with the show ip protocols command. This command displays all pertinent information about routing protocols operating on the router. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 27. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network Default Administrative Distances
  • 28. Implementing OSPF OSPF typically requires coordination among many internal routers, area border routers (routers connected to multiple areas), and autonomous system boundary routers. At a minimum, OSPF-based routers or access servers can be conļ¬gured with all default parameter values, no authentication, and interfaces assigned to areas. If you intend to customize your environment, you must ensure coordinated conļ¬gurations of all routers. To conļ¬gure OSPF, complete the tasks in the following sections. Enabling OSPF is mandatory; the other tasks are optional, but might be required for your application. Enable OSPF ā€¢ Conļ¬gure OSPF Interface Parameters ā€¢ Conļ¬gure OSPF over Different Physical Networks ā€¢ Conļ¬gure OSPF Area Parameters ā€¢ Conļ¬gure OSPF Not So Stubby Area (NSSA) ā€¢ Conļ¬gure Route Summarization between OSPF Areas ā€¢ Conļ¬gure Route Summarization when Redistributing Routes into OSPF ā€¢ Create Virtual Links ā€¢ Generate a Default Route 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 29. ā€¢ Conļ¬gure Lookup of DNS Names ā€¢ Force the Router ID Choice with a Loopback Interface ā€¢ Control Default Metrics ā€¢ Conļ¬gure OSPF on Simplex Ethernet Interfaces ā€¢ Conļ¬gure Route Calculation Timers ā€¢ Conļ¬gure OSPF over On Demand Circuits ā€¢ Log Neighbor Changes ā€¢ Monitor and Maintain OSPF Enable OSPF As with other routing protocols, enabling OSPF requires that you create an OSPF routing process, specify the range of IP addresses to be associated with the routing process, and assign area IDs to be associated with that range of IP addresses. Perform the following tasks, starting in global conļ¬guration mode. Step 1 Enable OSPF routing. router ospf process-id Step 2 Deļ¬ne an interface on which OSPF runs and deļ¬ne the area ID for that interface. network address wildcard-mask area area-id 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 30. Conļ¬gure OSPF Interface Parameters Our OSPF implementation allows you to alter certain interface-speciļ¬c OSPF parameters, as needed. You are not required to alter any of these parameters, but some interface parameters must be consistent across all routers in an attached network. Those parameters are controlled by the ip ospf hello-interval, ip ospf dead-interval, and ip ospf authentication key. commands. Therefore, be sure that if you do conļ¬gure any of these parameters, the conļ¬gurations for all routers on your network have compatible values. Step 1: Explicitly specify the cost of sending a packet on an OSPF interface. ip ospf cost cost. Step 2: Specify the number of seconds between link state advertisement retransmissions for adjacencies belonging to an OSPF interface. ip ospf retransmit-intervalseconds. Step 3: Set the estimated number of seconds it takes to transmit a link state update packet on an OSPF interface. ip ospf transmit-delay seconds Strep:4 Set priority to help determine the OSPF designated router for a network. ip ospf priority number 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 31. Step 5: Specify the length of time, in seconds, between the hello packets that the Cisco IOS software sends on an OSPF interface. ip ospf hello-intervalseconds Step 6: Set the number of seconds that a deviceā€™s hello packets must not have been seen before its neighbors declare the OSPF router down. ip ospf dead-intervalseconds Step 7: Assign a speciļ¬c password to be used by neighboring OSPF routers on a network segment that is using OSPFā€™s simple password authentication. ip ospf authentication-key key Step 8: Enable OSPF MD5 authentication. ip ospf message-digest-key keyid md5 key 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 32. Conļ¬gure Your OSPF Network Type You have the choice of conļ¬guring your OSPF network type as either broadcast or nonbroadcast multiaccess, regardless of the default media type. Using this feature, you can conļ¬gure broadcast networks as nonbroadcast multiaccess networks when, for example, you have routers in your network that do not support multicast addressing. You also can conļ¬gure nonbroadcast multiaccess networks (such as X.25, Frame Relay, and SMDS) as broadcast networks. Conļ¬guring nonbroadcast, multiaccess networks as either broadcast or nonbroadcast assumes that there are virtual circuits from every router to every router or fully meshed network. This is not true for some cases, for example, because of cost constraints, or when you have only a partially meshed network. In these cases, you can conļ¬gure the OSPF network type as a point-to-multipoint network. Routing between two routers not directly connected will go through the router that has virtual circuits to both routers. Note that you must not conļ¬gure neighbors when using this feature. Conļ¬gure the OSPF network type for a ip ospf network {broadcast | non-broadcast | point-to-multipoint} speciļ¬ed interface 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 33. Conļ¬gure OSPF for Nonbroadcast Networks Because there might be many routers attached to an OSPF network, a designated router is selected for the network. It is necessary to use special conļ¬guration parameters in the designated router selection if broadcast capability is not conļ¬gured. Conļ¬gure routers or access servers interconnecting to nonbroadcast networks neighbor ip-address[priority number] [poll-interval seconds] You can specify the following neighbor parameters, as required: ā€¢ Priority for a neighboring router ā€¢ Nonbroadcast poll interval ā€¢ Interface through which the neighbor is reachable Conļ¬gure OSPF Not So Stubby Area (NSSA) NSSA area is similar to OSPF stub area. NSSA does not ļ¬‚ood Type 5 external link state advertisements (LSAs) from the core into the area, but it has the ability of importing AS external routes in a limited fashion within the area. NSSA allows importing of Type 7 AS external routes within NSSA area by redistribution. These Type 7 LSAs are translated into Type 5 LSAs by NSSA ABR which are ļ¬‚ooded throughout the whole routing domain. Summarization and ļ¬ltering are supported during the translation.Use NSSA to simplify administration if you are an Internet service provider (ISP), or a network administrator that must connect a central site using OSPF to a remote site that is using a different routing protocol. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 34. Deļ¬ne an area to be NSSA area area-id nssa [no-redistribution] [default-information-originate] Conļ¬gure Route Summarization between OSPF Areas Route summarization is the consolidation of advertised addresses. This feature causes a single summary route to be advertised to other areas by an ABR. In OSPF, an ABR will advertise networks in one area into another area. If the network numbers in an area are assigned in a way such that they are contiguous, you can conļ¬gure the ABR to advertise a summary route that covers all the individual networks within the area that fall into the speciļ¬ed range.To specify an address range, perform the following task in router conļ¬guration mode: Specify an address range for which a single route will be advertised area area-id range address mask 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 35. Generate a Default Route You can force an autonomous system boundary router to generate a default route into an OSPF routing domain. Whenever you speciļ¬cally conļ¬gure redistribution of routes into an OSPF routing domain, the router automatically becomes an autonomous system boundary router. However, an autonomous system boundary router does not, by default, generate a default route into the OSPF routing domain. To force the autonomous system boundary router to generate a default route, perform the following task in router conļ¬guration mode: Force the autonomous system boundary router to generate a default route into the OSPF routing domain- default-information originate [always] [metric metric-value] [metric-type type-value] [route-map map-name] Conļ¬gure Lookup of DNS Names You can conļ¬gure OSPF to look up Domain Naming System (DNS) names for use in all OSPF show command displays. This feature makes it easier to identify a router, because it is displayed by name rather than by its router ID or neighbor ID. To conļ¬gure DNS name lookup, perform the following task in global conļ¬guration mode: Conļ¬gure DNS name lookup. - ip ospf name-lookup 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 36. Control Default Metrics In Cisco IOS Release 10.3 and later, by default, OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. For example, a 64K link gets a metric of 1562, while a T1 link gets a metric of 64.The OSPF metric is calculated asref-bw divided by bandwidth, with ref-bw equal to 108 by default,and bandwidth determined by the bandwidth command. The calculation gives FDDI a metric of 1. If you have multiple links with high bandwidth, you might want to specify a larger number to differentiate the cost on those links. To do so, perform the following task in router conļ¬guration mode: Differentiate high bandwidth links - ospf auto-cost reference-bandwidth ref-bw Monitor and Maintain OSPF You can display speciļ¬c statistics such as the contents of IP routing tables, caches, and databases. Information provided can be used to determine resource utilization and solve network problems. You can also display information about node reachability and discover the routing path your deviceā€™s packets are taking through the network. To display various routing statistics, perform the following tasks in EXEC mode: Display general information about OSPF routing processes- show ip ospf [process-id] 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 37. Display lists of information related to the OSPF database show ip ospf [process-id area-id] database show ip ospf [process-id area-id] database [router] [link-state-id] show ip ospf [process-id area-id] database [network] [link-state-id] show ip ospf [process-id area-id] database [summary] [link-state-id] show ip ospf [process-id area-id] database [asb-summary] [link-state-id] show ip ospf [process-id] database [external] [link-state-id] show ip ospf [process-id area-id] database [database-summary] 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 38. Display the internal OSPF routing table entries to Area Border Router (ABR) and Autonomous System Boundary Router (ASBR). show ip ospf border-routers Display OSPF-related interface information show ip ospf interface [interface-name] Display OSPF-neighbor infrmation on a per-interface basis. show ip ospf neighbor [interface-name] [neighbor-id] Detail Display OSPF-related virtual links information show ip ospf virtual-links 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network
  • 39. Lessons learned: ļ‚—WAN technologies. ļ‚—What is dynamic protocols and their different parameters and functions. ļ‚—Configuring OSPF. 08/18/13 Instructional Design-Computer Networking - Bridges Educational Group Building a Medium-Sized Network