SlideShare a Scribd company logo
www.linkedin.com/company/networkraft
contact@networkraft.com
www.facebook.com/networkraft
www.linkedin.com/company/networkraft
contact@networkraft.com
www.facebook.com/networkraft
CCNA: ROUTING
By Sushmil Garde
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 2
ROUTING
 Router IOS
 Boot Process
 Command Line Interface (CLI)
 Routing protocols and static routing
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 3
ROUTER IOS
 Carries Network Protocols and Functions
 Connects high speed traffic between network devices
 Adds security to network access
 Provides scalability for growth
 Supplies reliability
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 4
ROUTER BOOTUP PROCESS
 Three stage process
 Perform POST (Power On Self Test) and load Bootstrap Program
 Locate and load the Cisco IOS software
 Bootstrap Program performs this task
 By default IOS is stored in flash memory
 Locate Startup Configuration file or enter in Setup Mode.
 Bootstrap searches for startup config (present in NVRAM)
 Or else goes in Setup Mode.
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 5
ROUTERS- MODES OF OPERATION
 User Mode
 Privileged Mode
 Global Configuration Mode
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 6
EDITING COMMANDS FOR NETWORK GEEKS
Commands Explanation
Ctrl+A Moves the cursor to the begining of the line
Ctrl+E Moves the cursor to the end of the line
Esc+B Moves back one Word
Esc+F Moves forward one Word
Ctrl+R Redisplays a line
Ctrl+U Erases a line
Ctrl+W Erases a word
Ctrl+Z Ends configuration mode
TAB Finishes command for you
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 7
EDITING COMMANDS FOR NETWORK GEEKS
Commands Explanation
Ctrl+P Shows Last entered command
Ctrl+N Shows Previous commands entered
Show history Show last 10 commands entered by default
Show terminal Shows terminal configurations and history buffer size
Terminal history size Changes buffer size (max 256)
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 8
BASIC CONFIGURATION AND IMPORTANT
COMMANDS
 Configuring Hostname:
Router(config)# hostname <NAME>
 Configuring Banner:
Router(config)#banner motd ^c <TYPE THE BANNER>
 Configuring Password:
Router(config)#enable password
Router(config)#enable secret
 Interface configuration
Router(config)#
 …and many more
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 9
ROUTING
 WHAT DOES A ROUTER KNOW?
 Router knows about all the networks it can reach
 All paths to reach all networks
 Best path to reach all network
 Neighbor router
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 10
ROUTING
 IMPORTANT STATEMENTS:
 For end to end communication, it is not enough to have only forwarding
path, but having reverse path is also important.
 If you can reach one host on a network that does not mean you can reach all
hosts on that network.
 Initially router knows only about its directly connected neighbors, hence
can only communicate with them.
 Router must know the route to reach the destination network
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 11
STATIC vs DYNAMIC
 There are two ways to provide routes to the router
 Static Routing
 Provide the route manually
 Not very helpful in larger network
 Better when there is a need to provide a specific route
 Dynamic Routing
 Configuring Routing Protocols on routers
 Very useful in larger network
 Calculates the best path automatically
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 12
LEARNING A ROUTE THROUGH MULTIPLE
ROUTING PROTOCOLS
PROBLEM:
If a route is learnt from static entry/any routing protocol and same is learnt from
other routing protocol and both paths are different, then which path to prefer?
SOLUTION:
Administrative Distance (AD)
This is a value associated with each routing protocol and also with static route.
Lower the AD value better the path.
So, the router will prefer the path dictated by the one with LOWER AD value.
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 13
ONE ROUTING PROTOCOL MULTIPLE PATHS
PROBLEM:
If there is only one Routing Protocol running on the router and it receives two
different routes to reach same network, then which one to prefer?
SOLUTION:
Metric:
This is a value associated with the path. Every routing protocol has a way to
calculate its own metric. Lower the Metric Better the path and hence preferred.
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DYNAMIC ROUTING- ROUTING PROTOCOLS
 Routing protocols can be categorized as
 Interior Gateway Protocol
 Exterior Gateway Protocol
 Routing Protocols can also be categorized as
 Classful Protocols
 Classless Protocols
 …and also as
 Link state Routing
 Distance Vector Routing
14
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DYNAMIC ROUTING- ROUTING PROTOCOLS
 Interior Gateway Protocols (IGP):
– RIPv1 (CF/DV)
– RIPv2 (CL/DV)
– IGRP (CF/DV)
– IBGP (CL/DV)
15
– EIGRP (CL/Ad. DV)
– OSPF (CL/LS)
– ISIS (CL/LS)
 Exterior Gateway Protocols (EGP):
– EBGP (CL/DV)
ROUTING PROTOCOL
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CLASSFUL ROUTING
 Classful Routing Protocols do not send subnet mask with
its route information
 Classful Routing automatically summarizes the mask at
Classful boundaries.
 May lead to Sub-optimal paths.
 Examples of Classful Routing Protocols:
• RIP Version 1 (RIPv1)
• IGRP
16
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CLASSLESS ROUTING
 Classless Routing Protocol send subnet mask with IP route
information
 Classless routing protocols support variable-length subnet
masking (VLSM).
 Examples of classless routing protocols:
i. RIP Version 2 (RIPv2)
ii. EIGRP
iii. OSPF
iv. IS-IS
17
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DISTANCE VECTOR ROUTING PROTOCOL
 These are the protocols in which…
 Updates are sent periodically (every 30/90 seconds)
 Entire Routing Table is sent as an update
 Updates are broadcasted
 Updates are sent to directly connected neighbors only and not to
the entire group
 Routers don’t have end-to-end visibility of the entire network,
Directly connected neighbors are the worlds
 Convergence is slow.
 RIP, IGRP and BGP are DISTANCE VECTOR Routing Protocols
18
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ROUTING INFORMATION PROTOCOL
 Used for smaller networks
 Metric: Hop Count
 Maximum Hop Count: 15
 Administrative Distance: 120
 Load Balancing: over equal metric path (4 by default)
 RIP versions: RIPv1 and RIPv2
 RIPv1 sends updates on Broadcast address
 RIPv2 sends updates on Multicast address 224.0.0.9
 Encrypted Authentication between 2 RIPv2 routers
19
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
RIP TIMERS
• Update Timer: (default: 30 sec): Indicates how often the router will send out a routing
update
• Invalid Timer: (default: 180 sec): Indicates how long the route will remain in the
routing table before it gets invalid, if no new updates are received
• Hold-Down Timer: (default: 180 sec): Indicate how long RIP will suppress the route
that it has placed in HOLD state.
– HOLD state:
• Invalid timer has expired.
• Update received for a router marking that route with Metric 16 (unreachable)
• An update received from a router, with a higher metric than what is currently in
the routing table. (to prevent loops)
• Flush Timer: (default: 240 sec): Indicates how long a route can stay in the routing table
before its been flushed, if updates are not received
20
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
LINK STATE ROUTING PROTOCOL
 These are the protocols in which
 Updates are triggered and not periodic
 Updates are incremental, entire routing table is not sent as a part of
routing update
 Updates are sent as a multicast and not as broadcast
 Convergence is fast as updates are triggered
 Routers have end to end visibility of entire network through
topology table.
 OSPF and ISIS are Link State Routing Protocols
21
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ADVANCED DISTANCE VECTOR ROUTING PROTOCOL
 Combination of both Distance vector and Link State routing
protocols
 Best features of both are used in this
 Best feature of D.V Simple Configuration
 Best feature of L.S triggered updates, convergence is fast
etc.
 Used only in EIGRP
22
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
 Classless Routing Protocol
 Cisco Proprietary Protocol
 Advanced Distance Vector Protocol
 Uses DUAL (Diffusion Update Algorithm) to determine Best Path to
reach destinations
 Neighbors are formed with only directly connected routers
 Mostly the EIGRP traffic is sent on Multicast Address 224.0.0.10
 Updates are incremental and triggered
 Summarization can be done on any router interface manually
 Administrative Distance:
 Internal EIGRP : Routes originating within local AS- 90
 External EIGRP: Routes coming from outside AS- 170
 Summary EIGRP: 5
23
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP
 Maintains 3 tables
 Neighbor Table: List of all neighbor routers
 Topology Table: List of all routes in the AS
 Routing Table: Best routes to reach all networks
 Load Balancing:
 Load balancing on unequal metric path is possible.
 Default value: 4; Max Value: 6
24
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP OPERATION
 When routers are up, they exchange Multicast Hellos.
 Neighbor relation is formed after this exchange. Only directly
connected routers can become neighbors
 Topology table will be exchanged, till every router reaches converged
state
 After every router reaches converged state…
 No more exchange of Topology table, only updates will be sent after
modification in the network topology.
 EIGRP DUAL is run to find the best path to reach all networks
 Multicast echoes are exchanged to check the connectivity (Keep
Alive)
25
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP METRIC
 EIGRP is called COMPOSIT METRIC
 Bandwidth (K1) and Delay of the line (K3) is used by default to
calculate the distance Metric
 Reliability (K4/K5), MTU and Load (K2) are the other 3 parameters
that can be considered
 By default:
EIGRP METRIC=
10000000
𝐵𝑊 (𝐾𝑏𝑝𝑠)
+ delay * 256
26
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP- EXTRA
 EIGRP elects Next Best path at the same time, when it elects BEST
PATH
 Best Path is called as SUCCESSOR
 Next Best Path is called as FEASIBLE SUCCESSOR
 RULES:
 For a path to be considered as a feasible successor, its Advertised
Distance should be less than current Feasible Distance.
 For a path to be considered as a valid path, its AD should be less
than 2 times current FD
27
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DUAL
28
(a)
(1)
(2)
(1)
(1)
(1)
(2)
A
D
EC
B
FOR ROUTER C:
FD AD Topology
Via B 3 1 Successor
Via D 4 2 Feasible Successor
Via E 4 3
AD: Advertised Distance
FD: Feasible Distance
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OPEN SHORTEST PATH FIRST- OSPF
 Linked State Routing Protocol
 Metric: COST
 Higher the Bandwidth Lower the Cost, Lower the Cost Better the Path.
 𝐶𝑂𝑆𝑇 =
108
𝐵𝑊
 Determine the Best Path to reach all networks: Dijkstra Shortest Path
Algorithm
 AD Value: 110
 Sends Mask as a part of updates hence supports VLSM
 Updates are triggered
 Load Balancing on EQUAL costs path
 Multicast Address: 224.0.0.5 and 224.0.0.6
 Every OSPF router carries the visibility of the entire network with the help of
Link State Database
29
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
TABLES
 Neighbor Table
 Topology Table- Link State Database
 EIGRP and other DV protocols: Info that just have been passed on
by neighbors
 They know the roadmap to their entire AREA
 Routing Table
30
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
THE PROBLEM
 OSPF is a highly scalable protocol and can scale up to 1000s of routers.
 Has end to end visibility every router knows about all routes to reach
entire networks
 Updates are triggered after each Network Modification. This includes
addition/deletion of the route from routing table
 High Process Utilization
 High Bandwidth Utilization
 High Memory Utilization
 Solution: Summarization
31
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CONCEPT OF AREA
32
AREA 2AREA 1
AREA 0-
BACKBONEInternal
Router
Area Border
Router (ABR)
Autonomous
System Boundary
Router (ASBR)
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CONCEPT OF AREA
 All areas must connect to Area 0- One interface of ABR must
be connected to AREA 0
 All routers in an area have the same Topology Table
 Purpose: Localizing updates within a area
 Automatic Summarization is done at the ABR/ASBR only
 Hierarchical design is required
33
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF ROUTER ID
 In OSPF neighbors are identified by their RIDs
 RID is the highest IP of LOOPBACK interface.
 In absence of LOOPBACK interface, it’s the IP of highest ACTIVE
INTERFACE when router starts
 RID is also Hardcoded in the configuration using router id command-
Highest Preference
34
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF NEIGHBOR RELATIONSHIP
 Determining own Router ID
 Hardcoded
 Loopback
 Physical
 Add interfaces to Link State Database dictated by Network Command
 Send Hello on those interfaces
 This is DOWN state: Sending Hello but still waiting to hear back
 Receives Hello
 Goes in INIT state
 Checks: Hello/Dead timer, Authentication password, Area ID, Net mask 
must be identical
 Other parameters: DR/BDR IP address, Router ID and Router Priority
 Reaches TWO WAY state.
35
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF NEIGHBOR RELATIONSHIP
 Determines Master-Slave Relationship
 Determines who will send the routing first
 This is an EX_START ST
 Higher priority  Masters
 Master sends Database Description Packets (DBD) like cliff notes
 Slave sends DBDs
 DBDs are Acknowledged and Reviewed
 Router Goes in LOADING state
 First slave reviews the DBD and asks for missing info through LINK STATE REQUEST
to Master
 Master sends response in terms of LINK STATE UPDATES
 Master sends LSR and Slave responds back with LSU
 Neighbors are Synchronized
 This is the FULL STATE
 Now, Dijkstra’s SPF algorithm is applied to chose the Best Path and put it in the
routing table
 Keep Alive are sent
36
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DR/BDR
37
 DR/BDR listen on 224.0.0.6
 DROTHERS listen on 224.0.0.5
 DR/BDR is only for shared segments
 DR/BDR election is based on Router
Priority (Default: 1)
 If Router Priority is equal then the
Tie Breaker is the Router ID
 DROTHERS DO NOT need to
exchange their entire Routing info
with each other. Send it to only DR
and BDR
 Hence can stuck in TWO WAY state
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF PACKETS
 Hello:
 Sent every 10/30 sec
 Contains- Router ID, DR/BDR, Subnet Mask, Neighbors, Hello/Dead Intervals,
Auth Password, Router Priority, Area ID
 Neighbor relationship formation and keep alive
 Data-Base Description:
 Cliff notes sent in Ex-start state
 Link State Request:
 Sent in Loading state for requesting detailed information about a Network
 Link State Update:
 Response LSR
 Contain Multiple LSA
 Link State Advertisement:
 Response of each sub request
 Link State Acknowledgement:
 Reliability Mechanism
 OSPF itself is a Reliability Protocol
38
contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
LSA TYPES
 LSA 1 (Router LSA): contains a list of links local to the
router and generated by all the routers in the area
 LSA 2 (Network LSA): Generated by DR, contains list of all
routers attached to it
 LSA 3 (Network Summary LSA): Generated by ABRs; Used
for inter-area communication
 LSA 4 (ASBR Summary LSA): Route to reach ASBR
 LSA 5 (External LSA): Generated by ASBR and contains
routes to reach destinations outside local AS.
39
www.linkedin.com/company/networkraft
contact@networkraft.com
www.facebook.com/networkraft
www.linkedin.com/company/networkraft
contact@networkraft.com
www.facebook.com/networkraft
THANK YOU!
Ad

More Related Content

What's hot (20)

ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Naveen Soni
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
Er. Anmol Bhagat
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
RaghulR21
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
ETHERNET
ETHERNETETHERNET
ETHERNET
AKSHIT KOHLI
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
Smriti Tikoo
 
C I D R
C I D RC I D R
C I D R
colmbennett
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
Sourabh Goyal
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
Ethernet
EthernetEthernet
Ethernet
Mihika Shah
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
Kanishk Raj
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
Netwax Lab
 
The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
ISMT College
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
Farhan Galib
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
Bud Siddhisena
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
Tarun Khaneja
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)VLAN Trunking Protocol (VTP)
VLAN Trunking Protocol (VTP)
Naveen Soni
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
AIRTEL
 
Spanning tree protocol (stp)
Spanning tree protocol (stp)Spanning tree protocol (stp)
Spanning tree protocol (stp)
RaghulR21
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
Nishant Goel
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
Rohan Reddy
 
Vlans (virtual local area networks)
Vlans (virtual local area networks)Vlans (virtual local area networks)
Vlans (virtual local area networks)
Kanishk Raj
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
Netwax Lab
 
The mac layer
The mac layerThe mac layer
The mac layer
aazamk
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
ISMT College
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
Farhan Galib
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
Bud Siddhisena
 

Similar to CCNA Routing Fundamentals - EIGRP, OSPF and RIP (20)

Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Đồng Quốc Vương
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
Subhajit Sahu
 
ccna 4 final 2012
ccna 4 final 2012ccna 4 final 2012
ccna 4 final 2012
frivgames344jueg
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
Chris Grundemann
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
AyaanMohamed4
 
Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011
Dân Chơi
 
Ducat
DucatDucat
Ducat
kirti pachauri
 
Ch5
Ch5Ch5
Ch5
Abdisalam A. Mohamed
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
Abdisalam A. Mohamed
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
ccna4discovery
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
Đồng Quốc Vương
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
friv4schoolgames
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Đồng Quốc Vương
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
amit singh
 
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice QuestionsCrack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
rl7159133
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
nicolelemmimg
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
sushmil123
 
3 ip routing vrf lite - v2
3 ip routing   vrf lite - v23 ip routing   vrf lite - v2
3 ip routing vrf lite - v2
SagarR24
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
Dewa Ketut Setiawan
 
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Www ccnav5 net_ccna_3_v5_0_scaling_networks_final_exam_2013
Đồng Quốc Vương
 
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesAll About Routers: Types Of Routers, Routing Table And IP Routing : Notes
All About Routers: Types Of Routers, Routing Table And IP Routing : Notes
Subhajit Sahu
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 
Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023Peering 101 - ABQNOG1 - May2023
Peering 101 - ABQNOG1 - May2023
Chris Grundemann
 
Chapter 5 Routing.pptx
Chapter 5 Routing.pptxChapter 5 Routing.pptx
Chapter 5 Routing.pptx
AyaanMohamed4
 
Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011Ccna 4 chapter 2 v4.0 answers 2011
Ccna 4 chapter 2 v4.0 answers 2011
Dân Chơi
 
Ccna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 AnswersCcna 4 Chapter 8 V4.0 Answers
Ccna 4 Chapter 8 V4.0 Answers
ccna4discovery
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
Đồng Quốc Vương
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
friv4schoolgames
 
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Www ccnav5 net_ccna_3_v5_final_exam_answers_2014
Đồng Quốc Vương
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
amit singh
 
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice QuestionsCrack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
Crack the AZ-700 Exam in 2025: Real Dumps, Networking Tips & Practice Questions
rl7159133
 
119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut119163798 icnd1-practice-questions-9tut
119163798 icnd1-practice-questions-9tut
nicolelemmimg
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
sushmil123
 
3 ip routing vrf lite - v2
3 ip routing   vrf lite - v23 ip routing   vrf lite - v2
3 ip routing vrf lite - v2
SagarR24
 
Ad

Recently uploaded (20)

Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More MachinesRefactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Leon Anavi
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Best 10 Free AI Character Chat Platforms
Best 10 Free AI Character Chat PlatformsBest 10 Free AI Character Chat Platforms
Best 10 Free AI Character Chat Platforms
Soulmaite
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Middle East and Africa Cybersecurity Market Trends and Growth Analysis Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Preeti Jha
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More MachinesRefactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Refactoring meta-rauc-community: Cleaner Code, Better Maintenance, More Machines
Leon Anavi
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Digital Technologies for Culture, Arts and Heritage: Insights from Interdisci...
Vasileios Komianos
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
Right to liberty and security of a person.pdf
Right to liberty and security of a person.pdfRight to liberty and security of a person.pdf
Right to liberty and security of a person.pdf
danielbraico197
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Best 10 Free AI Character Chat Platforms
Best 10 Free AI Character Chat PlatformsBest 10 Free AI Character Chat Platforms
Best 10 Free AI Character Chat Platforms
Soulmaite
 
Secondary Storage for a microcontroller system
Secondary Storage for a microcontroller systemSecondary Storage for a microcontroller system
Secondary Storage for a microcontroller system
fizarcse
 
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
論文紹介:"InfLoRA: Interference-Free Low-Rank Adaptation for Continual Learning" ...
Toru Tamaki
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Middle East and Africa Cybersecurity Market Trends and Growth Analysis Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Middle East and Africa Cybersecurity Market Trends and Growth Analysis
Preeti Jha
 
accessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electricaccessibility Considerations during Design by Rick Blair, Schneider Electric
accessibility Considerations during Design by Rick Blair, Schneider Electric
UXPA Boston
 
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Limecraft Webinar - 2025.3 release, featuring Content Delivery, Graphic Conte...
Maarten Verwaest
 
Top Hyper-Casual Game Studio Services
Top  Hyper-Casual  Game  Studio ServicesTop  Hyper-Casual  Game  Studio Services
Top Hyper-Casual Game Studio Services
Nova Carter
 
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
MULTI-STAKEHOLDER CONSULTATION PROGRAM On Implementation of DNF 2.0 and Way F...
ICT Frame Magazine Pvt. Ltd.
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
Ad

CCNA Routing Fundamentals - EIGRP, OSPF and RIP

  翻译: