Free Essay

Internet Protocols

In:

Submitted By maxwell159
Words 1711
Pages 7
INTERNET PROTOCOLS & APPLICATIONS

* TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology. This protocol is also designed to run over major LAN types, notably Ethernet and Token Ring. * HTTP: Hypertext Transfer Protocol governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web (WWW). The Internet Engineering Task Force (IETF) developed the standards for HTTP. * FTP: File Transfer Protocol provides services for file transfer and manipulation. FTP allows multiple simultaneous connections to remote file systems. * SSH: Secure Shell is used to securely connect to a remote computer. * Telnet: An application used to connect to a remote computer that lacks security features. * POP3: Post Office Protocol is used to download e-mail from a remote mail server. * IMAP: Internet Message Access Protocol is also used to download e-mail from a remote mail server. * SMTP: Simple Mail Transfer Protocol is used to send e-mail to a remote e-mail server. * Internet Control Message Protocol (ICMP): Send control and error messages to computers and servers. ICMP has several different uses, such as announcing network errors, announcing network congestion, and troubleshooting.

TCP/IP Model
The TCP/IP reference model provides a common frame of reference for developing the protocols used on the Internet. It consists of layers that perform functions necessary to prepare data for transmission over a network. Table 8-6 describes the four layers of the TCP/IP model.

A message begins at the top layer, the application layer, and moves down the TCP/IP layers to the bottom layer, the network access layer. Header information is added to the message as it moves down through each layer and then is transmitted. After reaching the destination, the message travels back up through each layer of the TCP/IP model. The header information that was added to the message is stripped away as the message moves up through the layers toward its destination.

TCP/IP Model Layer Description
Application 4 Where high-level protocols such as SMTP and FTP operate
Transport 3 Where flow-control and connection protocols exist
Internet 2 Where IP addressing and routing take place
Network access 1 Where MAC addressing and physical network components exist

Application Protocols
Application layer protocols provide network services to user applications such as web browsers and e-mail programs. Here are some of the application protocols that operate at the TCP/IP application layer:

* Hypertext Transfer Protocol (HTTP) governs how files such as text, graphics, sound, and video are exchanged on the Internet or World Wide Web (WWW). HTTP is an application layer protocol. A web server runs an HTTP service or daemon. A daemon is a program that services HTTP requests. These requests are transmitted by HTTP client software, which is another name for a web browser. * Telnet is an application that you can use to access, control, and troubleshoot remote computers and network devices. * File Transfer Protocol (FTP) is a set of rules governing how files are transferred. FTP allows multiple simultaneous connections to remote file systems. * Simple Mail Transport Protocol (SMTP) provides messaging services over TCP/IP and supports most Internet e-mail programs. * Domain Name System (DNS) translates domain names, such as www.cisco.com, to IP addresses. * Hypertext Markup Language (HTML) is a page description language. Web designers use HTML to indicate to web browser software how the page should look. HTML includes tags to indicate boldface and italic type, line breaks, paragraph breaks, hyperlinks, and insertion of tables, among other instructions.

Transport Protocols

Transport layer protocols provide end-to-end management of the data. One of the functions of these protocols is to divide the data into manageable segments for easier transport across the network. Here are the two transport protocols that operate at the TCP/IP transport layer:

■ Transmission Control Protocol (TCP) is the primary Internet protocol for the reliable delivery of data. TCP includes facilities for end-to-end connection establishment, error detection and recovery, and metering the rate of data flow into the network. Many standard applications, such as e-mail, web browser, file transfer, and Telnet, depend on the services of TCP.
■ User Datagram Protocol (UDP) offers a connectionless service for delivery of data. UDP uses lower overhead than TCP and doesn’t handle issues of reliability. Network management applications, network file system, and simple file transport use UDP.

Internet Protocols

Internet layer protocols operate at the third layer from the top in the TCP/IP model. Internet protocols are used to provide connectivity between hosts in the network. Here are some of the protocols that operate at the TCP/IP Internet layer:

■ Internet Protocol (IP) provides source and destination addressing, much like the address and return address on a postal envelope. In conjunction with routing protocols, IP provides packet-forwarding information from one network to another.
■ Internet Control Message Protocol (ICMP) is used for network testing and troubleshooting. It enables diagnostic and error messages. The ping application uses ICMP echo messages to test if a remote device can be reached.
■ Routing information Protocol (RIP) operates between router devices to discover paths between networks. In an intranet, routers depend on a routing protocol to build and maintain information about how to forward packets toward the destination. RIP chooses routes based on the distance or hop count to the destination.
■ Address Resolution Protocol (ARP) is used to map the MAC address of a node on the network when its IP address is known. End stations as well as routers use ARP to discover MAC addresses.

Network Access Protocols

Network access protocols describe the standards that hosts use to access the physical media. The IEEE 802.3 Ethernet standards and technologies, such as CSMA/CD and 10BASE-T, are defined at this layer.

The OSI Model
The OSI model is an industry-standard framework that is used to divide network communications into seven distinct layers. Although other models exist, most network vendors today build their products using this framework.

A system that implements protocol behavior consisting of a series of these layers is known as a protocol stack. Protocol stacks can be implemented in either hardware or software, or a combination of both. Typically, only the lower layers are implemented in hardware, and the higher layers are implemented in software.

Each layer is responsible for part of the processing to prepare data for transmission on the network.

OSI Model | Layer | Description | Application | 7 | Responsible for network services to applications | Presentation | 6 | Transforms data formats to provide a standard interface for the application layer | Session | 5 | Establishes, manages, and terminates the connections between the local and remote applications | Transport | 4 | Provides reliable transport and flow control across a network | Network | 3 | Responsible for logical addressing and the domain of routing | Data link | 2 | Provides physical addressing and media access procedures | Physical | 1 | Defines all the electrical and physical specifications for devices |

In the OSI model, when data is transferred, it is said to virtually travel down the OSI model layers of the sending computer and up the OSI model layers of the receiving computer.

When a user wants to send data, such as an e-mail, the encapsulation process starts at the application layer. The application layer provides network access to applications. Information flows through the top three layers and is considered to be data when it gets down to the transport layer.

At the transport layer, the data is broken into more manageable segments, or transport layer protocol data units (PDU), for orderly transport across the network. A PDU describes data as it moves from one layer of the OSI model to another. The transport layer PDU also contains information such as port numbers, sequence numbers, and acknowledgment numbers, which is used for reliable data transport.

At the network layer, each segment from the transport layer becomes a packet. The packet contains logical addressing and other Layer 3 control information.

At the data link layer, each packet from the network layer becomes a frame. The frame contains physical address and error-correction information.

At the physical layer, the frame becomes bits. These bits are transmitted one at a time across the network medium.

At the receiving computer, the de-encapsulation process reverses the process of encapsulation. The bits arrive at the physical layer of the OSI model of the receiving computer. The process of virtually traveling up the OSI model of the receiving computer brings the data to the application layer, where an e-mail program displays the e-mail.

Compare the OSI and TCP/IP Models
The OSI model and the TCP/IP model are both reference models used to describe the data communication process. The TCP/IP model is used specifically for the TCP/IP suite of protocols. The OSI model is used to develop standard communication for equipment and applications from different vendors.

The TCP/IP model performs the same process as the OSI model, but it uses four layers instead of seven.

Similar Documents

Premium Essay

Internet Protocol

... INTERNET PROTOCOL (IP) The primary network communications protocol used on networks today is the IP (Internet Protocol). IP relays or transfers network packets, also known as datagrams, to destinations on local networks or across the public Internet. It defines the structures which encapsulate information as well as the legal addressing methods used to identify the source and destination network hosts or computing devices. IP was the datagram service included with the TCP (Transmission Control Program) protocol providing a connectionless service coupled with the connection-based TCP protocol. The primary version of the protocol in use on the Internet today is IPv4, Internet Protocol Version 4. TCP (TRANSMISSION CONTROL PROTOCOL): TCP/IP is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network. When we set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. TCP/IP is a two-layer program. The higher layer, Transmission Control Protocol, manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. The lower layer, Internet Protocol, handles the address part of each packet...

Words: 720 - Pages: 3

Premium Essay

Internet Protocols

...How Internet Protocols Work Kyra Pettit CIT/278 April 18, 2013 Richard Sleeper How Internet Protocols Work In the 1970s Internet Protocols were developed. Before this computer networks did not have a way to communicate with other networks. Protocols allowed computers on different networks to communicate or talk to each other. This let computers to communicate and exchange packets of data with each other. This essay will explain the different protocols and the responsibility of each protocol. Transfer Control Protocol\Internet Protocols (TCP\IP) Transfer Control Protocol/Internet Protocol (TCP/IP) was established. The TCP\IP enables packets to be routed by containing address information and control information. This protocol is the primary and heart of the Internet protocols. It makes sure all the information sent is transferred reliably and quickly. If any packet is lost the information is not re-routed back through again. It only sends what is missing out of the packet back again. File Retrieval Protocols This was an earlier Protocol for retrieving information from the Internet. This protocol had no type of graphics or no description of the file. The person putting in the info had to keep files on paper about the information are it would have been lost. File Transfer Protocol (FTP) The FTP helped move files from one computer to another. Using this user can log on to a computer, and look through the files, download or upload the files (usg). No description...

Words: 554 - Pages: 3

Premium Essay

Internet Protocol Security

...MEANING OF INTERNET PROTOCOL SECURITY Internet Protocol Security is a framework of open standards for ensuring private secure connections over internet protocol (IP) networks through the use of cryptographic security services. It encrypts and authenticates each communication package on the network in a communication session. It can be used to protect communication between data hosts, security gate ways or security gateway and host. It has been deployed widely to implement virtual private networks. It supports two encryption modes, tunnel and transport. The transport mode encrypts only the data section of each packet while the tunnel mode encrypts both the header and the data section. On the receiving side, an Internet protocol security compliant device decrypts both the header and the data portion to present it to the user in a format he can understand. In the recent past there has been a lot of development in the information technology sector. Much if this development is based in information. It is therefore important to protect the information since it is not only precious and private, but if found in the wrong hands, it could be used to do a lot of damage for example terrorism. It has forced tech companies to develop secure ways of transmitting information without the interception of non-intended users. Information is a strategic resource. A significant portion of organizational budgets is spent on managing information. Hence information is a huge business where loads of...

Words: 1373 - Pages: 6

Free Essay

Internet Protocol Ipv4

...8/17/14 The current version of the Internet Protocol IPv4 was first developed in the 1970s, and the main protocol standard RFC 791 that governs IPv4 functionality was published in 1981. With the unprecedented expansion of Internet usage in recent years, especially by population dense countries like India and China, the impending shortage of address space (availability) was recognized by 1992 as a serious limiting factor to the continued usage of the Internet run on IPv4 (Das, 2013). The Internet Protocol version 6 (IPv6) is the latest revision of the Internet Protocol (IP). It is a communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4, which still carries the vast majority of Internet traffic as of 2013. As of late November 2012, IPv6 traffic share was reported to be approaching 1% (Wikipedia, 2013). On the Internet, data is transmitted in the form of network packets. IPv6 specifies a new packet format, designed to minimize packet header processing by routers. Because the headers of IPv4 packets and IPv6 packets are significantly different, the two protocols are not interoperable. However, in most respects, IPv6 is a conservative extension of IPv4. Most transport and application-layer protocols need little or no change to operate...

Words: 913 - Pages: 4

Free Essay

The Internet Protocol Suite and the Osi Reference Model

...Deserae Caldwell Ip troubleshooting The Internet Protocol Suite and the OSI Reference Model Traceroute The traceroute utility sends out either ICMP echo request (Windows) or UDP (most implementations) messages with gradually increasing IP TTL values to probe the path by which a packet traverses the network. The first packet with the TTL set to 1 will be discarded by the first hop, and the first hop will send back an ICMP TTL When the machine running the traceroute receives the ICMP TTL exceeded message, it can determine the hop via the source IP address. This continues until the destination is reached. The destination will return either an ICMP echo reply (Windows) or a ICMP port unreachable, indicating that the destination had been reached. Traceroute can return useful information about TCP/IP connectivity across your network Example of traceroute Return Codes | Code | Meaning | Possible Cause(s) | nnmsec | This gives, for each node, the round-trip time (in milliseconds) for the specified number of probes. | This is normal. | * | The probe timed out. | A device along the path either did not receive the probe or did not reply with an ICMP "packet life exceeded" message. | A | Administratively prohibited. | A device along the path, such as a firewall or router, may be blocking the probe and possibly other or all traffic; check access lists. | Q | Source quench. | A device along the path may be receiving to much traffic; check input queues. | H | An ICMP unreachable...

Words: 906 - Pages: 4

Premium Essay

Pv4 Internet Protocol - a Brief History

...IPv4 Internet Protocol - A Brief History At the end of the 1960's there was a great demand in various US universities and research centers for a network that should permit nationwide utilization of existing computer resources. In addition to that there was the desire for data exchange. On the other hand there was the interest in practical experiences, design, implementation, the use of network techniques in general and packet switching in particular. So the Advanced Research Project Agency, an US government organization, started developing a net called ARPANET. From 1972 the Advanced Research Project Agency dealt with research projects of military interests and ARPANET was renamed DARPA. The first proposal was made in 1968. The contract was won in December 1968 by the company Bolt, Breakneck and Newman (BBN). The demands for file transfer, remote login and email were on top of the list for NCP (Network Control Protocol, the predecessor of TCP/IP). The first use of ARPANET was in 1971. In 1973, a project was started, developing new lower layer protocols because the existing layers had become functionally inadequate. So Cerf and Kahn specified the following goals for the lower layer protocols in 1974: • Independence from underlying network techniques and from the architecture of the host • Universal connectivity throughout the network • End-to-end acknowledgments • Standardized application protocols In 1981 the TCP/IPv4 was standardized in ARPANET RFC's. The...

Words: 298 - Pages: 2

Free Essay

Internet Protocol

...Definition Networked computer systems are rapidly growing in importance as the medium of choice for the storage and exchange of information. However, current systems afford little privacy to their users, and typically store any given data item in only one or a few fixed places, creating a central point of failure. Because of a continued desire among individuals to protect the privacy of their authorship or readership of various types of sensitive information, and the undesirability of central points of failure which can be attacked by opponents wishing to remove data from the system or simply overloaded by too much interest, systems offering greater security and reliability are needed. Freenet is being developed as a distributed information storage and retrieval system designed to address these concerns of privacy and availability. The system operates as a location-independent distributed file system across many individual computers that allow files to be inserted, stored, and requested anonymously. There are five main design goals: 1.Anonymity for both producers and consumers of information 2.Deniability for storers of information 3.Resistance to attempts by third parties to deny access to information 4.Efficient dynamic storage and routing of information 5.Decentralization of all network functions The system is designed to respond adaptively to usage patterns, transparently moving, replicating, and deleting files as necessary to provide efficient service without...

Words: 700 - Pages: 3

Premium Essay

Internet Protocol Configuration

...ip route 0.0.0.0 0.0.0.0 10.255.255.1 router eigrp 100 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.1.0.0 255.255.0.0 ip dhcp pool B1_VLAN10 network 10.1.10.0 255.255.255.0 default-router 10.1.10.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN20 network 10.1.20.0 255.255.255.0 default-router 10.1.20.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN30 network 10.1.30.0 255.255.255.0 default-router 10.1.30.1 dns-server 10.0.1.4 exit ip dhcp pool B1_VLAN88 network 10.1.88.0 255.255.255.0 default-router 10.1.88.1 dns-server 10.0.1.4 exit ip dhcp excluded-address 10.1.10.1 10.1.10.10 ip dhcp excluded-address 10.1.20.1 10.1.20.10 ip dhcp excluded-address 10.1.30.1 10.1.30.10 ip dhcp excluded-address 10.1.88.1 10.1.88.24 B2 hostname B2 int s0/0/0 ip address 10.255.255.6 255.255.255.252 no sh encapsulation frame-relay frame-relay lmi-type q933a exit ip route 0.0.0.0 0.0.0.0 10.255.255.5 router eigrp 100 passive-interface fa0/0.10 passive-interface fa0/0.20 passive-interface fa0/0.30 passive-interface fa0/0.99 network 10.0.0.0 no auto-summary int s0/0/0 ip summary-address eigrp 100 10.2.0.0 255.255.0.0 ip dhcp pool B2_VLAN10 network 10.2.10.0 255.255.255.0 default-router 10.2.10.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN20 network 10.2.20.0 255.255.255.0 default-router 10.2.20.1 dns-server 10.0.1.4 exit ip dhcp pool B2_VLAN30 network 10.2.30.0 255.255.255.0 default-router 10.2.30.1 ...

Words: 3046 - Pages: 13

Premium Essay

Voice over Internet Protocol

...Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular phone line. The technology was introduced in 1995, and has developed into an enormous enterprise since then. I will be presenting an overview of the technologies that brought VoIP to fruition, the methods of connecting, benefits, and drawbacks. VoIP is a general term for a family of transmission technologies for voice communications over the internet. Other terms associated with VoIP are; IP telephony, internet telephony, Voice over Broadband (VoBB), broadband telephony, and broadband phone. All of these terms mean essentially the same thing: voice communications that are sent over the internet instead of through the Public Switched Telephone Network. The technical mechanisms that allow this to happen will be explained in detail later. In 1995, VocalTec released the first commercial internet phone software (Wikipedia, 2010). Called “Internet Phone”, the application was designed to function on a home based computer system similar to how PC phones are used today. Mike Anderson says, “Although many people took a liking to the concept, there were major drawbacks in terms of quality and overall efficiency. At the time, the use of dial-up modems and lack of broadband availability resulted in poor voice quality when compared to the typical analog phone call. Despite the issue of quality, Vocaltec’s achievement is still viewed as...

Words: 1761 - Pages: 8

Free Essay

Huffman Trucking Service Request Sr-Ht-010

...Huffman Trucking Service Request SR-ht-010 NTC/361 Huffman Trucking Service Request SR-ht-010 Huffman Trucking is a national transportation company that provides carrier services for various vendors, including the United States Government. At present the company has a main office in Cleveland Ohio and hubs located in California, Missouri, and New Jersey (Apollo Group, Inc., 2012) . The ability to remain competitive relies on capable employees and efficient systems that operate at full capacity. The company is in the midst of developing the yearly budget and is examining all of the current systems in place. The Chief Information Officer (CIO) has requested a full review of all the current telephone and data network systems in all locations. Along with the review, recommendations for changes are also required. This document will outline Huffman Trucking’s systems and identify areas for improvement to maintain the company’s high level of service. Telephone Systems Looking at the current systems in the four plants and offices one can see that all four of the offices and plants have different telecommunication systems. Huffman Trucking has locations in four states with offices and plants located in California, Missouri, New Jersey, and Ohio. Many of the locations are using wiring that is not adequate for the system to have the capabilities to function in a business capacity. The California and New Jersey locations use a plain old telephone system (POTS), Private Branch Exchange...

Words: 3605 - Pages: 15

Free Essay

Case Study 3

...Case Study3: Design Scenario Klamath Paper Products Name: Fabio M. Cesar Professor: Edwin Otto Course: Network Architecture and Analysis Date: 12/04/2012 Many routing protocols are based on algorithms designed to obtain the shortest path between two points, disregarding metrics such as delay and congestion. However, the demand for speed and bandwidth on this environment is causing the depletion of resources available in the current network’s infrastructure. The users are constantly seeking larger applications, causing congestion and degradation of performance. Therefore, the goal is that the network support the various services and user’s requirements effectively by the techniques of Quality of Service (QoS). The Internet service is based on end-to-end without connection, which provides transport of best-effort data by using TCP / IP (Transmission Control Protocol / Internet Protocol). The QoS functions are expected to guarantee delivery and to differentiate IP services to network resources and for controlling the operation of the network. QoS is a set of service requirements that must be known by the network in the “Flow of Transportation” guaranteeing the service for the end-to-end, based on policy measured on performance, resource allocation, switching, routing, routing of packets and packet loss mechanisms. With the use of QoS in IP, networks can support the existing applications and emerging applications...

Words: 797 - Pages: 4

Premium Essay

Hw 1 It220

...Network Interface Card 3. Expand the acronym MAC. Media Access Control 4. Expand the acronym LAN. Local Area Network 5. Expand the acronym WAN. Wide Area Network Section 1-2: 6. Define the term protocol. Set of rules established for users to exchange information. 7. Define the term topology. Architecture of a network. 8. Define the term deterministic. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination without passing the data traffic to other networking devices. Section 1-3: 12. Define the acronym CSMA/CD and the protocol that uses CSMA/CD. Carrier Sense Multiple Access with Collision Detection, The networking protocol Ethernet. 13. What information is not included in an Ethernet frame? a. Frame size 14. What is the minimum size of the data payload in an Ethernet frame? 46 bytes The data being transmitted...

Words: 1934 - Pages: 8

Premium Essay

Course Materials

...Lab 5.1 Connect the Internetwork Lab Review Questions 1. For what purpose is a transceiver used? A transceiver can be used for converting one type of Ethernet connector to another or by converting one type of I/O port to an Ethernet port. 2. This lab connects routers directly to each other via serial cables. Is this a typical configuration? No, By default, Cisco routers are DTE (Data Terminal Equipment)/ DCE (Data Circuit-Terminating Equipment) If not, to what equipment does the DCE end of the serial cable usually connect? If Router A is connected to the DTE end of the cable, Router B must be connected to the DCE end 3. What does a rollover (console) cable look like? Rollover cable is often used to connect a computer terminal to a router's console port. This cable is typically flat (and has a light blue color) with a DB-9 Female end to RJ-45 Male end. 4. What kind of port does the console cable attach to on the computer? Serial Port (dial-up modem) 5. What kind of port does the UTP patch cable attach to on the router? The console port Lab 5.2 Configure HyperTerminal to Access a Cisco Router Review Questions 1. What program on a Windows computer is typically used for configuring a Cisco router? HyperTerminal 2. What are the important settings to configure in HyperTerminal to access a Cisco router? You must then configure how you will connect to the router and the system configuration 3. Where is the HyperTerminal program in most Windows computers? All Programs/Accessories/Communications...

Words: 2124 - Pages: 9

Free Essay

Unit 1 Nt 1104

...Configure OSPF routing on all routers Configure OSPF router IDs Verify OSPF routing using show commands Configure a static default route Propagate default route to OSPF neighbors Configure OSPF Hello and Dead Timers Configure OSPF priority Understand the OSPF election process Document the OSPF configuration Scenarios In this lab activity, there are two separate scenarios. In the first scenario, you will learn how to configure the routing protocol OSPF using the network shown in the Topology Diagram in Scenario A. The segments of the network have been subnetted using VLSM. OSPF is a classless routing protocol that can be used to provide subnet mask information in the routing updates. This will allow VLSM subnet information to be propagated throughout the network. In the second scenario, you will learn to configure OSPF on a multi-access network. You will also learn to use the OSPF election process to determine the designated router (DR), backup designated router (BDR), and DRother states. CCNA Exploration Routing Protocols and Concepts: OSPF Lab 11.6.1: Basic OSPF Configuration Lab Topology Diagram -- Scenario A Addressing Table Device Interface IP Address Subnet Mask R1 -- Don’t forget to add your clock rates on the serial interfaces!!! Fa0/0 172.16.1.17 255.255.255.240 S0/0/0 192.168.10.1 255.255.255.252 S0/0/1 192.168.10.5 255.255.255.252 R2 Fa0/0 10.10.10.1 255.255.255.0 S0/0/0 192.168.10.2 255.255.255...

Words: 3741 - Pages: 15

Premium Essay

Advanced Routing

...Linux Advanced Routing & Traffic Control HOWTO Bert Hubert Netherlabs BV Gregory Maxwell Remco van Mook Martijn van Oosterhout Paul B Schroeder Jasper Spaans Revision History Revision 1.1 DocBook Edition 2002−07−22 A very hands−on approach to iproute2, traffic shaping and a bit of netfilter. Linux Advanced Routing & Traffic Control HOWTO Table of Contents Chapter 1. Dedication.........................................................................................................................................1 Chapter 2. Introduction ......................................................................................................................................2 2.1. Disclaimer & License.......................................................................................................................2 2.2. Prior knowledge................................................................................................................................2 2.3. What Linux can do for you...............................................................................................................3 2.4. Housekeeping notes..........................................................................................................................3 2.5. Access, CVS & submitting updates..................................................................................................3 2.6. Mailing list..............................................

Words: 28706 - Pages: 115