Free Essay

Ospf

In:

Submitted By sheridankm
Words 2465
Pages 10
Summary
In this chapter, I talked about the differences between switches and bridges and how they both work at layer 2 and create a MAC address forward/filter table in order to make decisions on whether to forward or flood a frame.
I also discussed problems that can occur if you have multiple links between bridges (switches) and how to solve these problems by using the
Spanning Tree Protocol (STP).
Finally, I covered detailed configuration of Cisco’s Catalyst switches, including verifying the configuration, setting the Cisco STP extensions, and changing the root bridge by setting a bridge priority.
Exam Essentials
Remember the three switch functions. Address learning, forward/filter decisions, and loop avoidance are the functions of a switch.
Remember the command show mac address-table. The command show mac address-table will show you the forward/filter table used on the LAN switch. Understand the main purpose of the Spanning Tree Protocol in a switched LAN. The main purpose of STP is to prevent switching loops in a network with redundant switched paths.
Remember the states of STP. The purpose of the blocking state is to prevent the use of looped paths. A port in listening state prepares to forward data frames without populating the MAC address table. A port in learning state populates the MAC address table but doesn’t forward data frames. A port in forwarding state sends and receives all data frames on the bridged port. Last, a port in the disabled state is virtually nonoperational. Remember the command show spanning-tree. You must be familiar with the command show spanning-tree and how to determine who the root bridge is.
Written Lab 10
Write the answers to the following questions:
1. What command will show you the forward/filter table?
2. If a destination MAC address is not in the forward/filter table, what will the switch do with the frame?
3. What are the three switch functions at layer 2?
4. If a frame is received on a switch port and the source MAC address is not in the forward/filter table, what will the switch do?
5. Which proprietary Cisco STP extension would put a switch port into err-disabled if a BPDU is received on this port?
6. 802.1w is also called what?
7. When is STP considered to be converged?
8. Switches break up _________ domains.
9. What is used to prevent switching loops in a network with redundant switched paths?
10. Which Cisco 802.1d extension stops BPDU from being transmitted out a port?
(The answers to Written Lab 10 can be found following the review questions for this chapter.)
Review Questions
The following questions are designed to test your understanding of this chapter’s material. For more information on how to get additional questions, please see this book’s
Introduction.
1. Which of the following is a layer 2 protocol used to maintain a loop-free network?
A. VTP
B. STP
C. RIP
D. CDP
2. What command will display the forward/filter table?
A. show mac filter
B. show run
C. show mac address-table
D. show mac filter-table
3. What is the result of segmenting a network with a bridge (switch)? (Choose two.)
A. It increases the number of collision domains.
B. It decreases the number of collision domains.
C. It increases the number of broadcast domains.
D. It decreases the number of broadcast domains.
E. It makes smaller collision domains.
F. It makes larger collision domains.
4. Which statement describes a spanning-tree network that has converged?
A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.
5. What is the purpose of Spanning Tree Protocol in a switched LAN?
A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
E. To create collision domains
6. What are the three distinct functions of layer 2 switching that increase available bandwidth on the network? (Choose three.)
A. Address learning
B. Routing
C. Forwarding and filtering
D. Creating network loops
E. Loop avoidance
F. IP addressing
7. Your switch has a port status LED that is alternating between green and amber. What could this indicate?
A. The port is experiencing errors.
B. The port is shut down.
C. The port is in STP blocking mode.
D. Nothing; this is normal.
8. Which of the following statements is true?
A. A switch creates a single collision domain and a single broadcast domain. A router creates a single collision domain.
B. A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain.
C. A switch creates a single collision domain and separate broadcast domains. A router provides a separate broadcast domain as well.
D. A switch creates separate collision domains and separate broadcast domains. A router provides separate collision domains.
9. You need to configure a Catalyst switch so it can be managed remotely. Which of the following would you use to accomplish this task?
A. Switch(config)#int fa0/1
Switch(config-if)#ip address 192.168.10.252 255.255.255.0
Switch(config-if)#no shut
B. Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.10.252 255.255.255.0
Switch(config-if)#ip default-gateway 192.168.10.254 255.255.255.0
C. Switch(config)#ip default-gateway 192.168.10.254
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.10.252 255.255.255.0
Switch(config-if)#no shut
D. Switch(config)#ip default-network 192.168.10.254
Switch(config)#int vlan 1
Switch(config-if)#ip address 192.168.10.252 255.255.255.0
Switch(config-if)#no shut
10. What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?
A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution
11. If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
A. Discard it and send an error message back to the originating host
B. Flood the network with the frame
C. Add the source address and port to the MAC address table and forward the frame out the destination port
D. Add the destination to the MAC address table and then forward the frame
12. You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
A. Switch(config)#spanning-tree mode rapid-pvst
B. Switch#spanning-tree mode rapid-pvst
C. Switch(config)#spanning-tree mode 802.1w
D. Switch#spanning-tree mode 802.1w
13. In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology
14. Which command was used to produce the following output:
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 0005.dccb.d74b DYNAMIC Fa0/1
1 000a.f467.9e80 DYNAMIC Fa0/3
1 000a.f467.9e8b DYNAMIC Fa0/4
1 000a.f467.9e8c DYNAMIC Fa0/3
1 0010.7b7f.c2b0 DYNAMIC Fa0/3
1 0030.80dc.460b DYNAMIC Fa0/3
A. show vlan
B. show ip route
C. show mac address-table
D. show mac address-filter
15. If you want to disable STP on a port connected to a server, which command would you use?
A. disable spanning-tree
B. spanning-tree off
C. spanning-tree security
D. spanning-tree portfast
16. Refer to the diagram. Why does the switch have two MAC addresses assigned to the FastEthernet 0/1 port in the switch address table?

A. Data from HostC and HostD has been received by the switch port FastEthernet 0/1.
B. Data from two of the devices connected to the switch has been forwarded out to HostD.
C. HostC and HostD had their NIC replaced.
D. HostC and HostD are on different VLANs.
17. Layer 2 switching provides which of the following? (Choose four.)
A. Hardware-based bridging (ASIC)
B. Wire speed
C. Low latency
D. Low cost
E. Routing
F. WAN services
18. You type show mac address-table and receive the following output:
Switch#sh mac address-table
Vlan Mac Address Type Ports
---- ----------- -------- -----
1 0005.dccb.d74b DYNAMIC Fa0/1
1 000a.f467.9e80 DYNAMIC Fa0/3
1 000a.f467.9e8b DYNAMIC Fa0/4
1 000a.f467.9e8c DYNAMIC Fa0/3
1 0010.7b7f.c2b0 DYNAMIC Fa0/3
1 0030.80dc.460b DYNAMIC Fa0/3
Suppose the above switch received a frame with the following MAC addresses:
Source MAC: 0005.dccb.d74b
Destination MAC: 000a.f467.9e8c
What will it do?
A. It will discard the frame.
B. It will forward the frame out port Fa0/3 only.
C. It will forward it out Fa0/1 only.
D. It will send it out all ports except Fa0/1.
19. You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your
Catalyst switch to meet this policy? (Choose two.)
A. Switch(config-if)#ip access-group 10
B. Switch(config-if)#switchport port-security maximum 1
C. Switch(config)#access-list 10 permit ip host 1
D. Switch(config-if)#switchport port-security violation shutdown
E. Switch(config)#mac-address-table secure
20. You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
A. The routing tables on the switches will not update.
B. The MAC forward/filter table will not update on the switch.
C. Broadcast storms will occur on the switched network.
D. The switches will automatically load-balance between the two links.
Answers to Review Questions
1. B. The Spanning Tree Protocol is used to stop switching loops in a switched network with redundant paths.
2. C. The command show mac address-table displays the forward/filter table on the switch.
3. A, E. Bridges break up collision domains, which would increase the number of collision domains in a network and also make smaller collision domains. 4. C. Convergence occurs when all ports on bridges and switches have transitioned to either the forwarding or blocking states. No data is forwarded until convergence is complete. Before data can be forwarded again, all devices must be updated.
5. C. The Spanning Tree Protocol (STP) was designed to stop layer 2 loops. All Cisco switches have the STP on by default.
6. A, C, E. Layer 2 features include address learning, forwarding and filtering of the network, and loop avoidance.
7. A. When you connect to a switch port, at first the link lights are orange/amber, and then they turn green, indicating normal operation. If the link light is blinking, you have a problem.
8. B. Switches break up collision domains, and routers break up broadcast domains.
9. C. To manage a switch remotely, you must set an IP address under the management VLAN, which is, by default, interface vlan 1. Then, from global configuration mode, you set the default gateway with the ip default-gateway command. Option C enables the management interface, which makes it correct over option B.
10. C. Switches flood all frames that have an unknown destination address. If a device answers the frame, the switch will update the MAC address table to reflect the location of the device.
11. C. Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.
12. A. 802.1w is the also called Rapid Spanning Tree Protocol. It is not enabled by default on Cisco switches, but it is a better STP to run since it has all the fixes that the Cisco extensions provide with 802.1d.
13. D. If the Spanning Tree Protocol is not running on your switches and you connect them together with redundant links, you will have broadcast storms and multiple frame copies.
14. C. The command show mac address-table will display the forward/filter table, also called a CAM table, on a switch.
15. D. If you have a server or other devices connected into your switch that you’re totally sure won’t create a switching loop if STP is disabled, you can use something called portfast on these ports. Using it means the port won’t spend the usual 50 seconds to come up while STP is converging.
16. A. A switch can have multiple MAC addresses associated with a port. In the diagram, a hub is connected to port Fa0/1, which has two hosts connected. 17. A, B, C, D. Switches, unlike bridges, are hardware based. Cisco says its switches are wire speed and provide low latency, and I guess they are low cost compared to their prices in the 1990s.
18. B. Since the destination MAC address is in the MAC address table (forward/filter table), it will send it out port Fa0/3 only.
19. B, D. switchport port-security is an important command, and it’s super easy with the CNA; however, from the CLI you can set the maximum number of MAC addresses allowed into the port and then set the penalty if this maximum has been passed.
20. C. If spanning tree is disabled on a switch and you have redundant links to another switch, broadcast storms will occur, among other possible problems. Answers to Written Lab 10
1. show mac address-table
2. Flood the frame out all ports except the port on which it was received
3. Address learning, forward/filter decisions, and loop avoidance
4. It will add the source MAC address in the forward/filter table and associate it with the port on which the frame was received.
5. BPDUGuard
6. Rapid Spanning Tree Protocol (RSTP)
7. When all ports are in either the blocking or the forwarding mode
8. Collision
9. Spanning Tree Protocol (STP)
10. PortFast

Similar Documents

Free Essay

Ospf

...Chapter 11 Exercises For Exercises 1- 15, mark the answers true and false as follows: A. True B. False |1. |A text file stores binary data that is organized into groups of 8 or 16 bits that are interpreted as characters. | | |A | |2. |A program written in a high-level language is stored in a text file that is also called a source file. | | |A | |3. |The type of a file determines which kinds of operations can be performed on it. | | |A | |4. |The current file pointer indicates the end of a file. | | |B | |5. |Sequential access and direct access take about the same amount of time to retrieve data. | | |B | |6. |Some operating systems...

Words: 2267 - Pages: 10

Premium Essay

Router Ospf

...Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 172.16.1.17 255.255.255.240 duplex auto speed auto ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 64000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 ! interface Serial0/1/0 no ip address clock rate 2000000 shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ip flow-export version 9 ! ! ! ! ! ! ! line con 0 password cisco login ! line aux 0 ! line vty 0 4 password cisco login ! ! ! end R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 10 R1(config-router)#network 192.168.10.0\ ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.1 % Incomplete command. R1(config-router)#network 192.168.10.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.0.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10 0.0.0.0.3 area...

Words: 2242 - Pages: 9

Free Essay

Cisco Ospf

...Laborotory Work OSPF MULTI AREA CONFIGURATION In this laboratory work you will learn: * Use OSPF MultiArea protocol ; * Encrypted Ospf protocol; Note: The routers used CCNA labs are Cisco 2911 Cable the network as shown in the topology. Attach the devices as shown in the topology diagram, and cable as necessary. Configure PC hosts. Initialize and reload the routers and switches as necessary. Configure basic settings for each router. Configure routing. Configure OSPF on the routers in area 1 with process ID of 100, in area 0 with process ID of 110, in area 2 with 200. R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 * On R1 use the following commands #show ip route R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area ...

Words: 1093 - Pages: 5

Free Essay

Eigrp vs Ospf

...EIGRP vs OSPF EIGRP or OSPF, one is not necessarily better, but rather just different. Both are tools you can use to solve a problem they’re well suited to solve. Unfortunately, nothing on either protocol goes into too much detail on why we would use one or the other. EIGRP is known widely as a proprietary protocol. So is it just a matter of using EIGRP with Cisco equipment and OSPF without? OSPF is pretty cool because it allows us to decide the path through the network by being aware of all links in a given logical topology. OSPF gives us a bit more control, seeing as each router knows about every other link in an OSPF area, allowing us to get really granular path selection. OSPF does require more resources on the device than most other protocols, such as the relatively light DUAL algorithm that sits behind EIGRP. So use OSPF when you have beefy equipment and EIGRP when you don’t. From what I’ve read Cisco will be allowing EIGRP to be used on non-Cisco equipment. That will make it more available to use. So now EIGRP may be kind of open and newer equipment is less affected by the power of OSPF. So back and forth we go. One thing where OSPF holds an advantage is the ability to see your route. With EIGRP it’s considered routing by rumor. EIGRP is able to summarize on any interface running EIGRP, and OSPF is only able to do this at Area Border Routers, or routers at that join multiple areas together. There are a couple ways of looking at this, but I’d like to make one very clear...

Words: 376 - Pages: 2

Free Essay

Redistribution Eigrp Ospf

... [pic] Objectives • Review EIGRP and OSPF configuration. • Summarize routes in EIGRP. • Summarize in OSPF at an ABR and an ASBR. • Redistribute into EIGRP. • Redistribute into OSPF. Background Two online booksellers, Example.com and Example.net, have merged and now need a short-term solution to inter-domain routing. Since these companies provide client services to Internet users, it is essential to have minimal downtime during the transition. Example.com is running EIGRP while Example.net is running a multi-area OSPF. Because it is imperative that the two booksellers continuously deliver Internet services, you should bridge these two routing domains without interfering with each router’s path through its own routing domain to the Internet. The CIO determines that it is preferable to keep the two protocol domains shown in the diagram during the transition period, because the network engineers on each side need to understand the other’s network before deploying a long-term solution. Redistribution will be a short-term solution. In this scenario, R1 and R2 are running EIGRP while R2 is the OSPF autonomous system border router (ASBR) consisting of areas 0, 10, and 20. You need to configure R2 to enable these two routing protocols to interact to allow full connectivity between all networks. In this lab, R1 is running EIGRP and R3 is running multi-area OSPF. Your task is to configure redistribution on R2 to enable...

Words: 3338 - Pages: 14

Free Essay

Ospf White Paper

...WHITE PAPER BIDIRECTIONAL FORWARDING DETECTION FOR OSPF Fast Failure Detection to Speed Network Convergence OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet events*:...

Words: 6315 - Pages: 26

Free Essay

Eigr vs Ospf

...EIGRP vs OSPF IP Networking NT2640 Travis McCaig 05/07/16 Mr. M. G. Durazo Ed. EIGRP vs OSPF In this paper we will explore and compare EIGRP and OSPF protocols to determine if one might be better suited to a particular network. First I’ll explore their positive or negative features individually. Then I’ll do a more side-by-side comparison to see if there are more noticeable differences. Finally, I’ll make an informed decision on which protocol to choose based on network’s size, topology and more. EIGRP Enhanced Interior Gateway Routing Protocol or (EIGRP) is a protocol that lets routers exchange a copy of its neighbors routing tables. These tables are updated each time a new router comes online and EIGRP can detect changes in routes. It can do this marvelous feat by periodically sending a “hello” packet, that essentially responds an active or inactive result. If a router isn’t available EIGRP changes the route as well as updates the other neighboring routers. Finally, this protocol can consider distance and determine if a path is loop-free thereby determining most efficient route. OSPF Open Shortest Path First also called OSPF is a protocol that like EIGRP can exchange routing tables with neighbors with an added bonus. The bonus is that it creates a complete map of all networks and this is dubbed an Autonomous System or AS. This complete picture of the AS is also copied and shared but the advantage lies in the ability to manually manipulate routes for traffic...

Words: 715 - Pages: 3

Premium Essay

Eigrp vs Ospf

...EIGRP Vs OSPF EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out. ...

Words: 365 - Pages: 2

Premium Essay

Eigrp vs Ospf

...EIGRP Vs OSPF EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.   It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out...

Words: 361 - Pages: 2

Premium Essay

Ospf for Traffic Routing

...OSPF for Traffic Routing Robert Collazo Rasmussen College Author Note This research is being submitted on August 30, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. OSPF for Traffic Routing The OSPF dynamic routing protocol is probably the most popular LAN routing protocol today. OSPF can scale to the largest LANs but can also start out small. With OSPF, every router has its own unique "picture" (topology map) of the network. Routers use "HELLO" packets to periodically check with routers to ensure they are still there. Every router in OSPF is identified with a "router ID". The router ID can be manually entered or OSPF will automatically choose the IP address with the highest number. To configure OSPF, Set the bandwidth on your interfaces using the bandwidth command Router (config-if)# bandwidth XX (where XX signifies the bandwidth of the WAN connection). Router (config)# router ospf {process-ID#} Next, instruct the router to advertise the networks that are directly linked to it by entering network statements with the area ID number for that network, Router (config-router)# network {X.X.X.X} {Y.Y.Y.Y} area {z} X.X.X.X = Network ID of Network Y.Y.Y.Y = the wildcard mask for the network (the wildcard mask is the inverse mask of the subnet mask). Z = the area ID number (For small networks, this can always be zero (0) but for larger networks, the area IDs need to be properly planned as all routing updates...

Words: 347 - Pages: 2

Premium Essay

Ospf for Traffic Routing

...OSPF for Traffic Routing Robert Collazo Rasmussen College Author Note This research is being submitted on August 30, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. OSPF for Traffic Routing The OSPF dynamic routing protocol is probably the most popular LAN routing protocol today. OSPF can scale to the largest LANs but can also start out small. With OSPF, every router has its own unique "picture" (topology map) of the network. Routers use "HELLO" packets to periodically check with routers to ensure they are still there. Every router in OSPF is identified with a "router ID". The router ID can be manually entered or OSPF will automatically choose the IP address with the highest number. To configure OSPF, Set the bandwidth on your interfaces using the bandwidth command Router (config-if)# bandwidth XX (where XX signifies the bandwidth of the WAN connection). Router (config)# router ospf {process-ID#} Next, instruct the router to advertise the networks that are directly linked to it by entering network statements with the area ID number for that network, Router (config-router)# network {X.X.X.X} {Y.Y.Y.Y} area {z} X.X.X.X = Network ID of Network Y.Y.Y.Y = the wildcard mask for the network (the wildcard mask is the inverse mask of the subnet mask). Z = the area ID number (For small networks, this can always be zero (0) but for larger networks, the area IDs need to be properly planned as all routing updates...

Words: 374 - Pages: 2

Free Essay

Intro to Ospf V Eigrp

...EIGRP (Distance Vector) and OSPF (Link-State) Routing Protocol Comparison Prepared By Part 01 Literature Review Date April 15 2016 * Executive Summary For routers to be able to effectively and efficiently distribute data across a network they need to be programmed with the network topology. One method in which the network is "mapped" can be done by using routing protocols. The two main types of routing protocol are Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). * * Project plan The study will be compromised of setting up two different network topologies and implementing the different routing protocols on each so that we can observe and record the positive and negative aspects of each protocol. * Literature review http://packetlife.net/blog/2008/oct/2/distance-vector-versus-link-state/ “There are two major classes of routing protocol: distance vector and link-state. It's easy to remember which protocols belong to either class, but comprehending the differences between the two classes takes a bit more effort.” EIGRP (Distance Vector) and OSPF (Link-State) Routing Protocol Comparison * Summary EIGRP and OSPF are routing protocols used to advertise routes in a network. EIGRP was a cisco proprietary protocol, and OSPF is an open standard industry protocol, which means it can be implemented with non-Cisco devices. Protocols are set of rules and regulations, routing protocols...

Words: 644 - Pages: 3

Free Essay

Unit 5 Assignment 5.1 Eigrp vs Ospf

...Unit 5 Assignment 1: Cisco Networks EIGRP versus OSPF EIGRP: Enhanced Interior Gateway Routing Protocol Is another routing protocol just like RIP and OSPF. EIGRP converges very quickly and it takes about the same time or not less than OSPF takes to converge, but without the negatives of OSPF. EIGRP’s benefit requires much less processing time, memory and less design than say OSPF. The downside with EIGRP is that it is Cisco-proprietary, so if an internet work areas uses non-Cisco routers it cannot be used on those routers. EIGRP is neither distance-vector nor link-state. Sometimes Cisco refers to EIGRP as an enhanced distance vector protocol but in some cases calls it a balanced hybrid routing protocol. EIGRP has some similarities to routing protocols but the differences far outweigh them. OSPF: Open Shortest Path First Is a link-state routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 . OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in large service provider networks. The most widely used exterior gateway protocol is the Border Gateway Protocol (BGP), the principal routing protocol between autonomous...

Words: 269 - Pages: 2

Premium Essay

Netw204: Assignment 4, Link-State Routing and Ospf

...Routing and OSPF (50 points) Fill in the blanks below with either the term defined or the definition for the terms listed. Each answer is worth 2 points each, 25 questions X 2 = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME | Jose Antonio Nunez | | Term | Definition | 1 | An OSPF network | Attaches to multiple areas, maintains separatelink-state databases for each area it is connectedto, and routes traffic destined for or arriving fromother areas | 2 | Autonomous System Boundary Router (ASBR) | Is an OSPF router located between OSPF autonomous system networks and non-OSPF networks. | 3 | Backup Designated Router (BDR) | Is a router that becomes the Designated Router if the DR fails. | 4 | Database Description (DBD) | Contains an abbreviated list of the sendingrouter’s link-state database and is used by receiving routers to check against the local link-state database | 5 | Designated Router (DR) | Is an OSPF router that controls the routes of LSA’s or LSU’s. It helps maintain link state updates to other routers in the network. | 6 | DRothers | Is neither a DR, nor a BDR. They are other routers in the OSPF network. | 7 | Flapping link | Is when an advertised route between two nodes alternates back and forth. This creates a link state that cycles between up and down. | 8 | The highest IP address of an active router interface. | Router ID for an OSPF router if...

Words: 655 - Pages: 3

Free Essay

A Report to Critically Compare a Number of Routing Protocols; Including Rip V2, Eigrp & Ospf

...Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain on the network; with RIPv2 being the simplest to run, and OSPF being the most complicated to...

Words: 4222 - Pages: 17