Free Essay

Ospf

In:

Submitted By gvgsgoutham
Words 2267
Pages 10
Chapter 11 Exercises

For Exercises 1- 15, mark the answers true and false as follows: A. True B. False
|1. |A text file stores binary data that is organized into groups of 8 or 16 bits that are interpreted as characters. |
| |A |
|2. |A program written in a high-level language is stored in a text file that is also called a source file. |
| |A |
|3. |The type of a file determines which kinds of operations can be performed on it. |
| |A |
|4. |The current file pointer indicates the end of a file. |
| |B |
|5. |Sequential access and direct access take about the same amount of time to retrieve data. |
| |B |
|6. |Some operating systems maintain a separate read pointer and write pointer for a file. |
| |A |
|7. |UNIX file permissions allow a group of users to access a file in various ways. |
| |A |
|8. |In most operating systems, a directory is represented as a file. |
| |A |
|9. |Two files in a directory system can have the same name if they are in different directories. |
| |A |
|10. |A relative path is relative to the root of the directory hierarchy. |
| |B |
|11. |An absolute path and a relative path will always be the same length. |
| |B |
|12. |An operating system is responsible for managing the access to a disk drive. |
| |A |
|13. |The seek time is the amount of time it takes for the heads of a disk to reach a particular cylinder. |
| |A |
|14. |The shortest-seek-time-first disk scheduling algorithm moves the heads the minimum amount it can to satisfy a pending |
| |request. |
| |A |
|15. |The shortest-seek-time-first disk scheduling algorithm moves the heads the minimum amount it can to satisfy a pending |
| |request. |
| |B |

For Exercises 16 - 20, match the file extensions with the appropriate file. A. txt B. mp3, au, and wav C. gif, tiff, and jpg D. doc and wp3 E. java, c, and cpp

|16. |audio file |
| |B |
|17. |image file |
| |C |
|18. |text data file |
| |A |
|19. |program source file |
| |E |
|20. |word processing file |
| |D |

For Exercises 21 - 23 , match the symbol with its use. A. / B. \ C. ..

|21. |Symbol used to separate the names in a path in a Windows environment. |
| |B |
|22. |Symbol used to separate the names in a path in a Unix environment. |
| |A |
|23. |Symbol used to represent the parent directory in a relative path name. |
| |C |

Exercises 24 - 57 are problems or short-answer questions.
|24. |What is a file? |
| |A file is the smallest amount of information that can be written to secondary memory. It is a named collection of data, |
| |used for organizing secondary memory. |
|25. |Distinguish between a file and a directory. |
| |A file is a named collection of data. A directory is a named collection of files. |
|26. |Distinguish between a file and a file system. |
| |A file is a named collection of data. A file system is the operating system's logical view of the files it manages. |
|27. |Why is a file a generic concept and not a technical one? |
| |A file is just a named collection of bits (data) in storage. Because there are different operating systems, there are |
| |different technical views of a file. Because we are talking from the user's view not the implementation view, the |
| |concept is generic. |
|28. |Name and describe the two basic classifications of files. |
| |Text files: Files that contain text. Each byte is an ANSII character or each 2 types is a Unicode character. |
| |Binary files: The bytes in a binary file do not necessarily contain characters. These files require a special |
| |interpretation. |
|29. |Why is the term binary file a misnomer? |
| |All files ultimately are just a collection of bits, so why call one file type "binary?" In a binary file, the bits are |
| |not interpreted at text. A binary file would just be a stream of uninterpreted bits unless there is an interpretation |
| |provided. If a binary file is printed without interpretation, it looks like garbage. |
|30. |Distinguish between a file type and a file extension. |
| |A file type is a description of the information contained in the file. A file extension is a part of the file name that |
| |follows a dot and identifies the file type. |
|31. |What would happen if you give the name "myFile.jpg" to a text file? |
| |It depends on what application program you use to open the file. If you use a program that expects an image file, you |
| |would get an error. If you use a program that expects a text file, there would be no problem. |
|32. |How can an operating system make use of the file types that it recognizes? |
| |If you click on a file on your desktop and the OS recognizes the file type, then the appropriate application program can |
| |be called to open the file. If you are writing Java programs using an integrated environment, then the files saved in |
| |the IDE are tagged and clicking on a file automatically opens the file in the IDE. |
|33. |How does an operating system keep track of secondary memory? |
| |The OS maintains a table indicating which blocks of memory are free. The OS also maintains a table for each directory |
| |that contains information about the files in that directory. |
|34. |What does it mean to open and close a file? |
| |Operating systems keep a table of currently open files. The open operation enters the file into this table and places |
| |the file pointer at the beginning of the file. The close operation removes the file from the table of open files. |
|35. |What does it mean to truncate a file? |
| |Truncating a file means that all the information on the file is erased but the administrative entries remain in the file |
| |tables. Occasionally, the truncate operation removes the information from the file pointer to the end. |
|36. |Compare and contrast sequential and direct file access. |
| |Both sequential and direct file access find and access a record. In sequential access the file pointer begins at the |
| |beginning of the file and can only move in one direction. Thus sequential access is linear: The only record that can be |
| |accessed is the first or the one immediately following the last one accessed. In direct access the file pointer can be |
| |moved to any specific record and the data accessed from that place. |
|37. |File access is independent of any physical medium. |
| |a. How could you implement sequential access on a disk? |
| |Sequential access always accesses the next record. You implement sequential access on a disk by not giving the user an |
| |access command that takes a record address as a parameter. |
| |b. How could you implement direct access on a magnetic tape? |
| |Each record on a magnetic tape is conceptually numbered from the first to the last. Keep a counter of which record was |
| |read last. When a user gives an access command to read a specific record, if the record number is beyond the last record|
| |read, then records are read and skipped until the correct record is found. If the record number comes before the last |
| |record read, the tape is rewound and records are read and skipped until the correct record is found. |
|38. |What is a file protection mechanism? |
| |A file protection mechanism is one that an operating system implements that ensures the only valid users can access a |
| |particular file. |
|39. |How does Unix implement file protection? |
| |Unix implements file protection by associating with each file a 3x3 table in which the rows are Owner, Group, and World |
| |and the columns are Read, Write/Delete, and Execute. The contents of each cell in the table are boolean values meaning |
| |yes and no. For example, a yes in the cell (Owner, Execute) means that the owner of the file can execute it. A no in |
| |the cell (World, Write/Delete) means that permission to write or delete a file is not granted to anyone that is not the |
| |owner of the file or within a specified group. (Group is a list of those considered part of the group.) |
|40. |Given the following file permission, answer these questions. |
| |Read |Write/Delete |Execute |
|Owner |Yes |Yes |Yes |
|Group |Yes |Yes |No |
|World |Yes |No |No |

| |a. Who can read the file? |
| |Any one can read the file. |
| |b. Who can write or delete the file? |
| |The owner and members of the group can write or delete the file. |
| |c. Who can execute the file? |
| |Only the owner can execute the file. |
| |d. What do you know about the content of the file? |
| |Because the owner has permission to execute the file, it must contain an executable program. |
|41. |What is the minimum amount of information a directory must contain about each file? |
| |A directory must contain the file name, the file type, the address on disk where the file is stored, the current size of |
| |the file, and permission information. |
|42. |How do most operating systems represent a directory? |
| |As a file. |
|43. |Answer the following questions about directories. |
| |a. A directory that contains another directory is called what? |
| |parent directory |
| |b. A directory contained within another directory is called what? |
| |subdirectory |
| |c. The directory that is not contained in any other directory is called what? |
| |root directory |
| |d. The structure showing the nested directory organization is called what? |
| |directory tree |
| |e. Relate the structure in d to the binary tree data structure examined in Chapter 8. |
| |A directory tree and a binary tree are both hierarchical structures in which there is only one way to reach any subtree. |
| |The root directory is equivalent to the root of the binary tree. In a binary tree, each node can have none, one, or two |
| |child nodes. In a directory tree, each node can have any number of subdirectories. |
|44. |What is the directory called in which you are working at any one moment? |
| |working directory |
|45. |What is a path? |
| |A path is a text string that specifies the location of a file or subdirectory. |
|46. |Distinguish between an absolute path and a relative path. |
| |An absolute path is a path that begins at the root directory and includes all successive subdirectories. A relative path|
| |is a path that begins at the current working directory and includes all successive subdirectories. |
|47. |Show the absolute path to each of the following files or directories using the directory tree shown in Figure 11.4: |
| |a. QTEffects.qtx |
| |C:\WINDOWS\System\QuickTime\QTEffects.qtx |
| |b. brooks.mp3 |
| |C:\My Documents\downloads\brooks.mp3 |
| |c. Program Files |
| |C:\Program Files |
| |d. 3dMaze.scr |
| |C:\WINDOWS\System\3dMaze.scr |
| |e. Powerpnt.exe |
| |C:\Program Files\MS Office\Powerpnt.exe |
|48. |Show the absolute path to each of the following files or directories using the directory tree shown in Figure 11.5: |
| |a. tar |
| |/bin/tar |
| |b. access.old |
| |/etc/mail/access.old |
| |c. named.conf |
| |/etc/named.conf |
| |d. smith |
| |/home/smith |
| |e. week3.txt |
| |/home/smith/reports/week1.txt |
| |f. printall |
| |/home/jones/utilities/printall |
|49. |Assuming the current working directory is C:\WINDOWS\System, give the relative path name to the following files or |
| |directories using the directory tree shown in Figure 11.4: |
| |a. QTImage.qtx |
| |QuickTime\QTImage.qtx |
| |b. calc.exe |
| |..\calc.exe |
| |c. letters |
| |..\..\My Documents\letters |
| |d. proj3.java |
| |..\..\My Documents\csc101\proj3.java |
| |e. adobep4.hlp |
| |adobep4.hlp |
| |f. WinWord.exe |
| |..\..\Program Files\MS Office\Winword.exe |
|50. |Show the relative path to each of the following files or directories using the directory tree shown in Figure 11.5: |
| |a. localtime when working directory is the root directory |
| |/etc/localtime |
| |b. localtime when the working directory is etc |
| |localtime |
| |c. printall when the working directory is utilities |
| |printall |
| |d. week1.txt when the working directory is man2 |
| |../reports/week1.txt |
|51. |What is the worst bottleneck in a computer system? |
| |Transferring data to and from secondary memory is the worst bottleneck. |
|52. |Why is disk scheduling concerned more with cylinders than with tracks and sectors? |
| |Seek time (the time to find the right cylinder) is more time consuming than locating which track or which sector, so seek|
| |time is the time to minimize. |
|53. |Name and describe three disk scheduling algorithms. |
| |First-come, first-serve (FCSC): The requests are handled in the order in which they are generated. |
| |Shortest seek time first (SSTF): The request closest to the read/write heads is handled next. |
| |SCAN: The read/write heads move back and forth handling the closest in the direction in which they are moving. |
| |Use the following list of cylinder requests in Exercises 31 through 33. They are listed in the order in which they were |
| |received. |
| |40, 12, 22, 66, 67, 33, 80 |
|54. |List the order in which these requests are handled if the FCFS algorithm is used. Assume that the disk is positioned at |
| |cylinder 50. |
| |40, 12, 22, 66, 67, 33, 80 |
|55. |List the order in which these requests are handled if the SSTF algorithm is used. Assume that the disk is positioned at |
| |cylinder 50. |
| |40, 33, 22, 12, 66, 67, 80 |
|56. |List the order in which these requests are handled if the SCAN algorithm is used. Assume that the disk is positioned at |
| |cylinder 50 and the read/write heads are moving toward the higher cylinder numbers. |
| |66, 67, 80, 40, 33, 22, 12 |
|57. |Explain the concept of starvation. |
| |In the SSTF algorithm, it is possible for some requests never to be serviced because requests closer to the read/write |
| |heads keep being issued. |

Similar Documents

Free Essay

Ospf

...Summary In this chapter, I talked about the differences between switches and bridges and how they both work at layer 2 and create a MAC address forward/filter table in order to make decisions on whether to forward or flood a frame. I also discussed problems that can occur if you have multiple links between bridges (switches) and how to solve these problems by using the Spanning Tree Protocol (STP). Finally, I covered detailed configuration of Cisco’s Catalyst switches, including verifying the configuration, setting the Cisco STP extensions, and changing the root bridge by setting a bridge priority. Exam Essentials Remember the three switch functions. Address learning, forward/filter decisions, and loop avoidance are the functions of a switch. Remember the command show mac address-table. The command show mac address-table will show you the forward/filter table used on the LAN switch. Understand the main purpose of the Spanning Tree Protocol in a switched LAN. The main purpose of STP is to prevent switching loops in a network with redundant switched paths. Remember the states of STP. The purpose of the blocking state is to prevent the use of looped paths. A port in listening state prepares to forward data frames without populating the MAC address table. A port in learning state populates the MAC address table but doesn’t forward data frames. A port in forwarding state sends and receives all data frames on the bridged port. Last, a port in the disabled state is virtually ...

Words: 2465 - Pages: 10

Premium Essay

Router Ospf

...Loopback0 ip address 10.1.1.1 255.255.255.255 ! interface FastEthernet0/0 ip address 172.16.1.17 255.255.255.240 duplex auto speed auto ! interface FastEthernet0/1 no ip address duplex auto speed auto shutdown ! interface Serial0/0/0 ip address 192.168.10.1 255.255.255.252 clock rate 64000 ! interface Serial0/0/1 ip address 192.168.10.5 255.255.255.252 ! interface Serial0/1/0 no ip address clock rate 2000000 shutdown ! interface Vlan1 no ip address shutdown ! ip classless ! ip flow-export version 9 ! ! ! ! ! ! ! line con 0 password cisco login ! line aux 0 ! line vty 0 4 password cisco login ! ! ! end R1#conf t Enter configuration commands, one per line. End with CNTL/Z. R1(config)#router ospf 10 R1(config-router)#network 192.168.10.0\ ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.1 % Incomplete command. R1(config-router)#network 192.168.10.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10.0.0.0.0.3 area 0 ^ % Invalid input detected at '^' marker. R1(config-router)#network 192.168.10 0.0.0.0.3 area...

Words: 2242 - Pages: 9

Free Essay

Cisco Ospf

...Laborotory Work OSPF MULTI AREA CONFIGURATION In this laboratory work you will learn: * Use OSPF MultiArea protocol ; * Encrypted Ospf protocol; Note: The routers used CCNA labs are Cisco 2911 Cable the network as shown in the topology. Attach the devices as shown in the topology diagram, and cable as necessary. Configure PC hosts. Initialize and reload the routers and switches as necessary. Configure basic settings for each router. Configure routing. Configure OSPF on the routers in area 1 with process ID of 100, in area 0 with process ID of 110, in area 2 with 200. R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R6(config)#router ospf 100 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 192.168.1.0 0.0.0.255 area 1 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 R2(config)#router ospf 110 R6(config-router)#network 8.0.0.0 0.255.255.255 area 1 R6(config-router)#network 9.0.0.0 0.255.255.255 area 1 R6(config-router)#network 30.0.0.0 0.255.255.255 area 0 * On R1 use the following commands #show ip route R1#show ip route Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area ...

Words: 1093 - Pages: 5

Free Essay

Eigrp vs Ospf

...EIGRP vs OSPF EIGRP or OSPF, one is not necessarily better, but rather just different. Both are tools you can use to solve a problem they’re well suited to solve. Unfortunately, nothing on either protocol goes into too much detail on why we would use one or the other. EIGRP is known widely as a proprietary protocol. So is it just a matter of using EIGRP with Cisco equipment and OSPF without? OSPF is pretty cool because it allows us to decide the path through the network by being aware of all links in a given logical topology. OSPF gives us a bit more control, seeing as each router knows about every other link in an OSPF area, allowing us to get really granular path selection. OSPF does require more resources on the device than most other protocols, such as the relatively light DUAL algorithm that sits behind EIGRP. So use OSPF when you have beefy equipment and EIGRP when you don’t. From what I’ve read Cisco will be allowing EIGRP to be used on non-Cisco equipment. That will make it more available to use. So now EIGRP may be kind of open and newer equipment is less affected by the power of OSPF. So back and forth we go. One thing where OSPF holds an advantage is the ability to see your route. With EIGRP it’s considered routing by rumor. EIGRP is able to summarize on any interface running EIGRP, and OSPF is only able to do this at Area Border Routers, or routers at that join multiple areas together. There are a couple ways of looking at this, but I’d like to make one very clear...

Words: 376 - Pages: 2

Free Essay

Redistribution Eigrp Ospf

... [pic] Objectives • Review EIGRP and OSPF configuration. • Summarize routes in EIGRP. • Summarize in OSPF at an ABR and an ASBR. • Redistribute into EIGRP. • Redistribute into OSPF. Background Two online booksellers, Example.com and Example.net, have merged and now need a short-term solution to inter-domain routing. Since these companies provide client services to Internet users, it is essential to have minimal downtime during the transition. Example.com is running EIGRP while Example.net is running a multi-area OSPF. Because it is imperative that the two booksellers continuously deliver Internet services, you should bridge these two routing domains without interfering with each router’s path through its own routing domain to the Internet. The CIO determines that it is preferable to keep the two protocol domains shown in the diagram during the transition period, because the network engineers on each side need to understand the other’s network before deploying a long-term solution. Redistribution will be a short-term solution. In this scenario, R1 and R2 are running EIGRP while R2 is the OSPF autonomous system border router (ASBR) consisting of areas 0, 10, and 20. You need to configure R2 to enable these two routing protocols to interact to allow full connectivity between all networks. In this lab, R1 is running EIGRP and R3 is running multi-area OSPF. Your task is to configure redistribution on R2 to enable...

Words: 3338 - Pages: 14

Free Essay

Ospf White Paper

...WHITE PAPER BIDIRECTIONAL FORWARDING DETECTION FOR OSPF Fast Failure Detection to Speed Network Convergence OVERVIEW In both Enterprise and Service Provider networks, the convergence of business-critical applications onto a common IP infrastructure is becoming more common. Given the criticality of the data, these networks are typically constructed with a high degree of redundancy. While such redundancy is desirable, its effectiveness is dependant upon the ability of individual network devices to quickly detect failures and reroute traffic to an alternate path. This detection is now typically accomplished via hardware detection mechanisms. However, the signals from these mechanisms are not always conveyed directly to the upper protocol layers. When the hardware mechanisms do not exist (eg: Ethernet) or when the signaling does not reach the upper protocol layers, the protocols must rely on their much slower strategies to detect failures. The detection times in existing protocols are typically greater than one second, and sometimes much longer. For some applications, this is too long to be useful. Bi-directional Forwarding Detection (BFD) provides rapid failure detection times between forwarding engines, while maintaining low overhead. It also provides a single, standardized method of link/device/protocol failure detection at any protocol layer and over any media. THE PROBLEM WITH CONVERGENCE The process of network convergence can be broken up into a set of discreet events*:...

Words: 6315 - Pages: 26

Free Essay

Eigr vs Ospf

...EIGRP vs OSPF IP Networking NT2640 Travis McCaig 05/07/16 Mr. M. G. Durazo Ed. EIGRP vs OSPF In this paper we will explore and compare EIGRP and OSPF protocols to determine if one might be better suited to a particular network. First I’ll explore their positive or negative features individually. Then I’ll do a more side-by-side comparison to see if there are more noticeable differences. Finally, I’ll make an informed decision on which protocol to choose based on network’s size, topology and more. EIGRP Enhanced Interior Gateway Routing Protocol or (EIGRP) is a protocol that lets routers exchange a copy of its neighbors routing tables. These tables are updated each time a new router comes online and EIGRP can detect changes in routes. It can do this marvelous feat by periodically sending a “hello” packet, that essentially responds an active or inactive result. If a router isn’t available EIGRP changes the route as well as updates the other neighboring routers. Finally, this protocol can consider distance and determine if a path is loop-free thereby determining most efficient route. OSPF Open Shortest Path First also called OSPF is a protocol that like EIGRP can exchange routing tables with neighbors with an added bonus. The bonus is that it creates a complete map of all networks and this is dubbed an Autonomous System or AS. This complete picture of the AS is also copied and shared but the advantage lies in the ability to manually manipulate routes for traffic...

Words: 715 - Pages: 3

Premium Essay

Eigrp vs Ospf

...EIGRP Vs OSPF EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out. ...

Words: 365 - Pages: 2

Premium Essay

Eigrp vs Ospf

...EIGRP Vs OSPF EIGRP - Is an advanced distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.   It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out...

Words: 361 - Pages: 2

Premium Essay

Ospf for Traffic Routing

...OSPF for Traffic Routing Robert Collazo Rasmussen College Author Note This research is being submitted on August 30, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. OSPF for Traffic Routing The OSPF dynamic routing protocol is probably the most popular LAN routing protocol today. OSPF can scale to the largest LANs but can also start out small. With OSPF, every router has its own unique "picture" (topology map) of the network. Routers use "HELLO" packets to periodically check with routers to ensure they are still there. Every router in OSPF is identified with a "router ID". The router ID can be manually entered or OSPF will automatically choose the IP address with the highest number. To configure OSPF, Set the bandwidth on your interfaces using the bandwidth command Router (config-if)# bandwidth XX (where XX signifies the bandwidth of the WAN connection). Router (config)# router ospf {process-ID#} Next, instruct the router to advertise the networks that are directly linked to it by entering network statements with the area ID number for that network, Router (config-router)# network {X.X.X.X} {Y.Y.Y.Y} area {z} X.X.X.X = Network ID of Network Y.Y.Y.Y = the wildcard mask for the network (the wildcard mask is the inverse mask of the subnet mask). Z = the area ID number (For small networks, this can always be zero (0) but for larger networks, the area IDs need to be properly planned as all routing updates...

Words: 347 - Pages: 2

Premium Essay

Ospf for Traffic Routing

...OSPF for Traffic Routing Robert Collazo Rasmussen College Author Note This research is being submitted on August 30, 2013, for Christine Stagnetto-Zweig’s N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. OSPF for Traffic Routing The OSPF dynamic routing protocol is probably the most popular LAN routing protocol today. OSPF can scale to the largest LANs but can also start out small. With OSPF, every router has its own unique "picture" (topology map) of the network. Routers use "HELLO" packets to periodically check with routers to ensure they are still there. Every router in OSPF is identified with a "router ID". The router ID can be manually entered or OSPF will automatically choose the IP address with the highest number. To configure OSPF, Set the bandwidth on your interfaces using the bandwidth command Router (config-if)# bandwidth XX (where XX signifies the bandwidth of the WAN connection). Router (config)# router ospf {process-ID#} Next, instruct the router to advertise the networks that are directly linked to it by entering network statements with the area ID number for that network, Router (config-router)# network {X.X.X.X} {Y.Y.Y.Y} area {z} X.X.X.X = Network ID of Network Y.Y.Y.Y = the wildcard mask for the network (the wildcard mask is the inverse mask of the subnet mask). Z = the area ID number (For small networks, this can always be zero (0) but for larger networks, the area IDs need to be properly planned as all routing updates...

Words: 374 - Pages: 2

Free Essay

Intro to Ospf V Eigrp

...EIGRP (Distance Vector) and OSPF (Link-State) Routing Protocol Comparison Prepared By Part 01 Literature Review Date April 15 2016 * Executive Summary For routers to be able to effectively and efficiently distribute data across a network they need to be programmed with the network topology. One method in which the network is "mapped" can be done by using routing protocols. The two main types of routing protocol are Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). * * Project plan The study will be compromised of setting up two different network topologies and implementing the different routing protocols on each so that we can observe and record the positive and negative aspects of each protocol. * Literature review http://packetlife.net/blog/2008/oct/2/distance-vector-versus-link-state/ “There are two major classes of routing protocol: distance vector and link-state. It's easy to remember which protocols belong to either class, but comprehending the differences between the two classes takes a bit more effort.” EIGRP (Distance Vector) and OSPF (Link-State) Routing Protocol Comparison * Summary EIGRP and OSPF are routing protocols used to advertise routes in a network. EIGRP was a cisco proprietary protocol, and OSPF is an open standard industry protocol, which means it can be implemented with non-Cisco devices. Protocols are set of rules and regulations, routing protocols...

Words: 644 - Pages: 3

Free Essay

Unit 5 Assignment 5.1 Eigrp vs Ospf

...Unit 5 Assignment 1: Cisco Networks EIGRP versus OSPF EIGRP: Enhanced Interior Gateway Routing Protocol Is another routing protocol just like RIP and OSPF. EIGRP converges very quickly and it takes about the same time or not less than OSPF takes to converge, but without the negatives of OSPF. EIGRP’s benefit requires much less processing time, memory and less design than say OSPF. The downside with EIGRP is that it is Cisco-proprietary, so if an internet work areas uses non-Cisco routers it cannot be used on those routers. EIGRP is neither distance-vector nor link-state. Sometimes Cisco refers to EIGRP as an enhanced distance vector protocol but in some cases calls it a balanced hybrid routing protocol. EIGRP has some similarities to routing protocols but the differences far outweigh them. OSPF: Open Shortest Path First Is a link-state routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 in RFC 2328for IPv4. The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 . OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks. IS-IS, another link-state dynamic routing protocol, is more common in large service provider networks. The most widely used exterior gateway protocol is the Border Gateway Protocol (BGP), the principal routing protocol between autonomous...

Words: 269 - Pages: 2

Premium Essay

Netw204: Assignment 4, Link-State Routing and Ospf

...Routing and OSPF (50 points) Fill in the blanks below with either the term defined or the definition for the terms listed. Each answer is worth 2 points each, 25 questions X 2 = 50 total points. Type answers in the appropriate cell; text will automatically wrap. Post your completed assignment to the dropbox. NAME | Jose Antonio Nunez | | Term | Definition | 1 | An OSPF network | Attaches to multiple areas, maintains separatelink-state databases for each area it is connectedto, and routes traffic destined for or arriving fromother areas | 2 | Autonomous System Boundary Router (ASBR) | Is an OSPF router located between OSPF autonomous system networks and non-OSPF networks. | 3 | Backup Designated Router (BDR) | Is a router that becomes the Designated Router if the DR fails. | 4 | Database Description (DBD) | Contains an abbreviated list of the sendingrouter’s link-state database and is used by receiving routers to check against the local link-state database | 5 | Designated Router (DR) | Is an OSPF router that controls the routes of LSA’s or LSU’s. It helps maintain link state updates to other routers in the network. | 6 | DRothers | Is neither a DR, nor a BDR. They are other routers in the OSPF network. | 7 | Flapping link | Is when an advertised route between two nodes alternates back and forth. This creates a link state that cycles between up and down. | 8 | The highest IP address of an active router interface. | Router ID for an OSPF router if...

Words: 655 - Pages: 3

Free Essay

A Report to Critically Compare a Number of Routing Protocols; Including Rip V2, Eigrp & Ospf

...Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain on the network; with RIPv2 being the simplest to run, and OSPF being the most complicated to...

Words: 4222 - Pages: 17