SlideShare a Scribd company logo
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
1.1 Router Initial
Configuration
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Characteristicsof a Network
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Why Routing?
The router is responsible for the routing of traffic
between networks.
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers are specialized computers containing the following
required components to operate:
• Central processing unit (CPU)
• Operating system (OS) - Routers use Cisco IOS
• Memory and storage (RAM, ROM, NVRAM, Flash, hard drive)
Router Functions
Routers are Computers
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Routers use specialized ports and network interface cards to
interconnect to other networks.
Router Functions
Routers are Computers (cont.)
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers are Computers
Router Memory
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Interconnect Networks
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Functions
Routers Choose Best Paths
 Routers use static routes and dynamic routing protocols to learn
about remote networks and build their routing tables.
 Routers use routing tables to determine the best path to send
packets.
 Routers encapsulate the packet and forward it to the interface
indicated in routing table.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Process switching – An
older packet forwarding
mechanism still available for
Cisco routers.
 Fast switching – A common
packet forwarding
mechanism which uses a
fast-switching cache to store
next hop information.
 Cisco Express Forwarding
(CEF) – The most recent,
fastest, and preferred Cisco
IOS packet-forwarding
mechanism.
Router Functions
Packet Forwarding Methods
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Connect to a Network
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Default Gateways
To enable network
access devices, must be
configured with the
following IP address
information:
IP address - Identifies a
unique host on a local
network.
Subnet mask - Identifies
the host’s network subnet.
Default gateway -
Identifies the router a
packet is sent to when the
destination is not on the
same local network
subnet.
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Document Network Addressing
Network documentation should include at least the following in a topology diagram
and addressing table:
 Device names
 Interfaces
 IP addresses and
subnet masks
 Default gateways
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Statically Assigned IP address – The host is manually assigned an IP
address, subnet mask and default gateway. A DNS server IP address can
also be assigned.
• Used to identify specific network resources such as network servers
and printers.
• Can be used in very small networks with few hosts.
Dynamically Assigned IP Address – IP Address information is
dynamically assigned by a server using Dynamic Host Configuration
Protocol (DHCP).
• Most hosts acquire their IP address information through DHCP.
• DHCP services can be provided by Cisco routers.
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Host
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect devices
Device LEDs
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Console Access
Connect Devices
Console Access
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Connect Devices
Enable IP on a Switch
 Network infrastructure devices require IP addresses to enable remote
management.
 On a switch, the management IP address is assigned on a virtual interface
called a switched virtual interface (SVI)
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure Router Basic Settings
 Name the device – Distinguishes
it from other routers
 Secure management access –
Secures privileged EXEC, user
EXEC, and Telnet access, and
encrypts passwords .
 Configure a banner – Provides
legal notification of unauthorized
access.
 Save the Configuration
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Router Interface
To be available, a router interface
must be:
 Configured with an address and subnet
mask.
 Activated using no shutdown
command. By default LAN and WAN
interfaces are not activated.
 Configured with the clock
rate command on the Serial cable end
labeled DCE.
Optional description can be included.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface
Configure interface with IPv6 address and subnet mask:
 Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration
command.
 Activate using the no shutdown command.
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv6 Router Interface (cont.)
IPv6 interfaces can support more than one address:
 Configure a specified global unicast – ipv6address ipv6-
address /ipv6-length
 Configure a global IPv6 address with an interface identifier (ID) in the
low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64
 Configure a link-local address - ipv6address ipv6-address /ipv6-
length link-local
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router Basic Settings
Configure an IPv4 Loopback Interface
A loopback interface is a logical interface that is internal to the
router:
 It is not assigned to a physical port, it is considered a software interface that is
automatically in an UP state.
 A loopback interface is useful for testing.
 It is important in the OSPF routing process.
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings
Show commands are used to
verify operation and configuration
of interface:
 show ip interfaces brief
 show ip route
 show running-config
Show commands that are used to
gather more detailed interface
information:
 show interfaces
 show ip interfaces
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify Interface Settings (cont.)
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Verify IPv6 Interface Settings
Common commands to verify the IPv6 interface configuration:
 show ipv6 interface brief - displays a summary for each of the interfaces.
 show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6
addresses for this interface.
 show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have
been installed in the IPv6 routing table.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show command output can be managed using the following
command and filters:
 Use the terminal length number command to specify the number of lines to be
displayed.
 To filter specific output of commands use the (|)pipe character after show
command. Parameters that can be used after pipe include:
• section, include, exclude, begin
Verify Connectivity of Directly Connected Networks
Filter Show Command Output
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Verify Connectivity of Directly Connected Networks
Command History Feature
The command history feature temporarily stores a list of executed
commands for access:
 To recall commands press Ctrl+P or the UP Arrow.
 To return to more recent commands press Ctrl+N or the Down Arrow.
 By default, command history is enabled and the system captures the last 10 commands
in the buffer. Use the show history privileged EXEC command to display the buffer
contents.
 Use the terminal history size user EXEC command to increase or decrease size of
the buffer.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
1.2 Routing Decisions
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Router Switching Function
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Send a Packet
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Forward to Next Hop
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Packet Routing
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Switching Packets Between Networks
Reach the Destination
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Routing Decisions
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Best Path
 Best path is selected by a routing protocol based on the value or
metric it uses to determine the distance to reach a network:
o A metric is the value used to measure the distance to a given network.
o Best path to a network is the path with the lowest metric.
 Dynamic routing protocols use their own rules and metrics to build
and update routing tables:
o Routing Information Protocol (RIP) - Hop count
o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to
destination
o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Load Balancing
 When a router has two or more paths to a destination with equal cost
metrics, then the router forwards the packets using both paths equally:
o Equal cost load balancing can improve network performance.
o Equal cost load balancing can be configured to use both dynamic routing protocols and
static routes.
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Path Determination
Administrative Distance
 If multiple paths to a destination are configured on a router, the path
installed in the routing table is the one with the lowest Administrative
Distance (AD):
o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an
AD of 90.
o A directly connected route with an AD of 0 is more reliable than a static route with an AD
of 1.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39
1.3 Router Operation
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
The Routing Table
 A routing table is a file stored in RAM that contains information about:
o Directly connected routes
o Remote routes
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources
The show ip route command is used to display the contents of the routing
table:
o Local route interfaces - Added to the routing table when an interface is configured.
(displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.)
o Directly connected interfaces - Added to the routing table when an interface is
configured and active.
o Static routes - Added when a route is manually configured and the exit interface is active.
o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and
networks are identified.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Routing Table Sources (cont.)
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Analyze the Routing Table
Remote Network Routing Entries
Interpreting the entries in the routing table
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Interfaces
A newly deployed router, without any configured interfaces, has an empty
routing table.
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Routing Table Entries
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected Example
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directly Connected Routes
Directly Connected IPv6 Example
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Routes
Static routes and default static routes can be implemented after
directly connected interfaces are added to the routing table:
o Static routes are manually configured.
o They define an explicit path between two networking devices.
o Static routes must be manually updated if the topology changes.
o Their benefits include improved security and control of resources.
o Configure a static route to a specific network using the ip route network
mask {next-hop-ip | exit-intf} command.
o A default static route is used when the routing table does not contain a
path for a destination network.
o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit-
intf | next-hop-ip} command.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static Route Example (cont.)
Entering and Verifying a Static Route
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Statically Learned Routes
Static IPv6 Route Examples
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
Dynamic Routing
 Dynamic routing is used by
routers to share information
about the reachability and
status of remote networks.
 It performs network
discovery and maintains
routing tables.
 Routers have converged
after they have finished
exchanging and updating
their routing tables.
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Routing Protocols
Cisco routers can support a variety of dynamic IPv4 routing protocols
including:
• EIGRP – Enhanced Interior Gateway Routing Protocol
• OSPF – Open Shortest Path First
• IS-IS – Intermediate System-to-Intermediate System
• RIP – Routing Information Protocol
Use the router ? Command in global configuration mode to determine
which routing protocols are supported by the IOS.
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv4 Dynamic Routing Examples
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Routing Protocols
Cisco routers can support a variety of dynamic IPv6 routing protocols
including:
o RIPng (RIP next generation)
o OSPFv3
o EIGRP for IPv6
Use the ipv6 router ? command to determine which routing
protocols are supported by the IOS
IPv6 Routing Protocols
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Dynamic Routing Protocols
IPv6 Dynamic Routing Examples
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58
1.4 Chapter Summary
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
 Describe the primary functions and features of a router.
 Configure basic settings on a router to route between two directly-connected networks,
using CLI.
 Verify connectivity between two networks that are directly connected to a router.
 Explain how routers use information in data packets to make forwarding decisions in a
small to medium-sized business network.
 Explain the encapsulation and de-encapsulation process used by routers when switching
packets between interfaces.
 Explain the path determination function of a router.
 Explain how a router learns about remote networks when operating in a small to medium-
sized business network.
 Explain how a router builds a routing table of directly connected networks.
 Explain how a router builds a routing table using static routes.
 Explain how a router builds a routing table using a dynamic routing protocol.
Chapter Summary
Summary
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10
Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
Waqas Ahmed Nawaz
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
Nil Menon
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
Chaing Ravuth
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
Chaing Ravuth
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
Waqas Ahmed Nawaz
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
Irsandi Hasan
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
Irsandi Hasan
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
Waqas Ahmed Nawaz
 
CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6
Chaing Ravuth
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
Nil Menon
 

What's hot (20)

CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
CCNA (R & S) Module 04 - Scaling Networks - Chapter 9
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
CCNA (R & S) Module 04 - Scaling Networks - Chapter 10
 
CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10CCNA2 Verson6 Chapter10
CCNA2 Verson6 Chapter10
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 10
 
CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1CCNA2 Verson6 Chapter1
CCNA2 Verson6 Chapter1
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5CCNA2 Verson6 Chapter5
CCNA2 Verson6 Chapter5
 
CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2CCNA2 Verson6 Chapter2
CCNA2 Verson6 Chapter2
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 3
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 7
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9CCNA Discovery 2 - Chapter 9
CCNA Discovery 2 - Chapter 9
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
 
CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6CCNA4 Verson6 Chapter6
CCNA4 Verson6 Chapter6
 
CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8CCNA2 Verson6 Chapter8
CCNA2 Verson6 Chapter8
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 

Similar to CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1

Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
Yaser Rahmati
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
Vuz Dở Hơi
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
teknetir
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
CamTESOL2015
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
 
SESI 7 RouterTroubleshooting.pptx
SESI 7 RouterTroubleshooting.pptxSESI 7 RouterTroubleshooting.pptx
SESI 7 RouterTroubleshooting.pptx
FirmanAFauzi1
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
limenih muluneh
 
Basic Switch Configuration.pptx
Basic Switch Configuration.pptxBasic Switch Configuration.pptx
Basic Switch Configuration.pptx
andutokicho
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
Irsandi Hasan
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
United International University
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
eyad alaa
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
teknetir
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
Irsandi Hasan
 
Chapter 2 : Configuring a network operating system
Chapter 2 : Configuring a network operating systemChapter 2 : Configuring a network operating system
Chapter 2 : Configuring a network operating system
teknetir
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
Vuz Dở Hơi
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating System
Yaser Rahmati
 

Similar to CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1 (20)

Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
SESI 7 RouterTroubleshooting.pptx
SESI 7 RouterTroubleshooting.pptxSESI 7 RouterTroubleshooting.pptx
SESI 7 RouterTroubleshooting.pptx
 
Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2Itn6 instructor materials_chapter2
Itn6 instructor materials_chapter2
 
Basic Switch Configuration.pptx
Basic Switch Configuration.pptxBasic Switch Configuration.pptx
Basic Switch Configuration.pptx
 
CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
Chapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched NetworksChapter 02 - Introduction to Switched Networks
Chapter 02 - Introduction to Switched Networks
 
KPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_finalKPUCC-Rs instructor ppt_chapter2_final
KPUCC-Rs instructor ppt_chapter2_final
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
 
Chapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networksChapter 13 : Introduction to switched networks
Chapter 13 : Introduction to switched networks
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
Chapter 2 : Configuring a network operating system
Chapter 2 : Configuring a network operating systemChapter 2 : Configuring a network operating system
Chapter 2 : Configuring a network operating system
 
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating systemCCNAv5 - S1: Chapter 2 - Configuring a network operating system
CCNAv5 - S1: Chapter 2 - Configuring a network operating system
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating System
 

More from Waqas Ahmed Nawaz

CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
Waqas Ahmed Nawaz
 

More from Waqas Ahmed Nawaz (18)

CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
CCNA (R & S) Module 04 - Scaling Networks - Chapter 7
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
CCNA (R & S) Module 04 - Scaling Networks - Chapter 6
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
CCNA (R & S) Module 04 - Scaling Networks - Chapter 5
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
CCNA (R & S) Module 04 - Scaling Networks - Chapter 2
 
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
CCNA (R & S) Module 04 - Scaling Networks - Chapter 1
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 8
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 2
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
CCNA (R & S) Module 02 - Connecting Networks - Chapter 6
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 

Recently uploaded

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 

Recently uploaded (20)

Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 

CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 1

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 1.1 Router Initial Configuration
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Characteristicsof a Network
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Why Routing? The router is responsible for the routing of traffic between networks.
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers are specialized computers containing the following required components to operate: • Central processing unit (CPU) • Operating system (OS) - Routers use Cisco IOS • Memory and storage (RAM, ROM, NVRAM, Flash, hard drive) Router Functions Routers are Computers
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Routers use specialized ports and network interface cards to interconnect to other networks. Router Functions Routers are Computers (cont.)
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers are Computers Router Memory
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Interconnect Networks
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Functions Routers Choose Best Paths  Routers use static routes and dynamic routing protocols to learn about remote networks and build their routing tables.  Routers use routing tables to determine the best path to send packets.  Routers encapsulate the packet and forward it to the interface indicated in routing table.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Process switching – An older packet forwarding mechanism still available for Cisco routers.  Fast switching – A common packet forwarding mechanism which uses a fast-switching cache to store next hop information.  Cisco Express Forwarding (CEF) – The most recent, fastest, and preferred Cisco IOS packet-forwarding mechanism. Router Functions Packet Forwarding Methods
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Connect to a Network
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Default Gateways To enable network access devices, must be configured with the following IP address information: IP address - Identifies a unique host on a local network. Subnet mask - Identifies the host’s network subnet. Default gateway - Identifies the router a packet is sent to when the destination is not on the same local network subnet.
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Document Network Addressing Network documentation should include at least the following in a topology diagram and addressing table:  Device names  Interfaces  IP addresses and subnet masks  Default gateways
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host Statically Assigned IP address – The host is manually assigned an IP address, subnet mask and default gateway. A DNS server IP address can also be assigned. • Used to identify specific network resources such as network servers and printers. • Can be used in very small networks with few hosts. Dynamically Assigned IP Address – IP Address information is dynamically assigned by a server using Dynamic Host Configuration Protocol (DHCP). • Most hosts acquire their IP address information through DHCP. • DHCP services can be provided by Cisco routers.
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Host
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect devices Device LEDs
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Console Access Connect Devices Console Access
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Connect Devices Enable IP on a Switch  Network infrastructure devices require IP addresses to enable remote management.  On a switch, the management IP address is assigned on a virtual interface called a switched virtual interface (SVI)
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure Router Basic Settings  Name the device – Distinguishes it from other routers  Secure management access – Secures privileged EXEC, user EXEC, and Telnet access, and encrypts passwords .  Configure a banner – Provides legal notification of unauthorized access.  Save the Configuration
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Router Interface To be available, a router interface must be:  Configured with an address and subnet mask.  Activated using no shutdown command. By default LAN and WAN interfaces are not activated.  Configured with the clock rate command on the Serial cable end labeled DCE. Optional description can be included.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface Configure interface with IPv6 address and subnet mask:  Use the ipv6 address ipv6-address/ipv6-length [link-local | eui-64]interface configuration command.  Activate using the no shutdown command.
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv6 Router Interface (cont.) IPv6 interfaces can support more than one address:  Configure a specified global unicast – ipv6address ipv6- address /ipv6-length  Configure a global IPv6 address with an interface identifier (ID) in the low-order 64 bits - ipv6address ipv6-address /ipv6-length eui-64  Configure a link-local address - ipv6address ipv6-address /ipv6- length link-local
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router Basic Settings Configure an IPv4 Loopback Interface A loopback interface is a logical interface that is internal to the router:  It is not assigned to a physical port, it is considered a software interface that is automatically in an UP state.  A loopback interface is useful for testing.  It is important in the OSPF routing process.
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings Show commands are used to verify operation and configuration of interface:  show ip interfaces brief  show ip route  show running-config Show commands that are used to gather more detailed interface information:  show interfaces  show ip interfaces
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify Interface Settings (cont.)
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Verify IPv6 Interface Settings Common commands to verify the IPv6 interface configuration:  show ipv6 interface brief - displays a summary for each of the interfaces.  show ipv6 interface gigabitethernet 0/0 - displays the interface status and all the IPv6 addresses for this interface.  show ipv6 route - verifies that IPv6 networks and specific IPv6 interface addresses have been installed in the IPv6 routing table.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show command output can be managed using the following command and filters:  Use the terminal length number command to specify the number of lines to be displayed.  To filter specific output of commands use the (|)pipe character after show command. Parameters that can be used after pipe include: • section, include, exclude, begin Verify Connectivity of Directly Connected Networks Filter Show Command Output
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Verify Connectivity of Directly Connected Networks Command History Feature The command history feature temporarily stores a list of executed commands for access:  To recall commands press Ctrl+P or the UP Arrow.  To return to more recent commands press Ctrl+N or the Down Arrow.  By default, command history is enabled and the system captures the last 10 commands in the buffer. Use the show history privileged EXEC command to display the buffer contents.  Use the terminal history size user EXEC command to increase or decrease size of the buffer.
  • 29. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 1.2 Routing Decisions
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Router Switching Function
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Send a Packet
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Forward to Next Hop
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Packet Routing
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Switching Packets Between Networks Reach the Destination
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Routing Decisions
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Best Path  Best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network: o A metric is the value used to measure the distance to a given network. o Best path to a network is the path with the lowest metric.  Dynamic routing protocols use their own rules and metrics to build and update routing tables: o Routing Information Protocol (RIP) - Hop count o Open Shortest Path First (OSPF) - Cost based on cumulative bandwidth from source to destination o Enhanced Interior Gateway Routing Protocol (EIGRP) - Bandwidth, delay, load, reliability
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Load Balancing  When a router has two or more paths to a destination with equal cost metrics, then the router forwards the packets using both paths equally: o Equal cost load balancing can improve network performance. o Equal cost load balancing can be configured to use both dynamic routing protocols and static routes.
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Path Determination Administrative Distance  If multiple paths to a destination are configured on a router, the path installed in the routing table is the one with the lowest Administrative Distance (AD): o A static route with an AD of 1 is more reliable than an EIGRP-discovered route with an AD of 90. o A directly connected route with an AD of 0 is more reliable than a static route with an AD of 1.
  • 39. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39 1.3 Router Operation
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table The Routing Table  A routing table is a file stored in RAM that contains information about: o Directly connected routes o Remote routes
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources The show ip route command is used to display the contents of the routing table: o Local route interfaces - Added to the routing table when an interface is configured. (displayed in IOS 15 or newer for IPv4 routes and all IOS releases for IPv6 routes.) o Directly connected interfaces - Added to the routing table when an interface is configured and active. o Static routes - Added when a route is manually configured and the exit interface is active. o Dynamic routing protocol - Added when EIGRP or OSPF are implemented and networks are identified.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Routing Table Sources (cont.)
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Analyze the Routing Table Remote Network Routing Entries Interpreting the entries in the routing table
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Interfaces A newly deployed router, without any configured interfaces, has an empty routing table.
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Routing Table Entries
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected Example
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directly Connected Routes Directly Connected IPv6 Example
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Routes Static routes and default static routes can be implemented after directly connected interfaces are added to the routing table: o Static routes are manually configured. o They define an explicit path between two networking devices. o Static routes must be manually updated if the topology changes. o Their benefits include improved security and control of resources. o Configure a static route to a specific network using the ip route network mask {next-hop-ip | exit-intf} command. o A default static route is used when the routing table does not contain a path for a destination network. o Configure a default static route using the ip route 0.0.0.0 0.0.0.0 {exit- intf | next-hop-ip} command.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static Route Example (cont.) Entering and Verifying a Static Route
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Statically Learned Routes Static IPv6 Route Examples
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols Dynamic Routing  Dynamic routing is used by routers to share information about the reachability and status of remote networks.  It performs network discovery and maintains routing tables.  Routers have converged after they have finished exchanging and updating their routing tables.
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Routing Protocols Cisco routers can support a variety of dynamic IPv4 routing protocols including: • EIGRP – Enhanced Interior Gateway Routing Protocol • OSPF – Open Shortest Path First • IS-IS – Intermediate System-to-Intermediate System • RIP – Routing Information Protocol Use the router ? Command in global configuration mode to determine which routing protocols are supported by the IOS.
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv4 Dynamic Routing Examples
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Routing Protocols Cisco routers can support a variety of dynamic IPv6 routing protocols including: o RIPng (RIP next generation) o OSPFv3 o EIGRP for IPv6 Use the ipv6 router ? command to determine which routing protocols are supported by the IOS IPv6 Routing Protocols
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Dynamic Routing Protocols IPv6 Dynamic Routing Examples
  • 58. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58 1.4 Chapter Summary
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential  Describe the primary functions and features of a router.  Configure basic settings on a router to route between two directly-connected networks, using CLI.  Verify connectivity between two networks that are directly connected to a router.  Explain how routers use information in data packets to make forwarding decisions in a small to medium-sized business network.  Explain the encapsulation and de-encapsulation process used by routers when switching packets between interfaces.  Explain the path determination function of a router.  Explain how a router learns about remote networks when operating in a small to medium- sized business network.  Explain how a router builds a routing table of directly connected networks.  Explain how a router builds a routing table using static routes.  Explain how a router builds a routing table using a dynamic routing protocol. Chapter Summary Summary
  • 60. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 61. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential