The document provides an overview of routing services and focuses on complex enterprise network frameworks, creating implementation plans, and reviewing IP routing principles. Specifically, it discusses Cisco's Intelligent Information Network (IIN) and Services Oriented Network Architecture (SONA) frameworks, the process for creating and documenting an implementation plan, and concepts of static and dynamic routing, routing protocols, and how routes are populated in a routing table.
Production Readiness Reviews of Information Systems in BezeqLeadersNet.co.il
תהליך חשוב בניהול איכות בארגון הוא הטיפול במערכות מידע לפני עלייתן לאוויר.
חטיבת טכנולוגיות מידע בבזק יישמה לאחרונה נוהל קפדני לטיפול בשלב ההיערכות
להפעלה בייצור על פעילויות המוכנות הנדרשות בו, במטרה לשפר את העמידה ביעדי
הפרויקטים והחטיבה ובמטרה לשפר את יכולת התחרות של החברה.
המצגת סוקרת את תהליך ''סקר המוכנות לייצור'' המיושם בהצלחה רבה במערכות המידע
בבזק: הנוהל, רשימת התיוג, השותפים לתהליך ולקחים שנלמדו.
מצגת מאת נגה יינון, מנהלת מתודולוגיות ואבטחת איכות של חטיבת טכנולוגיות מידע בבזק.
Production Readiness Reviews of Information Systems in BezeqLeadersNet.co.il
תהליך חשוב בניהול איכות בארגון הוא הטיפול במערכות מידע לפני עלייתן לאוויר.
חטיבת טכנולוגיות מידע בבזק יישמה לאחרונה נוהל קפדני לטיפול בשלב ההיערכות
להפעלה בייצור על פעילויות המוכנות הנדרשות בו, במטרה לשפר את העמידה ביעדי
הפרויקטים והחטיבה ובמטרה לשפר את יכולת התחרות של החברה.
המצגת סוקרת את תהליך ''סקר המוכנות לייצור'' המיושם בהצלחה רבה במערכות המידע
בבזק: הנוהל, רשימת התיוג, השותפים לתהליך ולקחים שנלמדו.
מצגת מאת נגה יינון, מנהלת מתודולוגיות ואבטחת איכות של חטיבת טכנולוגיות מידע בבזק.
Tail f Systems Whitepaper - EMS and NMS Platforms - Beyond Alarms and MapsTail-f Systems
While Element Management Systems have traditionally focused on alarm acknowledgement, maps, and IP discovery, Network Equipment Providers are now being asked to provide plug-n-play device configuration and automated service provisioning. This whitepaper addresses why it is important to take a broader view that includes configuration management and shows how Tail-f Systems’ NCS approaches these requirements.
This whitepaper:
- Introduces new challenges facing developers of EMS and NMS platforms
- Describes technical requirements for next generation platforms
- Overviews Tail-f Systems’ NCS platform in the context of these requirements
- Shows practical examples of real world scenarios and how NCS can solve them
- Demonstrates how to save development costs and turnaround new functionality faster
- Compares NCS to EMS Frameworks and IP Network Monitors
Developers, architects, product managers, and CTOs involved with EMS and NMS platforms will find this whitepaper a useful tool for planning and scoping future projects.
http://www.tail-f.com
"Why do hand-picked cherries provide no guarantee for a tasty pie?" co-presented with Sergio Pellizzari at IIR's "IMS Global Congress" in Vienna, November 2009.
Lift Your Legacy UNIX Applications & Databases into the Cloud Fadi Semaan
Unlock efficiency and innovation while reducing costs. In this presentation we will address:
1) Legacy pain overview
2) Dell application modernization services
3) UNIX to Linux migration
4) Case studies
Presented by Rich Cronheim
Executive Director , Dell Application Modernization
Services
Incorporating Wireless Measurements with Wired Data Acquisition Systemscmstiernberg
Everyone is talking about wireless in test, measurement and control industries. The benefits provided by wireless are enticing – reduced cabling costs, distributed measurements and intelligent networks. Wireless will no doubt play a significant role shaping future measurement systems; but exactly what roll and how? This session considers many questions on the minds of engineers interested in using wireless technologies to improve, replace, or complement existing wired systems.
Tail f Systems Whitepaper - EMS and NMS Platforms - Beyond Alarms and MapsTail-f Systems
While Element Management Systems have traditionally focused on alarm acknowledgement, maps, and IP discovery, Network Equipment Providers are now being asked to provide plug-n-play device configuration and automated service provisioning. This whitepaper addresses why it is important to take a broader view that includes configuration management and shows how Tail-f Systems’ NCS approaches these requirements.
This whitepaper:
- Introduces new challenges facing developers of EMS and NMS platforms
- Describes technical requirements for next generation platforms
- Overviews Tail-f Systems’ NCS platform in the context of these requirements
- Shows practical examples of real world scenarios and how NCS can solve them
- Demonstrates how to save development costs and turnaround new functionality faster
- Compares NCS to EMS Frameworks and IP Network Monitors
Developers, architects, product managers, and CTOs involved with EMS and NMS platforms will find this whitepaper a useful tool for planning and scoping future projects.
http://www.tail-f.com
"Why do hand-picked cherries provide no guarantee for a tasty pie?" co-presented with Sergio Pellizzari at IIR's "IMS Global Congress" in Vienna, November 2009.
Lift Your Legacy UNIX Applications & Databases into the Cloud Fadi Semaan
Unlock efficiency and innovation while reducing costs. In this presentation we will address:
1) Legacy pain overview
2) Dell application modernization services
3) UNIX to Linux migration
4) Case studies
Presented by Rich Cronheim
Executive Director , Dell Application Modernization
Services
Incorporating Wireless Measurements with Wired Data Acquisition Systemscmstiernberg
Everyone is talking about wireless in test, measurement and control industries. The benefits provided by wireless are enticing – reduced cabling costs, distributed measurements and intelligent networks. Wireless will no doubt play a significant role shaping future measurement systems; but exactly what roll and how? This session considers many questions on the minds of engineers interested in using wireless technologies to improve, replace, or complement existing wired systems.
This slide provide various details regarding Information security. The Database its Advantage, Regarding DBMS, RDBMS, IS Design conderations. Various Cyber crime Techniques. Element of Information i.e Integrity, Availability , Classification of Threats. Information Security Risk Assessment. Four Stages of Risk Management. NIST Definition. Risk Assessment Methodologies. Security Risk Assessment Approach. Risk Mitigation Options. Categories of controls. Technical Controls etc.
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
Content personalisation is becoming more prevalent. A site, it's content and/or it's products, change dynamically according to the specific needs of the user. SEO needs to ensure we do not fall behind of this trend.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
By David F. Larcker, Stephen A. Miles, and Brian Tayan
Stanford Closer Look Series
Overview:
Shareholders pay considerable attention to the choice of executive selected as the new CEO whenever a change in leadership takes place. However, without an inside look at the leading candidates to assume the CEO role, it is difficult for shareholders to tell whether the board has made the correct choice. In this Closer Look, we examine CEO succession events among the largest 100 companies over a ten-year period to determine what happens to the executives who were not selected (i.e., the “succession losers”) and how they perform relative to those who were selected (the “succession winners”).
We ask:
• Are the executives selected for the CEO role really better than those passed over?
• What are the implications for understanding the labor market for executive talent?
• Are differences in performance due to operating conditions or quality of available talent?
• Are boards better at identifying CEO talent than other research generally suggests?
Are you facing some, or all, of these challenges?
-Host Mobility (w/o stretching VLANs)
-Network Segmentation (w/o implementing MPLS)
-Roles-based Access Control (w/o end-to-end TrustSec)
-Common Policy for Wired and Wireless (w/o multiple tools)
Using Cisco technologies already available today, you can overcome these challenges and build an evolved Campus network to better meet your business objectives.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
2. Focus on topics
Complex Enterprise Network Frameworks, Architectures and Models
Creating, Documenting and Executing an Implementation Plan
Reviewing IP Routing Principles
3. Complex Enterprise Network Frameworks,
Architectures and Models
Traffic Conditions in a Converged Network
–A converged is one in which data, voice and video traffic coexist on a single
network
–When voice and video are transported across a network, voice and video are
seen by the network as being just like any other application data
4. Complex Enterprise Network Frameworks,
Architectures and Models
Types of traffic in a converged network
–Voice and Video traffic
–Mission Critical traffic
–Transactional traffic
–Routing Protocol traffic
–Network Management traffic
–Traditional traffic
Different kinds of traffic and different requirements, demand special handling
by network professionals
–Voice & Video require constant bandwidth and low delay and jitter
–Transactional traffic require high reliability & security
5. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco IIN and SONA Framework
–To accommodate network requirements Cisco includes a strategy that
addresses how the network is integrated with business and business
priorities
–This strategy is known as IIN (Intelligent Information Network)
–The Cisco SONA (Services Oriented Network Architecture) is an architectural
framework that specifies how to build integrated systems
6. Complex Enterprise Network Frameworks,
Architectures and Models
The IIN encompasses the following features:
–Integration of network resources that have been largely unlinked
•The modern converged networks with integrated voice, video and data require that IT
departments more closely link the IT infrastructure with the network
–Intelligence across multiple products and infrastructure layers:
•The intelligence built in to each component of the network is extended network wide and
applies end to end
–Active participation of the network in the delivery of services and
applications:
•With added intelligence, the IIN makes it possible for the network to actively manage,
monitor and optimize service and application delivery across the entire IT environment
7. Complex Enterprise Network Frameworks,
Architectures and Models
There are 3 phases in order to implement the IIN framework:
–Phase 1, Integrated Transport:
•Everything consolidates onto an IP network
–Phase 2, Integrated Services:
•Integrated services help to unify common elements such as storage and data center server
–Phase 3, Integrated Applications:
•This phase focuses on making the network application-aware so that it can optimize
application performance more efficiently deliver networked applications to users
8. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco SONA framework
–The SONA architectural framework guides the evolution of enterprise
networks toward an IIN
SONA Layers:
–Network Infrastructure Layer:
•Interconnects all the IT resources across a converged network.
•The IT resources includes servers, storage and clients
–Interactive Services Layer:
•Enables efficient allocation of resources to applications and business processes delivered
through the network infrastructure
•Voice services, Security services, Storage Services, Management Services
–Application Layer
•Includes business applications and collaboration applications
9. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Network Models
Cisco Enterprise Architecture
–Cisco provides an enterprise wide systems architecture that helps companies
to protect, optimize and grow the infrastructure that supports their business
processes
Picture page 12
10. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Enterprise Campus Architecture:
–A core infrastructure of intelligent switching and routing
–Provides the enterprise with:
•High availability through a resilient multilayer design
•Redundant hardware and software features
•Automatic procedures for reconfiguring network paths when failure occurs
–IP multicast capabilities provide optimized bandwidth consumption
–QoS features ensure real-time traffic is not dropped or delayed
–Integrated security protects against worms, viruses and other attacks
11. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Enterprise Data Center Architecture:
–An adaptive network architecture that supports requirements for
consolidation, business continuance and security
–Staff, suppliers or customers can be provided with secure access to
applications and resources
–Redundant data centers provide backup by using application replication
–The network and devices offer server and application load balancing to
maximize performance
12. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Enterprise Branch Architecture:
–Allows Enterprises to extend head-office applications and services to remote
locations
–Cisco integrates security, switching, network analysis and converged voice
and video services into a series of ISR routers
–This architectures provides secure access to voice, mission critical data and
video applications anywhere
–The enterprise can easily support branch offices with the ability to centrally
configure, monitor and manage devices located at remote sites
13. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Enterprise Teleworker Architecure
–Allows enterprises to securely deliver voice and data services to remote
small or home offices over a broadband access service
–Staff can securely log in to the network over an always-on VPN and gain
access to authorized applications
14. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Enterprise WAN Architecture
–Offers convergence of voice, video and data services over a single Cisco
Unified Communications network
–Enables the enterprise to cost-effectively span large geographic areas
15. Complex Enterprise Network Frameworks,
Architectures and Models
Cisco Hierarchical Network model:
–Access Layer
•Grant users access to network devices
•In a LAN the access layer provides connectivity to switched infrastructure
•In a WAN the access layer provides connectivity to teleworkers or remote sites
–Distribution Layer
•Aggregates the wiring closet connections and users switches to segment workgroups
•WAN connections are aggregated at the edge of the campus and policy-based connectivity is
provided
–Core Layer (Backbone)
•Is a high speed backbone and is designed to switch packet as fast as possible
16. Creating, Documenting and Executing an
Implementation Plan
Approaches to Creating an Implementation plan
There are two approaches to implementing changes to a network:
Ad hoc:
–A solution is implemented without planning
–With this approach it is more likely that scalability issues, suboptimal routing
and security issues can occur
Structured approach:
–Any network change starts with planning
–All changes are reviewed
–Considerations taken into account
– Design plan is implemented
–Any changes are documented
17. Creating, Documenting and Executing an
Implementation Plan
Many models and methodologies used in IT define a lifecycle approach using
various processes to help provide high-quality IT services
The Cisco Lifecycle Services
–Defines six phases in the network lifecycle and is referred to as Prepare,
Plan, Design, Implement, Operate, Optimize (PPDIOO) model
IT Infrastructure Library
–A framework of best practices for IT service management, providing high
quality IT services that are aligned with businesses requirements
The Fault, Configuration, Accounting, Performance and Security (FCAPS) model
–Is defined by the ISO and defines the minimum set of categories needed for
successful network management
The Telecommunications Management Model (TMN)
–An ITU-T standard that defines a framework for management of
telecommunication networks
18. Creating, Documenting and Executing an
Implementation Plan
Creating an implementation plan
By using the PPDIOO model there are three basic steps
–Identify Customer requirements:
•In this step key decision makers identify the initial business and technical requirements
(Prepare Phase)
–Characterize the existing network sites:
•This step includes site and network audit and network analysis
•During audit the existing network is thoroughly checked for integrity and quality
•Network behavior is analyzed (Prepare Phase)
–Design the network topology and solutions
•Detailed design of the network is created
•Decisions are made about networked infrastructure, infrastructure services and applications
(Plan Phase)
19. Creating, Documenting and Executing an
Implementation Plan
When the design plan is complete, the design implementation process is
executed, with the following steps:
–Plan the implementation
•The implementation plan is prepared in advance to expedite and clarify the actual
implementation (Design phase)
–Implement and verify the design
•The actual implementation and verification of the design take place during this step by
building the network (Implement phase)
–Monitor and optionally redesign
•The network is put into operation
•During operation the network is constantly monitored and checked for errors
•If troubleshooting problems became too frequent a network redesign might be required
(Operate, Optimize phase)
20. Creating, Documenting and Executing an
Implementation Plan
Implementation Plan Documentation:
–The implementation documentation must be correct and up to date
–It must also be accessible and contain all information about the equipment
and configuration
–should include known issues, the baseline status and the details and results
of verification tasks
21. Reviewing IP Routing Principles
IP Routing overview
–A router can be made aware of remote networks in two ways:
•Static routing
•Dynamic Routing
22. Reviewing IP Routing Principles
A static route can be used in the following circumstances
–When it is undesirable to have dynamic routing updates forwarded across
slow bandwidth links
–When administrator needs total control over the routes used by the router
–When a backup to dynamically recognized route is necessary
–When there is only one exit from the network (Stub Network)
–When the router does not have the resources (CPU - Memory) to handle a
dynamic routing protocol
A major drawback of static routing is when a topology change occurs, an
administrator might have to reroute traffic by configuring new static routes
IP route command syntax, page 25-26
23. Reviewing IP Routing Principles
Configuring a Static Default Route
–In some circumstances a router does not need to to recognize the details of
remote networks
–The router is configured to send all traffic, or all traffic for which there is not
a more specific entry, in a particular destination
–Default routes are either dynamically advertised using routing protocols or
statically configured
–Static route syntax...
24. Reviewing IP Routing Principles
Principles of Dynamic Routing
–Dynamic routing allows the network to adjust to changes in the topology
automatically
–When using dynamic routing the administrator configures the routing
protocol on each router
–The routers then exchange information about the reachable networks and
the state of each network
–When the network topology changes the new information is dynamically
propagated throughout the network
25. Reviewing IP Routing Principles
Principles of Dynamic Routing
–Different routing protocols base their metrics on different measurements,
including hop count, interface speed etc.
–Most routing protocols maintain databases containing all the networks that
the routing protocol recognizes
–if a router recognizes more than a way to reach a network, it compares the
metric for each different path and chooses the one with the lowest metric
–If there are equal metrics then the router load balances packets (maximum
equal paths 16, default 4)
–Command to enable a router to advertise a network ??
26. Reviewing IP Routing Principles
Principles of demand routing
–A drawback of static routes is that they must be manually configured and
updated when the network topology changes
–A drawback of dynamic routing protocols is that they use network
bandwidth and route resources
27. Reviewing IP Routing Principles
–In a hub and spoke topology (and only in this topology) with hundreds of
spokes there is another option called On-Demand Routing (ODR)
–When ODR is configured, the stub routers use CDP to send IP prefix
information to the hub router for their directly connected networks
–In these updates subnet mask in included, making ODR VLSM capable
–The Hub router in turn sends a default route to the spokes that points back
to itself
–ODR is not a true routing protocol because the information exchanged is
limited to IP prefixes and a default route
–Configuring the global config router odr command on the hub router is
enough for odr to operate
28. Reviewing IP Routing Principles
Characteristics of routing protocols
–Distance Vector, Link State and Advanced Distance Vector routing protocols
•In Distance Vector protocols routers periodically exchange their routing tables to neighboring
routers
•In link state protocols each router sends the state of its own interfaces (links) to all other
routers (no only to directly connected neighbors)
•After the first exchange, there will be another exchange only if something change in the
topology
•Advanced Distance vector protocol has characteristic of both categories
•Hybrid protocol send only changed information when there is a topology change (Link State
behavior) but only to neighboring routers (Distance Vector behavior)
29. Reviewing IP Routing Principles
Classful Routing Protocol concept
–Routing updates sen by a classful routing protocol do not include subnet
mask (classful routing protocol??)
–Routing updates sent by a classless routing protocol include subnet mask
(classless routing protocol??).
–Therefore classless routing protocols supports the concept of CIDR and are
VLSM capable
–But how classful protocols learn subnet masks if they do not support the
exchange of subnet masks?
Page 33
30. Reviewing IP Routing Principles
Summarizing Routes in a Network with Discontiguous subnets
–Discontiguous subnets are subnets of the same major network that are
separated by a different major network
Page 34, discontiguous example
31. Reviewing IP Routing Principles
The ip classless command
–When you are running a classful protocol (RIP v1), ip classless must be
enabled if you want the router to use the default route for an unknown
subnet
–By default ip classless is configured
32. Reviewing IP Routing Principles
Classless Routing Protocol concepts
–With classless routing protocols, different subnets within the same major
network can have different subnet masks
–If more than one entry matches a particular destination, the longest prefix
match in the routing table is used
–Classful protocols automatically summarize at major network boundaries
–Classless protocols can summarize either automatically at major network
boundaries or manually configured by the administrator
33. Reviewing IP Routing Principles
RIP
–Characteristics of RIP v1
•Hop Count
•Maximum metric is 15 hops
•Broadcast routing updates every 30 second
•Equal cost load balancing (maximum 16 equal paths)
•No authentication
•Classful
–Characteristics of RIPv2
•Hop Count
•Maximun metric is 15 hops
•Multicast updates every 30 seconds (224.0.0.9)
•Equal cost load balancing (maximum 16 equal paths)
•Authentication
•Classless
Page 40, RIP configuration
34. Reviewing IP Routing Principles
Populating Routing Table
–Administrative Distance
•Administrative Distance rates a routing protocol’s believability or trustworthiness
•Cisco has assigned a default administrative distance to each routing protocol
•Administrative distance is a value from 0 - 255. Lower values are preferred
–Routing Protocol Metrics
•RIP v1 and v2 use hop count
•EIGRP by default uses bandwidth and delay to calculate the metric (load, reliability can also
be used)
•OSPF and ISIS use cost
•BGP uses many attributes (Weight, Local preference, AS path, MED)
35. Reviewing IP Routing Principles
Criteria for insterting routes into the routing table
–Valid Next hop address
–Metric
–Administrative Distance
–Prefix
•Routes to the same network but with different prefixes can coexist in the routing table
• RIPv2: 192.168.32.0/26
• OSPF: 192.168.32.0/24
• EIGRP: 192.168.32.0/19