Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
This study guide is intended to provide those pursuing the CCNA certification with a framework of what concepts need to be studied. This is not a comprehensive document containing all the secrets of the CCNP nor is it a “braindump” of questions and answers.
I sincerely hope that this document provides some assistance and clarity in your studies.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
CCNA Routing Fundamentals - EIGRP, OSPF and RIPsushmil123
- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops. It is standardized as IEEE 802.D protocol. STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure loop-free topology. With STP in place, you can have redundant links between switches in order to provide redundancy.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
This tutorial gives very good understanding on Computer Networks After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA), from where you can take yourself to next levels.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
This slide contains the basic and advanced concept of OSPF routing protocol, according to the latest version of Cisco books, and I presented it at IRAN TIC company. In the next slide, I will upload an attractive advanced feature about OSPF.
Spanning Tree Protocol (STP) is a network protocol designed to prevent layer 2 loops. It is standardized as IEEE 802.D protocol. STP blocks some ports on switches with redundant links to prevent broadcast storms and ensure loop-free topology. With STP in place, you can have redundant links between switches in order to provide redundancy.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
This tutorial gives very good understanding on Computer Networks After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA), from where you can take yourself to next levels.
An overview of networking basics, building to more advanced networking techniques. Learn more about networking by subscribing to the Networking Motivator's weekly email at http://www.BethBridges.com
This tutorial gives very good understanding on Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in Protocols port Number.
Department Of computer Application- Advanced computer network
Main office:
Remote locations
Branch offices:
Home offices:
Mobile users
Resource-Sharing Functions and Benefits
Network User Applications
Characteristics of a Network
Foundation
Advance Internet working
Congestion Control & Resource Allocation
Network Security
Symmetric Key Encryption
Cryptographic Building Blocks
This tutorial gives very good understanding on CCNA (VOIP). After completing this tutorial.You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. DYNAMIC ROUTING
PROTOCOLS
Dynamic routing protocols help the network
administrator overcome the time-consuming
and exacting process of configuring and
maintaining static routes.
The purpose of a dynamic routing
protocol is to:
Discover remote networks
Maintaining up-to-date routing information
Choosing the best path to destination
networks
Ability to find a new best path if the current
3. CLASSIFYING ROUTING
PROTOCOLS
Interior Gateway Routing Protocols (IGP)
-Used for routing inside an autonomous
system & used to route within the individual
networks themselves.
-Examples: RIP, EIGRP, OSPF
Exterior Routing Protocols (EGP)
-Used for routing between autonomous
systems
-Example: BGPv4
5. CLASSIFYING ROUTING
PROTOCOLS
Classful routing
protocols
Do NOT send subnet
mask in routing
updates
Classless routing
protocols
Do send subnet mask
in
routing updates.
6. ROUTING PROTOCOLS
METRICS
Metric
A value used by a routing protocol to determine which
routes are better than others.
Metrics used in IP routing
protocols:
-Bandwidth
-Cost
-Delay
-Hop count
-Load
-Reliability
7. AD VALUE FOR ROUTING PROTOCOLS
it is a numeric value that specifies the preference of a particular route
9. ROUTING INFORMATION PROTOCOL
The Routing Information Protocol (RIP) is an
intradomain routing protocol used inside an
autonomous system. It is a very simple protocol
based on distance vector routing.
A metric in RIP is called a hop count; distance;
defined as the number of links (networks) that have
to be used to reach the destination.
Distance vector algorithm.
Included in BSD-UNIX Distribution in
1982
10. COMMAND USED
Router (config)# router rip
Router (config-router)# network_required network
IP
11. RIP CHARACTERISTICS
Distance vector routing protocol.
Uses hop count as a path selection metric.
Three types of timers.
Multiple stability features.
12. Hop Count -- Fifteen Hop Limit
- Hop count is the sum of all the legs in a route.
-After 15 hops, the packet is discarded
13. RIP TIMERS
Timers in RIP
Periodic timer : controlling the advertisements of
regular update messages
expiration timer : governing the validity of a route
the garbage collection timer : advertising the
failure of a route
14. RIPv2
RIPv2 is an extends RIPv1:
Subnet masks are carried in the route
information
Authentication of routing messages
Route information carries next-hop address
Exploites IP multicasting
Extensions of RIPv2 are carried in unused fields
of RIPv1 messages
15. COMMAND USED
Router (config)# router rip
Router (config)# ver 2
Router (config-router)# network_required network
IP
16. RIP ADVANTAGES
Advantages
Simplicity ; little to no configuration, just start
routed up
Passive version for hosts
If a host wants to just listen and update its
routing table
17. RIP Problems
RIP takes a long time to stabilize
Even for a small network, it takes several
minutes until the routing tables have settled
after a change
RIP has all the problems of distance vector
algorithms, e.g., count-to-Infinity
RIP uses split horizon to avoid count-
to-infinity
The maximum path in RIP is 15 hops
18. OSPF (Open Shortest Path
First)
The Open Shortest Path First (OSPF)
protocol is an intradomain routing protocol
based on link state routing. Its domain is also
an autonomous system
Dividing an AS(autonomous system) into
areas
to handle routing efficiently and in a timely
manner
19. Functional Requirements of OSPF
Faster Convergence and less
consumption of network resources
A more descriptive routing metric
configurable
value ranges between 1 and 65,535
no restriction on network diameters
Equal-cost multipath
a way to do load balancing
20. Functional Requirements(contd.)
Routing Hierarchy
support large routing domains
Separate internal and external routes
Support of flexible subnetting schemes
route to arbitrary [address,mask]
combinations using VLSMs
Security
Type of Service Routing
21. OSPF (cont’d)
Areas
Is a collection of networks, hosts, and routers in AS
AS can be divided into many different areas.
All networks inside an area must be connected.
Routers inside an area flood the area with routing information.
Area Border Router
Summarizes the information about the area and sends it to
other areas
Backbone
All of the areas inside an AS must be connected to the
backbone
Serving as a primary area
Consisting of backbone routers
Back bone routers can be an area border router
22. OSPF (cont’d)
Metric
OSPF protocol allows the administrator to assign a
cost, called the metricc, to each route
Based on a type of service (minimum delay,
maximum throughput, and so on)
A router can have multiple routing tables, each based
on a different type of service.
Link State Routing
OSPF uses Link State Routing to update the routing
tables in an area
Each router shares its knowledge about its
neighborhood with every router in the area.
23. OSPF (cont’d)
Types of Links
In OSPF terminology, a connection is called a
link.
24. OSPF (cont’d)
Point-to-point Link
Routers are represented by nodes and the
link is represented by a bidirectional edge
connecting the nodes.
Each router has only one neighbor at the
other side of the link.
25. OSPF (cont’d)
• Tranisent network:
is a network with several routers attached to
transient Link .
(network)
26. OSPF (cont’d)
Stub Link
is a network that is connected to only one router
is a special case of transient network
The link is only one-directional, from the router to
the network.
27. OSPF (cont’d)
Virtual Link
When the link between two routers is broken,
the administration may create a virtual link
between them using a longer path
Graphical Representation
An internet with 7 networks and 6 routers
29. EIGRP
A classless version of IGRP.
EIGRP includes several features that are not commonly
found in other distance vector routing protocols like RIP
(RIPv1 and RIPv2) and IGRP.
These features include:
Reliable Transport Protocol (RTP)
Bounded Updates
Diffusing Update Algorithm (DUAL)
Establishing Adjacencies
Neighbor and Topology Tables
Although EIGRP may act like a link-state routing protocol,
it is still a distance vector routing protocol.
30. Path Determination (1)
Traditional distance vector routing protocols such as RIP
and IGRP keep track of only the preferred routes; the best
path to a destination network.
If the route becomes unavailable, the router waits for
another routing update with a path to this remote network.
EIGRP's DUAL maintains a topology table separate from
the routing table.
including both the best path to a destination network and any
backup paths that DUAL has determined to be loop-free.
Loop-free means that the neighbor does not have a route
to the destination network that passes through this router.
31. Path Determination (2)
If a route becomes unavailable, DUAL will
search its topology table for a valid backup path.
If one exists, that route is immediately entered
into the routing table.
If one does not exist, DUAL performs a network
discovery process to see if there happens to be
a backup path that did not meet the requirement
of the feasibility condition.
32. SYNTAX :
Router (config)# router eigrp_PROCESS ID ( )
Router (config-router)# network _ required
network IP
33. EXTERIOR ROUTING
PROTOCOL
BORDER GATEWAY PROTOCOL
Routing protocols used to route information
between multiple autonomous systems
BGP (Border Gateway Protocol) is a protocol for exchanging routing
information between gateway hosts (each with its own router) in a network
of autonomous systems. BGP is often the protocol used between gateway
hosts on the Internet. The routing table contains a list of known routers, the
addresses they can reach, and a cost metric associated with the path to
each router so that the best available route is chosen.
34. SYNTAX:
Router (config)#router bgp_PID1
Router (config)#Network directly connect
Router (config –router)# neighbor_ip of end
point_remote-as_PID2
NOTE 1: Before applying this command apply
Dynamic routing on each router
NOTE 2: Each router has different Process ID
NOTE 3:Do not write directly attached IP of network.
All except directly attached IP will be treated as
neighbor
NOTE 4: PID will be of current router only.