The document discusses implementing an EIGRP-based solution for computer networking. It covers topics such as EIGRP configuration, metrics, neighbor discovery, route summarization, and troubleshooting. Specific configuration commands are provided for enabling EIGRP routing, verifying neighbor relationships, and modifying interface metrics. The routing protocol's use of DUAL, finite state machines, and automatic summarization are also explained.
The document discusses implementing an OSPF routing protocol. It provides an overview of OSPF including how it establishes neighbor relationships, propagates link state advertisements, and uses the shortest path first algorithm to calculate routes. It then covers topics like configuring single-area and multi-area OSPF, setting the router ID, verifying the OSPF configuration, and different OSPF network types including broadcast and point-to-point.
The document provides instructions on troubleshooting basic connectivity issues using tools like ping and traceroute. It describes how ping is used to test reachability between devices and can return round-trip time statistics. Traceroute is used to identify where packets are being dropped by showing each hop to the destination. The document also provides details on using Cisco's debug ip packet command to examine packets passing through a router for troubleshooting.
This document provides an overview of establishing internet connectivity through exploring packet delivery processes, enabling static routing, managing traffic using access control lists (ACLs), and enabling internet connectivity. It discusses topics such as packet and frame formats, routing metrics, path determination, switching functions of routers, static route configuration and verification, ACL purposes and functions, and wildcard masking. The document is made up of multiple sections providing details on these various networking topics.
The document discusses IPv6, the next generation internet protocol. It introduces IPv6, describing its benefits over IPv4 including vastly larger address space. It then covers key aspects of IPv6 such as address types, auto-configuration, routing protocols, and technology scope. IPv6 aims to meet growing internet demands through expanded addressing and more efficient headers.
This document discusses network device management and configuration. It covers initial configuration of Cisco routers and switches, including connecting interfaces, setting IP addresses and default routes. It also discusses securing devices by configuring passwords, ACLs and port security. Common security threats to enterprises like malware and DDoS attacks are discussed along with mitigation techniques such as firewalls, IDS/IPS and security policies. The importance of securing routers and applying features like ACLs is emphasized.
The document discusses a computer networking course on wide-area networks (WANs) and virtual private networks (VPNs). It covers several topics:
- WAN technologies including physical and data link layer protocols for transmitting data to remote locations.
- Configuring serial interfaces and encapsulation methods like HDLC and PPP.
- Connectivity options for WANs like leased lines, PSTN, and packet switching.
- VPN solutions that provide secure connectivity over shared infrastructures at lower costs than private networks. VPNs offer flexibility, scalability, and cost savings.
MPLS VPN provides a way to extend private network connectivity over a shared public infrastructure in a secure manner. It utilizes MPLS to create virtual point-to-point connections between customer sites. There are two main types of MPLS VPNs - Layer 3 VPNs which use extensions to BGP to exchange routing information between customer edge routers and provider edge routers, and Layer 2 VPNs which extend customer layer 2 networks across the MPLS backbone by encapsulating layer 2 frames with labels.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) technology. It discusses the goals of MPLS including understanding the business drivers, market segments, problems addressed, benefits, and major components. The key components of MPLS technology are explained, including MPLS forwarding and signaling, label distribution protocols, MPLS network services like VPNs, QoS, and traffic engineering. An overview of typical MPLS applications is also provided.
The document discusses implementing an OSPF routing protocol. It provides an overview of OSPF including how it establishes neighbor relationships, propagates link state advertisements, and uses the shortest path first algorithm to calculate routes. It then covers topics like configuring single-area and multi-area OSPF, setting the router ID, verifying the OSPF configuration, and different OSPF network types including broadcast and point-to-point.
The document provides instructions on troubleshooting basic connectivity issues using tools like ping and traceroute. It describes how ping is used to test reachability between devices and can return round-trip time statistics. Traceroute is used to identify where packets are being dropped by showing each hop to the destination. The document also provides details on using Cisco's debug ip packet command to examine packets passing through a router for troubleshooting.
This document provides an overview of establishing internet connectivity through exploring packet delivery processes, enabling static routing, managing traffic using access control lists (ACLs), and enabling internet connectivity. It discusses topics such as packet and frame formats, routing metrics, path determination, switching functions of routers, static route configuration and verification, ACL purposes and functions, and wildcard masking. The document is made up of multiple sections providing details on these various networking topics.
The document discusses IPv6, the next generation internet protocol. It introduces IPv6, describing its benefits over IPv4 including vastly larger address space. It then covers key aspects of IPv6 such as address types, auto-configuration, routing protocols, and technology scope. IPv6 aims to meet growing internet demands through expanded addressing and more efficient headers.
This document discusses network device management and configuration. It covers initial configuration of Cisco routers and switches, including connecting interfaces, setting IP addresses and default routes. It also discusses securing devices by configuring passwords, ACLs and port security. Common security threats to enterprises like malware and DDoS attacks are discussed along with mitigation techniques such as firewalls, IDS/IPS and security policies. The importance of securing routers and applying features like ACLs is emphasized.
The document discusses a computer networking course on wide-area networks (WANs) and virtual private networks (VPNs). It covers several topics:
- WAN technologies including physical and data link layer protocols for transmitting data to remote locations.
- Configuring serial interfaces and encapsulation methods like HDLC and PPP.
- Connectivity options for WANs like leased lines, PSTN, and packet switching.
- VPN solutions that provide secure connectivity over shared infrastructures at lower costs than private networks. VPNs offer flexibility, scalability, and cost savings.
MPLS VPN provides a way to extend private network connectivity over a shared public infrastructure in a secure manner. It utilizes MPLS to create virtual point-to-point connections between customer sites. There are two main types of MPLS VPNs - Layer 3 VPNs which use extensions to BGP to exchange routing information between customer edge routers and provider edge routers, and Layer 2 VPNs which extend customer layer 2 networks across the MPLS backbone by encapsulating layer 2 frames with labels.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) technology. It discusses the goals of MPLS including understanding the business drivers, market segments, problems addressed, benefits, and major components. The key components of MPLS technology are explained, including MPLS forwarding and signaling, label distribution protocols, MPLS network services like VPNs, QoS, and traffic engineering. An overview of typical MPLS applications is also provided.
This document discusses MPLS VPN technology. It provides an overview of MPLS VPN concepts including how MPLS VPN works, key terminology, the connection model, forwarding mechanisms, and configuration. The connection model section describes how VPNs are implemented using MPLS, with PE routers maintaining separate routing instances (VRFs) for each VPN and exchanging routing information between VPN sites using MP-BGP. Core P routers are unaware of VPNs and switch packets using MPLS labels.
This document summarizes a student project on designing and analyzing MPLS virtual private networks. The project compares MPLS VPNs to traditional IP VPNs through network simulation. The student used NS2 to simulate an MPLS VPN architecture and IPv4 network with varying packet sizes. Results showed that MPLS VPNs performed better in terms of minimum delay, maximum delay, average delay, throughput and packet loss compared to IPv4 networks. The project provided a learning experience for the students in VPN and MPLS technologies, NS2 simulation, and analyzing results.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document discusses performance measurements of MPLS traffic engineering and QoS. It provides background on traditional IP routing and its disadvantages, and explains the need for MPLS to address issues like traffic engineering, QoS, and scalability. Key MPLS concepts covered include FEC, LER, LSR, LSP, labels, label switching, label stacking, LIB tables, and the forwarding process. Traditional IP routing is compared to MPLS forwarding.
Voice over MPLS (VoMPLS) allows multiple voice calls to be transported efficiently over a single MPLS label switched path (LSP) by reducing header overhead. There are three modes of carrying voice in MPLS networks, depending on requirements. VoMPLS uses LSPs to provide predictable quality of service for voice packets by multiplexing multiple calls into primary and control subframes that are transmitted together within an MPLS frame. This provides an efficient mechanism for voice transport that reduces costs compared to traditional circuit-switched networks.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
Comparison between traditional vpn and mpls vpnmmubashirkhan
The document discusses different types of traditional VPNs including overlay VPNs, peer-to-peer VPNs, and MPLS VPNs. Overlay VPNs use virtual circuits to connect sites but have high costs and difficult management. Peer-to-peer VPNs improve on this by exchanging routing information directly with the service provider. MPLS VPNs are considered the new standard as they use MPLS to label and route traffic, solving issues like address overlapping and data leakage while allowing for easy management and lower costs compared to traditional VPNs. The document concludes that MPLS VPN provides a secure and cost-effective solution for connecting company sites worldwide.
This document provides an overview and introduction to MPLS (Multi-Protocol Label Switching). It defines key MPLS concepts such as label switching, forwarding equivalence classes, label switched paths, and label distribution protocols. It also describes how MPLS works, the benefits it provides including traffic engineering and virtual private networks, and examples of MPLS encapsulation over different link layer technologies like ATM, Frame Relay, and PPP/LAN networks.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) in 3 sentences:
MPLS tags network traffic with labels to allow for fast switching through the network based on the label rather than traditional lookups of IP addresses, originally intended to simplify routing but also enabling features like traffic engineering and virtual private networks. MPLS works by adding a label to layer 2 frames at the edge of the network which is then used to forward packets across the core based on pre-established label switched paths, with the labels being distributed using a label distribution protocol.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
1. The document provides information about the CCNP (Cisco Certified Network Professional) training course offered by the Afghanistan Technical Vocational Institute.
2. The CCNP training focuses on routing, switching, and troubleshooting technologies and consists of modules on ROUTE, SWITCH, and TSHOOT.
3. Upon completion of the CCNP training, candidates will be able to plan, implement, verify and troubleshoot local and wide-area enterprise Cisco networks.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
This document chapter discusses enterprise internet connectivity, including:
1. Planning enterprise internet connectivity by identifying connectivity needs, ISP types, public IP addressing, and autonomous system numbers.
2. Establishing single-homed IPv4 internet connectivity by configuring static or DHCP public IP addresses, understanding DHCP operation, and configuring NAT.
3. Limitations of NAT include end-to-end visibility issues, complex tunneling, and failures in certain network topologies. The NAT virtual interface feature addresses some of NAT's limitations.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
This document discusses MPLS VPN technology. It provides an overview of MPLS VPN concepts including how MPLS VPN works, key terminology, the connection model, forwarding mechanisms, and configuration. The connection model section describes how VPNs are implemented using MPLS, with PE routers maintaining separate routing instances (VRFs) for each VPN and exchanging routing information between VPN sites using MP-BGP. Core P routers are unaware of VPNs and switch packets using MPLS labels.
This document summarizes a student project on designing and analyzing MPLS virtual private networks. The project compares MPLS VPNs to traditional IP VPNs through network simulation. The student used NS2 to simulate an MPLS VPN architecture and IPv4 network with varying packet sizes. Results showed that MPLS VPNs performed better in terms of minimum delay, maximum delay, average delay, throughput and packet loss compared to IPv4 networks. The project provided a learning experience for the students in VPN and MPLS technologies, NS2 simulation, and analyzing results.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document discusses performance measurements of MPLS traffic engineering and QoS. It provides background on traditional IP routing and its disadvantages, and explains the need for MPLS to address issues like traffic engineering, QoS, and scalability. Key MPLS concepts covered include FEC, LER, LSR, LSP, labels, label switching, label stacking, LIB tables, and the forwarding process. Traditional IP routing is compared to MPLS forwarding.
Voice over MPLS (VoMPLS) allows multiple voice calls to be transported efficiently over a single MPLS label switched path (LSP) by reducing header overhead. There are three modes of carrying voice in MPLS networks, depending on requirements. VoMPLS uses LSPs to provide predictable quality of service for voice packets by multiplexing multiple calls into primary and control subframes that are transmitted together within an MPLS frame. This provides an efficient mechanism for voice transport that reduces costs compared to traditional circuit-switched networks.
The document provides an overview of Internet Enhanced Service (IES) on Alcatel-Lucent platforms. IES allows customer IP interfaces to participate in the same routing instance as the service network core. Key points include:
- IES provides Internet connectivity through logical IP interfaces with SAP access points.
- Multiple IES services can be created to separate customer IP interfaces.
- Features like QoS policy propagation using BGP (QPPB) and VRRP are supported on IES interfaces.
The document discusses MPLS VPN configurations. It covers VPN concepts like overlay and peer models, benefits of MPLS VPNs, and how routing information is propagated between provider edge (PE) routers using MP-BGP. Key aspects include using virtual routing and forwarding (VRF) instances to isolate customer routes, extending prefixes with route distinguishers (RDs) to handle overlapping addresses, and exchanging VPN routes between PE routers in the provider network.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
The document provides information about a training event on Deploy MPLS Traffic Engineering taking place from 20 February to 2 March 2017 in Ho Chi Minh City, Vietnam. It includes details about two presenters - Nurul Islam Roman, Manager of Training & Technical Assistance at APNIC, and Jessica Wei, Training Officer at APNIC. It also acknowledges Cisco Systems and provides an agenda with topics on why MPLS Traffic Engineering is used and how it works.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
Comparison between traditional vpn and mpls vpnmmubashirkhan
The document discusses different types of traditional VPNs including overlay VPNs, peer-to-peer VPNs, and MPLS VPNs. Overlay VPNs use virtual circuits to connect sites but have high costs and difficult management. Peer-to-peer VPNs improve on this by exchanging routing information directly with the service provider. MPLS VPNs are considered the new standard as they use MPLS to label and route traffic, solving issues like address overlapping and data leakage while allowing for easy management and lower costs compared to traditional VPNs. The document concludes that MPLS VPN provides a secure and cost-effective solution for connecting company sites worldwide.
This document provides an overview and introduction to MPLS (Multi-Protocol Label Switching). It defines key MPLS concepts such as label switching, forwarding equivalence classes, label switched paths, and label distribution protocols. It also describes how MPLS works, the benefits it provides including traffic engineering and virtual private networks, and examples of MPLS encapsulation over different link layer technologies like ATM, Frame Relay, and PPP/LAN networks.
The document provides an introduction to MPLS (Multi-Protocol Label Switching) in 3 sentences:
MPLS tags network traffic with labels to allow for fast switching through the network based on the label rather than traditional lookups of IP addresses, originally intended to simplify routing but also enabling features like traffic engineering and virtual private networks. MPLS works by adding a label to layer 2 frames at the edge of the network which is then used to forward packets across the core based on pre-established label switched paths, with the labels being distributed using a label distribution protocol.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document provides an overview of MPLS (Multi-Protocol Label Switching) concepts and components. It discusses how MPLS separates routing from forwarding by using labels to forward packets based on the label rather than the IP address. It describes MPLS components like edge label switching routers (ELSR or PE), label switching routers (LSR or P), and the label distribution protocol (LDP). It also provides examples of MPLS forwarding and MPLS VPN operation.
1. The document provides information about the CCNP (Cisco Certified Network Professional) training course offered by the Afghanistan Technical Vocational Institute.
2. The CCNP training focuses on routing, switching, and troubleshooting technologies and consists of modules on ROUTE, SWITCH, and TSHOOT.
3. Upon completion of the CCNP training, candidates will be able to plan, implement, verify and troubleshoot local and wide-area enterprise Cisco networks.
Tutorial about MPLS Implementation with Cisco Router, this second of two chapter discuss about MPLS Configuration, LDP Configuration, VPN Services, L2VPN (VLL & VPLS) and L3VPN (VPRN).
it also contain case study and implementation of VLL, VPLS, and VPRN
This document chapter discusses enterprise internet connectivity, including:
1. Planning enterprise internet connectivity by identifying connectivity needs, ISP types, public IP addressing, and autonomous system numbers.
2. Establishing single-homed IPv4 internet connectivity by configuring static or DHCP public IP addresses, understanding DHCP operation, and configuring NAT.
3. Limitations of NAT include end-to-end visibility issues, complex tunneling, and failures in certain network topologies. The NAT virtual interface feature addresses some of NAT's limitations.
Multi-Protocol Label Switching has become by far one of the most important Internet technologies of the last 15 years. From humble beginnings back in 1996-97, it is literally the defacto standard in a large majority of service provider networks today. This presentation, delivered to executives at MTNL, Mumbai (a large regional carrier in India), explains the key operational principles behind MPLS, and its significant applications.
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
The chapter discusses EIGRP and OSPF routing protocols. It provides information on configuring and verifying EIGRP, including EIGRP tables, metrics, neighbor discovery using hello packets, and terminology such as feasible successors. It also covers configuring and verifying OSPF, as well as using wildcards.
EIGRP is a hybrid routing protocol that uses both distance-vector and link-state characteristics. It uses DUAL algorithm for routing calculations and loop prevention. EIGRP sends periodic hello packets to discover neighbors and non-periodic updates when routes change. The default EIGRP metric is the minimum bandwidth on a path plus the sum of the delays. Show commands can be used to display EIGRP neighbor information, topology tables, route tables, traffic statistics, and event/packet details for troubleshooting.
IGRP and EIGRP.
Comparison between traditional Distance Vector Routing Protocols and Enhanced Distance Vector Routing Protocols.
EIGRP Message Format and Packet Header.
EIGRP Parameters (K1,K2, K3, K4, K5, Reserved, and Hold Time).
Protocol Dependent Modules (PDM).
Reliable Transport Protocol (RTP).
EIGRP Packet Types (Hello Packets, Update packets, Acknowledgment packets, Query and Reply packets).
EIGRP Bounded Updates.
Introduction to DUAL Algorithm.
EIGRP Administrative Distance.
The router eigrp Command, the network command with a Wildcard Mask, Verifying EIGRP and using the Bandwidth command
EIGRP Metric Calculation, EIGRP uses Bandwidth, delay, reliability, and load in its metric.
DUAL Concepts, successor, Feasible distance (FD), Feasible successor (FS), Reported distance (RD)/ AD and Feasibility Condition (FC).
DUAL Finite State Machine, Null0 Summary Route, Disabling Automatic Summarization, Manual Summarization and EIGRP default route
EIGRP is an enhanced interior gateway routing protocol developed by Cisco. It is a hybrid routing protocol that incorporates features of both distance-vector and link-state routing protocols. EIGRP uses the Diffusing Update Algorithm (DUAL) to determine the best path to a destination while also maintaining alternative loop-free paths for rapid convergence in case of a link failure or cost change. EIGRP sends partial route updates only when changes occur to reduce bandwidth utilization.
EIGRP is an enhanced interior gateway routing protocol that has characteristics of both distance vector and link state routing. It supports features like classless routing, VLSM, route summarization, incremental updates, and load balancing. The maximum hop count for EIGRP is 224 and it uses the multicast address 224.0.0.10. EIGRP applies an administrative distance of 90 for internal routes and 170 for external routes.
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes EIGRP's history and evolution from IGRP, its message format, protocol dependent modules, reliable transport protocol, packet types, neighbor discovery process using hello packets, and route updates using partial bounded updates. It also covers EIGRP's Diffusing Update Algorithm (DUAL) for loop prevention, administrative distance, authentication, and basic configuration including enabling EIGRP on interfaces and verifying neighbor relationships.
Building Scalable Cisco Internetworks (Bsci)CCNAResources
This document provides a summary of key topics about the Building Scalable Cisco Internetworks (BSCI) 642-901 exam, including routing protocols like EIGRP, OSPF, and BGP. It outlines the contents, objectives, and recommends additional reading and hands-on practice to fully prepare for the exam. The summary is intended to help remember topics, but not replace learning the foundational knowledge required to pass.
The document provides information on Cisco Nexus 5000 Layer 3 switching including:
- An overview of EIGRP fundamentals such as neighbor discovery, route metrics, and the Diffusing Update Algorithm.
- Details on EIGRP configuration and operation in NX-OS versus IOS including differences in CLI, route redistribution, and VRF support.
- Configuration examples that highlight similarities and differences between NX-OS and IOS for EIGRP tasks like interface configuration, authentication, and summarization.
This document provides an overview of EIGRP including its characteristics, configuration, operation, and implementation for IPv4 and IPv6. It covers key topics such as EIGRP metrics, DUAL algorithm, neighbor discovery process, and verification commands. The document is intended to teach network engineers how to implement EIGRP routing in a small to medium sized business network.
This document provides an overview of the network layer and some of its key protocols. It begins with an introduction to the network layer and its main responsibilities, including routing packets between subnets that may have different addressing schemes or protocols. It then discusses some of the network layer's main functionalities and features. The remainder of the document defines and describes several important network layer protocols, including EIGRP, ICMP, IGMP, IPv4, and others. It provides high-level explanations of how these protocols function and their roles within the network layer.
This document describes a project report on EIGRP (Enhanced Interior Gateway Routing Protocol). It includes the authors, examiner, tutors, word count, and date. The body of the report discusses what EIGRP is, how it works, its advantages over other protocols, its packet types, tables, metrics, states, and a proposed model and implementation of an EIGRP network with multiple routers and subnets using different routing protocols.
This document compares the performance of link recovery between the EIGRP and OSPF routing protocols through simulation. It finds that EIGRP has faster retransmission times than OSPF when there is a failure in a data transmission link. Specifically, before a link fails the average transmission time is 17.5ms for OSPF and 17.1ms for EIGRP, and after a link fails the times increase to 29ms for OSPF and 28.4ms for EIGRP. Therefore, the research shows that EIGRP has better performance than OSPF in retransmitting data after a link fails.
The document discusses the key concepts of EIGRP including its hybrid nature, neighbor establishment process, metric calculations, and use of successors and feasible successors. EIGRP forms neighbor relationships by exchanging Hello packets to verify matching AS numbers and K-values. It calculates metrics based on bandwidth, delay, and other configurable factors, and uses the DUAL algorithm to determine the best path and maintain backup paths as feasible successors to speed convergence.
The document discusses various topics relating to EIGRP implementation including:
- Establishing EIGRP neighbor relationships and different network environments where EIGRP can operate like Frame Relay and MPLS networks.
- Building the EIGRP topology table by exchanging routing information with neighbors, calculating EIGRP metrics and selecting the best path.
- Optimizing EIGRP behavior such as using stub routing and route summarization to reduce queries when a route becomes active.
- The document discusses EIGRP routing protocols, including the basic concepts of routing, static versus dynamic routing, and an overview of EIGRP configuration and metrics.
- Key points covered include the basic functions of routers, different types of routing protocols, advantages and disadvantages of static routing, and how dynamic routing protocols automatically share information and update routing tables when network changes occur.
- The document also provides details on EIGRP packet types, neighbor discovery via hello packets, metric calculation using bandwidth and delay, and basic EIGRP configuration steps.
Similar to Implementing an EGIRP Based Solution (20)
The document provides instructions for configuring Windows 7. It discusses upgrade paths, hardware requirements, disk management including creating and attaching virtual hard disks, file system formatting and conversion, and using the disk management utility. Specific topics covered include Windows 7 editions, minimum requirements, configuring virtual hard disks, managing basic and dynamic storage, and using the Microsoft Management Console.
This document provides an overview of building a medium-sized computer network, including introducing different wide area network (WAN) technologies, dynamic routing protocols, and implementing the Open Shortest Path First (OSPF) routing protocol. Specifically, it discusses point-to-point links, circuit switching, packet switching, virtual circuits, dialup services, WAN devices, the role of dynamic routing protocols, how they operate, classifying routing protocols, metrics, and load balancing. The overall purpose is to teach readers how to construct a medium-sized computer network using various WAN technologies and routing protocols.
This document provides instructions on implementing VLANs and trunks in a medium-sized computer network. It discusses how VLANs can segment a network into logical broadcast domains while trunks allow multiple VLANs to be transported over a single link between switches. Static and dynamic VLAN configuration methods are described. The document also covers VLAN trunking protocols, configuring trunk links on switches, and managing VLAN traffic passing over trunks.
This document provides an overview of the basics of UNIX operating systems. It covers UNIX lessons objectives which include knowing UNIX, commands, compiling software packages, and variables. It defines UNIX as a stable, multi-user operating system and describes its graphical user interface. It also outlines the different types of UNIX and explains the core components of the UNIX operating system including the kernel, shell, and programs. The document provides examples of files and processes in UNIX and describes the directory structure and pathnames. It demonstrates various commands for listing files, making directories, copying/moving files, removing files and directories, and searching files. The document also covers redirection of input/output in UNIX.
This document provides instructions for securing network devices, including securing administrative access, implementing device hardening, and implementing traffic filtering. It discusses securing access to the device through the console port, VTY lines, and auxiliary port by configuring login passwords. It also recommends encrypting all passwords, configuring session timeouts, implementing access levels for administrators, and configuring warning banners. For the management plane, it suggests securing protocols like SNMP, SSH, and disabling unneeded services. Device hardening includes securing the management, control, and data planes through password policies and encryption. Traffic filtering can be implemented through access control lists.
This document provides instruction on converting between binary and decimal number formats. It includes:
1. Lessons on binary math concepts like converting binary to decimal and vice versa using a bit value chart.
2. Examples of converting specific IP addresses between dotted decimal and binary formats by placing the binary digits in the chart and adding or subtracting column values.
3. Practice questions for readers to convert sample IP addresses between the two number formats on their own.
The Cisco Unified Computing System (UCS) consolidates many separate data center elements like networking, storage, and servers into a single unified system using converged network adapters and fabric interconnects. The UCS Manager allows for unified management of physical and virtual infrastructure. Service profiles define hardware configurations that can be rapidly applied to server blades. Role-based access controls in the UCS Manager separate administrator access for networking, servers, storage and other roles.
IGRP is a Cisco proprietary distance-vector routing protocol that is more scalable than RIP. IGRP uses bandwidth and delay as its metric to calculate the distance to destinations. IGRP has limitations when networks are not contiguous and have inconsistent subnet masks, as it may summarize routes incorrectly.
The document discusses establishing internet connectivity through TCP/IP networking. It covers TCP/IP protocols, IP addressing, subnetting networks, routing, and configuring routers. Specifically, it explains how TCP/IP uses the client/server model for communication and defines common application layer protocols. It also provides examples for subnetting a Class C network address into a specific number of subnets and networks.
The document discusses configuring and troubleshooting VLANs on Cisco switches. It describes creating VLANs on a switch, assigning switch ports to VLANs in access mode, and configuring trunk ports. Key steps include using the global config vlan command to create VLANs, the show vlan command to verify configurations, and the switchport mode access and switchport access commands to assign access ports to VLANs. The document also covers VTP modes, extended VLAN ranges, and trunk port configuration options.
This document provides instructions on building a simple computer network. It describes how networking works from host-to-host communication using the OSI model. It defines the components of a network including hardware, software, end devices, and intermediary devices. It also discusses network structures such as local area networks (LANs) and wide area networks (WANs), Ethernet standards, and the roles of hubs and switches. The document concludes with an overview of the Cisco Internetwork Operating System used to configure and manage Cisco networking devices.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
4. Implementing an EIGRP-Based Solution
EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Roots of EIGRP: IGRP
-Developed in 1985 to overcome
RIPv1’s limited hop count
-Distance vector routing protocol
-Metrics used by IGRP
bandwidth (used by default)
Delay (used by default)
reliability
load
-Discontinued support starting
with IOS 12.2(13)T & 12.2(R1s4)S
5. EIGRP Message Format
EIGRP Header
Data link frame header - contains source and
destination MAC address
IP packet header - contains source & destination IP
address
EIGRP packet header - contains AS number
Type/Length/Field - data portion of EIGRP message
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
6. EIGRP packet header contains
– Opcode field
– Autonomous System number
EIGRP Parameters contains
– Weights
– Hold time
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
7. Protocol Dependent Modules (PDM)
EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalk
PDMs are responsible for the specific routing task for each network layer
protocol
Reliable Transport Protocol (RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of EIGRP packet
Reliable delivery requires acknowledgment from destination
Unreliable delivery does not require an acknowledgement from
destination
– Packets can be sent
Unicast
Multicast
– Using address 224.0.0.10
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
8. Reliable Transport Protocol
(RTP)
Purpose of RTP
– Used by EIGRP to transmit and receive EIGRP
packets
Characteristics of RTP
– Involves both reliable & unreliable delivery of
EIGRP packet
Reliable delivery requires acknowledgment
from destination
Unreliable delivery does not require an
acknowledgement from destination
– Packets can be sent
Unicast
Multicast
– Using address 224.0.0.10
Implementing an EIGRP-Based Solution
9. EIGRP’s 5 Packet Types
Hello packets
– Used to discover & form adjacencies with neighbors
Query & Reply packets
– Used by DUAL for searching for networks
– Query packets
-Can use
– Unicast
– Multicast
Reply packet
– -Use only
– unicast
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
10. Purpose of Hello Protocol
– To discover & establish adjacencies with neighbor routers
Characteristics of hello protocol
– Time interval for sending hello packet
Most networks it is every 5 seconds
Multipoint non broadcast multi-access networks
– Unicast every 60 seconds
-Holdtime
This is the maximum time router should wait before declaring a neighbor
down
Default holdtime
– 3 times hello interval
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
11. EIGRP Bounded Updates
EIGRP only sends update when there is a change in
route status
Partial update
– A partial update includes only the route information
that has changed – the whole routing table is NOT sent
Bounded update
– When a route changes, only those devices that are
impacted will be notified of the change
EIGRP’s use of partial bounded updates minimizes
use of bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
12. Diffusing Update Algorithm (DUAL)
– Purpose
• EIGRP’s primary method for preventing routing loops
– Advantage of using DUAL
• Provides for fast convergence time by keeping a list of loop-
free backup routes
Administrative Distance (AD)
– Defined as the trustworthiness of the source route
EIGRP default administrative distances
– Summary routes = 5
– Internal routes = 90
– Imported routes = 170
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
13. Authentication
EIGRP can
– Encrypt routing information
– Authenticate routing information
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
14. Network Topology
We will use the below topology for our EIGRP
configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
16. Autonomous System (AS) & Process IDs
– This is a collection of networks under the control of a single authority
(reference RFC 1930)
– AS Numbers are assigned by IANA
– Entities needing AS numbers
ISP
Internet Backbone prodiers
Institutions connecting to other institutions using AS numbers
Implementing an EIGRP-Based Solution
Instructional Design-Computer Networking -
Bridges Educational Group08/28/13
17. Basic EIGRP Configuration
EIGRP autonomous system number actually functions as a process ID
Process ID represents an instance of the routing protocol running on a router
Example
Router(config)#router
eigrp autonomous-system
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
18. The router eigrp command
The global command that enables eigrp is
router eigrp autonomous-system
-All routers in the EIGRP routing domain must use the same process ID
number (autonomous-system number)
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
19. The Network Command
Functions of the network command
– Enables interfaces to transmit & receive EIGRP updates
– Includes network or subnet in EIGRP updates
Example
– Router(config-router)#network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
20. 08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
The network Command with a Wildcard Mask
-This option is used when you want to configure EIGRP
to advertise specific subnets
-Example
Router(config-router)#network network-address
[wildcard-mask]
Implementing an EIGRP-Based Solution
21. Verifying EIGRP
EIGRP routers must establish adjacencies with their neighbors before any
updates can be sent or received
Command used to view neighbor table and verify that EIGRP has established
adjacencies with neighbors is
show ip eigrp neighbors
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
22. The show ip protocols
command is also used to
verify that EIGRP is
enabled
Implementing an
EIGRP-Based Solution
23. Examining the Routing Table
The show ip route command is also used to verify EIGRP
EIGRP routes are denoted in a routing table by the letter “D”
By default , EIGRP automatically summarizes routes at major network
boundary
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
24. Introducing the Null0 Summary Route
– Null0 is not a physical interface
– In the routing table summary routes are sourced from Null0
Reason: routes are used for advertisement purposes
– EIGRP will automatically include a null0 summary route as child route
when 2 conditions are met
At least one subnet is learned via EIGRP
Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
25. R3’s routing table shows that the 172.16.0.0/16
network is automatically summarized by R1 & R3
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
26. EIGRP Metric Calculation
EIGRP Composite Metric & the K Values
EIGRP uses the following values in its composite metric
-Bandwidth, delay, reliability, and load
The composite metric used by EIGRP
– formula used has values K1 K5
K1 & K3 = 1
all other K values = 0
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
27. Use the sh ip protocols command to verify the K
values
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
28. 08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
EIGRP Metrics
Use the show interfaces command to view metrics
EIGRP Metrics
Bandwidth – EIGRP uses a static bandwidth to calculate metric
Most serial interfaces use a default bandwidth value of 1.544Mbos (T1)
29. EIGRP Metrics
Delay is the defined as the measure of time it takes for a
packet to traverse a route
-it is a static value based on link type to which interface
is connected
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
30. Reliability (not a default EIGRP metric)
-A measure of the likelihood that a link will fail
-Measure dynamically & expressed as a fraction of 255
the higher the fraction the better the reliability
Load (not a default EIGRP metric)
– A number that reflects how much traffic is using a
link
– Number is determined dynamically and is expressed
as a fraction of 255
The lower the fraction the less the load on the link
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
31. Using the Bandwidth Command
Modifying the interface bandwidth
-Use the bandwidth command
-Example
Router(config-if)#bandwidth kilobits
Verifying bandwidth
– Use the show interface command
Note – bandwidth command
does not change the
link’s physical
bandwidth
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
32. – The EIGRP metric can be determined by examining the
– bandwidth delay
– EIGRP uses the lowest bandwidth (BW)in its metric calculation
– Calculated BW = reference BW / lowest BW(kbps)
– Delay – EIGRP uses the cumulative sum of all outgoing interfaces
– Calculated Delay = the sum of outgoing interface delays
– EIGRP Metric = calculated BW + calculated delay
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
34. DUAL Concepts
The Diffusing Update Algorithm (DUAL) is used to
prevent looping
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
35. Successor
The best least cost route to a destination found in the
routing table
Feasible distance
The lowest calculated metric along a path to a destination
network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
36. Feasible Successor
-This is a loop free backup route to same
destination as successor route
Reported distance (RD)
-The metric that a router reports to a neighbor about its own
cost to that network
Feasibility Condition (FC)
-Met when a neighbor’s RD is less than the local router’s
FD to the same destination network
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
37. Topology Table: Successor & Feasible Successor
EIGRP Topology table
– Viewed using the show ip eigrp topology command
Contents of table include:
– all successor routes
– all feasible successor routes
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
38. Topology Table: No Feasible Successor
A feasible successor may not be present because the feasibility condition may not be met
-In other words, the reported distance of the neighbor is greater than or equal to the
current feasible distance
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
39. Finite Sate Machine (FSM)
– An abstract machine that defines a set of possible states
something can go through, what event causes those
states and what events result form those states
– FSMs are used to describe how a device, computer
program, or routing algorithm will react to a set of input
events
DUAL FSM
– Selects a best loop-free path to a destination
– Selects alternate routes by using information in EIGRP
tables
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
40. Finite State Machines (FSM)
To examine output from EIGRP’s finite state machine
us the debug eigrp fsm command
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
41. The Null0 Summary Route
By default, EIGRP uses the Null0 interface to discard
any packets that match the parent route but do not
match any of the child routes
EIGRP automatically includes a null0 summary route
as a child route whenever both of the following
conditions exist
– One or subnets exists that was learned via EIGRP
– Automatic summarization is enabled
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
42. The Null0 Summary Route
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
43. Disabling Automatic Summarization
The auto-summary command permits EIGRP to automatically summarize at
major network boundaries
The no auto-summary command is used to disable automatic summarization
– This causes all EIGRP neighbors to send updates that will not be
automatically summarized
this will cause changes to appear in both
-routing tables
-topology tables
Manual Summarization
Manual summarization can include supernets
Reason: EIGRP is a classless routing protocol & include subnet mask in
update
Command used to configure manual summarization
– Router(config-if)#ip summary-address eigrp as-number
network-address subnet-mask
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
44. Configuring a summary route in EIGRP
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
45. EIGRP Default Routes
“quad zero” static default route
-Can be used with any currently supported routing protocol
-Is usually configured on a router that is connected a network outside the
EIGRP domain
EIGRP & the “Quad zero” static default route
– Requires the use of the redistribute static command to disseminate default
route in EIGRP updates
Fine-Tuning EIGRP
EIGRP bandwidth utilization
-By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP
information
-The command to change the percentage of bandwidth used by EIGRP is
Router(config-if)#ip bandwidth-percent eigrp as-
number percent
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
46. Configuring Hello Intervals and Hold Times
-Hello intervals and hold times are configurable on a per-interface basis
-The command to configure hello interval is
Router(config-if)#ip hello-interval eigrp as-number seconds
Changing the hello interval also requires changing the hold time to a value
greater than or equal to the hello interval
-The command to configure hold time value is
Router(config-if)#ip hold-time eigrp as-number seconds
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
47. Troubleshooting EIGRP
Normal EIGRP operation is stable, efficient in bandwidth utilization, and
relatively simple to monitor and troubleshoot.
Some possible reasons why EIGRP might not work correctly are as follows:
■ Layer 1 or Layer 2 connectivity issues exist.
■ AS numbers on EIGRP routers are mismatched.
■ The link might be congested or down.
■ The outgoing interface is down.
■ The advertised network interface is down.
■ Auto summarization is enabled on routers with discontiguous subnets. Use the
no auto summary command to disable automatic network summarization
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
48. One of the most common reasons for a missing neighbor is a failure on the actual
link. Another possible cause of missing neighbors is an expired hold-down
timer. Because hellos are sent every 5 seconds on most networks, the hold
time value in a show ip eigrp neighbors command output should normally be a
value between 10 and 15.
The debug ip eigrp privileged EXEC command helps you analyze the packets
pertaining to EIGRP routing that are sent and received on an interface, as
Example below
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
49. Because the debug ip eigrp command generates a substantial amount of output,
use it only when traffic on the network is light. Table below describes some
fields in the output from the debug ip eigrp command shown in Example on
last slide
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
The debug eigrp fsm command is used for EIGRP debugging. This command
displays information on DUAL feasible successor metrics and helps network
engineers analyze the packets that are sent and received on an interface.
50. Implementing EIGRP for IPv6
The configuration of EIGRP for IPv6 is not overly complicated; there are a few
changes to the process of configuration compared with EIGRP (for IPv4). Since
EIGRP is a highly implemented protocol, it will not be hard to understand that
as the implementation of IPv6 becomes more prevalent, the implementation
of EIGRP for IPv6 will become highly implemented as well. Table 1 shows the
commands required to configure EIGRP for IPv6 on a network device.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
51. Those familiar with EIGRP (for IPv4) will notice that the network commands are
no longer used to indicate which interfaces will be entered into the EIGRP
process; because of this, every interface that needs to be configured with
EIGRP for IPv6 needs its own configuration statements.
EIGRP for IPv6 uses multicast like EIGRP (for IPv4) to communicate between
local EIGRP neighbors; the multicast address used is referred to as the All
EIGRP routers address of FF02::10 (very similar to the previous 224.0.0.10). The
configuration of general EIGRP for IPv6 options which were previously
completed in EIGRP (for IPv4) router configuration mode still are, however,
the command that is used to enter EIGRP for IPv6 router configuration mode
has been changed. Table below shows the commands required to enter EIGRP
for IPv6 router configuration mode.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
52. EIGRP for IPv6 Configuration Example
The basic configuration of EIGRP for IPv6 is not overly complex, but it often
helps to see a working configuration.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
53. The example configuration shown in Table below uses the topology that is shown
in Figure before as a basis. In the figure, it shows two routers that need to be
configured with EIGRP for IPv6; the configuration will use default parameters.
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution
54. Lessons Learned:
EIGRP configuring and troubleshooting for IPV4
EIGRP configuring For IPV6
08/28/13
Instructional Design-Computer Networking -
Bridges Educational Group
Implementing an EIGRP-Based Solution