Preview

IP Routing

Powerful Essays
Open Document
Open Document
50610 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IP Routing
13
IP Routing—Configuring RIP, OSPF, BGP, and PBR
Contents
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6
Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-6
Dynamic Routing Protocols Supported on the ProCurve
Secure Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7
How Routing Protocols Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-7
Advantages and Disadvantages of Routing Protocols . . . . . . . . 13-10
Load Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-11
Configuring RIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RIP Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RIP Updates, v1 and v2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Speeding Convergence: Split Horizon, Poison Reverse, and Triggered Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RIP Timing Intervals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RIP Configuration Considerations . . . . . . . . . . . . . . . . . . . . . . . .
Selecting a RIP Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting a Global RIP Version . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting RIP Versions for Particular Interfaces . . . . . . . . . . . . . .
Specifying Networks That Will Participate in RIP . . . . . . . . . . . . . .
Redistributing Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Redistributing Connected Routes . . . . . . . . . . . . . . . . . . . . . . . .
Redistributing OSPF Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling and Disabling Route Summarization for
Classful

You May Also Find These Documents Helpful

  • Good Essays

    Routing is the methodology of selecting way or path in a system and also to send network traffic in this path or way and route is the way to send the system traffic. There are two types of routes. One is static routing and other…

    • 1266 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    No reference was given as to what revisions/changes occurred in the production of the RIPA-G:2 from its previous edition.…

    • 1614 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    • This needs to be completed before the code freeze on December 20, so that any fixes to the software are completed and tested…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Week 4 B IP Subnetting Lab

    • 2462 Words
    • 19 Pages

    Because you were instructed to use only one major network, you must design a subnet plan based on…

    • 2462 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 3 Assignment

    • 356 Words
    • 2 Pages

    Note: Follow these instructions carefully: There could be modifications that could limit your use of the Ghost software.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Is418 Lab8

    • 309 Words
    • 2 Pages

    List and explain at least 3 switches available with the tar command that can be useful in extracting and installing a tarball…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Software piracy and illegal file shares is becoming a bigger issue in modern day society, more likely with the youth of society. All computers now come with burn-ware technologies in which the user can take a product and create copies of that software. Originally, this process was created in order to provide methods of backing up a person’s computer files, in case of hardware crashing and system reboots. However, the situation has changed. People are now able to copy any type of media file (DVDs, CDs, operation systems, etc) and give out these products, free of charge. Do you like that CD that your friend bought the other day? Ask him to burn you a copy, then you can have it too. Did your latest version of Microsoft Windows crash…

    • 2160 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Course Syllabus

    • 617 Words
    • 3 Pages

     AACJ 013A  AACJ 013B For Office Use Only:  Reentry  Program/Version Change  Track Change IRN ________________________…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Fields deleted from the InventTrans table ................................................................................ 5 Developing new features ........................................................................................................ 6 Upgrading existing features .................................................................................................... 6…

    • 2367 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Ax.25 Protocol

    • 2542 Words
    • 11 Pages

    LIST OF ACRONYMS ................................................................................................................................ 5 INTRODUCTION ........................................................................................................................................ 6 TRANSFER FRAMES FORMAT .............................................................................................................. 7 6.1 AX.25 TRANSFER FRAME FORMAT 6.1.1 Flag (8 bits) 6.1.2 AX.25 Transfer Frame Header (128 bits) 6.1.3 Information Field (0 to 2048 bits) 6.1.4 Frame-Check Sequence (16 bits) 6.2 TELEMETRY INFORMATION FIELD USAGE 6.2.1 Telemetry Transfer Frame Secondary Header 6.2.2 Data 6.2.3 Telemetry Transfer Frame Trailer 6.3 TELECOMMAND INFORMATION FIELD USAGE 7 7 7 8 8 9 9 10 11 ERROR!…

    • 2542 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Oil and Gas Processing

    • 29255 Words
    • 118 Pages

    other files, and the selection and arrangement thereof, are the copyright property of ABB, ALL…

    • 29255 Words
    • 118 Pages
    Powerful Essays

Related Topics