<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Cisco elearning</title><description>elerning networking with cisco ccna,ccnp,ccdp,artcle cisco by  for elearning beginers, His current consulting work focuses on network</description><managingEditor>noreply@blogger.com (Blogging Free Software)</managingEditor><pubDate>Fri, 25 Oct 2024 00:27:47 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">91</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://ciscoelearning.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:summary>elerning networking with cisco ccna,ccnp,ccdp,artcle cisco by for elearning beginers, His current consulting work focuses on network</itunes:summary><itunes:subtitle>elerning networking with cisco ccna,ccnp,ccdp,artcle cisco by for elearning beginers, His current consulting work focuses on network</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>UTP CABLE WAYS LOADING</title><link>http://ciscoelearning.blogspot.com/2010/07/utp-cable-ways-loading.html</link><category>Cable</category><category>Network Addresing</category><category>UTP</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Sat, 10 Jul 2010 20:17:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-1715888564374823810</guid><description>&lt;div style="text-align: justify;"&gt;Shielded twisted pair (STP or STP-A), shielded twisted pair or STP is a twisting pair cable that has protection from metal to protect the cable from external electromagnetic intereferensi. For network installation at this point is usually used category 5 UTP cabling.&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;How to installation of cable in order for the second color system. you can see the image below&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUqJniRyhobNcbuBK3s5dsB3Z0Y144B4slJs1M-0lVbVxVOIO1UMK2pSrYu3hfYiiSTB9LHPauBSzc3cXEsj4Zn2mI1drrErAFTehVo7Dkr_dpqEnKLcXW1O8CnfMdAKXrT2AjwGRacb0/s1600/EthernetRJ45A.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="UTP CABLE WAYS LOADING" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUqJniRyhobNcbuBK3s5dsB3Z0Y144B4slJs1M-0lVbVxVOIO1UMK2pSrYu3hfYiiSTB9LHPauBSzc3cXEsj4Zn2mI1drrErAFTehVo7Dkr_dpqEnKLcXW1O8CnfMdAKXrT2AjwGRacb0/s320/EthernetRJ45A.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;UTP CABLE WAYS LOADING&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;Hopefully useful for those who want to know how the composition of network cabling (LAN)&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUqJniRyhobNcbuBK3s5dsB3Z0Y144B4slJs1M-0lVbVxVOIO1UMK2pSrYu3hfYiiSTB9LHPauBSzc3cXEsj4Zn2mI1drrErAFTehVo7Dkr_dpqEnKLcXW1O8CnfMdAKXrT2AjwGRacb0/s72-c/EthernetRJ45A.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>The IP Route Command</title><link>http://ciscoelearning.blogspot.com/2009/09/ip-route-command.html</link><category>Inside Routing</category><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Wed, 30 Sep 2009 11:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-1958759954993699556</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="font-weight: bold;"&gt;The IP Route Command&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The &lt;span style="font-weight: bold;"&gt;command for configuring a static route&lt;/span&gt; is &lt;span style="font-weight: bold;"&gt;ip route&lt;/span&gt;. The complete syntax for configuring a static route is:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red; font-style: italic;"&gt;Router(config)#ip route prefix mask {ip-address | interface-type interface-number [ip-address]} [distance] [name] [permanent] [tag tag] &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Most of these parameters are not relevant for this chapter or for your CCNA studies. As shown in the figure, we will use a simpler version of the syntax:&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red; font-style: italic;"&gt;Router(config)#ip route network-address subnet-mask {ip-address | exit-interface }&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The following parameters are used:&lt;br /&gt;
network-address - Destination network address of the remote network to be added to the routing table&lt;br /&gt;
subnet-mask - Subnet mask of the remote network to be added to the routing table. The subnet mask can be modified to summarize a group of networks.&lt;br /&gt;
&lt;br /&gt;
One or both of the following parameters must also be used:&lt;br /&gt;
ip-address - Commonly referred to as the next-hop router's IP address&lt;br /&gt;
exit-interface - Outgoing interface that would be used in forwarding packets to the destination network&lt;br /&gt;
&lt;br /&gt;
Note: The ip-address parameter is commonly referred to as the "next-hop" router's IP address. The actual next-hop router's IP address is commonly used for this parameter. However, the ip-address parameter could be any IP address, as long as it is resolvable in the routing table. This is beyond the scope of this course, but we've added this point to maintain technical accuracy.&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Purpose and Command Syntax OF IP Route</title><link>http://ciscoelearning.blogspot.com/2009/09/purpose-and-command-syntax-of-ip-route.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Wed, 30 Sep 2009 10:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8118302913240586775</guid><description>&lt;a href="http://ciscoelearning.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Purpose and Command Syntax of ip route" border="0" id="BLOGGER_PHOTO_ID_5387320922014120226" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaU-vJ_5VEwovm8l9JLEWMJU2W3mKsQCEuq-HNt3F3BXoPIy8sG4i-AEno39g5kFTsGorEoTtl-9rzGzkBPZn61EXhktmAnzNpnuJcOJ0Nwv7jORxvony4zADjg_4hD_9HnTbo2YFqnI4/s320/Purpose+Ip+route.JPG" style="cursor: pointer; float: left; height: 189px; margin: 0pt 10px 10px 0pt; width: 320px;" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;Purpose and Command Syntax of ip route&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;&lt;span id="formatbar_Buttons" style="display: block;"&gt;&lt;span id="formatbar_JustifyFull" style="display: block;" title="Justify Full"&gt;&lt;img alt="Justify Full" border="0" class="gl_align_full" src="http://www.blogger.com/img/blank.gif" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
As we have discussed previously, a router can learn about remote networks in one of two ways:&lt;br /&gt;
Manually, from configured static routes&lt;br /&gt;
Automatically, from a dynamic routing protocol&lt;br /&gt;
&lt;br /&gt;
The rest of this chapter focuses on configuring static routes. Dynamic routing protocols are introduced in the next chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Static routes&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Static routes are commonly used when routing from a network to a stub network. A stub network is a network accessed by a single route. For an example, see the figure. Here we see that any network attached to R1 would only have one way to reach other destinations, whether to networks attached to R2 or to destinations beyond R2. Therefore, network 172.16.3.0 is a stub network and R1 is a stub router.&lt;br /&gt;
&lt;br /&gt;
Running a routing protocol between R1 and R2 is a waste of resources because R1 has only one way out for sending non-local traffic. Therefore, static routes are configured for connectivity to remote networks that are not directly connected to a router. Again, referring to the figure, we would configure a static route on R1 to the LAN attached to R2. We will also see how to configure a default static route from R1 to R2 later in the chapter so that R1 can send traffic to any destination beyond R2.&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaU-vJ_5VEwovm8l9JLEWMJU2W3mKsQCEuq-HNt3F3BXoPIy8sG4i-AEno39g5kFTsGorEoTtl-9rzGzkBPZn61EXhktmAnzNpnuJcOJ0Nwv7jORxvony4zADjg_4hD_9HnTbo2YFqnI4/s72-c/Purpose+Ip+route.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Alexa traffic smallest</title><link>http://ciscoelearning.blogspot.com/2009/06/alexa-traffic-smallest.html</link><category>Alexa</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Sun, 21 Jun 2009 22:43:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8742190504421485315</guid><description>&lt;div style="text-align: justify;"&gt;Alexa traffic is traffic to our blog, the more traffic to our blog the small number of nominal figures we blog in Alexa’s eyes, and this is a sign of good alexa toolbar although sometimes confusing. Alexa indeed apply logic to the google rankings, blogs, if we are considered “important” google, it will increase the nominal amount of numbers we blog on google, while Alexa, the more we visited blog other bloggers, the small number of our nominal Alexa. Alexa rating determines your blog. The higher the ranking of a blog, the more “job / task” that you will receive, and also the more money that flows to your paypal. There are a few tips that can improve the ranking in the Alexa blog. among others:&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. Alexa Widget&lt;br /&gt;
&lt;blockquote&gt;Place the Alexa site widget stat in your website. Alexa stat this site contains javascript that accompany every visitor data (ping) to the server so that Alexa Alexa statistics become more accurate.&lt;br /&gt;
Scriptnya can be taken at the Alexa website. Live copy and paste. No need to install the Alexa widget ashamed when we rank blog is far, to achieve the desired results of course there is the price that must be paid.&lt;br /&gt;
&lt;/blockquote&gt;2. Alexa Toolbar&lt;br /&gt;
&lt;blockquote&gt;Using a browser that Alexa toolbar installed can increase your website ranking. In fact not only your website, every website visited by a browser which is installed Alexa toolbar also get “value” that will be in the ranking. Then, the visitor is not sure of the website you are yourself? So, if your browser already installed the toolbar, then the addition of point ranking akan happen automatically. Nah, Alexa toolbar for Firefox can be installed&lt;br /&gt;
&lt;/blockquote&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Router Connections</title><link>http://ciscoelearning.blogspot.com/2009/04/router-connections.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 27 Apr 2009 01:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-4033110164203414901</guid><description>&lt;span style="font-weight: bold;"&gt;Router Connections&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
Connecting a router to a network requires a router interface connector to be coupled with a cable connector. As you can see in the figure, Cisco routers support many different connector types.&lt;br /&gt;
&lt;br /&gt;
Serial Connectors&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="http://ciscoelearning.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Cisco elaerning Router Connections" border="0" id="BLOGGER_PHOTO_ID_5329293125303012562" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPyMPSHC7uhRaXqDqGAQPx3pDwdMikWfb2oPGrgxobKCcE-P58u6LJFsXn7SaB9o7kJ5rcuPh1TgQKb9DcJk-2NptFHTDoZJeMoVamAvVXaVR9Eh1EvjykUWrgTCHdyefyjZfZYe09KYw/s320/router+connetion.JPG" style="cursor: pointer; display: block; height: 198px; margin: 0px auto 10px; text-align: center; width: 319px;" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;Picture Router Connections&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
For WAN connections, Cisco routers support the EIA/TIA-232, EIA/TIA-449, V.35, X.21, and EIA/TIA-530 standards for serial connections, as shown. Memorizing these connection types is not important. Just know that a router has a DB-60 port that can support five different cabling standards. Because five different cable types are supported with thi&lt;span id="formatbar_Buttons" style="display: block;"&gt;&lt;span id="formatbar_JustifyFull" style="display: block;" title="Justify Full"&gt;&lt;img alt="Justify Full" border="0" class="gl_align_full" src="http://www.blogger.com/img/blank.gif" /&gt;&lt;/span&gt;&lt;/span&gt;s port, the port is sometimes called a five-in-one serial port. The other end of the serial cable is fitted with a connector that is appropriate to one of the five possible standards.&lt;br /&gt;
&lt;br /&gt;
Note: The documentation for the device to which you want to connect should indicate the standard for that device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Newer routers support the smart serial interface that allows for more data to be forwarded across fewer cable pins. The serial end of the smart serial cable is a 26-pin connector. It is much smaller than the DB-60 connector used to connect to a five-in-one serial port. These transition cables support the same five serial standards and are available in either DTE or DCE configurations.&lt;br /&gt;
&lt;br /&gt;
Note: For a thorough explanation of DTE and DCE, see Lab 1.5.1, "Cabling a Network and Basic Router Configuration."&lt;br /&gt;
&lt;br /&gt;
These cable designations are only important to you when configuring your lab equipment to simulate a "real-world" environment. In a production setting, the cable type is determined for you by the WAN service you are using.&lt;br /&gt;
&lt;br /&gt;
Ethernet Connectors&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://ciscoelearning.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Router Connections Cisco elaerning utp cable " border="0" id="BLOGGER_PHOTO_ID_5329290901420811346" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3d9ggHZGEwULivj9d0losvd6_DPRuDrJy_DCahEuW8LN-LKsoxMluZQjRMzboDxvUuoDcviDuyyeYwPigTJDylVjrhuza_S6VrhZMMl4ki1lIEkrujiSW1VvXb1wwnAbMzPnWgEVol1g/s320/router+connetion5.JPG" style="cursor: pointer; display: block; height: 184px; margin: 0px auto 10px; text-align: center; width: 211px;" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-weight: bold;"&gt;UTP CABLE&lt;/span&gt; &lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
A different connector is used in an Ethernet-based LAN environment. An RJ-45 connector for the unshielded twisted-pair (UTP) cable is the most common connector used to connect LAN interfaces. At each end of an RJ-45 cable, you should be able to see eight colored strips, or pins. An Ethernet cable uses pins 1, 2, 3, and 6 for transmitting and receiving data.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="http://ciscoelearning.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Router Connections dte Cable" border="0" id="BLOGGER_PHOTO_ID_5329293588237456898" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgApstXbx2gHn7lt7J2kiZJHapEWk_gMJ3pF0II0S6MeDMxFd_koyEhnHmXMWGRt0lqrlZEZgrkUqmw2WnKqY3OtLROmsZe0-J-I3G39iTvu0jidt2NQL2EVmeQxJjt8ed0i4QfW5pV2Kg/s320/router+connetion3.JPG" style="cursor: pointer; display: block; height: 174px; margin: 0px auto 10px; text-align: center; width: 223px;" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;DTE SERIAL&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://ciscoelearning.blogspot.com/" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Router Connections DTE Smart Serial " border="0" id="BLOGGER_PHOTO_ID_5329294579842980066" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1A8SsveZMMg45jZVdt2JNfOl9Fxabxaaw1Ahgr0a78z9H8ledfBV1oaNJXwShCxAHU2MjnRUauz8M398jDsnMmsCKzovQi6WNPIG1GPHM5Vv89PJ6GTXT7Y-wl68kR06UhPwsnZY3p8A/s320/router+connetion4.JPG" style="cursor: pointer; display: block; height: 189px; margin: 0px auto 10px; text-align: center; width: 211px;" /&gt;&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;DTE SMART SERIAL&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
Two types of cables can be used with Ethernet LAN interfaces:&lt;br /&gt;
A straight-through, or patch cable, with the order of the colored pins the same on each end of the cable&lt;br /&gt;
A crossover cable, with pin 1 connected to pin 3, and pin 2 connected to pin 6&lt;br /&gt;
&lt;br /&gt;
Straight-through cables are used for:&lt;br /&gt;
Switch-to-router&lt;br /&gt;
Switch-to-PC&lt;br /&gt;
Hub-to-PC&lt;br /&gt;
Hub-to-server&lt;br /&gt;
&lt;br /&gt;
Crossover cables are used for:&lt;br /&gt;
Switch-to-switch&lt;br /&gt;
PC-to-PC&lt;br /&gt;
Switch-to-hub&lt;br /&gt;
Hub-to-hub&lt;br /&gt;
Router-to-router&lt;br /&gt;
Router-to-server&lt;br /&gt;
&lt;br /&gt;
Note: Wireless connectivity is discussed in another course.&lt;br /&gt;
&lt;span style="color: #ff9900; font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPyMPSHC7uhRaXqDqGAQPx3pDwdMikWfb2oPGrgxobKCcE-P58u6LJFsXn7SaB9o7kJ5rcuPh1TgQKb9DcJk-2NptFHTDoZJeMoVamAvVXaVR9Eh1EvjykUWrgTCHdyefyjZfZYe09KYw/s72-c/router+connetion.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Role Of  The Router</title><link>http://ciscoelearning.blogspot.com/2009/04/role-of-router.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Sun, 26 Apr 2009 23:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-3064210394229717844</guid><description>The router is a special-purpose computer that plays a key role in the operation of any data network. Routers are primarily responsible for interconnecting networks by:&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;Determining the best path to send packets&lt;br /&gt;
Forwarding packets toward their destination&lt;br /&gt;
&lt;br /&gt;
Routers perform packet forwarding by learning about remote networks and maintaining routing information. The router is the junction or intersection that connects multiple IP networks. The routers primary forwarding decision is based on Layer 3 information, the destination IP address.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/04/role-of-router.html" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"&gt;&lt;img alt="Role Of  The Router" border="0" id="BLOGGER_PHOTO_ID_5329262862919983554" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHO-N3vT00FxTPTo9RqmQb-JWfo-G1nSgVPowYhNstBl-OQ4k8_w9Q1JqM2PBNUQamWegmYCBq1xm3_pJ5I7PYdrJBBzc0mxqMH-cHvv6XQviD-mO5Mfu3rjQAkR4f9GMBMKYl6VkUMQY/s320/Role+Of++The+Router.JPG" style="cursor: pointer; display: block; height: 186px; margin: 0px auto 10px; text-align: center; width: 320px;" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;The router's routing table is used to find the best match between the destination IP of a packet and a network address in the routing table. The routing table will ultimately determine the exit interface to forward the packet and the router will encapsulate that packet in the appropriated data link frame for that outgoing interface.&lt;br /&gt;
&lt;span style="color: #ff9900; font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHO-N3vT00FxTPTo9RqmQb-JWfo-G1nSgVPowYhNstBl-OQ4k8_w9Q1JqM2PBNUQamWegmYCBq1xm3_pJ5I7PYdrJBBzc0mxqMH-cHvv6XQviD-mO5Mfu3rjQAkR4f9GMBMKYl6VkUMQY/s72-c/Role+Of++The+Router.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Best Path Best Path And Metric</title><link>http://ciscoelearning.blogspot.com/2009/03/best-path-best-path-and-metric.html</link><category>Other</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 08:44:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-4055819084539387159</guid><description>&lt;div style="text-align: justify;"&gt;Determining a router's best path involves the evaluation of multiple paths to the same destination network and selecting the optimum or "shortest" path to reach that network. Whenever multiple paths to reach the same network exist, each path uses a different exit interface on the router to reach that network. The best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network. Some routing protocols, such as RIP, use simple hop-count, which the number of routers between a router and the destination network. Other routing protocols, such as OSPF, determine the shortest path by examining the bandwidth of the links, and using the links with the fastest bandwidth from a router to the destination network.&lt;br /&gt;&lt;br /&gt;Dynamic routing protocols typically use their own rules and metrics to build and update routing tables. A metric is the quantitative value used to measure the distance to a given route. The best path to a network is the path with the lowest metric. For example, a router will prefer a path that is 5 hops away over a path that is 10 hops away.&lt;br /&gt;&lt;br /&gt;The primary objective of the routing protocol is to determine the best paths for each route to include in the routing table. The routing algorithm generates a value, or a metric, for each path through the network. Metrics can be based on either a single characteristic or several characteristics of a path. Some routing protocols can base route selection on multiple metrics, combining them into a single metric. The smaller the value of the metric, the better the path.&lt;br /&gt;&lt;br /&gt;Comparing Hop Count and Bandwidth Metrics&lt;br /&gt;&lt;br /&gt;Two metrics that are used by some dynamic routing protocols are:&lt;br /&gt;Hop count-Hop count is the number of routers that a packet must travel through before reaching its destination. Each router is equal to one hop. A hop count of four indicates that a packet must pass through four routers to reach its destination. If multiple paths are available to a destination, the routing protocol, such as RIP, picks the path with the least number of hops.&lt;br /&gt;Bandwidth-Bandwidth is the data capacity of a link, sometimes referred to as the speed of the link. For example, Cisco's implementation of the OSPF routing protocol uses bandwidth as its metric. The best path to a network is determined by the path with an accumulation of links that have the highest bandwidth values, or the fastest links. The use of bandwidth in OSPF will be explained in Chapter 11.&lt;br /&gt;&lt;br /&gt;Note: Speed is technically not an accurate description of bandwidth because all bits travel at the same speed over the same physical medium. Bandwidth is more accurately defined as the number of bits that can be transmitted over a link per second.&lt;br /&gt;&lt;br /&gt;When hop count is used as the metric, the resulting path may sometimes be suboptimal. For example, consider the network shown in the figure. If RIP is the routing protocol used by the three routers, then R1 will choose the suboptimal route through R3 to reach PC2 because this path has fewer hops. Bandwidth is not considered. However, if OSPF is used as the routing protocol, then R1 will choose the route based on bandwidth. Packets will be able to reach their destination sooner using the two, faster T1 links as compared to the single, slower 56 Kbps link.&lt;/div&gt;</description><enclosure length="0" type="Cisco" url="http://ciscoelearning.blogspot.com/"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><itunes:explicit>no</itunes:explicit><itunes:subtitle>Determining a router's best path involves the evaluation of multiple paths to the same destination network and selecting the optimum or "shortest" path to reach that network. Whenever multiple paths to reach the same network exist, each path uses a different exit interface on the router to reach that network. The best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network. Some routing protocols, such as RIP, use simple hop-count, which the number of routers between a router and the destination network. Other routing protocols, such as OSPF, determine the shortest path by examining the bandwidth of the links, and using the links with the fastest bandwidth from a router to the destination network. Dynamic routing protocols typically use their own rules and metrics to build and update routing tables. A metric is the quantitative value used to measure the distance to a given route. The best path to a network is the path with the lowest metric. For example, a router will prefer a path that is 5 hops away over a path that is 10 hops away. The primary objective of the routing protocol is to determine the best paths for each route to include in the routing table. The routing algorithm generates a value, or a metric, for each path through the network. Metrics can be based on either a single characteristic or several characteristics of a path. Some routing protocols can base route selection on multiple metrics, combining them into a single metric. The smaller the value of the metric, the better the path. Comparing Hop Count and Bandwidth Metrics Two metrics that are used by some dynamic routing protocols are: Hop count-Hop count is the number of routers that a packet must travel through before reaching its destination. Each router is equal to one hop. A hop count of four indicates that a packet must pass through four routers to reach its destination. If multiple paths are available to a destination, the routing protocol, such as RIP, picks the path with the least number of hops. Bandwidth-Bandwidth is the data capacity of a link, sometimes referred to as the speed of the link. For example, Cisco's implementation of the OSPF routing protocol uses bandwidth as its metric. The best path to a network is determined by the path with an accumulation of links that have the highest bandwidth values, or the fastest links. The use of bandwidth in OSPF will be explained in Chapter 11. Note: Speed is technically not an accurate description of bandwidth because all bits travel at the same speed over the same physical medium. Bandwidth is more accurately defined as the number of bits that can be transmitted over a link per second. When hop count is used as the metric, the resulting path may sometimes be suboptimal. For example, consider the network shown in the figure. If RIP is the routing protocol used by the three routers, then R1 will choose the suboptimal route through R3 to reach PC2 because this path has fewer hops. Bandwidth is not considered. However, if OSPF is used as the routing protocol, then R1 will choose the route based on bandwidth. Packets will be able to reach their destination sooner using the two, faster T1 links as compared to the single, slower 56 Kbps link.</itunes:subtitle><itunes:author>noreply@blogger.com (Blogging Free Software)</itunes:author><itunes:summary>Determining a router's best path involves the evaluation of multiple paths to the same destination network and selecting the optimum or "shortest" path to reach that network. Whenever multiple paths to reach the same network exist, each path uses a different exit interface on the router to reach that network. The best path is selected by a routing protocol based on the value or metric it uses to determine the distance to reach a network. Some routing protocols, such as RIP, use simple hop-count, which the number of routers between a router and the destination network. Other routing protocols, such as OSPF, determine the shortest path by examining the bandwidth of the links, and using the links with the fastest bandwidth from a router to the destination network. Dynamic routing protocols typically use their own rules and metrics to build and update routing tables. A metric is the quantitative value used to measure the distance to a given route. The best path to a network is the path with the lowest metric. For example, a router will prefer a path that is 5 hops away over a path that is 10 hops away. The primary objective of the routing protocol is to determine the best paths for each route to include in the routing table. The routing algorithm generates a value, or a metric, for each path through the network. Metrics can be based on either a single characteristic or several characteristics of a path. Some routing protocols can base route selection on multiple metrics, combining them into a single metric. The smaller the value of the metric, the better the path. Comparing Hop Count and Bandwidth Metrics Two metrics that are used by some dynamic routing protocols are: Hop count-Hop count is the number of routers that a packet must travel through before reaching its destination. Each router is equal to one hop. A hop count of four indicates that a packet must pass through four routers to reach its destination. If multiple paths are available to a destination, the routing protocol, such as RIP, picks the path with the least number of hops. Bandwidth-Bandwidth is the data capacity of a link, sometimes referred to as the speed of the link. For example, Cisco's implementation of the OSPF routing protocol uses bandwidth as its metric. The best path to a network is determined by the path with an accumulation of links that have the highest bandwidth values, or the fastest links. The use of bandwidth in OSPF will be explained in Chapter 11. Note: Speed is technically not an accurate description of bandwidth because all bits travel at the same speed over the same physical medium. Bandwidth is more accurately defined as the number of bits that can be transmitted over a link per second. When hop count is used as the metric, the resulting path may sometimes be suboptimal. For example, consider the network shown in the figure. If RIP is the routing protocol used by the three routers, then R1 will choose the suboptimal route through R3 to reach PC2 because this path has fewer hops. Bandwidth is not considered. However, if OSPF is used as the routing protocol, then R1 will choose the route based on bandwidth. Packets will be able to reach their destination sooner using the two, faster T1 links as compared to the single, slower 56 Kbps link.</itunes:summary><itunes:keywords>Other</itunes:keywords></item><item><title>Packet Fields and Frame Fields</title><link>http://ciscoelearning.blogspot.com/2009/03/packet-fields-and-frame-fields.html</link><category>Other</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 08:35:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-2633847152294275354</guid><description>&lt;div style="text-align: justify;"&gt;As we discussed previously, routers make their primary forwarding decision by examining the destination IP address of a packet. Before sending a packet out the proper exit interface, the IP packet needs to be encapsulated into a Layer 2 data link frame. Later in this section we will follow an IP packet from source to destination, examining the encapsulation and decapsulation process at each router. But first, we will review the format of a Layer 3 IP packet and a Layer 2 Eternet frame.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Internet Protocol (IP) Packet Format&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Internet Protocol specified in RFC 791 defines the IP packet format. The IP packet header has specific fields that contain information about the packet and about the sending and receiving hosts. Below is a list of the fields in the IP header and a brief description for each one. You should already be familiar with destination IP address, source IP address, version, and Time To Live (TTL ) fields. The other fields are important but are outside the scope of this course.&lt;br /&gt;Version - Version number (4 bits); predominant version is IP version 4 (IPv4)&lt;br /&gt;IP header length - Header length in 32-bit words (4 bits)&lt;br /&gt;Precedence and type of service - How the datagram should be handled (8 bits); the first 3 bits are precedence bits (this use has been superseded by Differentiated Services Code Point [DSCP], which uses the first 6 bits [last 2 reserved])&lt;br /&gt;Packet length - Total length (header + data) (16 bits)&lt;br /&gt;Identification - Unique IP datagram value (16 bits)&lt;br /&gt;Flags - Controls fragmenting (3 bits)&lt;br /&gt;Fragment offset - Supports fragmentation of datagrams to allow differing maximum transmission units (MTUs) in the Internet (13 bits)&lt;br /&gt;Time to Live (TTL) - Identifies how many routers can be traversed by the datagram before being dropped (8 bits)&lt;br /&gt;Protocol - Upper-layer protocol sending the datagram (8 bits)&lt;br /&gt;Header checksum - Integrity check on the header (16 bits)&lt;br /&gt;Source IP address - 32-bit source IP address (32 bits)&lt;br /&gt;Destination IP address - 32-bit destination IP address (32 bits)&lt;br /&gt;IP options - Network testing, debugging, security, and others (0 or 32 bits, if any)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;MAC Layer Frame Format&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The Layer 2 data link frame usually contains header information with a data link source and destination address, trailer information, and the actual transmitted data. The data link source address is the Layer 2 address of the interface that sent the data link frame. The data link destination address is the Layer 2 address of the interface of the destination device. Both the source and destination data link interfaces are on the same network. As a packet is forwarded from router to router, the Layer 3 source and destination IP addresses will not change; however, the Layer 2 source and destination data link addresses will change. This process will be examined more closely later in this section.&lt;br /&gt;&lt;br /&gt;Note: When NAT (Network Address Translation) is used, the destination IP address does change, but this process is of no concern to IP and is a process performed within a company's network. Routing with NAT is discussed in a later course.&lt;br /&gt;&lt;br /&gt;The Layer 3 IP packet is encapsulated in the Layer 2 data link frame associated with that interface. In this example, we will show the Layer 2 Ethernet frame. The figure shows the two compatible versions of Ethernet. Below is a list of the fields in an Ethernet frame and a brief description of each one.&lt;br /&gt;Preamble - Seven bytes of alternating 1s and 0s, used to synchronize signals&lt;br /&gt;Start-of-frame (SOF) delimiter - 1 byte signaling the beginning of the frame&lt;br /&gt;Destination address - 6 byte MAC address of the sending device on the local segment&lt;br /&gt;Source address - 6 byte MAC address of the receiving device on the local segment&lt;br /&gt;Type/length - 2 bytes specifying either the type of upper layer protocol (Ethernet II frame format) or the length of the data field (IEEE 802.3 frame format)&lt;br /&gt;Data and pad - 46 to 1500 bytes of data; zeros used to pad any data packet less than 46 bytes&lt;br /&gt;Frame check sequence (FCS) - 4 bytes used for a cyclical redundancy check to make sure the frame is not corrupted&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Routing Table Principles</title><link>http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 08:34:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-6877931643608451239</guid><description>At times in this course we will refer to three principles regarding routing tables that will help you understand, configure, and troubleshoot routing issues. These principles are from Alex Zinin's book, Cisco IP Routing.&lt;br /&gt;&lt;br /&gt;1. Every &lt;span style="font-weight: bold;"&gt;router&lt;/span&gt; makes its decision alone, based on the information it has in its own routing table.&lt;br /&gt;&lt;br /&gt;2. The fact that one router has certain information in its routing table does not mean that other routers have the same information.&lt;br /&gt;&lt;br /&gt;3. Routing information about a path from one network to another does not provide routing information about the reverse, or return, path.&lt;br /&gt;&lt;br /&gt;What is the effect of these principles? Let's look at the example in the figure.&lt;br /&gt;&lt;br /&gt;1. After making its routing decision, router R1 forwards the packet destined for PC3 to router R2. R1 only knows about the information in its own routing table, which indicates that router R2 is the next-hop router. R1 does not know whether or not R2 actually has a route to the destination network.&lt;br /&gt;&lt;br /&gt;2. It is the responsibility of the network administrator to make sure that all routers within their control have complete and accurate routing information so that packets can be forwarded between any two networks. This can be done using static routes, a dynamic routing protocol, or a combination of both.&lt;br /&gt;&lt;br /&gt;3. Router R2 was able to forward the packet toward PC3's destination network. However, the packet from PC2 to PC1 was dropped by R2. Although R2 has information in its routing table about the destination network of PC1, we do not know if it has the information for the return path back to PC1's network.&lt;br /&gt;&lt;br /&gt;Asymmetric &lt;span style="font-weight: bold;"&gt;Routing&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Because routers do not necessarily have the same information in their routing tables, packets can traverse the network in one direction, using one path, and return via another path. This is called asymmetric routing. Asymmetric routing is more common in the Internet, which uses the BGP routing protocol than it is in most internal networks.&lt;br /&gt;&lt;br /&gt;This example implies that when designing and troubleshooting a network, the network administrator should check the following routing information:&lt;br /&gt;Is there a path from source to destination available in both directions?&lt;br /&gt;Is the path taken in both directions the same path? (Asymmetrical routing is not uncommon, but sometimes can pose additional issues.)&lt;br /&gt;&lt;span style="color: rgb(255, 153, 0);font-size:130%;" &gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/04/role-of-router.html"&gt;Role Of  The Router&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Dynamic Routing</title><link>http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 08:18:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-1952089160282005852</guid><description>&lt;div style="text-align: justify;"&gt;Remote networks can also be added to the&lt;span style="font-weight: bold;"&gt; routing&lt;/span&gt; table by using a &lt;span style="font-weight: bold;"&gt;dynamic routing&lt;/span&gt; protocol. In the figure, R1 has automatically learned about the 192.168.4.0/24 network from R2 through the dynamic routing protocol, RIP (Routing Information Protocol). RIP was one of the first IP routing protocols and will be fully discussed in later chapters.&lt;br /&gt;&lt;br /&gt;Note: R1's routing table in the figure shows that R1 has learned about two remote networks: one route that dynamically used RIP and a static route that was configured manually. This is an example of how routing tables can contain routes learned dynamically and configured statically and is not necessarily representative of the best configuration for this network.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Dynamic routing &lt;/span&gt;protocols are used by routers to share information about the reachability and status of remote networks. Dynamic routing protocols perform several activities, including:&lt;br /&gt;Network discovery&lt;br /&gt;Updating and maintaining routing tables&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Automatic Network Discovery&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Network discovery is the ability of a routing protocol to share information about the networks that it knows about with other routers that are also using the same routing protocol. Instead of configuring static routes to remote networks on every router, a dynamic routing protocol allows the routers to automatically learn about these networks from other routers. These networks - and the best path to each network - are added to the router's routing table and denoted as a network learned by a specific &lt;span style="font-weight: bold;"&gt;dynamic routing&lt;/span&gt; protocol.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Maintaining Routing Tables&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After the initial network discovery, &lt;span style="font-weight: bold;"&gt;dynamic routing &lt;/span&gt;protocols update and maintain the networks in their routing tables. Dynamic routing protocols not only make a best path determination to various networks, they will also determine a new best path if the initial path becomes unusable (or if the topology changes). For these reasons, dynamic routing protocols have an advantage over static routes. Routers that use dynamic routing protocols automatically share routing information with other routers and compensate for any topology changes without involving the network administrator.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;IP Routing Protocols&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are several &lt;span style="font-weight: bold;"&gt;dynamic routing &lt;/span&gt;protocols for IP. Here are some of the more common &lt;span style="font-weight: bold;"&gt;dynamic routing protocols&lt;/span&gt; for routing IP packets:&lt;br /&gt;RIP (Routing Information Protocol)&lt;br /&gt;IGRP (Interior Gateway Routing Protocol)&lt;br /&gt;EIGRP (Enhanced Interior Gateway Routing Protocol)&lt;br /&gt;OSPF (Open Shortest Path First)&lt;br /&gt;IS-IS (Intermediate System-to-Intermediate System)&lt;br /&gt;BGP (Border Gateway Protocol)&lt;br /&gt;&lt;br /&gt;Note: RIP (versions 1 and 2), EIGRP, and OSPF are discussed in this course. EIGRP and OSPF are also explained in more detail in CCNP, along with IS-IS and BGP. IGRP is a legacy routing protocol and has been replaced by EIGRP. Both IGRP and EIGRP are Cisco proprietary routing protocols, whereas all other routing protocols listed are standard, non-proprietary protocols.&lt;br /&gt;&lt;br /&gt;Once again, remember that in most cases, routers contain a combination of static routes and dynamic routes in the routing tables. Dynamic routing protocols will be discussed in more detail in Chapter 3, "Dynamic Routing Protocols."&lt;br /&gt;&lt;span style="color: rgb(255, 153, 0);font-size:130%;" &gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/04/role-of-router.html"&gt;Role Of  The Router&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Static Routing</title><link>http://ciscoelearning.blogspot.com/2009/03/static-routing.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:48:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8125503384252558185</guid><description>&lt;div style="text-align: justify;"&gt;Remote networks are added to the routing table either by configuring static routes or enabling a dynamic routing protocol. When the IOS learns about a remote network and the interface that it will use to reach that network, it adds that route to the routing table as long as the exit interface is enabled.&lt;br /&gt;&lt;br /&gt;A &lt;span style="font-weight: bold;"&gt;static route&lt;/span&gt; includes the network address and subnet mask of the remote network, along with the IP address of the next-hop router or exit interface. Static routes are denoted with the code S in the routing table as shown in the figure. &lt;span style="font-weight: bold;"&gt;Static routes&lt;/span&gt; are examined in detail in the next chapter.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;When to Use Static Routes&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Static routes&lt;/span&gt; should be used in the following cases:&lt;br /&gt;A network consists of only a few routers. Using a &lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;dynamic routing &lt;/a&gt;protocol in such a case does not present any substantial benefit. On the contrary, &lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;dynamic routing&lt;/a&gt; may add more administrative overhead.&lt;br /&gt;A network is connected to the Internet only through a single ISP. There is no need to use a &lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;dynamic routing&lt;/a&gt; protocol across this link because the ISP represents the only exit point to the Internet.&lt;br /&gt;A large network is configured in a hub-and-spoke topology. A hub-and-spoke topology consists of a central location (the hub) and multiple branch locations (spokes), with each spoke having only one connection to the hub. Using &lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;dynamic routing&lt;/a&gt; would be unnecessary because each branch has only one path to a given destination-through the central location.&lt;br /&gt;&lt;br /&gt;Typically, most routing tables contain a combination of static routes and d&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;ynamic routes&lt;/a&gt;. But, as stated earlier, the routing table must first contain the directly connected networks used to access these remote networks before any static or dynamic routing can be used.&lt;br /&gt;&lt;/div&gt;&lt;ul style="text-align: justify;"&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Building Routing Table</title><link>http://ciscoelearning.blogspot.com/2009/03/introducing-routing-table-primary.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:41:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8209947969647571148</guid><description>&lt;div style="text-align: justify;"&gt;&lt;span style="font-weight: bold;"&gt;Introducing the Routing Table&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The primary function of a router is to forward a packet toward its destination network, which is the destination IP address of the packet. To do this, a router needs to search the routing information stored in its routing table.&lt;br /&gt;&lt;br /&gt;A &lt;span style="font-weight: bold;"&gt;routing table&lt;/span&gt; is a data file in RAM that is used to store route information about directly connected and remote networks. The routing table contains network/next hop associations. These associations tell a router that a particular destination can be optimally reached by sending the packet to a specific router that represents the "next hop" on the way to the final destination. The next hop association can also be the outgoing or exit interface to the final destination.&lt;br /&gt;&lt;br /&gt;The network/exit-interface association can also represent the destination network address of the IP packet. This association occurs on the router's directly connected networks.&lt;br /&gt;&lt;br /&gt;A directly connected network is a network that is directly attached to one of the router interfaces. When a router interface is configured with an IP address and subnet mask, the interface becomes a host on that attached network. The network address and subnet mask of the interface, along with the interface type and number, are entered into the routing table as a directly connected network. When a router forwards a packet to a host, such as a web server, that host is on the same network as a router's directly connected network.&lt;br /&gt;&lt;br /&gt;A remote network is a network that is not directly connected to the router. In other words, a remote network is a network that can only be reached by sending the packet to another router. Remote networks are added to the routing table using either a dynamic routing protocol or by configuring static routes. Dynamic routes are routes to remote networks that were learned automatically by the router, using a dynamic routing protocol. Static routes are routes to networks that a network administrator manually configured.&lt;br /&gt;&lt;br /&gt;Note: The &lt;span style="font-weight: bold;"&gt;routing table&lt;/span&gt;-with its directly-connected networks, static routes, and d&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;ynamic routes&lt;/a&gt;-will be introduced in the following sections and discussed in even greater detail throughout this course.&lt;br /&gt;&lt;br /&gt;The following analogies may help clarify the concept of connected, &lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;static&lt;/a&gt;, and &lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;dynamic routes&lt;/a&gt;:&lt;br /&gt;Directly Connected Routes - To visit a neighbor, you only have to go down the street on which you already live. This path is similar to a directly-connected route because the "destination" is available directly through your "connected interface," the street.&lt;br /&gt;Static Routes - A train uses the same railroad tracks every time for a specified route. This path is similar to a static route because the path to the destination is always the same.&lt;br /&gt;Dynamic Routes - When driving a car, you can "dynamically" choose a different path based on traffic, weather, or other conditions. This path is similar to a dynamic route because you can choose a new path at many different points on your way to the destination.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;The show ip route command&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As shown in the figure the routing table is displayed with the show ip route command. At this point, there have not been any static routes configured nor any dynamic routing protocol enabled. Therefore, the routing table for R1 only shows the router's directly connected networks. For each network listed in the routing table, the following information is included:&lt;br /&gt;C - The information in this column denotes the source of the route information, directly connected network, static route or a dynamic routing protocol. The C represents a directly connected route.&lt;br /&gt;192.168.1.0/24 - This is the network address and subnet mask of the directly connected or remote network. In this example, both entries in the routing table, 192.168.1./24 and 192.168.2.0/24, are directly connected networks.&lt;br /&gt;FastEthernet 0/0 - The information at the end of the route entry represents the exit interface and/or the IP address of the next-hop router. In this example, both FastEthernet 0/0 and Serial0/0/0 are the exit interfaces used to reach these networks.&lt;br /&gt;&lt;br /&gt;When the routing table includes a route entry for a remote network, additional information is included, such as the routing metric and the administrative distance. Routing metrics, administrative distance, and the show ip route command are explained in more detail in later chapters.&lt;br /&gt;&lt;br /&gt;PCs also have a routing table. In the figure, you can see the route print command output. The command reveals the configured or acquired default gateway, connected, loopback, multicast, and broadcast networks. The output from route print command will not be analyzed during this course. It is shown here to emphasize the point that all IP configured devices should have a routing table.&lt;br /&gt;Adding a Connected Network to the Routing Table&lt;br /&gt;&lt;br /&gt;As stated in the previous section, when a router's interface is configured with an IP address and subnet mask, that interface becomes a host on that network. For example, when the FastEthernet 0/0 interface on R1in the figure is configured with the IP address 192.168.1.1 and the subnet mask 255.255.255.0, the FastEthernet 0/0 interface becomes a member of the 192.168.1.0/24 network. Hosts that are attached to the same LAN, like PC1, are also configured with an IP address that belongs to the 192.168.1.0/24 network.&lt;br /&gt;&lt;br /&gt;When a PC is configured with a host IP address and subnet mask, the PC uses the subnet mask to determine what network it now belongs to. This is done by the operating system ANDing the host IP address and subnet mask. A router uses the same logic when an interface is configured.&lt;br /&gt;&lt;br /&gt;A PC is normally configured with a single host IP address because it only has a single network interface, usually an Ethernet NIC. Routers have multiple interfaces; therefore, each interface must be a member of a different network. In the figure, R1 is a member of two different networks: 192.168.1.0/24 and 192.168.2.0/24. Router R2 is also a member of two networks: 192.168.2.0/24 and 192.168.3.0/24.&lt;br /&gt;&lt;br /&gt;After the router's interface is configured and the interface is activated with the no shutdown command, the interface must receive a carrier signal from another device (router, switch, hub, etc.) before the interface state is considered "up." Once the interface is "up," the network of that interface is added to the routing table as a directly connected network.&lt;br /&gt;&lt;br /&gt;Before any static or dynamic routing is configured on a router, the router only knows about its own directly connected networks. These are the only networks that are displayed in the routing table until static or dynamic routing is configured. Directly connected networks are of prime importance for routing decisions. Static and dynamic routes cannot exist in the routing table without a router's own directly connected networks. The router cannot send packets out an interface if that interface is not enabled with an IP address and subnet mask, just as a PC cannot send IP packets out its Ethernet interface if that interface is not configured with an IP address and subnet mask.&lt;br /&gt;&lt;br /&gt;Note: The process of configuring &lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;router interfaces&lt;/a&gt; and adding network address to the r&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;outing table&lt;/a&gt; are discussed in the following chapter.&lt;br /&gt;&lt;span style="color: rgb(255, 153, 0); font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Basic Router Configuration</title><link>http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8924450294819805558</guid><description>&lt;div style="text-align: justify;"&gt;When configuring a router, certain basic tasks are performed including:&lt;br /&gt;Naming the router&lt;br /&gt;Setting passwords&lt;br /&gt;Configuring interfaces&lt;br /&gt;Configuring a banner&lt;br /&gt;Saving changes on a router&lt;br /&gt;Verifying basic configuration and router operations&lt;br /&gt;&lt;br /&gt;You should already be familiar with these configuration commands; however, we will do a brief review. We begin our review with the assumption that the router does not have a current startup-config file.&lt;br /&gt;&lt;br /&gt;The first prompt appears at user mode. User mode allows you to view the state of the router, but does not allow you to modify its configuration. Do not confuse the term "user" as used in user mode with users of the network. User mode is intended for the network technicians, operators, and engineers who have the responsibility to configure network devices.&lt;br /&gt;&lt;br /&gt;Router&gt;&lt;br /&gt;&lt;br /&gt;The enable command is used to enter the privileged EXEC mode. This mode allows the user to make configuration changes on the router. The router prompt will change from a "&gt;" to a "#" in this mode.&lt;br /&gt;&lt;br /&gt;Router&gt;enable&lt;br /&gt;Router#&lt;br /&gt;&lt;br /&gt;Hostnames and Passwords&lt;br /&gt;&lt;br /&gt;The figure shows the basic router configuration command syntax used to configure R1 in the following example. You can open Packet Tracer Activity 1.2.2 and follow along or wait until the end of this section to open it.&lt;br /&gt;&lt;br /&gt;First, enter the global configuration mode.&lt;br /&gt;&lt;br /&gt;Router#config t&lt;br /&gt;&lt;br /&gt;Next, apply a unique hostname to the router.&lt;br /&gt;&lt;br /&gt;Router(config)#hostname R1&lt;br /&gt;R1(config)#&lt;br /&gt;&lt;br /&gt;Now, configure a password that is to be used to enter privileged EXEC mode. In our lab environment, we will use the password class. However, in production environments, routers should have strong passwords. See the links at the end of this section for more information on creating and using strong passwords.&lt;br /&gt;&lt;br /&gt;Router(config)#enable secret class&lt;br /&gt;&lt;br /&gt;Next, configure the console and Telnet lines with the password cisco. Once again, the password cisco is used only in our lab environment. The command login enables password checking on the line. If you do not enter the command login on the console line, the user will be granted access to the line without entering a password.&lt;br /&gt;&lt;br /&gt;R1(config)#line console 0&lt;br /&gt;R1(config-line)#password cisco&lt;br /&gt;R1(config-line)#login&lt;br /&gt;R1(config)#line vty 0 4&lt;br /&gt;R1(config-line)#password cisco&lt;br /&gt;R1(config-line)#login&lt;br /&gt;&lt;br /&gt;Configuring a Banner&lt;br /&gt;&lt;br /&gt;From the global configuration mode, configure the message-of-the-day (motd) banner. A delimiting character, such as a "#" is used at the beginning and at the end of the message. The delimiter allows you to configure a multiline banner, as shown here.&lt;br /&gt;&lt;br /&gt;R1(config)#banner motd #&lt;br /&gt;Enter TEXT message. End with the character '#'.&lt;br /&gt;******************************************&lt;br /&gt;WARNING!! Unauthorized Access Prohibited!!&lt;br /&gt;******************************************&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that "welcomes" an unauthorized user.&lt;br /&gt;&lt;br /&gt;Links&lt;br /&gt;&lt;br /&gt;For discussions about using strong passwords, see:&lt;br /&gt;&lt;br /&gt;"Cisco Response to Dictionary Attacks on Cisco LEAP," at http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_bulletin09186a00801cc901.html#wp1002291&lt;br /&gt;&lt;br /&gt;"Strong passwords: How to create and use them," at http://www.microsoft.com/athome/security/privacy/password.mspx&lt;br /&gt;&lt;br /&gt;Router Interface Configuration&lt;br /&gt;&lt;br /&gt;You will now configure the individual router interfaces with IP addresses and other information. First, enter the interface configuration mode by specifying the interface type and number. Next, configure the IP address and subnet mask:&lt;br /&gt;&lt;br /&gt;R1(config)#interface Serial0/0&lt;br /&gt;R1(config-if)#ip address 192.168.2.1 255.255.255.0&lt;br /&gt;&lt;br /&gt;It is good practice to configure a description on each interface to help document the network information. The description text is limited to 240 characters. On production networks a description can be helpful in troubleshooting by providing information about the type of network that the interface is connected to and if there are any other routers on that network. If the interface connects to an ISP or service carrier, it is helpful to enter the third party connection and contact information; for example:&lt;br /&gt;&lt;br /&gt;Router(config-if)#description Ciruit#VBN32696-123 (help desk:1-800-555-1234)&lt;br /&gt;&lt;br /&gt;In lab environments, enter a simple description that will help in troubleshooting situations; for example:&lt;br /&gt;&lt;br /&gt;R1(config-if)#description Link to R2&lt;br /&gt;&lt;br /&gt;After configuring the IP address and description, the interface must be activated with the no shutdown command. This is similar to powering on the interface. The interface must also be connected to another device (a hub, a switch, another router, etc.) for the Physical layer to be active.&lt;br /&gt;&lt;br /&gt;Router(config-if)#no shutdown&lt;br /&gt;&lt;br /&gt;Note: When cabling a point-to-point serial link in our lab environment, one end of the cable is marked DTE and the other end is marked DCE. The router that has the DCE end of the cable connected to its serial interface will need the additional clock rate command configured on that serial interface. This step is only necessary in a lab environment and will be explained in more detail in Chapter 2, "Static Routing."&lt;br /&gt;&lt;br /&gt;R1(config-if)#clock rate 64000&lt;br /&gt;&lt;br /&gt;Repeat the interface configuration commands on all other interfaces that need to be configured. In our topology example, the FastEthernet interface needs to be configured.&lt;br /&gt;&lt;br /&gt;R1(config)#interface FastEthernet0/0&lt;br /&gt;R1(config-if)#ip address 192.168.1.1 255.255.255.0&lt;br /&gt;R1(config-if)#description R1 LAN&lt;br /&gt;R1(config-if)#no shutdown&lt;br /&gt;&lt;br /&gt;Each Interface Belongs to a Different Network&lt;br /&gt;&lt;br /&gt;At this point, note that each interface must belong to a different network. Although the IOS allows you to configure an IP address from the same network on two different interfaces, the router will not activate the second interface.&lt;br /&gt;&lt;br /&gt;For example, what if you attempt to configure the FastEthernet 0/1 interface on R1 with an IP address on the 192.168.1.0/24 network? FastEthernet 0/0 has already been assigned an address on that same network. If you attempt to configure another interface, FastEthernet 0/1, with an IP address that belongs to the same network, you will get the following message:&lt;br /&gt;&lt;br /&gt;R1(config)#interface FastEthernet0/1&lt;br /&gt;R1(config-if)#ip address 192.168.1.2 255.255.255.0&lt;br /&gt;192.168.1.0 overlaps with FastEthernet0/0&lt;br /&gt;&lt;br /&gt;If there is an attempt to enable the interface with the no shutdown command, the following message will appear:&lt;br /&gt;&lt;br /&gt;R1(config-if)#no shutdown&lt;br /&gt;192.168.1.0 overlaps with FastEthernet0/0&lt;br /&gt;FastEthernet0/1: incorrect IP address assignment&lt;br /&gt;&lt;br /&gt;Notice that the output from the show ip interface brief command shows that the second interface configured for the 192.168.1.0/24 network, FastEthernet 0/1, is still down.&lt;br /&gt;&lt;br /&gt;R1#show ip interface brief&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;FastEthernet0/1 192.168.1.2 YES manual administratively down down&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;Verifying Basic Router Configuration&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;Currently in the example, all of the previous basic router configuration commands have been entered and were immediately stored in the running configuration file of R1. The running-config file is stored in RAM and is the configuration file used by IOS. The next step is to verify the commands entered by displaying the running configuration with the following command:&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show running-config&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;Now that the basic configuration commands have been entered, it is important to save the running-config to the nonvolatile memory, the NVRAM of the router. That way, in case of a power outage or an accidental reload, the router will be able to boot with the current configuration. After the router's configuration has been completed and tested, it is important to save the running-config to the startup-config as the permanent configuration file.&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#copy running-config startup-config&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;After applying and saving the basic configuration, you can use several commands to verify that you have correctly configured the router. Click the appropriate button in the figure to see a listing of each command's output. All of these commands are discussed in detail in later chapters. For now, begin to become familiar with the output.&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show running-config&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;This command displays the current running configuration that is stored in RAM. With a few exceptions, all configuration commands that were used will be entered into the running-config and implemented immediately by the IOS. &lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show startup-config&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;This command displays the startup configuration file stored in NVRAM. This is the configuration that the router will use on the next reboot. This configuration does not change unless the current running configuration is saved to NVRAM with the copy running-config startup-config command. Notice in the figure that the startup configuration and the running configuration are identical. They are identical because the running configuration has not changed since the last time it was saved. Also notice that the show startup-config command also displays how many bytes of NVRAM the saved configuration is using.&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show ip route&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;This command displays the routing table that the IOS is currently using to choose the best path to its destination networks. At this point, R1 only has routes for its directly connected networks via its own interfaces.&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show interfaces&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;This command displays all of the interface configuration parameters and statistics. Some of this information is discussed later in the curriculum and in CCNP. &lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;R1#show ip interface brief&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;&lt;/output&gt;&lt;br /&gt;&lt;output omitted=""&gt;This command displays abbreviated interface configuration information, including IP address and interface status. This command is a useful tool for troubleshooting and a quick way to determine the status of all router interfaces.&lt;br /&gt;&lt;/output&gt;&lt;span style="color: rgb(255, 153, 0); font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Implementing Basic Addressing Schemes</title><link>http://ciscoelearning.blogspot.com/2009/03/implementing-basic-addressing-schemes.html</link><category>Addressing</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:34:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-5478801663848528801</guid><description>&lt;div style="text-align: justify;"&gt;When designing a new network or mapping an existing network, document the network. At a minimum, the documentation should include a topology diagram that indicates the physical connectivity and an addressing table that lists all of the following information:&lt;br /&gt;Device names&lt;br /&gt;Interfaces used in the design&lt;br /&gt;IP addresses and subnet masks&lt;br /&gt;Default gateway addresses for end devices, such as PCs&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Populating an Address Table &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The figure shows a network topology with the devices interconnected and configured with IP addresses. Under the topology is a table used to document the network. The table is partially populated with the data documenting the network (devices, IP addresses, subnet masks, and interfaces).&lt;br /&gt;&lt;br /&gt;&lt;a href="http://ciscoelearning.blogspot.com/search/label/Router"&gt;Router&lt;/a&gt; R1 and host PC1 are already documented. Finish populating the table and the blank spaces on the diagram dragging the pool of IP addresses shown below the table to the correct locations.&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Routers and the Network Layer</title><link>http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:30:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-3270083775392223210</guid><description>&lt;div style="text-align: justify;"&gt;The main purpose of a router is to connect multiple networks and forward packets destined either for its own networks or other networks. A router is considered a Layer 3 device because its primary forwarding decision is based on the information in the Layer 3 IP packet, specifically the destination IP address. This process is known as routing.&lt;br /&gt;&lt;br /&gt;When a router receives a packet, it examines its destination IP address. If the destination IP address does not belong to any of the router's directly connected networks, the router must forward this packet to another router. In the figure, R1 examines the destination IP address of the packet. After searching the routing table, R1 forwards the packet onto R2. When R2 receives the packet, it also examines the packet's destination IP address. After searching its routing table, R2 forwards the packet out its directly connected Ethernet network to PC2.&lt;br /&gt;&lt;br /&gt;When each router receives a packet, it searches its routing table to find the best match between the destination IP address of the packet and one of the network addresses in the routing table. Once a match is found, the packet is encapsulated in the layer 2 data link frame for that outgoing interface. The type of data link encapsulation depends on the type of interface, such as Ethernet or HDLC.&lt;br /&gt;&lt;br /&gt;Eventually the packet reaches a router that is part of a network that matches the destination IP address of the packet. In this example, router R2 receives the packet from R1. R2 forwards the packet out its Ethernet interface, which belongs to the same network as the destination device, PC2.&lt;br /&gt;&lt;br /&gt;This sequence of events is explained in more detail later in this chapter.&lt;br /&gt;Routers Operate at Layers 1, 2, and 3&lt;br /&gt;&lt;br /&gt;A router makes its primary forwarding decision at Layer 3, but as we saw earlier, it participates in Layer 1 and Layer 2 processes as well. After a router has examined the destination IP address of a packet and consulted its routing table to make its forwarding decision, it can forward that packet out the appropriate interface toward its destination. The router encapsulates the Layer 3 IP packet into the data portion of a Layer 2 data link frame appropriate for the exit interface. The type of frame can be an Ethernet, HDLC, or some other Layer 2 encapsulation - whatever encapsulation is used on that particular interface. The Layer 2 frame is encoded into the Layer 1 physical signals that are used to represent bits over the physical link.&lt;br /&gt;&lt;br /&gt;To understand this process better, refer to the figure. Notice that PC1 operates at all seven layers, encapsulating the data and sending the frame out as a stream of encoded bits to R1, its default gateway.&lt;br /&gt;&lt;br /&gt;R1 receives the stream of encoded bits on its interface. The bits are decoded and passed up to Layer 2, where R1 decapsulates the frame. The router examines the destination address of the data link frame to determine if it matches the receiving interface, including a broadcast or multicast address. If there is a match with the data portion of the frame, the IP packet is passed up to Layer 3, where R1 makes its routing decision. R1 then re-encapsulates the packet into a new Layer 2 data link frame and forwards it out the outbound interface as a stream of encoded bits.&lt;br /&gt;&lt;br /&gt;R2 receives the stream of bits, and the process repeats itself. R2 decapsulates the frame and passes the data portion of the frame, the IP packet, to Layer 3 where R2 makes its routing decision. R2 then re-encapsulates the packet into a new Layer 2 data link frame and forwards it out the outbound interface as a stream of encoded bits.&lt;br /&gt;&lt;br /&gt;This process is repeated once again by router R3, which forwards the IP packet, encapsulated inside a data link frame and encoded as bits, to PC2.&lt;br /&gt;&lt;br /&gt;Each router in the path from source to destination performs this same process of decapsulation, searching the routing table, and then re-encapsulation. This process is important to your understanding of how routers participate in networks. Therefore, we will revisit this discussion in more depth in a later section.&lt;br /&gt;&lt;span style="color: rgb(255, 153, 0); font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Router Interface</title><link>http://ciscoelearning.blogspot.com/2009/03/router-interface.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:27:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-4829596771935967267</guid><description>&lt;div style="text-align: justify;"&gt;Management Ports&lt;br /&gt;&lt;br /&gt;Routers have physical connectors that are used to manage the router. These connectors are known as management ports. Unlike Ethernet and serial interfaces, management ports are not used for packet forwarding. The most common management port is the console port. The console port is used to connect a terminal, or most often a PC running terminal emulator software, to configure the router without the need for network access to that router. The console port must be used during initial configuration of the router.&lt;br /&gt;&lt;br /&gt;Another management port is the auxiliary port. Not all routers have auxiliary ports. At times the auxiliary port can be used in ways similar to a console port. It can also be used to attach a modem. Auxiliary ports will not be used in this curriculum.&lt;br /&gt;&lt;br /&gt;The figure shows the console and AUX ports on the router.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Router Interfaces&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The term interface on Cisco routers refers to a physical connector on the router whose main purpose is to receive and forward packets. Routers have multiple interfaces that are used to connect to multiple networks. Typically, the interfaces connect to various types of networks, which means that different types of media and connectors are required. Often a router will need to have different types of interfaces. For example, a router usually has FastEthernet interfaces for connections to different LANs and various types of WAN interfaces to connect a variety of serial links including T1, DSL and ISDN. The figure shows the FastEthernet and serial interfaces on the router.&lt;br /&gt;&lt;br /&gt;Like interfaces on a PC, the ports and interfaces on a router are located on the outside of the router. Their external location allows for convenient attachment to the appropriate network cables and connectors.&lt;br /&gt;&lt;br /&gt;Note: A single interface on a router can be used to connect to multiple networks; however, this is beyond the scope of this course and is discussed in a later course.&lt;br /&gt;&lt;br /&gt;Like most networking devices, Cisco routers use LED indicators to provide status information. An interface LED indicates the activity of the corresponding interface. If an LED is off when the interface is active and the interface is correctly connected, this may be an indication of a problem with that interface. If an interface is extremely busy, its LED will always be on. Depending on the type of router, there may be other LEDs as well. For more information on LED displays on the 1841, see the link below.&lt;br /&gt;&lt;br /&gt;Links&lt;br /&gt;&lt;br /&gt;"Troubleshooting Cisco 1800 Series Routers (Modular)," http://www.cisco.com/en/US/products/ps5853/products_installation_guide_chapter09186a00802c36b8.html&lt;br /&gt;Interfaces Belong to Different Networks&lt;br /&gt;&lt;br /&gt;As shown in the figure, every interface on the router is a member or host on a different IP network. Each interface must be configured with an IP address and subnet mask of a different network. Cisco IOS will not allow two active interfaces on the same router to belong to the same network.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Router interfaces&lt;/span&gt; can be divided into two major groups:&lt;br /&gt;LAN interfaces - such as Ethernet and FastEthernet&lt;br /&gt;WAN interfaces - such as serial, ISDN, and Frame Relay&lt;br /&gt;&lt;br /&gt;LAN Interfaces&lt;br /&gt;&lt;br /&gt;As the name indicates, LAN interfaces are used to connect the router to the LAN, similar to how a PC Ethernet NIC is used to connect the PC to the Ethernet LAN. Like a PC Ethernet NIC, a router Ethernet interface also has a Layer 2 MAC address and participates in the Ethernet LAN in the same way as any other hosts on that LAN. For example, a router Ethernet interface participates in the ARP process for that LAN. The router maintains an ARP cache for that interface, sends ARP requests when needed, and responds with ARP replies when required.&lt;br /&gt;&lt;br /&gt;A router Ethernet interface usually uses an RJ-45 jack that supports unshielded twisted-pair (UTP) cabling. When a router is connected to a switch, a straight-through cable is used. When two routers are connected directly through the Ethernet interfaces, or when a PC NIC is connected directly to a router Ethernet interface, a crossover cable is used.&lt;br /&gt;&lt;br /&gt;Use the Packet Tracer Activity later in this section to test your cabling skills.&lt;br /&gt;&lt;br /&gt;WAN Interfaces&lt;br /&gt;&lt;br /&gt;WAN interfaces are used to connect routers to external networks, usually over a larger geographical distance. The Layer 2 encapsulation can be of different types, such as PPP, Frame Relay, and HDLC (High-Level Data Link Control). Similar to LAN interfaces, each WAN interface has its own IP address and subnet mask, which identifies it as a member of a specific network.&lt;br /&gt;&lt;br /&gt;Note: MAC addresses are used on LAN interfaces, such as Ethernet, and are not used on WAN interfaces. However, WAN interfaces use their own Layer 2 addresses depending on the technology. Layer 2 WAN encapsulation types and addresses are covered in a later course.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Router Interfaces&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The router in the figure has four interfaces. Each interface has a Layer 3 IP address and subnet mask that configures it for a different network. The Ethernet interfaces also have Layer 2 Ethernet MAC addresses.&lt;br /&gt;&lt;br /&gt;The WAN interfaces are using different Layer 2 encapsulations. Serial 0/0/0 is using HDLC and Serial 0/0/1 is using PPP. Both of these serial point-to-point protocols use a broadcast address for the Layer 2 destination address when encapsulating the IP packet into a data link frame.&lt;br /&gt;&lt;br /&gt;In the lab environment, you are restricted as to how many LAN and WAN interfaces you can use to configure hands-on labs. With Packet Tracer, however, you have the flexibility to create more complex network designs.&lt;br /&gt;&lt;span style="color: rgb(255, 153, 0); font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Router Bootup Process</title><link>http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html</link><category>Inside Routing</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:22:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-615330235368743797</guid><description>There are four major phases to the bootup process:&lt;br /&gt;&lt;br /&gt;1. Performing the POST&lt;br /&gt;&lt;br /&gt;2. Loading the bootstrap program&lt;br /&gt;&lt;br /&gt;3. Locating and loading the Cisco IOS software&lt;br /&gt;&lt;br /&gt;4. Locating and loading the startup configuration file or entering setup mode&lt;br /&gt;&lt;br /&gt;1. Performing the POST&lt;br /&gt;&lt;br /&gt;The Power-On Self Test (POST) is a common process that occurs on almost every computer during bootup. The POST process is used to test the router hardware. When the router is powered on, software on the ROM chip conducts the POST. During this self-test, the router executes diagnostics from ROM on several hardware components including the CPU, RAM, and NVRAM. After the POST has been completed, the router executes the bootstrap program.&lt;br /&gt;&lt;br /&gt;2. Loading the Bootstrap Program&lt;br /&gt;&lt;br /&gt;After the POST, the bootstrap program is copied from ROM into RAM. Once in RAM, the CPU executes the instructions in the bootstrap program. The main task of the bootstrap program is to locate the Cisco IOS and load it into RAM.&lt;br /&gt;&lt;br /&gt;Note: At this point, if you have a console connection to the router, you will begin to see output on the screen.&lt;br /&gt;&lt;br /&gt;3. Locating and Loading Cisco IOS&lt;br /&gt;&lt;br /&gt;Locating the Cisco IOS software. The IOS is typically stored in flash memory, but can also be stored in other places such as a TFTP (Trivial File Transfer Protocol) server.&lt;br /&gt;&lt;br /&gt;If a full IOS image can not be located, a scaled-down version of the IOS is copied from ROM into RAM. This version of IOS is used to help diagnose any problems and can be used to load a complete version of the IOS into RAM.&lt;br /&gt;&lt;br /&gt;Note: A TFTP server is usually used as a backup server for IOS but it can also be used as a central point for storing and loading the IOS. IOS management and using the TFTP server is discussed in a later course.&lt;br /&gt;&lt;br /&gt;Loading the IOS. Some of the older Cisco routers ran the IOS directly from flash, but current models copy the IOS into RAM for execution by the CPU.&lt;br /&gt;&lt;br /&gt;Note: Once the IOS begins to load, you may see a string of pounds signs (#), as shown in the figure, while the image decompresses.&lt;br /&gt;&lt;br /&gt;4. Locating and Loading the Configuration File&lt;br /&gt;&lt;br /&gt;Locating the Startup Configuration File. After the IOS is loaded, the bootstrap program searches for the startup configuration file, known as startup-config, in NVRAM. This file has the previously saved configuration commands and parameters including:&lt;br /&gt;interface addresses&lt;br /&gt;routing information&lt;br /&gt;passwords&lt;br /&gt;any other configurations saved by the network administrator&lt;br /&gt;&lt;br /&gt;If the startup configuration file, startup-config, is located in NVRAM, it is copied into RAM as the running configuration file, running-config.&lt;br /&gt;&lt;br /&gt;Note: If the startup configuration file does not exist in NVRAM, the router may search for a TFTP server. If the router detects that it has an active link to another configured router, it sends a broadcast searching for a configuration file across the active link. This condition will cause the router to pause, but you will eventually see a console message like the following one:&lt;br /&gt;&lt;br /&gt;&lt;router&gt;&lt;br /&gt;&lt;br /&gt;%Error opening tftp://255.255.255.255/network-confg (Timed out)&lt;br /&gt;%Error opening tftp://255.255.255.255/cisconet.cfg (Timed out)&lt;br /&gt;&lt;br /&gt;Executing the Configuration File. If a startup configuration file is found in NVRAM, the IOS loads it into RAM as the running-config and executes the commands in the file, one line at a time. The running-config file contains interface addresses, starts routing processes, configures router passwords and defines other characteristics of the router.&lt;br /&gt;&lt;br /&gt;Enter Setup Mode (Optional). If the startup configuration file can not be located, the router prompts the user to enter setup mode. Setup mode is a series of questions prompting the user for basic configuration information. Setup mode is not intended to be used to enter complex router configurations, and it is not commonly used by network administrators.&lt;br /&gt;&lt;br /&gt;When booting a router that does not contain a startup configuration file, you will see the following question after the IOS has been loaded:&lt;br /&gt;&lt;br /&gt;Would you like to enter the initial configuration dialog? [yes/no]: no&lt;br /&gt;&lt;br /&gt;Setup mode will not be used in this course to configure the router. When prompted to enter setup mode, always answer no. If you answer yes and enter setup mode, you can press Ctrl-C at any time to terminate the setup process.&lt;br /&gt;&lt;br /&gt;When setup mode is not used, the IOS creates a default running-config. The default running-config is a basic configuration file that includes the router interfaces, management interfaces, and certain default information. The default running-config does not contain any interface addresses, routing information, passwords, or other specific configuration information.&lt;br /&gt;&lt;br /&gt;Command Line Interface&lt;br /&gt;&lt;br /&gt;Depending on the platform and IOS, the router may ask the following question before displaying the prompt:&lt;br /&gt;&lt;br /&gt;Would you like to terminate autoinstall? [yes]: &lt;enter&gt;&lt;br /&gt;Press the Enter key to accept the default answer.&lt;br /&gt;Router&gt;&lt;br /&gt;&lt;br /&gt;Note: If a startup configuration file was found, the running-config may contain a hostname and the prompt will display the hostname of the router.&lt;br /&gt;&lt;br /&gt;Once the prompt displays, the router is now running the IOS with the current running configuration file. The network administrator can now begin using IOS commands on this router.&lt;br /&gt;&lt;br /&gt;Note: The bootup process is discussed in more detail in a later course.&lt;br /&gt;Verifying Router Bootup Process&lt;br /&gt;&lt;br /&gt;The show version command can be used to help verify and troubleshoot some of the basic hardware and software components of the router. The show version command displays information about the version of the Cisco IOS software currently running on the router, the version of the bootstrap program, and information about the hardware configuration, including the amount of system memory.&lt;br /&gt;&lt;br /&gt;The output from the show version command includes:&lt;br /&gt;&lt;br /&gt;IOS version&lt;br /&gt;&lt;br /&gt;Cisco Internetwork Operating System Software&lt;br /&gt;IOS (tm) C2600 Software (C2600-I-M), Version 12.2(28), RELEASE SOFTWARE (fc5)&lt;br /&gt;&lt;br /&gt;This is the version of the Cisco IOS software in RAM and that is being used by the router.&lt;br /&gt;&lt;br /&gt;ROM Bootstrap Program&lt;br /&gt;&lt;br /&gt;ROM: System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)&lt;br /&gt;&lt;br /&gt;This shows the version of the system bootstrap software, stored in ROM memory, that was initially used to boot up the router.&lt;br /&gt;&lt;br /&gt;Location of IOS&lt;br /&gt;&lt;br /&gt;System image file is "flash:c2600-i-mz.122-28.bin"&lt;br /&gt;&lt;br /&gt;This shows where the boostrap program is located and loaded the Cisco IOS, and the complete filename of the IOS image.&lt;br /&gt;&lt;br /&gt;CPU and Amount of RAM&lt;br /&gt;&lt;br /&gt;cisco 2621 (MPC860) processor (revision 0x200) with 60416K/5120K bytes of memory&lt;br /&gt;&lt;br /&gt;The first part of this line displays the type of CPU on this router. The last part of this line displays the amount of DRAM. Some series of routers, like the 2600, use a fraction of DRAM as packet memory. Packet memory is used for buffering packets.&lt;br /&gt;&lt;br /&gt;To determine the total amount of DRAM on the router, add both numbers. In this example, the Cisco 2621 router has 60,416 KB (kilobytes) of free DRAM used for temporarily storing the Cisco IOS and other system processes. The other 5,120 KB is dedicated for packet memory. The sum of these numbers is 65,536K, or 64 megabytes (MB) of total DRAM.&lt;br /&gt;&lt;br /&gt;Note: It may be necessary to upgrade the amount of RAM when upgrading the IOS.&lt;br /&gt;&lt;br /&gt;Interfaces&lt;br /&gt;&lt;br /&gt;2 FastEthernet/IEEE 802.3 interface(s)&lt;br /&gt;2 Low-speed serial(sync/async) network interface(s)&lt;br /&gt;&lt;br /&gt;This section of the output displays the physical interfaces on the router. In this example, the Cisco 2621 router has two FastEthernet interfaces and two low-speed serial interfaces.&lt;br /&gt;&lt;br /&gt;Amount of NVRAM&lt;br /&gt;&lt;br /&gt;32K bytes of non-volatile configuration memory.&lt;br /&gt;&lt;br /&gt;This is the amount of NVRAM on the router. NVRAM is used to store the startup-config file.&lt;br /&gt;&lt;br /&gt;Amount of Flash&lt;br /&gt;&lt;br /&gt;16384K bytes of processor board System flash (Read/Write)&lt;br /&gt;&lt;br /&gt;This is the amount of flash memory on the router. Flash is used to permanently store the Cisco IOS.&lt;br /&gt;&lt;br /&gt;Note: It may be necessary to upgrade the amount of flash when upgrading the IOS.&lt;br /&gt;&lt;br /&gt;Configuration Register&lt;br /&gt;&lt;br /&gt;Configuration register is 0x2102&lt;br /&gt;&lt;br /&gt;The last line of the show version command displays the current configured value of the software configuration register in hexadecimal. If there is a second value displayed in parentheses, it denotes the configuration register value that will be used during the next reload.&lt;br /&gt;&lt;br /&gt;The configuration register has several uses, including password recovery. The factory default setting for the configuration register is 0x2102. This value indicates that the router will attempt to load a Cisco IOS software image from flash memory and load the startup configuration file from NVRAM.&lt;br /&gt;&lt;br /&gt;Note: The configuration register is discussed in more detail in a later course.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Internetwork Operating System</title><link>http://ciscoelearning.blogspot.com/2009/03/internetwork-operating-system.html</link><category>Inside Routing</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:20:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-388703708136936522</guid><description>The operating system software used in Cisco routers is known as Cisco Internetwork Operating System (IOS). Like any operating system on any computer, Cisco IOS manages the hardware and software resources of the router, including memory allocation, processes, security, and file systems. Cisco IOS is a multitasking operating system that is integrated with routing, switching, internetworking, and telecommunications functions.&lt;br /&gt;&lt;br /&gt;Although the Cisco IOS may appear to be the same on many routers, there are many different IOS images. An IOS image is a file that contains the entire IOS for that router. Cisco creates many different types of IOS images, depending upon the model of the router and the features within the IOS. Typically the more features in the IOS, the larger the IOS image, and therefore, the more flash and RAM that is required to store and load the IOS. For example, some features include the ability to run IPv6 or the ability for the router to perform NAT (Network Address Translation).&lt;br /&gt;&lt;br /&gt;As with other operating systems Cisco IOS has its own user interface. Although some routers provide a graphical user interface (GUI), the command line interface (CLI) is a much more common method of configuring Cisco routers. The CLI is used throughout this curriculum.&lt;br /&gt;&lt;br /&gt;Upon bootup, the startup-config file in NVRAM is copied into RAM and stored as the running-config file. IOS executes the configuration commands in the running-config. Any changes entered by the network administrator are stored in the running-config and are immediately implemented by the IOS. In this chapter, we will review some of the basic IOS commands used to configure a Cisco router. In later chapters, we will learn the commands used to configure, verify, and troubleshoot static routing and various routing protocols such as RIP, EIGRP, and OSPF.&lt;br /&gt;&lt;br /&gt;Note: Cisco IOS and the bootup process is discussed in more detail in a later course.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Router CPU And Memory</title><link>http://ciscoelearning.blogspot.com/2009/03/router-cpu-and-memory.html</link><category>Router And Memory</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:18:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8108637348123035315</guid><description>Router Components and their Functions&lt;br /&gt;&lt;br /&gt;Like a PC, a router also includes:&lt;br /&gt;Central Processing Unit (CPU)&lt;br /&gt;Random-Access Memory (RAM)&lt;br /&gt;Read-Only Memory (ROM)&lt;br /&gt;&lt;br /&gt;Roll over components in the figure to see a brief description of each.&lt;br /&gt;&lt;br /&gt;CPU&lt;br /&gt;&lt;br /&gt;The CPU executes operating system instructions, such as system initialization, routing functions, and switching functions.&lt;br /&gt;&lt;br /&gt;RAM&lt;br /&gt;&lt;br /&gt;RAM stores the instructions and data needed to be executed by the CPU. RAM is used to store these components:&lt;br /&gt;Operating System: The Cisco IOS (Internetwork Operating System) is copied into RAM during bootup.&lt;br /&gt;Running Configuration File: This is the configuration file that stores the configuration commands that the router IOS is currently using. With few exceptions, all commands configured on the router are stored in the running configuration file, known as running-config.&lt;br /&gt;IP Routing Table: This file stores information about directly connected and remote networks. It is used to determine the best path to forward the packet.&lt;br /&gt;ARP Cache: This cache contains the IPv4 address to MAC address mappings, similar to the ARP cache on a PC. The ARP cache is used on routers that have LAN interfaces such as Ethernet interfaces.&lt;br /&gt;Packet Buffer: Packets are temporarily stored in a buffer when received on an interface or before they exit an interface.&lt;br /&gt;&lt;br /&gt;RAM is volatile memory and loses its content when the router is powered down or restarted. However, the router also contains permanent storage areas, such as ROM, flash and NVRAM.&lt;br /&gt;&lt;br /&gt;ROM&lt;br /&gt;&lt;br /&gt;ROM is a form of permanent storage. Cisco devices use ROM to store:&lt;br /&gt;The bootstrap instructions&lt;br /&gt;Basic diagnostic software&lt;br /&gt;Scaled-down version of IOS.&lt;br /&gt;&lt;br /&gt;ROM uses firmware, which is software that is embedded inside the integrated circuit. Firmware includes the software that does not normally need to be modified or upgraded, such as the bootup instructions. Many of these features, including ROM monitor software, will be discussed in a later course. ROM does not lose its contents when the router loses power or is restarted.&lt;br /&gt;&lt;br /&gt;Flash Memory&lt;br /&gt;&lt;br /&gt;Flash memory is nonvolatile computer memory that can be electrically stored and erased. Flash is used as permanent storage for the operating system, Cisco IOS. In most models of Cisco routers, the IOS is permanently stored in flash memory and copied into RAM during the bootup process, where it is then executed by the CPU. Some older models of Cisco routers run the IOS directly from flash. Flash consists of SIMMs or PCMCIA cards, which can be upgraded to increase the amount of flash memory.&lt;br /&gt;&lt;br /&gt;Flash memory does not lose its contents when the router loses power or is restarted.&lt;br /&gt;&lt;br /&gt;NVRAM&lt;br /&gt;&lt;br /&gt;NVRAM (Nonvolatile RAM) does not lose its information when power is turned off. This is in contrast to the most common forms of RAM, such as DRAM, that requires continual power to maintain its information. NVRAM is used by the Cisco IOS as permanent storage for the startup configuration file (startup-config). All configuration changes are stored in the running-config file in RAM, and with few exceptions, are implemented immediately by the IOS. To save those changes in case the router is restarted or loses power, the running-config must be copied to NVRAM, where it is stored as the startup-config file. NVRAM retains its contents even when the router reloads or is powered off.&lt;br /&gt;&lt;br /&gt;ROM, RAM, NVRAM, and flash are discussed in the following section which introduces the IOS and the bootup process. They are also discussed in more detail in a later course relative to managing the IOS.&lt;br /&gt;&lt;br /&gt;It is more important for a networking professional to understand the function of the main internal components of a router than the exact location of those components inside a specific router. The internal physical architecture will differ from model to model.&lt;br /&gt;&lt;br /&gt;Links&lt;br /&gt;&lt;br /&gt;View the "Cisco 1800 Series Portfolio Multimedia Demo," http://www.cisco.com/en/US/products/ps5875/index.html</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Inside Routing</title><link>http://ciscoelearning.blogspot.com/2009/03/inside-routing.html</link><category>Inside Routing</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:14:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-923379256373066152</guid><description>Routers are Computers&lt;br /&gt;&lt;br /&gt;A router is a computer, just like any other computer including a PC. The very first router, used for the Advanced Research Projects Agency Network (ARPANET), was the Interface Message Processor (IMP). The IMP was a Honeywell 316 minicomputer; this computer brought the ARPANET to life on August 30, 1969.&lt;br /&gt;&lt;br /&gt;Note: The ARPANET was developed by Advanced Research Projects Agency (ARPA) of the United States Department of Defense. The ARPANET was the world's first operational packet switching network and the predecessor of today's Internet.&lt;br /&gt;&lt;br /&gt;Routers have many of the same hardware and software components that are found in other computers including:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;CPU&lt;/li&gt;&lt;li&gt;RAM&lt;/li&gt;&lt;li&gt;ROM&lt;/li&gt;&lt;li&gt;Operating System&lt;/li&gt;&lt;/ul&gt;Typical users may be unaware of the presence of numerous routers in their own network or in the Internet. Users expect to be able to access web pages, send e-mails, and download music - whether the server they are accessing is on their own network or on another network half-way around the world. However, networking professionals know it is the router that is responsible for forwarding packets from network-to-network, from the original source to the final destination.&lt;br /&gt;&lt;br /&gt;A router connects multiple networks. This means that it has multiple interfaces that each belong to a different IP network. When a router receives an IP packet on one interface, it determines which interface to use to forward the packet onto its destination. The interface that the router uses to forward the packet may be the network of the final destination of the packet (the network with the destination IP address of this packet), or it may be a network connected to another router that is used to reach the destination network.&lt;br /&gt;&lt;br /&gt;Each network that a router connects to typically requires a separate interface. These interfaces are used to connect a combination of both Local Area Networks (LANs) and Wide Area Networks (WANs). LANs are commonly Ethernet networks that contain devices such as PCs, printers, and servers. WANs are used to connect networks over a large geographical area. For example, a WAN connection is commonly used to connect a LAN to the Internet Service Provider (ISP) network.&lt;br /&gt;&lt;br /&gt;In the figure, we see that routers R1 and R2 are responsible for receiving the packet on one network and forwarding the packet out another network toward the destination network.&lt;br /&gt;The primary responsibility of a router is to direct packets destined for local and remote networks by:&lt;br /&gt;Determining the best path to send packets&lt;br /&gt;Forwarding packets toward their destination&lt;br /&gt;&lt;br /&gt;The router uses its routing table to determine the best path to forward the packet. When the router receives a packet, it examines its destination IP address and searches for the best match with a network address in the router's routing table. The routing table also includes the interface to be used to forward the packet. Once a match is found, the router encapsulates the IP packet into the data link frame of the outgoing or exit interface, and the packet is then forwarded toward its destination.&lt;br /&gt;&lt;br /&gt;It is very likely that a router will receive a packet that is encapsulated in one type of data link frame, such as an Ethernet frame and when forwarding the packet, the router will encapsulate it in a different type of data link frame, such as Point-to-Point Protocol (PPP). The data link encapsulation depends on the type of interface on the router and the type of medium it connects to. The different data link technologies that a router connects to can include LAN technologies, such as Ethernet, and WAN serial connections, such as T1 connection using PPP, Frame Relay, and Asynchronous Transfer Mode (ATM).&lt;br /&gt;&lt;br /&gt;In the figure, we can follow a packet from the source PC to the destination PC. Notice that it is the responsibility of the router to find the destination network in its routing table and forward the packet on toward its destination. In this example, router R1 receives the packet encapsulated in an Ethernet frame. After decapsulating the packet, R1 uses the destination IP address of the packet to search its routing table for a matching network address. After a destination network address is found in the routing table, R1 encapsulates the packet inside a PPP frame and forwards the packet to R2. A similar process is performed by R2.&lt;br /&gt;&lt;br /&gt;Static routes and &lt;a href="http://ciscoelearning.blogspot.com/search/label/Dinamyc%20Routing"&gt;dynamic routing&lt;/a&gt; protocols are used by routers to learn about remote networks and build their routing tables. These routes and protocols are the primary focus of the course and will be discussed in detail in later chapters along with the process that routers use in searching their routing tables and forwarding the packets.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Introducing Routing And Packet Forwading</title><link>http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html</link><category>Routing And Packet Forwading</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Mon, 2 Mar 2009 07:09:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-3192041090909195213</guid><description>Today's networks have a significant impact on our lives - changing the way we live, work, and play. Computer networks - and in a larger context the Internet - allow people to communicate, collaborate, and interact in ways they never did before. We use the network in a variety of ways, including web applications, IP telephony, video conferencing, interactive gaming, electronic commerce, education, and more. &lt;br /&gt;&lt;br /&gt;At the center of the network is the router. Stated simply, a router connects one network to another network. Therefore, the router is responsible for the delivery of packets across different networks. The destination of the IP packet might be a web server in another country or an e-mail server on the local area network. It is the responsibility of the routers to deliver those packets in a timely manner. The effectiveness of internetwork communications depends, to a large degree, on the ability of routers to forward packets in the most efficient way possible.&lt;br /&gt;&lt;br /&gt;Routers are now being added to satellites in space. These routers will have the ability to route IP traffic between satellites in space in much the same way that packets are moved on Earth, thereby reducing delays and offering greater networking flexibility.&lt;br /&gt;&lt;br /&gt;In addition to packet forwarding, a router provides other services as well. To meet the demands on today's networks, routers are also used to:&lt;br /&gt;Ensure 24x7 (24 hours a day, 7 days a week) availability. To help guarantee network reachability, routers use alternate paths in case the primary path fails.&lt;br /&gt;Provide integrated services of data, video, and voice over wired and wireless networks. Routers use Quality of service (QoS) prioritization of IP packets to ensure that real-time traffic, such as voice, video and critical data are not dropped or delayed.&lt;br /&gt;Mitigate the impact of worms, viruses, and other attacks on the network by permitting or denying the forwarding of packets.&lt;br /&gt;&lt;br /&gt;All of these services are built around the router and its primary responsibility of forwarding packets from one network to the next. It is only because of the router's ability to route packets between networks that devices on different networks can communicate. This chapter will introduce you to the router, its role in the networks, its main hardware and software components, and the routing process itself.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cable Access (Ethernet Interfaces)</title><link>http://ciscoelearning.blogspot.com/2009/01/cable-access-ethernet-interfaces.html</link><category>Cable</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Fri, 16 Jan 2009 06:52:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-5281190959296132799</guid><description>Cable access can be deployed easily. The vast majority of providers deliver a CPE device (cable modem) that terminates the coax network frequency bands that carry data, TV, and telephony, and provide a standard Ethernet/POTS/ISDN interface as the demarcation point.&lt;br /&gt;&lt;script type="text/javascript"&gt;&lt;!--&lt;br /&gt;google_ad_client = "pub-3959395381094144";&lt;br /&gt;/* 336x280, dibuat 08/12/22 */&lt;br /&gt;google_ad_slot = "0043690011";&lt;br /&gt;google_ad_width = 336;&lt;br /&gt;google_ad_height = 280;&lt;br /&gt;//--&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;&lt;script type="text/javascript"&lt;br /&gt;src="http://pagead2.googlesyndication.com/pagead/show_ads.js"&gt;&lt;br /&gt;&lt;/script&gt;&lt;br /&gt;To get telephony out of the RF side, an additional termination unit is needed. In contrast to DSL architectures, no additional software or stack components (PPTP, PPPoA, PPPoE) are required on the attached end system or gateway. The cable modem connects via coaxial drop and trunk cables as well as signal repeaters to a carrier's cable head-end. Mixed architectures featuring optical-electrical converters for optical trunk cables are used, too. In contrast to DSL, this is a shared medium; therefore, VLAN architectures and MAC-based access control are commonly deployed and addresses delivered to the customer via Dynamic Host Configuration Protocol (DHCP).</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>DSL Access</title><link>http://ciscoelearning.blogspot.com/2009/01/dsl-access.html</link><category>Cable</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Fri, 16 Jan 2009 06:35:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-8075500807675436091</guid><description>Historically, DSL has been an asymmetric service (ADSL), evolving into a symmetric one (G.SHDSL) designed to replace E1 TDM circuits and provide voice, ATM, raw IP, and ISDN transport.&lt;br /&gt;&lt;br /&gt;DSL copper cables are terminated at a central office (CO) DSLAM port (digital subscriber access line multiplexer). The DSLAM serves two purposes:&lt;br /&gt;&lt;br /&gt;One is to physically terminate the subscriber line and separate the voice band from the data bands utilizing an integrated splitter device similar to the one on the customer end; the voice signal is delivered directly to the PSTN network on OSI Layer 1.&lt;br /&gt;&lt;br /&gt;The second purpose is to relay the data traffic to an IP backbone, usually based on ATM or Ethernet. Aggregation and service-selection gateways constitute the distribution layer of modern DSL provider architectures.&lt;br /&gt;&lt;br /&gt;Almost all open-source UNIX operating systems provide mature PPTP support required for the PPPoA architectures that are popular in some European countries. Linux, OpenBSD, and FreeBSD support native PPPoE. PPPoA or PPPoE support of your favorite operating system usually requires a modified/patched version of the PPP toolset. Discussion goes beyond the scope of this book, but you can find easily several cookbooks for setup via your favorite search engine or Linux repository. Several DSL NICs are also available (ATM25, splitterless operation). Some of their important characteristics are as follows:&lt;br /&gt;&lt;br /&gt;DSL modes of operation: PPPoA, PPPoE, bridging mode&lt;br /&gt;&lt;br /&gt;DSL flavors: ADSL, HDSL, SDSL, G.SHDSL, G.Lite, VDSL, and so on&lt;br /&gt;&lt;br /&gt;Software requirements of DSL access: PPPoE or PPPoA stack support, PPTP (for example, via Netgraph/mpd daemon under FreeBSD)</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Route Cloning</title><link>http://ciscoelearning.blogspot.com/2009/01/route-cloning.html</link><category>Router</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Fri, 16 Jan 2009 06:33:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-7590231126889511148</guid><description>&lt;div style="text-align: justify;"&gt;         Cloned routes are a concept unique to BSD networks stacks. The concept refers to on-demand generation (cloning) of host routes (/32). In other words (quoted from the FreeBSD arp(4) manual page), "The ARP cache is stored in the system routing table as dynamically created host routes. The route to a directly attached Ethernet network is installed as a 'cloning' route (one with the RTF_CLONING flag set), causing routes to individual hosts on that network to be created on demand."[1] The actual cloning template (or parent) is marked with (C = generate new routes on use), the instantiated cloned host route (child) with (W = was cloned) in the system routing table. The associated ref_counter indicates how many existing connections use that particular entry, which is also correlated with an expire_timer (usually 3600 seconds). Cloned routes time out periodically after initial validation as long as they are not used.
&lt;br /&gt;
&lt;br /&gt;Examples 8-3 through 8-5 show the differences in arp and netstat command output on OpenBSD, Linux, and FreeBSD operating systems to demonstrate the connection between next-hop/interface Media Access Control (MAC) resolution and similarities between route and netstat commands. In addition, interface statistics with netstat are presented, as are usage statistics of routing table entries. All routing tables present prefix entries, flags, a reference counter for the number of uses of a prefix, and a usage counter for the number of packets that were forwarded along that route out of the associated physical interface. Additional parameters of netstat output are system-specific.
&lt;br /&gt;
&lt;br /&gt;Example 8-3. OpenBSD arp and netstat Output
&lt;br /&gt;
&lt;br /&gt;[root@ganymed:~#] arp -an
&lt;br /&gt;
&lt;br /&gt;? (192.168.1.1) at 52:54:05:e3:51:87
&lt;br /&gt;
&lt;br /&gt;? (192.168.1.2) at 08:00:46:64:74:1b
&lt;br /&gt;
&lt;br /&gt;? (192.168.2.7) at 00:10:5a:c4:2c:04
&lt;br /&gt;
&lt;br /&gt;? (111.11.117.1) at 00:05:9a:5b:23:fc
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@ganymed:~#] netstat -rna -f inet
&lt;br /&gt;
&lt;br /&gt;Routing tables
&lt;br /&gt;
&lt;br /&gt;Internet:
&lt;br /&gt;
&lt;br /&gt;Destination        Gateway            Flags     Refs     Use    Mtu  Interface
&lt;br /&gt;
&lt;br /&gt;default            111.11.117.1       UGS         3    11991   1500   ne5
&lt;br /&gt;
&lt;br /&gt;127/8              127.0.0.1          UGRS        0        0  33224   lo0
&lt;br /&gt;
&lt;br /&gt;127.0.0.1          127.0.0.1          UH          2        0  33224   lo0
&lt;br /&gt;
&lt;br /&gt;192.168.1/24       link#1             UC          0        0   1500   ne3
&lt;br /&gt;
&lt;br /&gt;192.168.1.1        52:54:5:e3:51:87   UHL         0     8801   1500   ne3
&lt;br /&gt;
&lt;br /&gt;192.168.1.2        8:0:46:64:74:1b    UHL         1     4451   1500   ne3
&lt;br /&gt;
&lt;br /&gt;192.168.1.254      127.0.0.1          UGHS        0        0  33224   lo0
&lt;br /&gt;
&lt;br /&gt;192.168.2/24       link#2             UC          0        0   1500   ne4
&lt;br /&gt;
&lt;br /&gt;192.168.2.7        0:10:5a:c4:2c:4    UHL         0     2111   1500   ne4
&lt;br /&gt;
&lt;br /&gt;192.168.44.1       192.168.44.1       UH          0        0  33224   lo1
&lt;br /&gt;
&lt;br /&gt;192.168.45/24      link#1             UC          0        0   1500   ne3
&lt;br /&gt;
&lt;br /&gt;111.11.117/24      link#3             UC          0        0   1500   ne5
&lt;br /&gt;
&lt;br /&gt;111.11.117.1       0:5:9a:5b:23:fc    UHL         1        0   1500   ne5
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@ganymed:~#] netstat -in -f inet
&lt;br /&gt;
&lt;br /&gt;Name    Mtu   Network     Address              Ipkts Ierrs    Opkts Oerrs Colls
&lt;br /&gt;
&lt;br /&gt;lo0     33224 &lt;link&gt;                               0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo0     33224 fe80::/64   fe80::1                  0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo0     33224 ::1/128     ::1                      0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo0     33224 127/8       127.0.0.1                0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo1     33224 &lt;link&gt;                               0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo1     33224 192.168.44/ 192.168.44.1             0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo1     33224 fe80::/64   fe80::1                  0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;lo1     33224 ::1/128     ::1                      0     0        0     0     0
&lt;br /&gt;
&lt;br /&gt;ne3     1500  &lt;link&gt;      48:54:e8:8c:0a:3f    17263     0    13427     0   329
&lt;br /&gt;
&lt;br /&gt;ne3     1500  192.168.1/2 192.168.1.254        17263     0    13427     0   329
&lt;br /&gt;
&lt;br /&gt;ne3     1500  fe80::/64   fe80::4a54:e8ff:f    17263     0    13427     0   329
&lt;br /&gt;
&lt;br /&gt;ne3     1500  192.168.45/ 192.168.45.254       17263     0    13427     0   329
&lt;br /&gt;
&lt;br /&gt;ne4     1500  &lt;link&gt;      52:54:05:e3:e4:2f     2503   234     2247     0     0
&lt;br /&gt;
&lt;br /&gt;ne4     1500  192.168.2/2 192.168.2.254         2503   234     2247     0     0
&lt;br /&gt;
&lt;br /&gt;ne4     1500  fe80::/64   fe80::5054:5ff:fe     2503   234     2247     0     0
&lt;br /&gt;
&lt;br /&gt;ne5     1500  &lt;link&gt;      52:54:05:e3:51:87    11531  1253    12040     0     0
&lt;br /&gt;
&lt;br /&gt;ne5     1500  111.11.117/ 111.11.117.206       11531  1253    12040     0     0
&lt;br /&gt;
&lt;br /&gt;ne5     1500  fe80::/64   fe80::5054:5ff:fe    11531  1253    12040     0     0
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@ganymed:~#] netstat -rs
&lt;br /&gt;
&lt;br /&gt;routing:
&lt;br /&gt;
&lt;br /&gt;      0 bad routing redirects
&lt;br /&gt;
&lt;br /&gt;      0 dynamically created routes
&lt;br /&gt;
&lt;br /&gt;      0 new gateways due to redirects
&lt;br /&gt;
&lt;br /&gt;      10 destinations found unreachable
&lt;br /&gt;
&lt;br /&gt;      0 uses of a wildcard route
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;Example 8-4 also demonstrates an advanced feature of Linux: TCP parameters such as the TCP Maximum Segment Size (MSS) and the TCP Window Size, which can be altered on a per-prefix basis (shaded text). For a better understanding, consider the following technical details quoted from the Linux route(8) manual page:
&lt;br /&gt;
&lt;br /&gt;mss M:
&lt;br /&gt;
&lt;br /&gt;set the TCP Maximum Segment Size (MSS) for connections over this route to M bytes. The default is the device MTU minus headers, or a lower MTU when path mtu discovery occurred [sic]. This setting can be used to force smaller TCP packets on the other end when path mtu discovery does not work (usually because of misconfigured firewalls that block ICMP Fragmentation Needed)
&lt;br /&gt;
&lt;br /&gt;window W:
&lt;br /&gt;
&lt;br /&gt;set the TCP window size for connections over this route to W bytes. This is typically only used on AX.25 networks and with drivers unable to handle back to back frames.[2]
&lt;br /&gt;
&lt;br /&gt;Example 8-4. Linux arp and netstat Output
&lt;br /&gt;
&lt;br /&gt;[root@callisto:~#] arp -an
&lt;br /&gt;
&lt;br /&gt;? (192.168.1.2) at 08:00:46:64:74:1B [ether] on eth1
&lt;br /&gt;
&lt;br /&gt;? (192.168.1.254) at 48:54:E8:8C:0A:3F [ether] on eth1
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@callisto:~#] netstat -rnva
&lt;br /&gt;
&lt;br /&gt;Kernel IP routing table
&lt;br /&gt;
&lt;br /&gt;Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
&lt;br /&gt;
&lt;br /&gt;192.168.1.0     0.0.0.0         255.255.255.0   U        40 0          0 eth1
&lt;br /&gt;
&lt;br /&gt;192.168.1.0     0.0.0.0         255.255.255.0   U        40 0          0 ipsec0
&lt;br /&gt;
&lt;br /&gt;192.168.14.0    0.0.0.0         255.255.255.0   U        40 0          0 eth0
&lt;br /&gt;
&lt;br /&gt;127.0.0.0       0.0.0.0         255.0.0.0       U        40 0          0 lo
&lt;br /&gt;
&lt;br /&gt;0.0.0.0         192.168.1.254   0.0.0.0         UG       40 0          0 eth1
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@callisto:~#] netstat -i
&lt;br /&gt;
&lt;br /&gt;Kernel Interface table
&lt;br /&gt;
&lt;br /&gt;Iface   MTU Met   RX-OK RX-ERR RX-DRP RX-OVR   TX-OK TX-ERR TX-DRP TX-OVR Flg
&lt;br /&gt;
&lt;br /&gt;eth0   1500   0     276      0      0      0     166      0      0      0 BMRU
&lt;br /&gt;
&lt;br /&gt;eth1   1500   0   14889      0      0      0    9260      0      0      0 BMRU
&lt;br /&gt;
&lt;br /&gt;ipsec 16260   0       0      0      0      0       0      0      0      0 ORU
&lt;br /&gt;
&lt;br /&gt;lo    16436   0      64      0      0      0      64      0      0      0 LRU
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@callisto:~#] route -nee
&lt;br /&gt;
&lt;br /&gt;Kernel IP routing table
&lt;br /&gt;
&lt;br /&gt;Destination     Gateway     Genmask        Flags Metric  Ref  Use Iface   MSS  Window irtt
&lt;br /&gt;
&lt;br /&gt;192.168.1.0    0.0.0.0    255.255.255.0  U    0      0   0   eth1    40    0      0
&lt;br /&gt;
&lt;br /&gt;192.168.1.0    0.0.0.0    255.255.255.0  U    0      0   0   ipsec0  40    0      0
&lt;br /&gt;
&lt;br /&gt;192.168.14.0   0.0.0.0    255.255.255.0  U    0      0   0   eth0    40    0      0
&lt;br /&gt;
&lt;br /&gt;127.0.0.0      0.0.0.0    255.0.0.0      U    0      0   0   lo      40    0      0
&lt;br /&gt;
&lt;br /&gt;0.0.0.0     192.168.1.254 0.0.0.0        UG   0      0   0   eth1    40    0      0
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;The highlighted text in Example 8-5 emphasizes the timer correlation of ARP cache entries and the forwarding table on FreeBSD for cloned routes (ARP neighbors). On BSD systems, you can manually adjust the route_expire sysctl parameter net.inet.ip.rtexpire, which defaults to 3600 seconds. Connected routes are created for each interface attached to the local host. Examples of the ip Linux facility are left to the lab because it is specific only to Linux, whereas netstat and route are generic tools of all Unices.
&lt;br /&gt;
&lt;br /&gt;Example 8-5. FreeBSD arp and netstat Output
&lt;br /&gt;
&lt;br /&gt;[root@castor:~#] arp -an
&lt;br /&gt;
&lt;br /&gt;? (192.168.2.254) at 52:54:05:e3:e4:2f on xl0 [ethernet]
&lt;br /&gt;
&lt;br /&gt;? (192.168.7.254) at 00:00:0c:1a:a9:a8 on ed0 [ethernet]
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@castor:~#] netstat -rnaW -f inet
&lt;br /&gt;
&lt;br /&gt;Routing tables
&lt;br /&gt;
&lt;br /&gt;Internet:
&lt;br /&gt;
&lt;br /&gt;Destination        Gateway            Flags    Refs      Use    Mtu  Netif Expire
&lt;br /&gt;
&lt;br /&gt;default            192.168.2.254      UGSc        4        6   1500    xl0
&lt;br /&gt;
&lt;br /&gt;127.0.0.1          127.0.0.1          UH          0        0  16384    lo0
&lt;br /&gt;
&lt;br /&gt;192.53.103.103     192.168.2.254      UGHW3       0       63   1500    xl0   3314
&lt;br /&gt;
&lt;br /&gt;192.53.103.104     192.168.2.254      UGHW        1       64   1500    xl0
&lt;br /&gt;
&lt;br /&gt;192.168.1.2        192.168.2.254      UGHW        1     1207   1500    xl0
&lt;br /&gt;
&lt;br /&gt;192.168.2          link#1             UC          2        0   1500    xl0
&lt;br /&gt;
&lt;br /&gt;192.168.2.254      52:54:05:e3:e4:2f  UHLW        3        3   1500    xl0   1028
&lt;br /&gt;
&lt;br /&gt;192.168.7          link#2             UC          1        0   1500    ed0
&lt;br /&gt;
&lt;br /&gt;192.168.7.254      00:00:0c:1a:a9:a8  UHLW        1        5   1500    ed0   1038
&lt;br /&gt;
&lt;br /&gt;195.34.133.10      192.168.2.254      UGHW3       0       14   1500    xl0   3440
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@castor:~#] netstat -i -f inet
&lt;br /&gt;
&lt;br /&gt;Name  Mtu   Network       Address            Ipkts Ierrs    Opkts Oerrs  Coll
&lt;br /&gt;
&lt;br /&gt;xl0   1500  192.168.2     192.168.2.7         2260     -     3303     -     -
&lt;br /&gt;
&lt;br /&gt;ed0   1500  192.168.7     castor               260     -     1214     -     -
&lt;br /&gt;
&lt;br /&gt;lo0   16384 your-net      localhost              0     -        0     -     -
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;[root@castor:~#] netstat -rs
&lt;br /&gt;
&lt;br /&gt;routing:
&lt;br /&gt;
&lt;br /&gt;      0 bad routing redirects
&lt;br /&gt;
&lt;br /&gt;      0 dynamically created routes
&lt;br /&gt;
&lt;br /&gt;      0 new gateways due to redirects
&lt;br /&gt;
&lt;br /&gt;      3 destinations found unreachable
&lt;br /&gt;
&lt;br /&gt;      0 uses of a wildcard route
&lt;br /&gt;
&lt;br /&gt;      1 route not in table but not freed
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;&lt;span style="color: rgb(255, 153, 0); font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;Related Topic Router&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/dynamic-routing.html"&gt;Dinamic Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/static-routing.html"&gt;Static Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/basic-router-configuration.html"&gt;Basic Routing Configuration&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routing-table-principles.html"&gt;Routing Tables Principles&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-interface.html"&gt;Router Interface&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/router-bootup-process.html"&gt;Router Bootup&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/routers-and-network-layer.html"&gt;Router And Network Layer&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/03/introducing-routing-and-packet.html"&gt;Introducing Routing And Packet Forwading&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2009/01/route-filtering-and-redistribution.html"&gt;Route Filtering&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/dynamic-routing-protocols_15.html"&gt;Dinamyc Routing Protocol&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/policy-routing.html"&gt;Policy Routing&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://ciscoelearning.blogspot.com/2008/12/static-nat-and-arprouting-issues.html"&gt;Routing Issu&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Floating Static Routes</title><link>http://ciscoelearning.blogspot.com/2009/01/floating-static-routes.html</link><category>Routing Protocol</category><author>noreply@blogger.com (Blogging Free Software)</author><pubDate>Fri, 16 Jan 2009 06:30:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3712699502068010440.post-3316831848757354152</guid><description>Floating static routes are a useful and simple measure to provide backup routes via another hop or link. However, a floating static route just "lurks" there and does not provide load balancing! This can be as simple as two default routes that just differ in terms of metric or cost. As long as the preferred route with the better metric is available, the floating static route with the less attractive metric floats unused but suddenly takes over if the preferred route disappears. A requirement is an operating system that supports metrics for static routes. Lab 8-1 shows an example of this setup.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>