The steps for configuring Static Routing Protocols are complex. Each step is very important. You need to pay special attention to the configuration process. We also need to sum up experience to avoid unexpected errors.
I. Two Static Routing Protocols
1. The S0 port address of R1 is 192.168.1.1, And the E0 port address
We have summarized and summarized the types of routing protocols in previous articles. Now we will analyze the two protocols in detail. One is the IGRP Gateway Routing Protocol and the other is the OSPF protocol. These two protocols, however, can be thought of from the name
I. Definition of routing control
1) IP address and routing control2) Static Routing and dynamic routing3) Fundamentals of dynamic routingSecond, the routing control range1) Autonomous systems and routing protocols2) IGP and EGPThird, ro
label: ibgp redistribute igp ospf in the network, R1 and R2 RUN BGP routing protocol, and ibgp
,
R2
and
R3
RUN
OSPF
, the main purpose of this topology is to test
ibgp
and
OSPF
route redistribution problem between two clusters.
650) This. width = 650; "Title =" qq20141107225007.png "alt =" wKioL1Rc3JPhvytvAACatWn-81w129.jpg "src =" http://s3.51cto.com
a static route table. Generally, it is set in advance according to the network configuration during system installation, it will not change as the network structure changes in the future. Dynamic) the route table is the route table automatically adjusted by the Router Protocol according to the running status of the network system. The router selects the Routing Protocol) to automatically learn and remember the network running status, and automaticall
other sensor nodes, and the energy supply module supplies energy for the operation of the entire sensor network.
The energy supply of sensor nodes is battery, and the node energy is limited. Consider extending the life cycle of the entire sensor network as much as possible. When designing sensor nodes, ensuring the continuity of energy supply is an important design principle. Sensor node energy consumption modules mainly include sensor modules, information processing modules, and wireless commu
timestamps debug datetime msec
No service password-Encryption
!
Hostname r3
!
!
!
!
!
!
!
!
!
!
!
!
No IP domain-Lookup
!
!
Spanning-tree mode pvst
!
!
!
!
Interface fastethernet0/0
IP address 10.27.72.2 255.255.255.0
Duplex auto
Speed auto
!
Interface fastethernet0/1
IP address 192.168.2.1 255.255.255.0
Duplex auto
Speed auto
!
Interface vlan1
No IP Address
Shutdown
!
IP classless
IP Route 192.168.1.0 255.255.255.0 10.27.72.1
IP Route 172.16.1.0 255.255.255.0 10.27.72.1
!
!
!
!
!
!
!
Line con
1 Some problems of restricting BGP expansibility
BGP is the IP network Interconnection protocol applied to Internet, which provides a stable and secure routing protocol for the interconnection between operators, and has rich routing control mechanism. To better control the routing strategy, most operators now deploy BGP to backbone routers. With the continuous e
Static Routing has the following purposes:In a small network with no significant growth, it is easy to maintain the route table using static routes.Static Routing can be routed to the remote network or from the remote network to the external network (see Chapter 2nd ).Use a single default route. If a network cannot find a more matched route entry in the route table, you can use the default route as the path
layers to complete their own functions. Both parties can communicate with each other only at the same level. Common protocols include TCP/IP, IPX/SPX, and NetBEUI. IPX/SPX is usually used in the LAN .. If you access the Internet, you must add the TCP/IP protocol to the network protocol.
Let's briefly introduce the differences between different transmission protocols:
IPX/SPXInternet group Exchange/ordered
NetBEUI protocol was proposed by IBM in 1985. NetBEUI is mainly designed For a LAN of 20 to 200 workstations. It is used For NetBEUI, LanMan, Windows For WorkgroUPS, and Windows NT networks. NetBEUI is a compact and fast Protocol. However, because NetBEUI does not have the routing capability, it cannot route from one LAN to another, and can no longer adapt to a large network. To route to another Lan, you must install TCP/IP or IPX/SPX.
IPX/SPX (Inter
Redis Research (13)-security and communication protocols, redis research communication protocols
I. Security
Salvatore Sanfilippo, author of Redis, once published the Redis declaration, which mentions Redis to be concise and beautiful. Redis does not do much work at the security level.1. trusted environmentThe Redis security design is based on the premise that "Redis runs in a trusted environment". During t
Open source is already widely used in today's software industry, but does open source mean that users can do whatever they want to do with open source code? The answer is no. Open-source sports also have their own game rules and ethics. Failing to comply with these rules will not only damage the healthy development of the open source movement, but also cause reputational and market losses to violators, and more likely fall into legal disputes and compensation.
There are many open-source
The usage of softswitch protocol is described in four special protocols. Next we will give a brief introduction to several main Softswitch protocols, such as H.248/MEGACO, Media Gateway Control Protocol MGCP), and Session Initiation Protocol SIP.
Main protocols used by Softswitch
The softswitch system involves many Softswitch
A Preliminary Study on WCF-17: the equivalence of WCF data protocols, a preliminary study on wcf-17 protocolsData contract equivalenceFeatures
If the client successfully sends data of a certain type to the service or the service successfully sends the data to the client, the receiving end does not necessarily have to send data of this type. The only requirement is that the two types of data protocols sho
OC-Concepts and usage of protocols, oc-concepts of protocols
In the previous article, we introduced the class extension in OC: Extend.
The protocol in OC is equivalent to the interface (abstract class) in Java, but the name in OC is more vivid, because when we are learning interfaces in Java, it can be seen that the interface is equivalent to a contract (Protocol), marking its implementation class. Of cour
Escape characters in communication protocols and escape characters in communication protocolsEscape characters in communication protocolsPurpose: make the communication content more secure and reliable in the communication protocol.For example: if you need to customize a communication protocol, the most basic thing you need is a frame header and frame tail flag, only the recipient of the communication knows when the communication starts and ends. Assu
Explanation of ES6 syntax iteration protocols and iterator protocols; explanation of es6
The supplement of ECMAScript 2015 is not a new built-in or syntax, but a protocol. These protocols can be implemented by any object that complies with certain conventions.There are two protocols: the iteratable protocol and the ite
to send IP groups that do not know where to send them. In this way, the router correctly forwards IP groups that know how to transfer them, and the IP groups that do not know are sent to the "Default Gateway" router. In this way, the IP Group will eventually be sent to the destination, IP groups that cannot be sent to the destination are discarded by the network.
Currently, all TCP/IP networks are interconnected through routers. The Internet is an international network that connects thousands o
prompt" Window /? You can see the corresponding prompt information.
Network Protocol-DHCP protocol
(The full name of the DHCP Protocol is Dynamic Host Configuration Protocol). DHCP can automatically assign an IP address to each computer in the LAN, complete the TCP/IP protocol configuration for each computer, including the IP address, subnet mask, gateway, and DNS server. In this way, the Administrator does not need to manually configure the TCP/IP protocol for each computer in a LAN, especiall
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.