En Route v6 Ch01

Embed Size (px)

Citation preview

ROUTE Chapter 1

Chapter 1: Routing ServicesCCNP ROUTE: Implementing IP Routing 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicROUTE v6 Chapter 1#Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1Cisco Networking Academy ProgramCCNP ROUTE: Implementing IP RoutingChapter 1: Routing Services

2006, Cisco Systems, Inc. All rights reserved.Chapter 1 ObjectivesDescribe common enterprise traffic requirements and network design models.Describe how to create a plan for implementing routing services in an enterprise network.Review the fundamentals of routing and compare various routing protocols.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public2Chapter 1 Objectives 2006, Cisco Systems, Inc. All rights reserved.

Complex Enterprise Network Frameworks, Architectures, and ModelsChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicTraffic Conditions in a Converged NetworkModern networks must support various types of traffic:Voice and video trafficVoice applications trafficMission-critical trafficTransactional trafficNetwork management trafficRouting protocol trafficThis mix of traffic greatly impacts the network requirements such as security and performance.To help enterprises, Cisco has developed the Intelligent Information Network (IIN).

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public4Converged networks contain a variety of different types of traffic, including the following:Voice and video trafficExamples include IP telephony, video broadcast and conferencing.Voice applications trafficGenerated by voice-related applications, such as contact centers,Mission-critical trafficGenerated by applications critical to an organization (for example, information generated by a stock exchange application at a finance company, patient records at a hospital, and so forth).Transactional trafficGenerated by applications such as those for e-commerce.Routing protocol trafficData from whichever routing protocols are running in the network, such as the Routing Information Protocol (RIP), Open Shortest Path First Protocol (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP), Intermediate System-to-Intermediate System Protocol (IS-IS), and Border Gateway Protocol (BGP).Network management trafficIncluding information about the status of the network and its devices.The requirements on the network differ significantly depending on the mix of traffic types, especially in terms of security and performance. 2006, Cisco Systems, Inc. All rights reserved.Cisco Intelligent Information NetworkThe Intelligent Information Network (IIN):Integrates networked resources and information assets.Extends intelligence across multiple products and infrastructure layers.Actively participates in the delivery of services and applications.The IIN technology vision consists of 3 three phases in which functionality can be added to the infrastructure as required:Integrated transportIntegrated servicesIntegrated applicationsChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public5The Cisco vision of the future IIN encompasses these features:Integration of networked resources and information assets that have been largely unlinked: The modern converged networks with integrated voice, video, and data require that Information Technology (IT) departments more closely link the IT infrastructure with the network.Intelligence across multiple products and infrastructure layers: The intelligence built into each component of the network is extended network-wide and applies end-to-end.Active participation of the network in the delivery of services and applications: With added intelligence, the IIN makes it possible for the network to actively manage, monitor, and optimize service and application delivery across the entire IT environment.With the listed features, the IIN offers much more than basic connectivity, bandwidth for users, and access to applications. The IIN offers end-to-end functionality and centralized, unified control that promotes true business transparency and agility. 2006, Cisco Systems, Inc. All rights reserved.3 Phases of the IINPhase 1: Integrated transportIntegrates data, voice, and video transport into a single, standards-based, modular network simplifying network management and generating enterprise-wide efficiencies. Phase 2: Integrated servicesIntegrated services help to unify common elements, such as storage and data center server capacity. IT resources can now be pooled and shared, or virtualized, to address the changing needs of the organization. Business continuity is also enhanced in the event of a local systems failure because shared resources across the IIN can provide needed services.Phase 3: Integrated applicationsThis phase focuses on making the network application-aware so that it can optimize application performance and more efficiently deliver networked applications to users. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public6The IIN technology vision offers an evolutionary approach that consists of three phases in which functionality can be added to the infrastructure as required:Phase 1: Integrated transportEverything (data, voice, and video) consolidates onto an IP network for secure network convergence. By integrating data, voice, and video transport into a single, standards-based, modular network, organizations can simplify network management and generate enterprise-wide efficiencies. Network convergence also lays the foundation for a new class of IP-enabled applications, delivered through Cisco Unified Communications solutions.Phase 2: Integrated servicesWhen the network infrastructure is converged, IT resources can be pooled and shared, or virtualized, to flexibly address the changing needs of the organization. Integrated services help to unify common elements, such as storage and data center server capacity. By extending this virtualization concept to encompass server, storage, and network elements, an organization can transparently use all of its resources more efficiently. Business continuity is also enhanced because in the event of a local systems failure, shared resources across the IIN can provide needed services.Phase 3: Integrated applicationsThis phase focuses on making the network application-aware so that it can optimize application performance and more efficiently deliver networked applications to users. With Application-Oriented Networking (AON) technology, Cisco hasentered this third IIN phase. In addition to capabilities such as content caching, load balancing, and application-level security, the Cisco AON makes it possible for the network tosimplify the application infrastructure by integrating intelligent application message handling, optimization, and security into the existing network. 2006, Cisco Systems, Inc. All rights reserved.Cisco SONA FrameworkThe Cisco Service-Oriented Network Architecture (SONA) is an architectural framework to create a dynamic, flexible architecture and provide operational efficiency through standardization and virtualization. SONA provides guidance, best practices, and blueprints for connecting network services and applications to enable business solutions.In this framework, the network is the common element that connects and enables all components of the IT infrastructure.SONA help enterprises achieve their goals by leveraging:The extensive Cisco product-line servicesThe proven Cisco architecturesThe experience of Cisco and its partnersChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public7Cisco SONA is an architectural framework that guides the evolution of enterprise networks to an IIN. The Cisco SONA framework provides several advantages to enterprises, such as the following:Outlines the path towards the IINIllustrates how to build integrated systems across a fully converged IINImproves flexibility and increases efficiency, which results in optimized applications, processes, and resources. 2006, Cisco Systems, Inc. All rights reserved.Cisco SONA Framework LayersThe SONA framework outlines three layers:

Application Layer:Interactive Services Layer:Network Infrastructure Layer:Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public8 2006, Cisco Systems, Inc. All rights reserved.SONA: Network Infrastructure LayerThis layer provides connectivity anywhere and anytime.All the IT resources (servers, storage, and clients) are interconnected across a converged network foundation. This layer represents how these resources exist in different places in the network (campus, branch, data center, WAN, MAN and with the teleworker).

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public9 2006, Cisco Systems, Inc. All rights reserved.SONA: Interactive Services LayerEnables efficient allocation of resources to applications and business processes delivered through the networked infrastructure. Application and business processes include:Voice and collaboration servicesMobility servicesSecurity and identity servicesStorage servicesComputer servicesApplication networking servicesNetwork infrastructure virtualizationServices managementAdaptive management services

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public10 2006, Cisco Systems, Inc. All rights reserved.SONA: Application LayerThis layers objective is to meet business requirements and achieve efficiencies by leveraging the interactive services layer.Includes business applications and collaboration applications such as: Commercial applicationsInternally developed applicationsSoftware as a Services (SaaS)Composite Apps/SOA

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public11Application layer: This layer includes business applications and collaboration applications. The objective for customers in this layer is to meet business requirements and achieve efficiencies by leveraging the interactive services layer. 2006, Cisco Systems, Inc. All rights reserved.Updated SONA FrameworkCisco Systems has recently updated the SONA framework:

Cisco designs, tests, and validates sets of modular, connected infrastructure elements organized by places in the network (PINs).

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public12http://www.cisco.com/en/US/netsol/ns629/index.htmlhttp://www.cisco.com/en/US/solutions/ns340/ns629/togaf_sona_guide.html 2006, Cisco Systems, Inc. All rights reserved.Updated SONA Framework

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public13http://www.cisco.com/en/US/netsol/ns629/index.htmlhttp://www.cisco.com/en/US/solutions/ns340/ns629/togaf_sona_guide.html

2006, Cisco Systems, Inc. All rights reserved.Cisco Enterprise ArchitectureThe places in the network in the SONA Network Infrastructure Layer have been identified as follows:

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public14http://www.cisco.com/en/US/netsol/ns936/index.html The Cisco Enterprise Architecture helps companies to protect, optimize, and grow the infrastructure that supports business processes. The architecture provides integration of the entire networkcampus, data center, WAN, branches, and teleworkersoffering staff secure access to the tools, processes, and services. 2006, Cisco Systems, Inc. All rights reserved.The Cisco Enterprise Architecture

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1515 2006, Cisco Systems, Inc. All rights reserved.

Campus ArchitectureProvides:High availability with a resilient multilayer design and redundant hardware and software features. Automatic procedures for reconfiguring network paths when failures occur.Multicast to provide optimized bandwidth consumption. Quality of Service (QoS). Integrated security. Flexibility to add IP security (IPsec) and MPLS VPNs, identity and access management, and VLANs to compartmentalize access.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1616 2006, Cisco Systems, Inc. All rights reserved.

Branch ArchitectureProvides head-office applications and services, such as security, Cisco IP Communications, and advanced application performance. Integrates security, switching, network analysis, caching, and converged voice and video services into a series of integrated services routers in the branch. Enterprises can centrally configure, monitor, and manage devices that are located at remote sites.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1717 2006, Cisco Systems, Inc. All rights reserved.

Data Center ArchitectureAdaptive network architecture that supports the requirements for consolidation, business continuance, and security. Redundant data centers provide backup services using synchronous and asynchronous data and application replication. The network and devices offer server and application load balancing to maximize performance. This solution allows the enterprise to scale without major changes to the infrastructure.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1818 2006, Cisco Systems, Inc. All rights reserved.

Teleworker ArchitectureAlso called the Enterprise Branch-of-One, it allows enterprises to deliver secure voice and data services to remote SOHO offices over a broadband access service. Centralized management minimizes the IT support costs.Campus security policies are implemented using robust integrated security and identity-based networking services. Staff can securely log on to the network over an always-on VPN and gain access to authorized applications and services. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public1919There is also the Cisco Enterprise WAN Architecture which offers the convergence of voice, video, and data services over a single Cisco Unified Communications network, which enables the enterprise to cost-effectively span large geographic areas. QoS, granular service levels, and comprehensive encryption options help ensure the secure delivery of high-quality corporate voice, video, and data resources to all corporate sites, enabling staff to work productively and efficiently wherever theyare located. Security is provided with multiservice VPNs (using IPsec and MPLS) over Layer 2 or Layer 3 WANs, hub-and-spoke, or full-mesh topologies. 2006, Cisco Systems, Inc. All rights reserved.Cisco Hierarchical Network ModelThe three-layer hierarchical model is used extensively in network design.The hierarchical model consists of the:Access layerDistribution layerCore layerIt provides a modular framework that allows design flexibility and facilitates implementation and troubleshooting. The hierarchical model is useful for smaller networks, but does not scale well to todays larger, more complex networks. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public20 2006, Cisco Systems, Inc. All rights reserved.Hierarchical Campus Model

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public21 2006, Cisco Systems, Inc. All rights reserved.Hierarchical Model Applied to a WAN

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicThe hierarchical model divides networks into the Building Access, Building Distribution, and Building Core layers, as follows:Building Access layer: The Building Access layer is used to grant user access to network devices. In a network campus, the Building Access layer generally incorporates switched LAN devices with ports that provide connectivity to workstations and servers. In the WAN environment, the Building Access layer at remote sites may provide access to the corporate network across WAN technology.Building Distribution layer: The Building Distribution layer aggregates the wiring closets and uses switches to segment workgroups and isolate network problems. Building Core layer: The Building Core layer (also known as the Campus Backbone submodule) is a high-speed backbone and is designed to switch packets as fast as possible. Because the core is critical for connectivity, it must provide a high level of availability and adapt to changes very quickly.

22 2006, Cisco Systems, Inc. All rights reserved.Enterprise Composite Network ModelThe Enterprise Composite Network Model divides the network into three functional areas:Enterprise CampusEnterprise EdgeService Provider EdgeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public23The Enterprise Composite Network Model (ECNM) provides a modular framework for designing networks. This modularity allows flexibility in network design and facilitates ease of implementation and troubleshooting.The ECNM introduces modularity by dividing the network into functional areas that ease design, implementation, and troubleshooting tasks. The ECNM divides the enterprise network into physical, logical, and functional areas. These areas allow network designers and engineers to associate specific network functionality on equipment based upon its placement and function in the model.

2006, Cisco Systems, Inc. All rights reserved.Enterprise Composite Network Model

Building AccessBuilding DistributionCore (Campus backbone)Server FarmManagementEdge DistributionE-CommerceISP ACorporate InternetRemote Access VPNWANFrame Relay / ATMPSTNISP BEnterprise CampusEnterprise EdgeService Provider EdgeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public24The ECNM meets these criteria:It is a deterministic network with clearly defined boundaries between modules. The model also has clear demarcation points, so that the designer knows exactly where traffic is located.It increases network scalability and eases the design task by making each module discrete.It provides scalability by allowing enterprises to add modules easily. As network complexity grows, designers can add new functional modules.It offers more network integrity in network design, allowing the designer to add services and solutions without changing the underlying network design.The ECNM contains these three major functional areas:Enterprise Campus: The Enterprise Campus functional area contains the modules required to build a hierarchical, highly robust campus network that offers performance, scalability, and availability. This area contains the network elements required for independent operation within a single campus, such as access from all locations to central servers. The Enterprise Campus functional area does not offer remote connections or Internet access.Enterprise Edge: The Enterprise Edge aggregates connectivity from the various resources external to the enterprise network. As traffic comes into the campus, this area filters traffic from the external resources and routes it into the Enterprise Campus functional area. It contains all of the network elements for efficient and secure communication between the enterprise campus and remote locations, remote users, and the Internet. The Enterprise Edge would replace the Demilitarized Zone (DMZ) of most networks.Service Provider Edge: This functional area represents connections to resources external to the campus. This area facilitates communication to WAN and Internet service provider technologies. 2006, Cisco Systems, Inc. All rights reserved.Modules in the Enterprise Campus

Building AccessBuilding DistributionCore (Campus backbone)Server FarmManagementEdge DistributionE-CommerceISP ACorporate InternetRemote Access VPNWANFrame Relay / ATMPSTNISP BEnterprise CampusEnterprise EdgeService Provider EdgeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public25Enterprise Campus: An enterprise campus is defined as one or more buildings, with multiple virtual and physical networks, connected across a high-performance, multilayer-switched backbone.The Enterprise Campus functional area contains the modules required to build a hierarchical, highly robust campus network that offers performance, scalability, and availability. This area contains the network elements required for independent operation within a single campus, such as access from all locations to central servers. The Enterprise Campus functional area does not offer remote connections or Internet access.The Enterprise Campus functional area comprises the following modules:Building AccessContaining access switches and end-user devices (including PCs and IP phones).Building DistributionIncludes distribution multilayer switches to provide access between workgroups and to the Core.CoreAlso called the backbone, provides a high-speed connection between buildings themselves, and between buildings and the Server Farm and Edge Distribution modules.Edge DistributionThe interface between the Enterprise Campus and the Enterprise Edge functional areas. This module concentrates connectivity to and from all branches and teleworkers accessing the campus via a WAN or the Internet.Server FarmRepresents the campuss data center.ManagementRepresents the network management functionality, including monitoring, logging, security, and other management features within an enterprise.

2006, Cisco Systems, Inc. All rights reserved.Modules in the Enterprise Edge

Building AccessBuilding DistributionCore (Campus backbone)Server FarmManagementEdge DistributionE-CommerceISP ACorporate InternetRemote Access VPNWANFrame Relay / ATMPSTNISP BEnterprise CampusEnterprise EdgeService Provider EdgeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public26Enterprise Edge: The Enterprise Edge aggregates connectivity from the various resources external to the enterprise network. As traffic comes into the campus, this area filters traffic from the external resources and routes it into the Enterprise Campus functional area. It contains all of the network elements for efficient and secure communication between the enterprise campus and remote locations, remote users, and the Internet. The Enterprise Edge would replace the Demilitarized Zone (DMZ) of most networks.The Enterprise Edge functional area is the interface between the Enterprise Campus functional area (through the Edge Distribution module) and the Service Provider Edge functional area. It is composed of the following four modules:E-commerceIncludes the servers, network devices, and so forth necessary for an organization to provide e-commerce functionality, such as online orderingCorporate InternetProvides Internet access for the organization, and passes VPN traffic from external users to the VPN and Remote Access moduleVPN and Remote AccessTerminates VPN traffic and dial-in connections from external usersWANProvides connectivity from remote sites using various WAN technologies 2006, Cisco Systems, Inc. All rights reserved.Modules in the Service Provider Edge

Building AccessBuilding DistributionCore (Campus backbone)Server FarmManagementEdge DistributionE-CommerceISP ACorporate InternetRemote Access VPNWANFrame Relay / ATMPSTNISP BEnterprise CampusEnterprise EdgeService Provider EdgeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public27Service Provider Edge: This functional area represents connections to resources external to the campus. This area facilitates communication to WAN and Internet service provider technologies.The three modules within the Service Provider Edge functional area are as follows:ISPRepresents Internet connections (in Figure 1-7 two instances of this module are shown, representing a dual-homed connection to two ISPs)PSTNRepresents all nonpermanent connections, including via analog phone, cellular phone, and Integrated Services Digital Network (ISDN) Frame Relay/Asynchronous Transfer Mode (ATM)Represents all permanent connections to remote locations, including via Frame Relay, ATM, leased lines, cable, digital subscriber line (DSL), and wireless. 2006, Cisco Systems, Inc. All rights reserved.

Creating, Documenting, and Executing an Implementation PlanChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public28 2006, Cisco Systems, Inc. All rights reserved.Creating an Implementation PlanAn effective, documented implementation plan is a result of good processes and procedures during network design, implementation, and performance testing. There are two approaches to implementing changes to a network.Ad-hoc approachStructured approachChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public29 2006, Cisco Systems, Inc. All rights reserved.Ad-hoc ApproachThe many tasks such as deploying new equipment, connectivity, addressing, routing, and security are implemented and configured as required without planning any of the tasks. With such an approach, it is more likely that scalability issues, suboptimal routing, and security issues can occur. A good implementation plan is required to avoid such difficulties. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public30 2006, Cisco Systems, Inc. All rights reserved.Structured ApproachPrior to implementing a change many considerations are taken into account.The design and implementation plan are completed, and may include a new topology, an IP addressing plan, a solution to scalability issues, a link utilization upgrade, remote network connectivity, and changes to other network parameters. The design and implementation plan must meet both technical and business requirements. All details are documented in the implementation plan prior to the implementation. After successful implementation, the documentation is updated to include the tools and resources used, and the implementation results. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public31 2006, Cisco Systems, Inc. All rights reserved.Models and MethodologiesThere are there are many models and methodologies used in IT that define a lifecycle approach using various processes to help provide high quality IT services. No need to reinvent the wheel.Examples of these models:The Cisco Lifecycle Services (PPDIOO) modelIT Infrastructure Library (ITIL)The Fault, Configuration, Accounting, Performance, and Security (FCAPS) modelInternational Organization for Standardization (ISO)The Telecommunications Management Network (TMN) modelTelecommunications Standardization Sector (ITU-T)Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicThe Cisco Lifecycle Services approach defines the minimum set of activities needed to help customers successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of the network. The Cisco Lifecycle Services approach defines six phases in the network lifecycle and is referred to as the Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) model. The implementation plan is part of the Design phase; implementation is of course part of the Implement phase.IT Infrastructure Library (ITIL) is a framework of best practices for IT Service Management, providing high quality IT services that are aligned with business requirements and processes. The implementation plan and implementation are part of ITIL best practices.The Fault, Configuration, Accounting, Performance, and Security (FCAPS) model is defined by the International Organization for Standardization (ISO) and defines the minimum set of categories needed for successful network management. Five different categories are defined as follows: Fault management, Configuration management, Accounting management, Performance management and Security management. The implementation plan and implementation are part of the Configuration management category.The Telecommunications Management Network (TMN) model is similar to the FCAPS model and defines a framework for the management of telecommunication networks. The Telecommunications Standardization Sector (ITU-T) took the main aspects of the FCAPS model and refined it to create the TMN framework. The implementation plan and implementation are one of the building blocks within the framework.32 2006, Cisco Systems, Inc. All rights reserved.Cisco Lifecycle Services (PPDIOO) ModelThe Cisco Lifecycle Services approach defines six phases in the network lifecycle and is referred to as the PPDIOO model:PrepareOptimizePlanDesignImplementOperate

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicStep 1: Identify customer requirements: In this step, which is typically completed during the PPDIOO Prepare phase, key decision makers identify the initial business and technical requirements. Based on these requirements, a high-level conceptual architecture is proposed.Step 2: Characterize the existing network and sites: The Plan phase involves characterizing sites and assessing any existing networks, and performing a gap analysis to determine whether the existing system infrastructure, sites, and operational environment can support the proposed system. Characterization of the existing network and sites includes site and network audit and network analysis. During the network audit, the existing network is thoroughly checked for integrity and quality. During the network analysis, network behavior (traffic, congestion, and so forth) is analyzed.Step 3: Design the network topology and solutions: In this step, the detailed design of the network is created. Decisions are made about networked infrastructure, infrastructure services, and applications. The data for making these decisions is gathered during the first two steps.Source of graphic: http://www.cisco.com/en/US/services/ps6887/ps10672/docs/mra_white_paper.pdf 33 2006, Cisco Systems, Inc. All rights reserved.PPDIOO Prepare, Plan, and DesignThe PPDIOO methodology begins with these three basic steps: Step 1: Identify customer requirementsStep 2: Characterize the existing network and sitesStep 3: Design the network topology and solutions

Once the design is defined, the implementation plan can be executed.

Identify customer requirementsDesign the networkCharacterize existing networkPreparePlanDesignChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicIn the Planning Phase you must identify:Network specific information, and the activities and tasks associated with developing the implementation plan. The network information includes: the existing topology, equipment, and software versions; the IP addressing plan; scalability requirements (summarization, stub areas, and so on); the list of advertised networks; the link utilization; and the metric requirements for primary and backup links. Other requirements to consider include site-specific implementation requirements, the tools required, and specific commands (for configuration and verification) that should be used.The dependencies that your implementation plan development has on other service components and the existing network. Implementation risks should be identified and a plan to manage them established. The recommended resources to accomplish the activities and tasks associated with the implementation plan development. The implementation schedule and the roles and responsibilities of the resources should also be established.34 2006, Cisco Systems, Inc. All rights reserved.PPDIOO Implement, Operate, OptimizeThe next three steps include:Step 4: Plan the implementation:Step 5: Implement and verify the design:Step 6: Monitor and optionally redesign:

Plan the implementationMonitor / RedesignImplement and VerifyDesignImplementOperate / OptimizeChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicStep 4: Plan the implementation: During this step, the implementation plan is prepared in advance to expedite and clarify the actual implementation. Cost assessment is also undertaken at this time. This step is performed during the PPDIOO Design phase.Step 5: Implement and verify the design: The actual implementation and verification of the design take place during this step by building the network. This step maps directly to the Implement phase of the PPDIOO methodology.The following steps are completed during creation and execution of an implementation plan:Planning the implementationSelecting the tools and resources requiredCoordinating work with specialistsVerification of the implementationInterpreting performance resultsDocumenting the baseline, performance, and recommendationsThe tasks in a site-specific implementation plan may include the following:Identifying applications and devices to be implementedCreating installation tasks and checklistsDefining device configuration and software requirementsCreating site-specific device configurations, installation tasks, and checklistsCreating installation verification testsStep 6: Monitor and optionally redesign: The network is put into operation after it is built. During operation, the network is constantly monitored and checked for errors. If troubleshooting problems become too frequent or even impossible to manage, a network redesign might be required; this can be avoided if all previous steps have been completed properly. This step is a part of the Operate and Optimize phases of the PPDIOO methodology.

35 2006, Cisco Systems, Inc. All rights reserved.Implementation Plan documentationThe implementation plan documentation should include the following:Network information Tools requiredResources requiredImplementation plan tasksVerification tasksPerformance measurement and resultsScreen shots and photos, as appropriateThe documentation creation process is not finished until the end of the project, when the verification information is added to it.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicA template for an implementation plan should be used, and information added during every step of the process. If a standard template does not exist within the organization, one should be created. At the end of the project, the documentation should be safely archived so that it can be used to review and troubleshoot the network, and when future changes are required.After successful implementation, the documentation must be updated to include all of the details, verification steps, and results.36 2006, Cisco Systems, Inc. All rights reserved.Sample Implementation PlanProject contact list and statements of work, to define all of the people involved and their commitments to the projectSite and equipment location information and details of how access to the premises is obtainedTools and resources requiredAssumptions madeTasks to be performed, including detailed descriptionsNetwork staging plan

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public37 2006, Cisco Systems, Inc. All rights reserved.Project Contact List (sample)Cisco Project Team Project TeamProject Manager: Telephone: Email: Project Manager: Telephone: Email: Project Engineer: Telephone: Email: Project Engineer: Telephone: Email: Design Engineer: Telephone: Email: Design Engineer: Telephone: Email: Account Manager: Telephone: Email: Account Manager: Telephone: Email: Systems Engineer: Telephone: Email: Systems Engineer: Telephone: Email: Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public38 2006, Cisco Systems, Inc. All rights reserved.Equipment Floor Plan (sample)

LocationDetailsFloorRoomSuitePositionRack No.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public39 2006, Cisco Systems, Inc. All rights reserved.Tools Required (sample)Item No.Item1.PC with Teraterm, 100BaseT interface, FTP Server and TFTP client applications2.Console port cable3.Ethernet cableChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public40 2006, Cisco Systems, Inc. All rights reserved.Implementation Task List (sample)Step No.Task1.Connect to the router2.Verify the current installation and create backup file3.Change IOS version (on all routers)4.Update IP address configuration (on distribution routers)5.Configure EIGRP routing protocol6.Verify configuration and record the resultsChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public41 2006, Cisco Systems, Inc. All rights reserved.

IP Routing OverviewChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public42 2006, Cisco Systems, Inc. All rights reserved.RoutingThis section addresses the ways in which routers learn about networks and how routers can incorporate static and dynamic routes.A router can be made aware of remote networks in two ways: An administrator can manually configure the information (static routing)The router can learn from other routers (dynamic routing). A routing table can contain both static and dynamically recognized routes.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public43 2006, Cisco Systems, Inc. All rights reserved.Static RoutesA static route can be used in the following circumstances:To have absolute control of routes used by the router. When a backup to a dynamically recognized route is necessary.When it is undesirable to have dynamic routing updates forwarded across slow bandwidth links.To reach a stub network.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public44 2006, Cisco Systems, Inc. All rights reserved.Static RoutingConfigure a static route with the ip route command.

Router(config)#ip route prefix mask address interface dhcp distance name next-hop-name permanent track number tag tagParameterDescriptionprefix maskThe IP network and subnet mask for the remote network to be entered into the IP routing table.addressThe IP address of the next hop that can be used to reach the destination network.interfaceThe local router outbound interface to be used to reach the destination network.dhcp(Optional) Enables a Dynamic Host Configuration Protocol (DHCP) server to assign a static route to a default gateway (option 3). distance(Optional) The administrative distance to be assigned to this route.name next-hop-name(Optional) Applies a name to the specified route. permanent(Optional) Specifies that the route will not be removed from the routing table even if the interface associated with the route goes down.track number(Optional) Associates a track object with this route. Valid values for the number argument range from 1 to 500.tag tag(Optional) A value that can be used as a match value in route maps.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public45 2006, Cisco Systems, Inc. All rights reserved.Configuring a Default Static RouteR2 is configured with a static route to the R1 LAN and a default static route to the Internet.R1 is configured with a default static route.R1(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1R1(config)# exitR1# show ip route

Gateway of last resort is not setC 172.16.1.0 is directly connected, FastEthernet0/0C 10.1.1.0 is directly connected, Serial0/0/0S* 0.0.0.0/0 [1/0] via 10.1.1.1R1#

R2(config)# ip route 172.16.1.0 255.255.255.0 S0/0/0R2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1

InternetS0/0/0S0/0/0Fa0/0Fa0/010.1.1.210.1.1.1192.168.1.2192.168.1.1S0/0/1R1R2172.16.1.0 /2410.2.0.0 /16Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public46 2006, Cisco Systems, Inc. All rights reserved.Dynamic RoutingDynamic routing (RIPv1, RIPv2, EIGRP, OSPF, and IS-IS) allows the network to adjust to changes in the topology automatically, without administrator involvement.The information exchanged by routers includes the metric or cost to each destination (this value is sometimes called the distance).Different routing protocols base their metric on different measurements, including hop count, interface speed, or more-complex metrics.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public47 2006, Cisco Systems, Inc. All rights reserved.On-Demand RoutingStatic routes must be manually configured and updated when the network topology changes. Dynamic routing protocols use network bandwidth and router resources. Resource usage of dynamic routing can be considerable.A third option is to use the Cisco On-Demand Routing (ODR) feature.ODR uses minimal overhead compared to a dynamic routing protocol and requires less manual configuration than static routes.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public48 2006, Cisco Systems, Inc. All rights reserved.ODR ODR is applicable in a hub-and-spoke topology only. ODR works with the Cisco Discovery Protocol (CDP) to carry network information between spokes and hub router.The hub router sends a default route to the spokes that points back to itself and installs the stub networks reported by ODR in its routing table.The hub router can then be configured to redistribute the ODR learned routes into a dynamic routing protocol. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicODR is not a true routing protocol because the information exchanged is limited to IP prefixes and a default route. ODR reports no metric information; the hub router uses a hop count of 1 as the metric for all routes reported via ODR. However, by using ODR, routing information for stub networks can be obtained dynamically without the overhead of a dynamic routing protocol, and default routes can be provided to the stub routers without manual configuration.49 2006, Cisco Systems, Inc. All rights reserved.Configuring ODRODR is configured:On all routers, CDP must be enabled.On the hub router using the router odr global config command.On the stub routers, no IP routing protocol can be configured. ODR learned routes appear in the hub router routing table with an entry of o and an administrative distance of 160.On each spoke router, the routing table contains only its connected networks and a static default route injected by ODR from the hub.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicODR relies on CDP to carry the information between the hub router and the spoke routers. Therefore, CDP must be enabled on the links between the hub router and the spoke routers. Cisco routers by default have CDP enabled both globally and per interface on most interfaces. However, on some WAN links, such as ATM, CDP must be explicitly enabled.CDP updates are sent as multicasts. On WAN links that require mappings, such as dialer links and Frame Relay, it is important to use the broadcast keyword in the mapping statements; allowing broadcasts also allows multicasts across the link. CDP uses Subnetwork Access Protocol (SNAP) frames, so it runs on all media that support SNAP.CDP updates are sent every 60 seconds by default. This setting might be too infrequent in rapidly changing networks or too often in stable ones. You can adjust the timers with the cdp timer global configuration command. You can verify CDP settings by using the show cdp interface command.50 2006, Cisco Systems, Inc. All rights reserved.Configuring ODRR1 is a hub router while R2 and R3 are stub routers.All routers have CDP enabled.R1(config)# router odrR1(config)# exitR1# show ip route

172.16.0.0/16 is subnetted, 2 subnetso 172.16.1.0/24 [160/1] via 10.1.1.2, 00:00:23, Serial0/0/1o 172.16.2.0/24 [160/1] via 10.2.2.2, 00:00:03, Serial0/0/2

R1#

S0/0/110.1.1.2S0/0/2R2R1172.16.1.0 /24R3172.16.2.0 /2410.2.2.210.2.2.110.1.1.1Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public51 2006, Cisco Systems, Inc. All rights reserved.Additional ODR commands.ODR can also be tuned with optional commands, including:a distribute list to filter routing updates timers basic router configuration command to adjust ODR timerscdp timer global configuration command to adjust the timers and improve convergence time (default is every 60 seconds).Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public52 2006, Cisco Systems, Inc. All rights reserved.Distance Vector Versus Link-StateDistance vector:All the routers periodically send their routing tables (or a portion of their tables) to only their neighboring routers. Routers use the received information to determine whether any changes need to be made to their own routing table. Link-state routing protocol:Each router sends thestate of its own interfaces (links) to all other routers in an area only when there is a change. Each router uses the received information to recalculate the best path to each network and then saves this information in its routing table.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicWhen a network is using a distance vector routing protocol, all the routers periodically send their routing tables (or a portion of their tables) to only their neighboring routers. The routers then use the received information to determine whether any changes need to be made to their own routing table (for example, if a better way to a specific network is now available). This process repeats periodically.In contrast, when a network is using a link-state routing protocol, each of the routers sends thestate of its own interfaces (its links) to all other routers (or to all routers in a part of the network, known as an area) only when there is a change. Each router uses the received information to recalculate the best path to each network and then saves this information in its routing table.53 2006, Cisco Systems, Inc. All rights reserved.Classful Versus Classless RoutingClassful Routing Protocol:Does not support VLSM.Routing updates sent do not include the subnet mask. Subnets are not advertised to a different major network.Discontiguous subnets are not visible to each other.RIP Version 1 (RIPv1) is a classful routing protocol.Classless Routing Protocol:Supports VLSM.Routing updates sent include the subnet mask. Subnets are advertised to a different major network.Discontiguous subnets are visible to each other.RIPv2, EIGRP, OSPF, IS-IS, and BGP are classless routing protocols.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public54 2006, Cisco Systems, Inc. All rights reserved.Discontiguous Subnets - Classful RoutingClassful routing protocols do not support discontiguous networks.Discontiguous subnets are subnets of the same major network that are separated by a different major network.For example, RIPv1 has been configured on all three routers.Routers R2 and R3 advertise 172.16.0.0 to R1.They cannot advertise the 172.16.1.0 /24 and 172.16.2.0 /24 subnets across a different major network because RIPv1 is classful. R1 therefore receives routes about 172.16.0.0 /16 from two different directions and it might make an incorrect routing decision.

Fa0/0R2R1172.16.1.0 /24R3Fa0/0172.16.2.0 /24192.168.2.0 /24192.168.1.0 /24RIPv1 update172.16.0.0RIPv1 update172.16.0.0Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public55 2006, Cisco Systems, Inc. All rights reserved.Discontiguous Subnets - Classless RoutingClassless routing protocols support discontiguous networks.For example, RIPv2 has been configured on all three routers.Because of RIPv2, routers R2 and R3 can now advertise the 172.16.1.0 /24 and 172.16.2.0 /24 subnets across a different major network. R1 therefore receives routes with valid subnet information and can now make a correct routing decision.

Fa0/0R2R1172.16.1.0 /24R3Fa0/0172.16.2.0 /24192.168.2.0 /24192.168.1.0 /24RIPv2 update172.16.1.0/24RIPv2 update172.16.2.0/24R1 Routing Table: 172.16.1.0/24 172.16.2.0/24Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public56 2006, Cisco Systems, Inc. All rights reserved.ip classless CommandThe behavior of a classful routing protocol changes when the ip classless global config command is used.Classful protocols assume that if the router knows some of the subnets of a classful network (e.g. 10.0.0.0), then it must know all that networks existing subnets. If a packet arrives for an unknown destination on the 10.0.0.0 subnet and:ip classless is not enabled, the packet is dropped. ip classless is enabled, then the router will follow the best supernet route or the default route.Since IOS release 12.0, ip classless is enabled by default and should not be disabled.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public57 2006, Cisco Systems, Inc. All rights reserved.Automatic Route SummarizationClassful routing automatically summarize to the classful network boundary at major network boundaries. Classless routing protocols either do not automatically summarize or automatically summarize but this feature can be disabled.OSPF or IS-IS do not support automatic network summarization. RIPv2 and EIGRP perform automatic network summarization to maintain backward compatibility with RIPv1 and IGRP.However, automatic summarization can be disabled in RIPv2 and EIGRP by using the no auto-summary router config command.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public58 2006, Cisco Systems, Inc. All rights reserved.Characteristics of Routing ProtocolsCharacteristicsRIPv1RIPv2EIGRPIS-ISOSPFBGPDistance vectorLink-stateClasslessVLSM supportAutomatic route summarization(can be disabled using no auto-summary)(can be disabled using no auto-summary)Manual route summarizationHierarchical topology requiredSize of networkSmallSmallLargeLargeLargeVery largeMetricHopsHopsComposite metricMetricCostPath attributesConvergence timeSlowSlowVery fastFastFastSlowChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public59 2006, Cisco Systems, Inc. All rights reserved.Routing Protocol SpecificsRouting ProtocolProtocol NumberPort NumberAdmin DistanceRIP--UDP 520120IGRP9--100EIGRP88--90Summary Routes 5Redistributed Routes 170OSPF89--110IS-IS124--115BGP--TCP 179eBGP 20iBGP 200 Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public60 2006, Cisco Systems, Inc. All rights reserved.Routing Table Criteria

The best route selected from various routing protocols for a specific destination is chosen by considering the following four criteria:Valid next-hop IP address.Administrative distanceMetricPrefixChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicValid next-hop IP addressAs each routing process receives updates and other information, the router first verifies that the route has a valid next-hop IP address.Administrative distanceThe next consideration is administrative distance. If more than one route exists for the same network (with the same prefix), the router decides which route to install based on the administrative distance of the routes source. The route with the lowest administrative distance is installed in the routing table. Routes with higher administrative distances are rejected.MetricIf the next hop is valid, the routing protocol chooses the best path to any given destination based on the lowest metric. The routing protocol offers this path to the routing table. For example, if EIGRP learns of a path to 10.1.1.0/24 and decides that this particular path is the best EIGRP path to this destination, the routing protocol offers the learned path to the routing table.PrefixThe router looks at the prefix being advertised; routes to the same network but with different prefixes can coexist in the routing table. For example, suppose the router hasthree routing processes running on it, and each process has received the following routes:RIPv2: 192.168.32.0/26OSPF: 192.168.32.0/24EIGRP: 192.168.32.0/19Because each route has a different prefix length (different subnet mask), the routes are considered different destinations and are all installed in the routing table. As discussed in the Classless Routing Protocol Concepts section earlier in this chapter, if more than one entry in the routing table matches a particular destination, the longest prefix match in the routing table is used. Therefore, in this example, if a packet arrives for the address 192.168.32.5, the router will use the 192.168.32.0/26 subnet, advertised by RIPv2, because it is the longest match for this address.

61 2006, Cisco Systems, Inc. All rights reserved.Administrative DistanceCisco routers use a value called administrative distance to select the best path when they learn of two or more routes to the same destination with the same prefix from different routing protocols.Administrative distance rates a routing protocols believability. Cisco has assigned a default administrative distance value to each routing protocol supported on its routers. Each routing protocol is prioritized in the order of most to least believable.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public62 2006, Cisco Systems, Inc. All rights reserved.Administrative DistancesRoute Source Default Distance Routing Table Entry Connected interface 0 C Static route out an interface 0 S Static route to a next-hop address 1 S EIGRP summary route 5 D External BGP 20 B Internal EIGRP 90 D IGRP 100 I OSPF 110 O IS-IS 115 i RIPv1, RIPv2 120 R Exterior Gateway Protocol (EGP) 140 E ODR 160 O External EIGRP 170 D EX Internal BGP 200 B Unknown 255 Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public63 2006, Cisco Systems, Inc. All rights reserved.Floating Static RouteRouters believe static routes over any dynamically learned route. To change this default behavior and make a static route appear in the routing table only when the primary route goes away, create a floating static route.The administrative distance of the static route is configured to be higher than the administrative distance of the primary route and it floats above the primary route, until the primary route fails.To configure a static route use the ip route command with the distance parameter.

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public64 2006, Cisco Systems, Inc. All rights reserved.Configuring a Floating Static RouteCreate floating static routes on R1 and R2 that floats above the EIGRP learned routes.R1(config)# ip route 10.0.0.0 255.0.0.0 172.16.1.2 100R1(config)# router eigrp 1R1(config-router)# network 172.17.0.0R1(config-router)# network 192.168.1.0

InternetFa0/0Fa0/0192.168.1.0 /24Backup linkR1R2172.17.0.0 /1610.0.0.0 /8EIGRP 1Primary link172.16.1.1172.16.1.2R2(config)# ip route 172.17.0.0 255.255.0.0 172.16.1.1 100R2(config)# router eigrp 1R2(config-router)# network 10.0.0.0R2(config-router)# network 192.168.1.0

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco PublicR1 and R2 have two connections: a point-to-point serial connection that is the primary link, and a backup connection to be used if the other line goes down. Both routers use EIGRP, but do not use a routing protocol on the backup 172.16.1.0 network link.A static route that points to the backup interface of the other router has been created on each router. Because EIGRP has an administrative distance of 90, the static route has been given an administrative distance of 100. As long as router A has an EIGRP route to the 10.0.0.0 network, it appears more believable than the static route, and the EIGRP route is used. If the serial link goes down, deleting the EIGRP route, router A will insert the static route into the routing table. A similar process happens on router B with its route to the 172.17.0.0 network.65 2006, Cisco Systems, Inc. All rights reserved.Routing Within the ECNM

Routing protocols are an integral part of any network. When designing a network routing protocol, selection and planning are among the design decisions to be made. Although the best practice is to use one IP routing protocol throughout the enterprise if possible, in some cases multiple routing protocols might be required.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public66 2006, Cisco Systems, Inc. All rights reserved.Suggested Routing Protocols Used

Building AccessBuilding DistributionCore (Campus backbone)Server FarmEdge DistributionRIPv2, OSPF, EIGRP, Static routesOSPF, EIGRP, IS-IS and BGPBetween Building Access and Building Distribution:Between Building Distribution and Core:Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public67Service Provider Edge: This functional area represents connections to resources external to the campus. This area facilitates communication to WAN and Internet service provider technologies.The three modules within the Service Provider Edge functional area are as follows:ISPRepresents Internet connections (in Figure 1-7 two instances of this module are shown, representing a dual-homed connection to two ISPs)PSTNRepresents all nonpermanent connections, including via analog phone, cellular phone, and Integrated Services Digital Network (ISDN) Frame Relay/Asynchronous Transfer Mode (ATM)Represents all permanent connections to remote locations, including via Frame Relay, ATM, leased lines, cable, digital subscriber line (DSL), and wireless. 2006, Cisco Systems, Inc. All rights reserved.Routing Within the ECNM

The Enterprise Composite Network Model can assist in determining where each routing protocol is implemented, where the boundaries between protocols are, and how traffic flows between them will be managed.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public68 2006, Cisco Systems, Inc. All rights reserved.Chapter 1 SummaryTraffic in converged networks includes voice and video, voice applications, mission-critical, transactional, routing protocol, and network management.The three phases of the Cisco IIN: integrated transport, integrated services, and integrated applications.The three layers of the Cisco SONA architectural framework: networked infrastructure, interactive services, application.The components of the Cisco Enterprise Architecture for integration of the entire network: campus, data center, branches, teleworkers, and WAN.The traditional hierarchical network model with its three layers: core, distribution, and access.The Cisco Enterprise Composite Network Model with its three functional areas and their associated modules: Enterprise Campus: Building, Building Distribution, Core, Edge Distribution, Server Farm, ManagementEnterprise Edge: E-commerce, Corporate Internet, VPN and Remote Access, WANService Provider Edge: ISP, PSTN, Frame Relay/ATM. Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public69 2006, Cisco Systems, Inc. All rights reserved.Chapter 1 Summary (continued)The two approaches to implementing changes to a network: using an ad-hoc approach or using a structured approach.Four models used in IT services lifecycles: Cisco Lifecycle Services (PPDIOO), ITIL, FCAPS, and TMN.Creating an implementation plan, as part of the network Design phase, that includes: Network information Tools requiredResources requiredImplementation plan tasksVerification tasksPerformance measurement and results}Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public70 2006, Cisco Systems, Inc. All rights reserved.Chapter 1 Summary (continued)Static routing characteristics and configuration.Characteristics and configuration of ODR, which uses CDP to carry network information between spoke (stub) routers and the hub router.Dynamic routing protocol characteristics, including:The metric, a value (such as path length) that routing protocols use to measure paths to a destination.Configuration, using the router protocol global configuration command.Distance vector routing, in which all the routers periodically send their routing tables (or a portion of their tables) to only their neighboring routers.Link-state routing, in which each of the routers sends thestate of its own interfaces (its links) to all other routers (or to all routers in a part of the network, known as an area) only when there is a change.Hybrid routing, in which routers send only changed information when there is a change (similar to link-state protocols) but only to neighboring routers (similar to distance vector protocols).Classful routing protocol updates, which do not include the subnet mask. Classful protocols do not support VLSM or discontiguous subnets and must automatically summarize across the network boundary to the classful address. Classless routing protocol updates, which do include the subnet mask. Classless protocols do support VLSM and discontiguous subnets, and do not have to summarize automatically across network boundaries.The process that Cisco routers use to populate their routing tables includes a valid next-hop IP address, Administrative distance, metric, and prefix.Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public71 2006, Cisco Systems, Inc. All rights reserved.Lab 1-1 Tcl Script Reference and DemonstrationChapter 1 LabsChapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public

Chapter 1# 2007 2010, Cisco Systems, Inc. All rights reserved.Cisco Public73 2006, Cisco Systems, Inc. All rights reserved.