The document discusses routers and Cisco IOS. It describes how Cisco IOS is the operating system that controls routing and switching functions. It then explains the basic components and functions of routers, including memory components like ROM, RAM, NVRAM and Flash memory. It also discusses router interfaces, bootup sequence, and configuration modes.
The document discusses how OSPF routers elect a Designated Router (DR) and Backup Designated Router (BDR) on multi-access networks like LANs. The DR and BDR serve as central points for exchanging routing information with other routers to reduce OSPF traffic. If the DR fails, the BDR takes over its role of redistributing routing information. The election is based on priority and router ID, with the highest priority router becoming DR and second highest becoming BDR.
This document provides an overview of EtherChannel concepts and configuration. EtherChannel allows linking multiple physical Ethernet ports together to form a single logical trunk with increased bandwidth. It uses protocols like PAgP and LACP to dynamically establish and maintain EtherChannel bundles. EtherChannel load balances traffic across physical ports and treats the bundle as a single logical port for functions like spanning tree. The document outlines terminology, configuration, verification commands, and considerations for optimizing EtherChannel deployment.
In this lecture you can learn about IPv4 addressing Schemes and subnetting in easy and simple way. the topics are explained with example which can help you to understand the concept.
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
?
This document provides an overview of configuring a Cisco IOS network operating system. It discusses accessing and navigating the Cisco IOS using the command line interface, including setting hostnames, limiting access using passwords, and saving configurations. It also covers basic networking concepts like addressing schemes and verifying connectivity between devices.
The document provides instructions for configuring initial settings on a Cisco switch, including:
- Configuring the boot system to specify the IOS image loaded during startup.
- Configuring the switch management interface by assigning an IP address to the SVI for a designated management VLAN.
- Configuring switch ports by setting the duplex and speed settings, enabling auto-MDIX, and verifying the port configuration and status using commands like show interfaces.
The document discusses implementing BGP, including BGP terminology, concepts, operation, neighbor relationships, and basic BGP configuration. It describes BGP as a path vector routing protocol used between autonomous systems to exchange routing and reachability information. It differentiates between external BGP which establishes relationships between routers in different autonomous systems, and internal BGP which is used within an autonomous system. Basic BGP configuration involves defining BGP neighbors, entering BGP configuration mode, and activating BGP sessions.
This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
PRISMA CSI ? Cyber Security and Intelligence www.prismacsi.com
Bu dokman, al?nt? vererek kullan?labilir ya da payla??labilir ancak de?i?tirilemez ve ticari ama?la kullan?lamaz. Detayl? bilgiye https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.tr ba?lant?s?ndan eri?ebilirsiniz.
The document discusses configuring EIGRP on routers. EIGRP configuration requires enabling EIGRP using the "router eigrp ASN_NUMBER" command and specifying networks to advertise using the "network SUBNET" command. The ASN number must match across routers to establish neighbor relationships. The network command can use a wildcard mask to enable EIGRP on specific interfaces rather than all interfaces in a classful network. Verification commands like "show ip eigrp neighbors" and "show ip route" are provided to check neighbor relationships and exchanged routes.
- The document discusses a thesis submitted on the Password Authenticated Key Exchange Protocol (PAKE) which allows two parties to establish a secure communication channel by exchanging a secret key based on a shared password.
- It proposes using public key cryptography like RSA to generate a session key, and symmetric key encryption like AES to generate a public key by encrypting the secret key along with the shared password. Hashing with SHA-1 is also used to provide data integrity.
- The implementation uses Java to encrypt and decrypt strings and files to demonstrate that the PAKE protocol provides security even when parties share a simple password.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
This document provides an overview of cyber security fundamentals and concepts including information assurance, authentication, authorization, non-repudiation, confidentiality, integrity, and availability. It defines these terms and describes how they relate to maintaining the security properties of systems. The document also discusses specific authentication methods like factors of authentication. It explains concepts like authorization, encryption techniques including symmetric and asymmetric cryptography, and the goals of confidentiality, integrity and availability.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
?
This document discusses static routing and how to configure static routes on Cisco routers. It begins with an overview of static routing, including the advantages and disadvantages. It then covers different types of static routes such as standard, default, summary, and floating static routes. The document provides examples of how to configure IPv4 and IPv6 static routes, default routes, and verify the routes. It also includes background information on topics like classful addressing and CIDR that are relevant to static route configuration.
The document discusses implementing BGP, including BGP terminology, concepts, operation, neighbor relationships, and basic BGP configuration. It describes BGP as a path vector routing protocol used between autonomous systems to exchange routing and reachability information. It differentiates between external BGP which establishes relationships between routers in different autonomous systems, and internal BGP which is used within an autonomous system. Basic BGP configuration involves defining BGP neighbors, entering BGP configuration mode, and activating BGP sessions.
This document discusses configuring and troubleshooting single-area OSPF routing. It covers topics like:
- Configuring static and dynamic routing on distribution and core routers
- Configuring and verifying single-area OSPF
- Designated router election process for multiaccess networks
- Propagating default static routes in OSPF
- Securing OSPF with message digest 5 authentication
- Components of troubleshooting single-area OSPF like forming adjacencies and transitioning states
This document provides an overview of the Enhanced Interior Gateway Routing Protocol (EIGRP). It describes the history and development of EIGRP, its basic operation and components, including reliable transport protocol, packet types, neighbor discovery via hello packets, and route updates using the diffusing update algorithm. It also covers basic EIGRP configuration such as enabling it with the router eigrp command, advertising networks, and verifying neighbor relationships.
PRISMA CSI ? Cyber Security and Intelligence www.prismacsi.com
Bu dokman, al?nt? vererek kullan?labilir ya da payla??labilir ancak de?i?tirilemez ve ticari ama?la kullan?lamaz. Detayl? bilgiye https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.tr ba?lant?s?ndan eri?ebilirsiniz.
The document discusses configuring EIGRP on routers. EIGRP configuration requires enabling EIGRP using the "router eigrp ASN_NUMBER" command and specifying networks to advertise using the "network SUBNET" command. The ASN number must match across routers to establish neighbor relationships. The network command can use a wildcard mask to enable EIGRP on specific interfaces rather than all interfaces in a classful network. Verification commands like "show ip eigrp neighbors" and "show ip route" are provided to check neighbor relationships and exchanged routes.
- The document discusses a thesis submitted on the Password Authenticated Key Exchange Protocol (PAKE) which allows two parties to establish a secure communication channel by exchanging a secret key based on a shared password.
- It proposes using public key cryptography like RSA to generate a session key, and symmetric key encryption like AES to generate a public key by encrypting the secret key along with the shared password. Hashing with SHA-1 is also used to provide data integrity.
- The implementation uses Java to encrypt and decrypt strings and files to demonstrate that the PAKE protocol provides security even when parties share a simple password.
Spanning Tree Protocol (STP) resolves physically redundant topologies into loop-free, tree-like
topologies. The biggest issue with STP is that some hardware failures can cause it to fail. This failure
creates forwarding loops (or STP loops). Major network outages are caused by STP loops.
The loop guard STP feature that is intended to improve the stability of the Layer 2 networks. This
document also describes Bridge Protocol Data Unit (BPDU) skew detection. BPDU skew detection is a
diagnostic feature that generates syslog messages when BPDUs are not received in time.
This document provides an overview of cyber security fundamentals and concepts including information assurance, authentication, authorization, non-repudiation, confidentiality, integrity, and availability. It defines these terms and describes how they relate to maintaining the security properties of systems. The document also discusses specific authentication methods like factors of authentication. It explains concepts like authorization, encryption techniques including symmetric and asymmetric cryptography, and the goals of confidentiality, integrity and availability.
RIP (Routing Information Protocol) is a standard routing protocol that exchanges routing information between gateways and hosts. It works by limiting routes to a maximum of 15 hops to prevent routing loops. There are three versions of RIP: RIP version 1 supports only classful routing; RIP version 2 adds support for VLSM and authentication; and RIPng extends RIP version 2 to support IPv6. RIP has limitations such as a small hop count limit and slow convergence times. It is commonly implemented in Cisco IOS, Junos, and open source routing software.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It describes OSPF's message encapsulation, packet types, neighbor discovery process using Hello packets, link state database and shortest path first algorithm, metric and cost calculation, and mechanisms for handling multi-access networks like designated router election. The objectives are to describe OSPF configuration and troubleshooting.
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
?
This document discusses static routing and how to configure static routes on Cisco routers. It begins with an overview of static routing, including the advantages and disadvantages. It then covers different types of static routes such as standard, default, summary, and floating static routes. The document provides examples of how to configure IPv4 and IPv6 static routes, default routes, and verify the routes. It also includes background information on topics like classful addressing and CIDR that are relevant to static route configuration.
This document provides an example to illustrate how the distance vector routing algorithm works. It shows the vector tables of routers B, D, and C that store the distances to all other routers. It then calculates the routing table for router A based on the distances through neighboring routers B, D, and C, taking the minimum distances. The final routing table for A is (0, 2, 2, 1, 2, 2) with routes going through routers D, C, D, D, D respectively.
Routing protocols allow routers to communicate and exchange information that helps determine the best path between networks. The main types are static routing, where routes are manually configured, and dynamic routing, where routes are automatically updated as network conditions change. Common dynamic routing protocols include RIP, IGRP, EIGRP, and OSPF, which use different algorithms and metrics like hop count or bandwidth to calculate the best routes.
DHCP SERVER Loglar? ve SNMP ile Kimlik TakibiErtugrul Akbas
?
Yasal sorumluklardan dolay? ve gvenlik analizleri i?in a? y?neticilerine, belirli tarihte bir IP adresini kimin kulland??? sorusu s?k s?k sorulur. E?er btn kullan?c?lar bir hotpot/Proxy/Captive Portal kullan?l?yorsa bu soruya cevap vermek kolayd?r. Ama kullan?lmayan durumlarda di?er y?ntemlerden faydalanmak gerekir. Burada 802.1x A? Kimlik Denetimi Protokol ve MAC adresi temelli kimlik denetimi devreye girer. 802.1x kimlik denetimi protokol OSIye g?re ikinci katman protokoldr ve olu?an logda sadece MAC bilgisi bulunur dolay?s? ile ba?ka bir networke ta??nmaz ayr?ca soru IP adresini kim kulland? ?eklindedir. MAC adresi temelli kimlik denetimi ise pratikte uygulamas? imkans?zd?r. Mesela MAC adresi de?i?tiren programlar vs.. . Bu durumda MAC ve IP aras?ndaki ili?kileri her durumda al?p otomatik korelasyona tabi tutan bir sistem gerekmektedir. Bunun da yolu DHCP Sunucu lo?lar? ile gatewaylerdeki ARP tablosunu takip edip sonu?lar? korele etmektir.
2. Y?NLEND?R?C?LER(ROUTER)
? A?lar aras? (LAN-LAN,LAN-WAN,WAN-WAN) haberle?menin
yap?labilmesi i?in ara ba?lant?y? sa?lar.
? Gelen paketin ba?l???ndan ve y?nlendirme tablosu bilgilerinden
yararlanarak y?nlendirme kararlar?n? verme yetene?ine sahiptir.
3. ? Routerin bir RAM, CPU ve zerinde bir i?letim sistemi IOS (Internal
Operating System) vard?r.
? Y?nlendiricilerin as?l vazifesi ald??? paketi hedef adresine
g?ndermektir.
? Y?nlendiriciler farkl? ?l?ekteki a?lara g?re farkl? kapasitelerde
retilirler.
4. ? Y?nlendirici al?rken;
1.Hangi a? arayzlerini desteklemektedir?
Her y?nlendirici her ba?lant? ?eklini desteklemez. Ethernet ya da
Fastethernet portu hemen tm y?nlendiricilerin zerinde bulunur. Di?er
portlar ihtiyaca g?re sonradan tak?labilir.
2.Y?nlenricilerin ayn? anda ?evirebilecekleri paket oran?
(switchfabric) bilinmelidir.
Y?nlendiricilerin ayn? anda i?leyebilecekleri paket miktar? k?s?tl?d?r.
Al?nacak y?nlendiricinin switchfabric de?eri y?nlendiricinin zerinden
akacak toplam trafik miktar?na g?re belirlenmelidir.
5. Y?nlendiriciler
Merkez Y?nlendiriciler:
? Daha fazla porta ve h?zl? bir a? eri?imine sahiptir.
? A??n merkezinde bulunduklar?ndan hatas?z ve srekli ?al??mas? gerekir.
Kenar Y?nlendiriciler:
? Yerel a?? geni? alana ba?lamakta kullan?l?r.
7. Y?nlendirme (Routing) Nedir?
? Bir networkten di?erine ge?i? i?in bir yol haritas?d?r.
? Bu yol haritalar? routerlar?m?za dinamik olarak ba?ka bir router
taraf?ndan yada statik olarak bir admin taraf?ndan haz?rlanm??
olabilirler.
10. Algoritma ?e?itleri
Sabit Y?ntem:
? Tablo, y?nlendirme i?lemleri boyunca sabit olarak kullan?l?r ve a?daki
trafik farkl?la?malar?na ra?men de?i?tirilmez.
? ?ki nokta aras?nda verinin ilerleyece?i yol ?nceden belli olmaktad?r.
11. Algoritma ?e?itleri
Sabit Algoritman?n Dezavantajlar?
? A? zerinde belli yollarda t?kan?kl??a neden olabilmektedir.
? Ba?ka bir olumsuz noktas? ise ba?lant?larda meydana gelebilecek
kopmalar?n tablolarda gncelleme yap?lmad???ndan dolay?
y?nlendirme i?lemine olumsuz yans?mas?d?r.
12. Algoritma ?e?itleri
Dinamik ( Dynamic ) Y?ntem:
? Tablolar?n a??n trafi?ine g?re srekli gncellenmesi yap?lmaktad?r.
? ?ki nokta aras?nda iletilen veri her seferinde farkl? yollar?
kullanabilmektedir.
? Daha karma??k algoritmalara sahiptir.
? A?da olu?abilecek trafik de?i?imleri ve ba?lant? kopmalar?nda farkl?
yollar kullanabilmektedir.
14. Y?nlendirme ?e?itleri
Da??n?k Y?nlendirme:
? Paketin ula?t??? her y?nlendirici hedef ?P adresi baz alarak elindeki
bilgiler ile paketi bir sonraki y?nlendiriciye iletmektedir.
? Paketin yolu ba?lang??ta de?il sre? i?erisinde belirlenmektedir.
15. Y?nlendirme Algoritmalar?
? Temel amac? bir graf zerindeki iki nokta aras?nda en k?sa yolun
bulunmas?d?r.
? Y?nlendirme algoritmalar?n?n atas? olarak da kabul edilmektedir.
a. Dijkstra En K?sa Yol Algoritmas?
16. Y?nlendirme Algoritmalar?
? Dijkstra algoritmas? sonu? olarak A d?mnden di?er d?mlere giden en k?sa
yollar? verecektir.
a. Dijkstra En K?sa Yol Algoritmas?
17. Y?nlendirme Algoritmalar?
? Bu algoritma sabit y?nlendirme algoritmas? s?n?f?na dahildir. ?nk bu
algoritma taraf?ndan olu?turulan y?nlendirme tablosu, y?nlendirme
i?lemleri boyunca sabit olarak kullan?l?r ve a?daki trafik
farkl?la?malar?na ra?men de?i?tirilmez.
a. Dijkstra En K?sa Yol Algoritmas?
18. Y?nlendirme Algoritmalar?
? Bellman-Frord algoritmas? Dijkstra algoritmas?na g?re daha kapsaml?
bir algoritmad?r.
? Bu Algoritma temel olarak d?mlerin kaynaktan olan uzakl?klar?na
g?re (ge?ilecek d?m say?s?-hop) i?lemektedir.
b. Bellman-Ford En K?sa Yol Algoritmas?
19. Y?nlendirme Algoritmalar?
? ?lk olarak kaynak d?mden (A d?m) bir atlamayla gidilecek olan B ve D
d?mleri belirlenir ve de?erleri i?lenir.
b. Bellman-Ford En K?sa Yol Algoritmas?
20. Y?nlendirme Algoritmalar?
? Ge?ilecek d?m say?s? s?ras?yla 2-3 ve 4 olarak belirlenip her atlamada
gidilecek d?mler belirlenerek algoritma sonunda kaynak d?mden di?er
tm d?mlere gidilecek en k?sa yollar belirlenmi? olur.
b. Bellman-Ford En K?sa Yol Algoritmas?
21. Y?nlendirme Algoritmalar?
? Su bask?n? y?nteminde bir d?me gelen paketin kopyalar? paketin
geldi?i d?m hari? tm kom?ular?na g?nderilme prensibine
dayanmaktad?r.
? Bu y?ntemin dezavantaj? her d?mde paketin kopyalar?
olu?turuldu?undan dolay? trafi?in a??r? derecede yo?unla?mas?d?r.
c. Su Bask?n? (Flooding) Algoritmas?
22. Y?nlendirme Algoritmalar?
? Su bask?n? y?nteminin dezavantajlar? olmas?na ra?men bir?ok da
avantaj? bulunmaktad?r.
? Bu avantajlar, d?mlerde hi?bir hesaplaman?n yap?lmamas? ve
paketin ne olursa olsun bir yolunu bulup hedefe ula?mas? ?eklinde
s?ralanabilir.
c. Su Bask?n? (Flooding) Algoritmas?
23. d. Rastgele (Random) Y?nlendirme Algoritmas?
? D?me gelen paket tamamen rastsal bir bi?imde se?ilen kom?ulardan
birine g?nderilmektedir.
? Bu y?ntemde d?me paketin geldi?i d?m hari? 4 yol varsa paketin
herhangi bir yola g?nderilme olas?l??? 1/4 olmaktad?r.
? Bu y?ntemdeki rastsal se?im i?in belli bir ?l?t koyularak geli?mi? bir
modele d?ndrlebilmektedir. Bu ?l?t genelde d?me ba?l? hatlar?n
veri h?z? olarak kullan?lmaktad?r.
? Bu sayede paketin daha h?zl? olan bir hatta g?nderilme olas?l???
artt?r?lmaktad?r.
Y?nlendirme Algoritmalar?
24. e. Uzakl?k Vekt?r Algoritmas?
? Dinamik bir y?nlendirme algoritmas?d?r.
? Her bir d?m a??n geneli hakk?nda bir y?nlendirme tablosu tutmaktad?r.
? Bu tabloda hedef d?mn uzakl??? ve hedef d?me ula?abilmek i?in
y?nlendirilmesi gereken bir sonraki d?m bilgisi tutulmaktad?r.
? Bu tablolara uzakl?k vekt?r ad? verilmektedir.
Y?nlendirme Algoritmalar?
25. e. Uzakl?k Vekt?r Algoritmas?
? D?mler ellerinde bulunan vekt?rleri belli zaman aral?klar?nda kom?ula-
r?na g?ndermekte ve kom?ular?ndan gelen bilgileri almaktad?rlar.
? Her d?m kendine gelen vekt?rlerdeki verileri kullanarak tuttu?u
vekt?r gncellemektedir.
? Bu sayede d?m kendine kom?u olmayan d?mlere ula?ma yollar?n? da
??renmi? olmaktad?r.
Y?nlendirme Algoritmalar?
26. ? Sistem ilk ?al??maya ba?lad???nda btn d?mlerdeki bo? olan tablolar,
d?mn kom?ular?na olan uzakl?klar?n? ??renmesi ile doldurulmaktad?r. Bu
durumda sadece kom?ular?na olan uzakl?k yer almaktad?r.
27. f. Ba?lant? Durumu Algoritmas?
? Ba?lant? durumu y?nlendirme (Link State) algoritmas? Dijkstra en k?sa yol
algoritmas?n? kullanmaktad?r. Fakat bu algoritmalardan en byk fark? sabit
de?il a??n durumuna g?re de?i?en (dinamik) bir y?ntem olmas?d?r.
? Bu y?ntem 1979'da uzakl?k vekt?r algoritmas?n?n temel iki problemine
alternatif olarak geli?tirilmi?tir.
? Bu iki problemden ilki uzakl?k vekt?r algoritmas?n?n sonuca ula?mas?n?n fazla
zaman almas?d?r. ?kincisi ise uzakl?k vekt?r algoritmas?n?n ba?lant?lar?n
kapasitelerinin g?z ?nnde bulundurulmamas?d?r.
Y?nlendirme Algoritmalar?
28. Y?nlendirme Protokolleri
? ?nterneti olu?turan a?lar birbirlerine a? ge?idi ile ba?lanmaktad?r.
? ?nterneti olu?turan ve kendi i?erisinde ortak bir y?netime sahip a? yap?lar?na
otonom sistemler (Autonomous systems) denir.
? Y?nlendirme Protokoller;
1) Otonom sistemlerin i?erisinde ?al??an dahili y?nlendirme protokolleri
(Inte- rior Routing Protokol-IRP)
2) Otonom sistemler aras?nda y?nlendirme sa?layan harici y?nlendirme
protokolleri (Exterior Routing Protokol-ERP)
34. Y?nlendirme Protokolleri
A.RIP
? Dahili y?nlendirme protokol olan y?nlendirme bilgi protokol (Rou ting
Information Protocol-RIP).
? TCP/IP a??ndaki y?nlendiricilerin birbirini otomatik olarak tan?mas?nda ve kendi
y?nlendirme tablolar?n? olu?turmas?nda kullan?lan protokoldr.
? Uzakl?k vekt?r algoritmas?n? kuIlan?r.
? RIP bu algoritmay? kullan?rken kaynak ve hedef aras?ndaki mesafeyi ge?ilecek
d?m say?s? olarak kabul etmektedir.
? Uzakl?k vekt?r algoritmas?nda ortaya ??kan sonsuza sayma probleminin ??zm
i?in RIP, iki nokta aras?ndaki yolun maksimum 15 d?m say?s? kabul
etmektedir.
35. ? B.OSPF
? En k?sa a??k yol protokol (OPSF-Open Shortest Path First).
? A? katman?nda ?al??an, TCP/IP protokol a?lar? zerinde y?nlendirme
yapan dahili y?nlendirme protokoldr.
? Ba?lant? durumu algoritmas?n? kullanmakta dolay?s? ile Dijkstra algoritmas?
temelinde ?al??maktad?r.
? OSPF'nin en byk avantaj? byk a?lar zerinde bile maliyeti ?ok d?k
tutarak verimlili?i artt?rmas?d?r.
? En byk dezavantaj? ise karma??k bir yap?ya sahip olmas?d?r.
? Her bir y?nlendirici ba?l? bulundu?u otonom sistem i?erisinde yer alan
tm yol bilgisini bir tabloda tutmakta ve en k?sa yolu bu tabloyu
kullanarak hesaplamaktad?r.
Y?nlendirme Protokolleri
37. ? C.IGRP
? Dahili a? ge?idi y?nlendirme protokol (Dahili a? ge?idi y?nlendirme prolokol-
IGRP)
? IGRP, RIP i?erisinde bulunan s?n?rl?l?klar? (iki d?m aras? maksimum d?m say?s?)
ortadan kald?rmak amac? ile geli?tirilmi?tir.
? IGRP'de maksimum d?m say?s? varsay?lan olarak 100 ile belirlense de 255'e
kadar ??kart?labilmektedir.
? Yol se?iminde atlama say?s? yerine be? adet ?l?t kullan?lmaktad?r: bant geni?li?i,
yk, gecikme, gvenilirlik ve iletilen maksimum birim.
? Uzakl?k vekt?r algoritmas?n? kullanan IGRP yol bilgisine ait veri de?i?imi 90
saniyede ger?ekle?tirirken, a?daki de?i?ikliklerin bildirilmesini hemen
yapmaktad?r.
Y?nlendirme Protokolleri
38. ? D.EIGRP
? Geli?tirilmi? dahili a? ge?idi y?nlendirme protokol (Enhanced inter- rior
gateway routing protocol-EIGRP)
? IGRP'nin yetersiz kalmas? ile geli?tirilmi? bir protokoldr.
? EIGRP temel olarak hem bir uzakl?k vekt?r ve ba?lant? durum vekt?r
algoritmas?n?n iyi y?nlerini alarak geli?tirilmi?tir.
Y?nlendirme Protokolleri
39. ? D.EIGRP
? EIGRP zerinde ?al??an y?nlendiriciler, veri al??veri?i amac? ile 5 farkl? paket
kullanmaktad?r:
? Selam (Hello),
? Gncelleme (Update),
? Sorgu (Query),
? Yan?t (Reply)
? Onay (Acknovvledgement)
? Sisteme yeni dahil olan veya sistemden ??kar?lan bir y?nlendiricinin
belirlenmesi sorgu, selam ve onay mesajlar? ile tespit edilmektedir.
? A? da ger?ekle?en de?i?iklikler gncelleme paketleri ile kom?ulara sunulur.
Y?nlendirme Protokolleri
40. ? E.EGP
? Harici a? ge?idi protokol (Exterior Gatevvay Protocol-EGP)
? Otonom sistemler aras?nda yol belirlemede kullan?l?r.
? EGP temel olarak a? ge?itleri i?erisinde bulunan y?nlendirme tab-
lolar?n?n kurulmas? ve gncellenmesini sa?lamaktad?r.
? EGP ile ?al??an bir a? ge?idi kom?ular?n? belirlemekte, kom?ular?na
bilgi mesajlar? g?ndermekte ve onlar?n ?al???r durumda olduklar?m test
etmektedir.
Y?nlendirme Protokolleri
42. ? F.BGP
? S?n?r a? ge?idi protokol (Border gatevvay protocol-BGP)
? EGP protokolnn yerine geli?tirilen merkezi olmayan bir y?nlendirme
protokoldr.
? ?rnek olarak i?erisinde OSPF protokol kullanan otonom sistemler bu
protokol yard?m? ile birbirlerine ba?lanabilmektedirler. Bu yap?s? ile
BGP ?nternet'in en ?nemli protokollerinden birisidir.
? BGP a? yap?s?nda ger?ekle?ebilecek de?i?imleri anlayabilmek amac? ile
duyuru (anouncement) paketlerini kullanmaktad?r.
? Bu y?ntemde her kenar a? ge?idi belli sre aral?klar?nda ?al???r
durumda oldu?unu kom?ular?na duyurmaktad?r.
Y?nlendirme Protokolleri
43. ? Herhangi bir nedenden ?tr a? ge?idi ?al??amaz hale gelirse kom?u cihaz, bu
paketi alamayacakt?r.
? Bu durumda a? ge?idi ?al???r durumda olmayan a? ge?idinin bilgilerini tespit
etmekte ve bunlar? silmektedir.
? BGP di?er bir?ok y?nlendirme protokolnden farkl? olarak TCP protokoln
kullanmaktad?r.
? BGPyi kullanan bir y?nlendirici her 60 saniyede bir 19 byte paketleri
kom?ular?na g?ndermektedir.
? ?nemli fonksiyonlar?ndan biri y?nlendirmede ger?ekle?ebilecek d?nglerin
yakalanmas?d?r.
? BGP, otonom sistemleri birbirlerine ba?lamas?n?n d???nda, otonom sistem
i?erisinde de kullan?labilmektedir.
Y?nlendirme Protokolleri