SlideShare a Scribd company logo
Lecture 13 - Introduction and
Configuration of EIGRP
1
Story of a routing protocol
2
Load Balancing / Trouble shooting
• Variance
• Debug ip eigrp
• show ip EIGRP neighbors
3
EIGRP Tables
• EIGRP maintain three tables
• Neighbor Table
• Topology table
 Feasible successor
• Routing table
 Successor route
• Advertised distance: the EIGRP metric for an EIGRP neighbor to reach
a particular network (1 can take you Lahore in 2 hours)
• Feasible distance: the advertised distance for a particular network
learned from an EIGRP neighbor plus the EIGRP metric to reach that
neighbor
4
5
LAB
6
Key chain
7

More Related Content

PPT
EIGRP Automatic & Manual Summarization
PPT
EIGRP Authentication & Load Balancing
PPT
EIGRP Configuration
PPTX
PPTX
Route Redistribution between OSPF and EIGRP
PPTX
Route Redistribution
PPTX
Ric presentation
PPTX
Dynamic routing
EIGRP Automatic & Manual Summarization
EIGRP Authentication & Load Balancing
EIGRP Configuration
Route Redistribution between OSPF and EIGRP
Route Redistribution
Ric presentation
Dynamic routing

Viewers also liked (20)

PPTX
15 lecture - acl part1, introduction to access control list
PPTX
Chapter 1: Overview of Network Security
PPT
Chapter 20: Internet Protocol
PPT
Chapter 8: Switching
PPT
Chapter 1: Introduction to Operating System
PPT
Chapter 3: Data & Signals
PPT
Chapter 2: Network Models
PPT
Chapter 19: Logical Addressing
PPT
Message Authentication: MAC, Hashes
PDF
05 signal encoding
PPTX
10 lecture - ospf part1 , introduction to ospf , areas and abr
PPT
L8 signal encoding techniques
PPT
signal encoding techniques
PPTX
Encoding techniques
PPTX
Data encoding
PPT
4 signal encodingtechniques
PPT
Data Encoding
PPT
Chapter 7: Transmission Media
PDF
Chapter 5 - Signal Encoding Techniques 9e
PPT
Chapter 1: Introduction to Data Communication and Networks
15 lecture - acl part1, introduction to access control list
Chapter 1: Overview of Network Security
Chapter 20: Internet Protocol
Chapter 8: Switching
Chapter 1: Introduction to Operating System
Chapter 3: Data & Signals
Chapter 2: Network Models
Chapter 19: Logical Addressing
Message Authentication: MAC, Hashes
05 signal encoding
10 lecture - ospf part1 , introduction to ospf , areas and abr
L8 signal encoding techniques
signal encoding techniques
Encoding techniques
Data encoding
4 signal encodingtechniques
Data Encoding
Chapter 7: Transmission Media
Chapter 5 - Signal Encoding Techniques 9e
Chapter 1: Introduction to Data Communication and Networks
Ad

More from Shafaan Khaliq Bhatti (18)

PPTX
1- Introduction to Red Hat
PPTX
Linux Servers
PPTX
5 - Networking in Red Hat
PPTX
2- System Initialization in Red Hat
PPTX
3 - Disk Partitioning in Red Hat
PPTX
6 - Package Management in Red Hat
PPTX
11 - SELinux in Red Hat
PPTX
7 - User Administration in Red Hat
PPTX
12 - System Security in Red Hat
PPT
Protocols for Public Key Management
PPT
Authentication: keys, MAC
PPT
Public key cryptography and RSA
PPT
Block Ciphers Modes of Operation
PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
PPT
Chapter 3: Processes
PPT
Chapter 2: Operating System Structures
PPT
Classical Encryption
PPTX
Chapter 01 (Discovering Computers)
1- Introduction to Red Hat
Linux Servers
5 - Networking in Red Hat
2- System Initialization in Red Hat
3 - Disk Partitioning in Red Hat
6 - Package Management in Red Hat
11 - SELinux in Red Hat
7 - User Administration in Red Hat
12 - System Security in Red Hat
Protocols for Public Key Management
Authentication: keys, MAC
Public key cryptography and RSA
Block Ciphers Modes of Operation
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Processes
Chapter 2: Operating System Structures
Classical Encryption
Chapter 01 (Discovering Computers)
Ad

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
master seminar digital applications in india
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Pharma ospi slides which help in ospi learning
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Presentation on HIE in infants and its manifestations
Complications of Minimal Access Surgery at WLH
Pharmacology of Heart Failure /Pharmacotherapy of CHF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
master seminar digital applications in india
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Final Presentation General Medicine 03-08-2024.pptx
Computing-Curriculum for Schools in Ghana
Pharma ospi slides which help in ospi learning
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
O7-L3 Supply Chain Operations - ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Presentation on HIE in infants and its manifestations

13 lecture - introduction and configuration of eigrp

  • 1. Lecture 13 - Introduction and Configuration of EIGRP 1
  • 2. Story of a routing protocol 2
  • 3. Load Balancing / Trouble shooting • Variance • Debug ip eigrp • show ip EIGRP neighbors 3
  • 4. EIGRP Tables • EIGRP maintain three tables • Neighbor Table • Topology table  Feasible successor • Routing table  Successor route • Advertised distance: the EIGRP metric for an EIGRP neighbor to reach a particular network (1 can take you Lahore in 2 hours) • Feasible distance: the advertised distance for a particular network learned from an EIGRP neighbor plus the EIGRP metric to reach that neighbor 4
  • 5. 5