 Two types  Distance Vector ◦ Examples:  RIP v1 and RIPv2 (Routing Information Protocol)  IGRP (Interior Gateway Routing Protocol)  Link State ◦

Slides:



Advertisements
Similar presentations
Distance Vector Routing Protocols
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
IP Routing.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-5-1 WAN Connections Enabling RIP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
EIGRP routing protocol Omer ben-shalom Omer Ben-Shalom: Must show how EIGRP is dealing with count to infinity problem Omer Ben-Shalom: Must.
1 CCNA 3 v3.1 Module 1. 2 CCNA 3 Module 1 Introduction to Classless Routing.
RD-CSY3021 Comparing Routing Protocols. RD-CSY3021 Criteria used to compare routing protocols includes  Time to convergence  Proprietary/open standards.
CCNA 2 v3.1 Module 6.
Routing and Routing Protocols
Routing.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Fundamentals of Networking Discovery 2, Chapter 6 Routing.
Switching and Routing Technique
Chapter 12 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Read a routing table  Configure a static route 
Interior Gateway Protocols: RIP & OSPF
Chapter 7: Routing Dynamically
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Routing Dynamically Routing Protocols.
6: Routing Working at a Small to Medium Business.
Distance Vector Routing Protocols W.lilakiatsakun.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
Distance Vector Routing Protocols
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Distance Vector Routing Protocols Routing Protocols and Concepts –
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
Routing -2 Dynamic Routing
Review Routing fundamental W.lilakiatsakun. Review Routing Fundamental VLSM VLSM Route Summarization Route Summarization Static & Dynamic Routing Static.
TCOM 515 Lecture 2. Lecture 2 Objectives Dynamic Routing Distance Vector Routing Link State Routing Interior vs Exterior RIP - Routing Information Protocol.
1 3-Oct-15 Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Routing and Packet Forwarding Routing Protocols and.
Routing/Routed Protocols Part I. Routed Protocol Definition: Routed Protocol – used to transmit user data (packets) through an internetwork. Routed protocols.
Routing in the Internet The Global Internet consists of Autonomous Systems (AS) interconnected with eachother: Stub AS: small corporation Multihomed AS:
Distance Vector Routing Protocols Routing Protocols and Concepts Lecture Week 4.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/35- OfficeServ 7x00 Enterprise IP Solutions Quick Install Guide.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
1 1-Dec-15 S Ward Abingdon and Witney College Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
6: Routing Working at a Small to Medium Business.
Routing and Routing Protocols
Cisco Systems Networking Academy S2 C 11 Routing Basics.
TCOM 515 Lecture 2. Lecture 2 Objectives Dynamic Routing Distance Vectore Routing Link State Routing Interior vs Exterior RIP - Routing Information Protocol.
1 Version 3.1 Module 6 Routed & Routing Protocols.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Routing Dynamically Routing & Switching.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Routing Protocols and Concepts Dr. Muazzam A. Khan.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
Routing Protocols and Concepts
Distance Vector Routing Protocols
Dynamic Routing Protocols part2
Routing Protocols (RIP, OSPF, BGP)
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Routing/Routed Protocols
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
IS3120 Network Communications Infrastructure
Routing.
Chapter 5: Dynamic Routing
Chapter 7: Routing Dynamically
Dynamic Routing Protocols part2
Distance Vector Routing Protocols
Dynamic Routing and OSPF
Distance Vector Routing Protocols
Distance Vector Routing
Routing.
Presentation transcript:

 Two types  Distance Vector ◦ Examples:  RIP v1 and RIPv2 (Routing Information Protocol)  IGRP (Interior Gateway Routing Protocol)  Link State ◦ Examples  OSPF (Open Shortest Path First)  IS-IS (Intermediate System - Intermediate System)  NLSP (Netware Link Services Protocol)  Path Vector ◦ Example  BGP (Border Gateway Protocol)

 Link State (LS) advantages:  More stable (aka fewer routing loops)  Faster convergence than distance vector  Easier to discover network topology, troubleshoot network.

 Routing table shows the ◦ route source  Directly connected networks  Static routes  Dynamic routing protocols  Parent and Child Routes ◦ A Level 1Parent route does not contain any next-hop IP address or exit interface information  Level 2 child routes contain route source & the network address of the route Diagram illustrates 2 child networks belonging to the parent route / 24 level 1 route level 2 route

 Longest Match: Level 1 Network Routes –Best match is also known as the longest match –The best match is the one that has the most number of left most bits matching between the destination IP address and the route in the routing table.

 Classful routing protocols do not send subnet mask information with their routing updates.  A router running a classful routing protocol will react in one of two ways when receiving a route: ◦ If the router has a directly connected interface belonging to the same major network, it will apply the same subnet mask as that interface. ◦ If the router does not have any interfaces belonging to the same major network, it will apply the classful subnet mask to the route. ◦ Example: and belong to the same major network ( )  What happens when Router B sends routing update to Router A? ◦ What subnet mask will be used by Router A? When using classful routing protocols, the subnet mask must remain consistent throughout your entire network

What happens to a packet with destination /24 for Classful routing and Classless routing?

 If no match is found in child routes of previous slide then router continues to search the routing table for a match that may have fewer bits in the match

 why the router drops the Packet destined to /24  None of the child routes left most bits match the first 24 bits.

Figure 1  The use of CIDR and VLSM not only reduces address waste, but it also promotes route aggregation, or route summarization.  route summarization reduces the burden on upstream routers.  Example: Figure 1  variable-sized networks and subnetworks is summarized at various points using a prefix address until the entire network is advertised as a single aggregate route of /20

Figure 1  Route flapping occurs when a router interface alternates rapidly between the up and down states. This can be caused by a number of factors, including a faulty interface or poorly terminated media.  Summarization can effectively insulate upstream routers from route-flapping problems.  Example: Figure 1  If the RTC interface connected to the network goes down, RTC removes that route from its table  What if routers were not configured to summarise?

 Steps to calculate a route summary  List networks in binary format  Count number of left most matching bits to determine summary route’s mask  Copy the matching bits and add zero bits to determine the summarized network address

 Default routes ◦ Packets that are not defined specifically in a routing table will go to the specified interface for the default route ◦ Example: Customer routers use default routes to connect to an ISP router. ◦ Command used to configure a default route is ◦ #ip route s0/0/1

 When network topology changes, network traffic must reroute quickly. The phrase "convergence time" describes the time it takes a router to start using a new route after a topology changes.  Routers must do three things after a topology changes:  Detect the change  Select a new route  Propagate the changed route information

 EASE OF IMPLEMENTATION  SPEED OF IMPLEMENTATION

 Three key issues determine the amount of bandwidth a routing protocol consumes: 1. When routing information is sent--- 1.Periodic updates are sent at regular intervals. Flash updates are sent only when a change occurs. 2.Complete updates contain all routing information. Partial updates contain only changed information. 3. Flooded updates are sent to all routers. Bounded updates are sent only to routers that are affected by a change. Note: These three issues also affect CPU sage.

 CPU usage is protocol dependent.  Some protocols use CPU cycles to compare new routes to existing routes.  Other protocols use CPU cycles to regenerate routing tables after a topology change.  In most cases, the latter technique will use more CPU cycles than the former. ◦ Example: For link-state protocols, keeping areas small and using summarization reduces CPU requirements by reducing the effect of a topology change and by decreasing the number of routes that must be recomputed after a topology change.

 Routing protocols use memory to store routing tables and topology information.  Route summarization cuts memory consumption for all routing protocols.  Keeping areas small reduces the memory consumption for hierarchical routing protocols

 The ability to extend your internetwork is determined, in part, by the scaling characteristics of the routing protocols used and the quality of the network design.  Network scalability is limited by two factors: ◦ operational issues and  Operational scaling concerns encourage the use of large areas or protocols that do not require hierarchical structures. ◦ technical issues  When hierarchical protocols are required, technical scaling concerns promote the use of small areas

 Some routing protocols provide techniques that can be used as part of a security strategy.  Some routing protocols allow filter on the routes being advertised so that certain routes are not advertised in some parts of the network.  Some routing protocols can authenticate routers that run the same protocol. Authentication mechanisms are protocol specific  Authentication can increase network stability by preventing unauthorized routers or hosts from participating in the routing protocol, whether those devices are attempting to participate accidentally or deliberately.

 Uses hop count as metric (max: 16 is infinity)  Tables (vectors) “advertised” to neighbors every 30 s.  Each advertisement: upto 25 entries  No advertisement for 180 sec: neighbor/link declared dead  routes via neighbor invalidated  new advertisements sent to neighbors (Triggered updates)  neighbors in turn send out new advertisements (if tables changed)  link failure info quickly propagates to entire net  poison reverse used to prevent ping-pong loops (infinite distance = 16 hops)

 Split horizon/poison reverse does not guarantee to solve count-to-infinity problem ◦ 16 = infinity => RIP for small networks only! ◦ Slow convergence  Broadcasts consume non-router resources  RIPv1 does not support subnet masks (VLSMs) ◦ No authentication

 Why ? Installed base of RIP routers  Provides: ◦ VLSM support ◦ Authentication ◦ Multicasting ◦ “Wire-sharing” by multiple routing domains, ◦ Tags to support EGP/BGP routes.  Uses reserved fields in RIPv1 header.  First route entry replaced by authentication info.

 CISCO proprietary; successor of RIP (late 80s)  Several metrics (delay, bandwidth, reliability, load etc)  Uses TCP to exchange routing updates  Loop-free routing via Distributed Updating Alg. (DUAL) based on diffused computation  Freeze entry to particular destination  Diffuse a request for updates  Other nodes may freeze/propagate the diffusing computation (tree formation)  Unfreeze when updates received.  Tradeoff: temporary un-reachability for some destinations

 Key: Create a network “map” at each node.  1. Node collects the state of its connected links and forms a “Link State Packet” (LSP)  2. Flood LSP => reaches every other node in the network and everyone now has a network map.  3. Given map, run Dijkstra’s shortest path algorithm (SPF) => get paths to all destinations  4. Routing table = next-hops of these paths.  5. Hierarchical routing: organization of areas, and filtered control plane information flooded.

 Reliable Flooding: sequence #s, age  LSA types, Neighbor discovery and maintainence (hello) ◦ Efficiency in Broadcast LANs, NBMA, Pt-Mpt subnets: designated router (DR) concept  Areas and Hierarchy ◦ Area types: Normal, Stub, NSSA: filtering ◦ External Routes (from other ASs), interaction with inter-domain routing.  Advanced topics: incremental SPF algorithms

OSPF  OSPF Network Topology  OSPF Addressing and Route Summarization  OSPF Route Selection  OSPF Convergence  OSPF Network Scalability  OSPF Security