Chapter 10 Switching and Routing

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Mod 10 – Routing Protocols
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Routing Fundamentals and Subnetting
Routing and Routing Protocols
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Connecting LANs, Backbone Networks, and Virtual LANs
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
Chapter Six NetworkingHardware. Agenda Questions about Ch. 11 Midterm Exam Ch.6 Cable kit.
Chapter 8 Routing. Introduction Look at: –Routing Basics (8.1) –Address Resolution (8.2) –Routing Protocols (8.3) –Administrative Classification (8.4)
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Dr. John P. Abraham Professor University of Texas Pan American Internet Routing and Routing Protocols.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
University of the Western Cape Chapter 11: Routing Aleksandar Radovanovic.
CCNA Guide to Cisco Networking Chapter 8: Routing Protocols and Network Address Translation.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Dynamic Routing Chapter 9. powered by DJ 1. C HAPTER O BJECTIVES At the end of this Chapter you will be able to:  Explain Dynamic Routing  Identify.
Introduction to Dynamic Routing Protocol
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Guide to TCP/IP, Third Edition Chapter 10: Routing in the IP Environment.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Routing Protocols and Concepts Introduction to Dynamic Routing Protocol.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Sem1 - Module 10 Routing Fundamentals and Subnets Review.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
IP Routing Principles. Network-Layer Protocol Operations Each router provides network layer (routing) services X Y A B C Application Presentation Session.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Routing Protocols Brandon Wagner.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
 Identify the functions of LAN connectivity hardware  Install, configure, and differentiate between network devices such as NICs, hubs, switches, routers,
Sem1 - Module 10 Routing Fundamentals and Subnets
Release 16/7/2009 Internetworking Devices Chapter 10 Jetking Infotrain Ltd.
Cisco 2 - Routers Perrine modified by Brierley Page 13/21/2016 Chapter 4 Module 6 Routing & Routing Protocols.
Click to edit Master subtitle style Chapter 10: Routing Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
+ Dynamic Routing Protocols 2 nd semester
Lec4: Introduction to Dynamic Routing Protocol
Working at a Small-to-Medium Business or ISP – Chapter 6
Introduction to Dynamic Routing Protocol
Chapter 5: Dynamic Routing
Introduction to Dynamic Routing Protocol
Routing Fundamentals and Subnets
Working at a Small-to-Medium Business or ISP – Chapter 6
Chapter 6 Switching and Routing
Computer Networks Protocols
Presentation transcript:

Chapter 10 Switching and Routing Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 10 Switching and Routing 1

Objectives Explain the basic differences between hubs and switches Discuss the difference between store-and-forward switching and cut-through switching Understand the function of the Spanning Tree Protocol Describe the differences between a switch and a router Explain the differences between distance-vector and link-state routing protocols and give examples of each Computer Networking From LANs to WANs: Hardware, Software, and Security

Objectives (cont’d.) List several Autonomous Systems and their regions Illustrate the differences between interior and exterior routing protocols Describe how Classless Domain Internet Routing increased the availability of Internet addresses Compare and contrast Distance Vector, Link State, and Policy Routing algorithms Computer Networking From LANs to WANs: Hardware, Software, and Security

Hubs versus Switches Hubs broadcast received frames to all other ports Switches forward received frames to a specific port Fully switched network LAN stations connect to switched port Partitions network into separate collision domains Stations have unrestricted access to dedicated bandwidth, operate at switched port speed Maximum Ethernet network size: 1024 nodes Switches learn associated port MAC addresses Computer Networking From LANs to WANs: Hardware, Software, and Security

Figure 10-1 Comparing a hub and a switch Computer Networking From LANs to WANs: Hardware, Software, and Security

Inside a Switch Switch components Figure 10-3 Block diagram of a switch Computer Networking From LANs to WANs: Hardware, Software, and Security

Inside a Switch (cont’d.) Switch components (cont’d.) Input port logic contains: Ethernet receiving logic Buffer for received frames Output port logic contains: Ethernet transmitter Output frame buffer Switching fabric Directs input port frames to the output port Handles broadcasts to all output ports Computer Networking From LANs to WANs: Hardware, Software, and Security

Inside a Switch Switch components (cont’d.) Switching fabric (cont’d.) Crossbar switch: two-dimensional set of data buses Multiplexed bus: makes one input-output connection at a time Control logic chores Updating, searching MAC address table Configuring switching fabric Maintaining proper flow control through switch fabric Content addressable memory (CAM) Stores MAC addresses, port numbers Computer Networking From LANs to WANs: Hardware, Software, and Security

Store-and-Forward Switching Entire frame stored when received No immediate routing decisions made Latency Delay between frame receive time and transmission start time Dependent on frame length Minimum latency obtained with minimum size frame Applications may be sensitive to latency (streaming audio, video) Computer Networking From LANs to WANs: Hardware, Software, and Security

Cut-Through Switching Forwarding process begins immediately When incoming frame destination MAC address received Advantages of cut-through switching 10-Mbps Ethernet latency reduced to 11.2 microseconds Plus any additional time for internal switch operations Fixed latency Disadvantages of cut-through switching Error propagation Computer Networking From LANs to WANs: Hardware, Software, and Security

Spanning Trees Compatible switch uses a Spanning Tree Algorithm Spanning Tree Protocol (STP) Prevents looping Prevents network flooding from duplicate data frames Dynamic filtering Redundant links causing loops held in reserve Rapid Spanning Tree Algorithm and Protocol (RSTP) Replaced Spanning Tree Protocol Multiple Spanning Tree Protocol (MSTP) Supports multiple trees in the network Computer Networking From LANs to WANs: Hardware, Software, and Security

Switches versus Routers Switches: layer 2 (Data-Link) devices Use MAC addresses to forward frames Used within networks to forward local traffic Routers: layer 3 hardware device More complex than a switch Microprocessor-based circuitry Higher latency than a switch Additional packet processing required Routers used between networks Nonroutable protocols pass through switches Not routers Computer Networking From LANs to WANs: Hardware, Software, and Security

Routing Protocols Perform different type of packet forwarding Operate at Network layer (Layer 3) Logical network formed by routers Example: the Internet Router Moves data between source, destination computers Can be different network types Follows general ground rules Windows NETSTAT program Shows currently active routes Computer Networking From LANs to WANs: Hardware, Software, and Security

Routing Protocols (cont’d.) Routing table creation and maintenance methods Static routing A number of predefined routes created Router lacks ability to discover new routes Network administrator involvement required Not fault tolerant Dynamic routing New routes discovered; old routes updated as required Routing tables maintained automatically Fault tolerant Uses distance-vector or link-state routing algorithm Computer Networking From LANs to WANs: Hardware, Software, and Security

Autonomous Systems Individual networks Autonomous System (AS) number Grouped together by region Controlled by single administrative authority Autonomous System (AS) number Associated with each autonomous system Have single, clearly defined external routing policy Interior Gateway Protocol (IGP) Used inside of Autonomous Systems Exterior Gateway Protocols (EGP) Exchange information between different systems Computer Networking From LANs to WANs: Hardware, Software, and Security

Interior Gateway Protocols Communication inside Autonomous Systems Many protocols used as IGPs for IP networks Gateway-to-Gateway Protocol (GGP) Routing Information Protocol (RIP) Routing Information Protocol 2 (RIP-2) Interior Gateway Routing Protocol (IGRP) Extended Interior Gateway Routing Protocol (EIGRP) Open Shortest Path First (OSPF) Intermediate System to Intermediate System (IS-IS) Computer Networking From LANs to WANs: Hardware, Software, and Security

Exterior Gateway Protocols Used between different Autonomous Systems (AS) Define how networks within an AS advertise outside the AS AS advertises “reachability” to connectable networks Use Exterior Gateway Protocols (EGP) messages Independent of IGPs used within Autonomous Systems Facilitate exchange of routes between Autonomous Systems using different IGPs Protocols used for EGPs in IP networks Exterior Gateway Protocol (EGP) Border Gateway Protocol (BGP) Open Shortest Path First (OSPF) Computer Networking From LANs to WANs: Hardware, Software, and Security

Classless Inter-Domain Routing Developed to recover unused class A and class B network addresses Supported by interior and exterior gateway protocols Based on route aggregation Known as supernetting Eliminates class concept IP addresses and their subnet masks: Written as four octets, separated by periods Followed by a forward slash, two-digit number that represents subnet mask length Computer Networking From LANs to WANs: Hardware, Software, and Security

Classless Inter-Domain Routing (cont’d.) Class B network 178.217.0.0 Class C supernet address in CIDR notation 178.217.0.0/24 /24 indicates a 24 bit subnet mask Route aggregation Using several different routes so that a single route can be advertised Minimizes routing table size Computer Networking From LANs to WANs: Hardware, Software, and Security

Distance-Vector Routing Also called Bellman-Ford algorithm Based on number of hops in a route Between source and destination computers Distance-vector routing algorithm Each router sends entire routing table (to its neighbor) every 30 seconds Distributed between network routers Metric based on number of hops to take to reach destination Number of hops from any router to itself: 0 Connection to a neighbor: 1 Computer Networking From LANs to WANs: Hardware, Software, and Security

Distance-Vector Routing (cont’d.) RIP uses UDP transport protocol Router hops specified in 4-bit field (15 hop maximum) Field value of 16 (all 1s) represents infinity Disadvantages Bandwidth usage can become excessive Difficult to debug, no security Benefits Runs on every router platform Little effort to configure the RIP protocol No computation, storage requirements RIP-2 provides additional features Computer Networking From LANs to WANs: Hardware, Software, and Security

Distance-Vector Routing (cont’d.) Inter-Gateway Routing Protocol Cisco-proprietary solution to RIP issues Regarded as an Interior Gateway Protocol (IGP) Used as EGP for inter-domain routing Hold down feature prevents premature use of unstable route Poison-reverse update to eliminates routing loops Split horizon prevent information from being sent back on a source direction link Offers several new timer variables Computer Networking From LANs to WANs: Hardware, Software, and Security

Distance-Vector Routing (cont’d.) Enhanced Inter-Gateway Routing Protocol Cisco-proprietary solution Improves IGRP operating efficiency by using: Distributed update algorithm MD5 authentication Protocol Independent Routing Metric changes (not entire routing tables) exchanged every 90 seconds CIDR support Computer Networking From LANs to WANs: Hardware, Software, and Security

Link-State Routing Broadcasts cost of reaching each neighbor To all network routers Creates consistent network view at routers Method to compute shortest distance Based on Dijkstra’s algorithm Open shortest path algorithm Difference between distance-vector and link-state routing Path with least hops may not be chosen as the least-cost route Computer Networking From LANs to WANs: Hardware, Software, and Security

Link-State Routing (cont’d.) Many routing protocols based on link-state algorithm End System to Intermediate System Intermediate System to Intermediate System NetWare Link Services Protocol Inter-Domain Routing Protocol Exterior Gateway Protocol Border Gateway Protocol Computer Networking From LANs to WANs: Hardware, Software, and Security

Policy Routing Routing based on factors other than “shortest path” Primary use Accommodates interconnected networks acceptable use policies Other considerations Contract obligations Quality of service (resource reservation) Service provider selection BGP supports policy-based routing Complex set up and management Great rewards Computer Networking From LANs to WANs: Hardware, Software, and Security

Multi-Protocol Label Switching Allows faster, cheaper IP routers Based on ATM technology Labels: shorter than IP addresses Packets forwarded faster IP address independent allowing for policies Layer 2 network link information integrated into Layer 3 (IP) Occurs within a particular Autonomous System Simplifies, improves IP datagram exchange Great flexibility to divert and route traffic Computer Networking From LANs to WANs: Hardware, Software, and Security

Private Network-Network Interface ATM forum specification For protocols between switches in private ATM network Two main features: Routing protocol Reliably distributes network topology information Paths to any addressed destination computed Signaling protocol Establishment and takedown of point-to-point and point-to-multipoint connections Computer Networking From LANs to WANs: Hardware, Software, and Security

Layer 3 Switching Switch and router combined into one package Reason for popularity Ever-increasing demand for bandwidth and services Utilizes ASIC (application specific integrated circuit) technology Implements routing functions in hardware Switch performs router duties Forwarding frames significantly faster Layer 3 switch has many benefits Computer Networking From LANs to WANs: Hardware, Software, and Security

Inside an ISP Figure 10-19 Overhead view of ISP network hardware Computer Networking From LANs to WANs: Hardware, Software, and Security

Inside an ISP (cont’d.) Figure 10-20 ISP network diagram Computer Networking From LANs to WANs: Hardware, Software, and Security

Troubleshooting Techniques Look at the big picture Use http://www.internettrafficreport.com Check router status across the Internet Check traffic characteristics Use http://www.internetpulse.net Provides latency, network utilization, packet loss information For major Internet backbone Tier One providers Use http://www.caida.org Underlying Internet network topology information Computer Networking From LANs to WANs: Hardware, Software, and Security

Summary Hubs, switches, and routers operate differently Switches operate at layer 2 Routers operate at layer 3 Routers connect different types of networks together Static, dynamic routers Switching techniques Store-and forward, cut-through Autonomous networks grouped by region Classless Inter-Domain Routing frees addresses Many protocols support switching and routing Computer Networking From LANs to WANs: Hardware, Software, and Security