0% found this document useful (0 votes)
52 views

Introd Uction To IP Routing

This document provides an introduction to IP routing. It discusses that routers learn about connected networks and use routing protocols or static configuration to learn paths to other networks. Dynamic routing protocols automatically discover network topology and share routing information between routers to build and update routing tables. Different protocols use different mechanisms for sharing information and calculating the best path. Key factors in choosing a protocol include routing metrics, update methods, convergence speed and overhead.

Uploaded by

api-292985604
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Introd Uction To IP Routing

This document provides an introduction to IP routing. It discusses that routers learn about connected networks and use routing protocols or static configuration to learn paths to other networks. Dynamic routing protocols automatically discover network topology and share routing information between routers to build and update routing tables. Different protocols use different mechanisms for sharing information and calculating the best path. Key factors in choosing a protocol include routing metrics, update methods, convergence speed and overhead.

Uploaded by

api-292985604
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Introd uction to IP Routing

Routing is , to find Layer 3 path to the destination network . to


know where other networks are located . Once path is identified
Router moves packets from one interface to another to get a
packet to its destination. Note, Router remembers network
numbers only and not the ip addresses of the individual devices.
To perform routing function, router needs to.
A. Learn about networks connected to other Routers.
B. Choose best path to reach each destination.
C. Maintain most up to date information about the destination
networks. This information is called as Routing Table.
Once we configure ip addresses of interfaces, Router knows
what networks are connected to its interfaces. These routes
are called as Connected Route.
Static Routes:
A static route is a route that is to be manually configured on
each router. Using static routes, router finds path to reach to
a particular network . Router automatically learns what
networks are directly connected to its interface, but for the
networks that are not directly connected to any of its
interfaces, we must make router aware how it can reach to
these destination networks.
Default Route:
Default Route is a part of static route. The static route
specifies a path for a specific network number, whereas
default route is used to reach to any network. Default routes
are typically used on edge routers where by using only one
interface they can reach all other networks. We specify
destination ip and subnet mask as 0.0.0.0 which is used to
represent any network. static and default routes are typically
used in smaller networks .

Dynamic Routes.
In static routes, a network administrator has to configure
each router to know where destination network is located.
This increases the administrative overheads in case of a big
network. For example, in a network where only 2 routers are
connected, we would require only 2 statics routes. A network
with 3 routers would require 6 static routers and a network
with 100 routers would require 9900 static routes. The only
advantage with static route is that the administrator has
total control over routes routing table and there are no
network overheads like dynamic routing protocols.
Dynamic routes are the routes that are learnt by router
automatically by running Routing Protocols. Using Dynamic
routing protocols there is no need to configure routes
manually. these protocols automatically discover what
networks are connected to which routers. Using routing
protocol each router shares its own network number
information, called as routing updates, with each directly
connected routes called as neighbors. Upon receiving routing
update, every router stores this information its routing table
and passes this information to its neighbor. This is how each
router comes to know the reachability to other networks in
an internetwork.
It is important to understand difference between routing
protocols and routed protocols. Routing protocol learns about
routes to reach the destination network routed protocol are
the layer -3 protocol such as IP or IPX which carries user
traffic by the path decided by routing protocol,

Routed protocols
IP

Routing protocols
RIPv1, RIPv2, IGRP, OSPF,
EIGRP , BGP, IS-IS

IPX
Apple talk

RIP, NLSP, EIGRP


RMTP, AVRP, EIGRP

Autonomous System (AS):- As is a group of Routers under


a single administrative control. Routers must have same AS
number to become neighbors and to share their routing
information with each other. Routers that are directly
connected to each other but having different AS numbers
will never become neighbor and wont share routing
information. AS number from 1 to 65535 which needs to be
assigned to every router. AS number is required to be
configured only for IGRP & EIGRP.
Administrative Distance:- A Router needs to choose a
best path to reach to the destination. A value of
Administrative Distance is associated with static routes and
routes learned by routing protocols. If multiple paths are
found to reach to the destination network, router will always
choose a path that has got lowest administrative distance.
Routing Protocol

Administrative Distance

Directly Connected Networks


Static Route / Default Route
EIGRP
IGRP
OSPF
RIP

0
1
90
100
110
120

Dynamic Routing Protocols

Dynamic routing protocols learns about other networks from


the neighboring routers. Dynamic routing protocols are
categorized as Distance Vector, Link State and Hybrid.

Dynamic Routing Protocols


Distance Vector
RIPv1

IGRP

Link State
OSPF

IS-IS

Hybrid
RIPv2 EIGRP

Intermediate System-to-Intermediate System (IS-IS)

Each routing protocol takes different approach in sharing routing


information with neighboring routers and choosing the best path
to the destination.
A. Routing metrics used to choose the best path
B. How and when routing information is shred
C. Convergence speed of the routing protocol
D. Overhead of the routing protocol
Routing Metrics:- Routing metrics are used to decide best path
to the destination network. Routing protocols used metric value
for measuring the path network, having same administrative
distance, Router always chooses a path having best metric value.
For example, RIP uses Hop Count as a metric (number of
Routers to be crossed to reach to the destination) to decide best
path. IGRP, EIGRP and OSPF consider bandwidth of a link to
decide best path.
Routing Information Updates:- Every Router in an internetwork
shares its own network number information with other Routers.
This information is known as Routing Information or Routing
Updates. Every Router shares this information with other Routers
after a specific time interval so that all Routers in an internetwork
have most up to date information. Routing protocols such as

RIPv1 and IGRP shares their own network number information


with other routers using broadcasts packets, whereas RIPv2,
EIGRP and OSPF uses multicast.
Convergence:- As discussed earlier, every router shares their
routing information with other router after a specific time interval.
The time each Router takes to understand the complete network
topology is referred as Convergence time.
Routing Protocol Overheads:- Overheads are measured in
terms of utilization of router resources such as CPU, Memory,
WAN bandwidth etc and overheads on a WAN link. Static /default
routes no routing updates are generated, these routers `do not
have any overheads over Router and WAN links.
Distance Vector Protocols:- Distance Vector Protocols uses
distance and direction to find best path to the destination.
These protocols update their complete routing table to the
directly connected routers, called as neighbors. Once a router
receives routing update information from its neighbor, receiving
router updates its own routing table and passes this information
to its neighbor and so on. This is called as routing by Rumors,
because Router receives the information from its neighbor and
Router accepts this information as it is without checking the truth.
Examples of distance Vector Protocols are RIPv1 and IGRP. These
protocol uses broadcast with IP 255.255.255.255 to share
routing information with neighbors. These protocols update their
routing table regularly, whether something changes or not, once
periodic timer expires, the routing update broadcast is being sent
on all interfaces.

Link State Routing Protocols:- Link state protocol considers


bandwidth to calculate best path to the destination network.
Examples of link state protocols are OSPF and IS-IS. Distance
vector protocols uses broadcast to share routing information that

are sent to all the devices in a network, whereas link state


protocols uses multicast that are sent only to a group of devices.
These multicasts are called as link state Advertisements
(LSAs) which is a piece of routing information that contains who
originated the advertisement and what networks are connected to
that device. LSAs are generated when the timer expires and also
when the Router notice a change in network topology its called
Trigger Updates. A Router learns routes from LSA and builds a
complete topology of the network. Router stores this information
in RAM. Using LSA, each router forms an inverted tree like
structure placing itself on top and other Routers beneath it called
as Dijkstra SPF Algorithm
Distance vector protocols always send their full routing table
to their neighbors which consume valuable WAN bandwidth. But
link state protocol sends full routing table updates only once and
then after they always send incremental updates. They notify only
the change in the routing table to their neighbors and not the full
routing table. Another major advantage with link state protocols is
that they also support classless network numbers. That means,
these protocols understands subnetting and can be used in a
large enterprise network with subnets. The only disadvantage of
these protocol is that they more CPU & memory intensive a s
compare to distance vector protocols.
Hybrid Routing Protocols:Hybrid protocol takes the advantages of both distance vector and
link state protocols.

Routing Information Protocol (RIP):- RIP supports routing for


routed protocol like IP and IPX Rip uses Distance as metric to find
best path to the destination. Hop Count is used to measure the
distance.

IP RIP comes in two versions, RIP version 1 and RIP version2.


RIP v1
Uses broadcast for routing
updates
Routing updates are periodic
Supports for class full networks
only
Uses hop count as metric
Hop count limit is of 15 hops

RIPv2
Uses multicast for routing
updates.
Supports periodic and trigger
Routing updates.
Support for class full and
classless networks
Uses hop count and metric
Hop count limit is of 15 hops.

Open Shortest Path First:- Ospf is typically used in large enterprise


networks. OSPF uses hierarchical network design that makes it
suitable for very large network. OSPF has following advantages.
A. OSPF runs even on non-cisco routers since it is based on
open standards.
B. OSPF use SFP algorithm to provide a loop free topology.
C. OSPF provides fast convergence with trigger updates.
D. OSPF support classless IP addresses and uses VLSM.
E. OSPF decreases the size of routing table by using
hierarchical design and route summarization.
F. OSPF uses incremental updates. These updates are sent only
when required which reduces the routing overheads on the
WAN links.
G. OSPF is a scalable protocol that means it will work perfectly
fine in small network as well as with large network where we
may have several hundred routers.

Disadvantages of OSPF.
A) OSPF requires more memory to hold the database containing
all the routers and their routes I the routing table.
B) OSPF requires extra CPU processing to run SFP algorithm.
C) OSPF is complex to configure and difficult to troubleshoot.

To work in large enterprise network, OSPF uses Areas. Areas


are used to control when and how mach routing information
is shared between what routers. All routers In ospf network
are divides into different areas. While configuring OSPF we
need to specify area number for every interface of router.
Routes within same area shares full routing table with each
other and with routers which belongs to other area, shares
only summarized routing updates. Router whose interfaces
belong to different areas is known as Area Border Route
(ABR). OSPF implements two layer hierarchies the backbone
(Area 0) and other area (Area 1 to 4294967295) A backbone
area is used to connect routers belonging to other areas
together.
Wild Card Mask:- OSPF supports classfull as well as classless
network numbers . A wild card mask is used to tell router,
the subnet component of the IP address. A WCM is an
inverse of subnet mask. For Example , WCMof subnet mask
255.255.255.0 will be 0.0.0.255.

Enhanced Interior Gateway Routing Protocol (EIGRP):EIGRP comes with many enhancements in IGRP allowing it to work
for large enterprise networks. Below are the advantages of EIGRP.
A. Fast Convergence using DUAL (Diffusing Update Algorithm)
algorithm and trigger updates
B. Provides loop free topology
C. Supports classful and classless IP addressing
D. Uses multicast to share routing information
E. Less network overheads as EIGRP uses incremental updates
F. Support equal and unequal coast load balancing up to 6
paths
G. Supports multiple routed protocols like IP, IPX. Apple Talk

The disadvantage of EIGRP could be, it is proprietary


routing protocol and works only with cisco Routers.
Diffusing Update Algorithm (DUAL):- Router running EIGRP
uses Dual to update its routing table. This algorithm enables very
fast convergence. Whenever an EIGRP router receives update
message from neighbor router, it stores there information in its
topology table first. Once all routing updates and their metrics are
received from neighbors, EIGRP router then run DUAL algorithm
on these routes and selects the best route among all. Once the
best route is calculated, it is moved from topology table to the
routing table. If thir are more than one route available to the
destination, EIGRP uses them for load sharing. The best route to
the destination is Know as Successor. The second best route to
the destination is termed as Feasible Successor. The successor is
stored in the routing table and feasible successor is stored in the
topology table. If the best route (Successor )fails, router takes
second best route for the topology table and places it in routers
routing table without necessarily having talk with neighbor to find
alternate path. Theis makes EIGRP to converge very fast as
compare to other routing protocols.
EIGRP Metric:- Like IGRP, EIGRP uses a composite metric to
choose the best path to the destination. Composite metric is a
combination of Bandwidth, Delay, load, Reliability.
Introduction to WAN
Unlike LAN, WAN connections allow us to connect sites that are
geographically apart. Typically, we dont own the infrastructure
required for WAN connectivity.
WAN Components:CPE (Customer Premises Equipments):- cpe are the network
equipments that are placed at customers premises. Customer

has to take ownership of these equipments. Examples of CPEs are


Modems, Routers, etc.
Demarcation point:- This is a spot where service providers
responsibility end and customers responsibility begins. This is a
closet box fixed at customers premises by service provider.
Local Loop:- This is a connection from service providers switch
to the Demarcation point.
Toll Network:- This is the service providers internal
infrastructure we use for transporting the data.

Collision Domain is a group of Ethernet or Fast Ethernet devices in a CSMA/CD LAN


that are connected and compete for access on the network. Only one device in the
collision domain may transmit at any one time, and the other devices in the domain
listen to the network in order to avoid data collisions.
A broadcast domain is a logical division of a computer network, in which all nodes
can reach each other by broadcast at the data link layer. A broadcast domain can
be within the same LAN segment or it can be bridged to other LAN segments.

carrier sense multiple access with collision detection (CSMA/CD):- Carrier Sense
Multiple Access With Collision Detection (CSMA/CD) is a media access control
method used most notably in local area networking using early Ethernet technology.
It uses a carrier sensing scheme in which a transmitting data station detects other
signals while transmitting a frame, and stops transmitting that frame, transmits a
jam signal, and then waits for a random time interval before trying to resend the
frame.

Introduction to Bridging and Switching :- Main function of a


Bridges or Switches is to solve bandwidth and collision prolems.
Bridges or Switches breaks up the network into multiple
segments,. This segmentation is called as micro segmentation.
Each port of a switch or Bridge acts, as a separate collision
domain. Collisions occurred on one port of a switch or a bridge are
not passed to other ports. But all these ports are a part of single
broadcast domain.
Hub receives any information, including collision on its port it
amplifies the signals and floods this informationto all the active
ports. Each receiving device then reads the destination MAC

address in the frame and determines whether this information is


meant for him or not . if destination MAC address in the frame and
the devices MAC address matches the frame is forwarded to
upper layers for processing . if the MAC address doesnt match,
the frame is rejected.
If one device in the network is transmitting the information
no other device can transmit the informationat the same time and
must wait until carrier becomes available . using Hubs in large
networks create problems in terms of carrier availability to each
device that may increase collsions in the network resulting
network congestion problems.

Switch :- A switch knows which devices are connected to which of


its port by learning Mac address of each device

Configuration of Vlan
Switch(config)#vlan 10
Switch(config-vlan)#name nagpur
Switch(config-vlan)#exi
Switch(config)#vlan 20
Switch(config-vlan)#name pune
Switch(config-vlan)#exi
Switch(config)#vlan 30
Switch(config-vlan)#name gondia
Switch(config-vlan)#exi

Switch(config)#int f0/1
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 10
Switch(config-if)#exi
Switch(config)#int f0/2
Switch(config-if)#switchport mode access
Switch(config-if)#switchport access vlan 20
Switch(config-if)#exi

VLAN Trunk Protocol (VTP)


VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the
definition of Virtual Local Area Networks (VLAN) on the whole local area network.
VTP carries VLAN information to all the switches in a VTP domain. VTP
advertisements can be sent over lan trunks. In other words, switches use VLAN
trunking protocol (VTP) to communicate among themselves about VLAN
configuration. VTP is available on most of the Cisco Catalyst Family products.

Configuration of VTP
Switch(config)#hostname iant
iant(config)#vtp domain ccna
iant(config)#vtp mode server
iant(config)#end
iant#vlan database
iant(vlan)#vlan 10 name it
iant(vlan)#vlan 20 name hr
iant(vlan)#vlan 30 name sale

iant(config)#int f0/1
iant(config-if)#switchport mode trunk

Switch(config)#int f0/1
Switch(config-if)#switchport mode trunk
Switch(config-if)#exit
Switch(config)#host nagpur
nagpur(config)#vtp domain ccna
nagpur(config)#vtp mode client
nagpur(config)#exit

You might also like