0% found this document useful (0 votes)
25 views8 pages

IP Connectivity

RIP is a distance vector routing protocol that uses hop count to determine the best path. It has limitations such as slow convergence, high overhead from frequent broadcasts, and limited scalability for large networks. RIP is still used in some small networks.

Uploaded by

Ella Del Mundo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views8 pages

IP Connectivity

RIP is a distance vector routing protocol that uses hop count to determine the best path. It has limitations such as slow convergence, high overhead from frequent broadcasts, and limited scalability for large networks. RIP is still used in some small networks.

Uploaded by

Ella Del Mundo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Routing Information Protocol (RIP)

RIP is a distance vector routing protocol, which means that it uses hop count to determine the best path to a
destination. RIP is a simple protocol to configure and manage, but it has some limitations, including:

• Slow convergence: RIP can take a long time to converge after a network topology change, which can
lead to routing loops.
• High overhead: RIP broadcasts its entire routing table to all neighbors every 30 seconds, which can
generate a lot of traffic on large networks.
• Limited scalability: RIP is not well-suited for large networks because of its slow convergence and high
overhead.

RIP is still used in some smaller networks and WANs, but it is generally not recommended for large or complex
networks.

RIP's distance-vector routing algorithm works by exchanging routing tables with neighboring routers. Each RIP
router maintains a routing table, which is a list of all the destinations the router knows how to reach and the
number of hops to each destination.

RIP routers broadcast their routing tables to their neighbors every 30 seconds. When a RIP router receives a
routing update from a neighbor, it updates its own routing table accordingly. If a RIP router sees a new path
to a destination in a routing update, it will add the new path to its own routing table. If a RIP router sees a
better path to a destination in a routing update, it will update its own routing table to use the better path.

RIP uses hop count as its routing metric. Hop count is the number of routers a packet must pass through to
reach its destination. RIP always chooses the path to a destination with the lowest hop count.

Here is an example of how RIP shares routing information in a network:

• Router A broadcasts its routing table to its neighbors, Routers B and C.


• Router B receives Router A's routing table and updates its own routing table accordingly.
• Router C receives Router A's routing table and updates its own routing table accordingly.
• Router B broadcasts its routing table to its neighbors, Routers A and D.
• Router D receives Router B's routing table and updates its own routing table accordingly.
• Router C broadcasts its routing table to its neighbors, Routers A and E.
• Router E receives Router C's routing table and updates its own routing table accordingly.

This process continues until all of the routers in the network have converged on the same routing table. Once
the routers have converged, they will be able to forward packets to their destinations using the most efficient
paths.

RIP is a simple and easy-to-configure routing protocol, but it has some limitations. RIP can be slow to converge
after a network topology change, and it can generate a lot of traffic on large networks. However, RIP is still a
popular routing protocol for small and medium-sized networks.
Enhanced Interior Gateway Routing Protocol (EIGRP)

EIGRP is a hybrid routing protocol that combines features of both distance vector and link state protocols.
EIGRP is known for its fast convergence and scalability.

EIGRP uses a metric called the Composite Metric to determine the best path to a destination. The Composite
Metric is calculated based on the following factors:

• Bandwidth: The bandwidth of each link in the path.


• Delay: The delay of each link in the path.
• Reliability: The reliability of each link in the path.

EIGRP also uses a technique called Diffused Update Algorithm (DUAL) to quickly propagate routing updates
throughout the network. DUAL ensures that all routers in the network converge to the same routing table in
a short amount of time.

EIGRP is a good choice for a wide range of networks, including small networks, large networks, and WANs.

EIGRP Basics

Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines features of
both distance vector and link state protocols. EIGRP is known for its fast convergence and scalability.

EIGRP uses a metric called the Composite Metric to determine the best path to a destination. The Composite
Metric is calculated based on the following factors:

• Bandwidth: The bandwidth of each link in the path.


• Delay: The delay of each link in the path.
• Reliability: The reliability of each link in the path.

EIGRP also uses a technique called Diffused Update Algorithm (DUAL) to quickly propagate routing updates
throughout the network. DUAL ensures that all routers in the network converge to the same routing table in
a short amount of time.

DUAL Algorithm

The DUAL algorithm works by first calculating a Feasible Distance (FD) to each destination. The FD is the cost
of the best known path to the destination.

DUAL then calculates a Successor Distance (SD) to each destination. The SD is the cost of the best known path
to the destination that includes the current router as the successor.

DUAL then compares the FD and SD to each destination. If the FD is less than the SD, then the current router
knows of a better path to the destination and will send a routing update to its neighbors. If the SD is less than
the FD, then the current router is on the best known path to the destination and will not send a routing
update.
Applicability to IPv4 and IPv6 Networks

EIGRP can be used to route both IPv4 and IPv6 traffic. EIGRP uses the same DUAL algorithm for both IPv4 and
IPv6, but there are some differences in the way that EIGRP messages are formatted and sent.

For IPv4 networks, EIGRP uses the multicast address 224.0.0.10 to send routing updates. For IPv6 networks,
EIGRP uses the multicast address FF02::A to send routing updates.

Conclusion

EIGRP is a powerful and versatile routing protocol that can be used in a variety of networks, including small
networks, large networks, and WANs. EIGRP is a good choice for networks that require fast convergence and
scalability.

Border Gateway Protocol (BGP)

BGP is an exterior routing protocol that is used to exchange routing information between autonomous
systems (AS). BGP is the most widely used routing protocol on the Internet.

BGP uses a path vector routing algorithm to determine the best path to a destination. BGP routers send each
other routing advertisements containing information about the networks they can reach. BGP routers then
use this information to build a routing table that shows the best path to each network.

BGP is a complex protocol to configure and manage, but it is very flexible and scalable. BGP is the only routing
protocol that can be used to exchange routing information between ASs.

BGP (Border Gateway Protocol) is an exterior routing protocol that is used to exchange routing information
between autonomous systems (AS). BGP is the most widely used routing protocol on the Internet.

Role in Internet Routing

BGP plays a vital role in internet routing by allowing ASs to exchange routing information. This allows ASs to
learn about the networks that are reachable through other ASs and to choose the best paths to those
networks.

Autonomous Systems (AS)

An autonomous system (AS) is a collection of networks that are under the control of a single administrative
entity. ASs can be interconnected through BGP, which allows them to exchange routing information and to
route traffic between each other's networks.

BGP Attributes for Path Selection

BGP uses a variety of attributes to select the best path to a destination. These attributes include:

• AS Path: The list of ASs that a packet must traverse to reach its destination.
• Origin: The origin of the route, such as IGP, EGP, or Incomplete.
• MED (Multi-Exit Discriminator): A hint to the external neighbors about the preferred path into an AS
when there are multiple entry points into the AS.
• Local Preference: A preference value that is used to select between multiple paths with the same AS
Path and MED.

BGP routers use these attributes to select the best path to a destination based on the following criteria:

1. AS Path: The shortest AS Path is preferred.


2. Origin: IGP is preferred over EGP, and EGP is preferred over Incomplete.
3. MED: A lower MED is preferred.
4. Local Preference: A higher local preference is preferred.

BGP routers will also consider other factors, such as traffic engineering policies, when selecting the best path
to a destination.

Conclusion

BGP is a complex routing protocol, but it is essential for the operation of the Internet. BGP allows ASs to
exchange routing information and to route traffic between each other's networks. BGP uses a variety of
attributes to select the best path to a destination, including AS Path, Origin, MED, and Local Preference.

Here are some examples of how BGP is used in internet routing:

• Internet service providers (ISPs) use BGP to exchange routing information with each other. This allows
ISPs to learn about the networks that are reachable through other ISPs and to choose the best paths
to those networks.
• Content delivery networks (CDNs) use BGP to distribute their content servers around the world. This
allows CDNs to serve content to users from the nearest server, which improves performance and
reliability.
• Enterprises use BGP to connect their networks to the Internet and to other enterprises. This allows
enterprises to exchange traffic with each other and with the rest of the Internet.

BGP is a powerful and versatile routing protocol that is essential for the operation of the modern internet.

Hot Standby Router Protocol (HSRP)

HSRP is a fault tolerance protocol that is used to provide redundancy for gateway routers. HSRP works by
creating a virtual router interface (VIP) that is shared by two or more routers.

One of the routers in the HSRP group is designated as the active router. The active router is responsible for
forwarding traffic to the gateway. The other routers in the HSRP group are designated as standby routers. The
standby routers monitor the active router and take over if the active router fails.
HSRP Definition

Hot Standby Router Protocol (HSRP) is a fault tolerance protocol that is used to provide redundancy for
gateway routers. HSRP works by creating a virtual router interface (VIP) that is shared by two or more routers.

One of the routers in the HSRP group is designated as the active router. The active router is responsible for
forwarding traffic to the gateway. The other routers in the HSRP group are designated as standby routers. The
standby routers monitor the active router and take over if the active router fails.

HSRP Configuration on Cisco Routers

To configure HSRP on Cisco routers, you will need to follow these steps:

1. Enable HSRP on the interface that will be used for the VIP.
2. Configure the group number and priority for the HSRP group.
3. Configure the VIP address.
4. Apply the configuration.

Example HSRP Configuration

Here is an example of an HSRP configuration on Cisco routers:

interface Ethernet0/0
standby 1 priority 100
ip address 192.168.1.1 255.255.255.0

interface Ethernet0/1
no shutdown
ip address 192.168.1.2 255.255.255.0

In this example, HSRP is enabled on the Ethernet0/0 interface with a group number of 1 and a priority of 100.
The VIP address is 192.168.1.1.

The Ethernet0/1 interface is also configured, but HSRP is not enabled on it. This interface will be used as a
backup interface in case the Ethernet0/0 interface fails.

Benefits of using HSRP

• Network redundancy: HSRP provides network redundancy by ensuring that there is always an active
router available to forward traffic to the gateway.
• High availability: HSRP helps to improve the high availability of networks by ensuring that traffic can
continue to flow even if a gateway router fails.
• Reduced downtime: HSRP helps to reduce downtime by allowing networks to recover from router
failures quickly and automatically.

HSRP is a valuable tool for network administrators who want to improve the reliability and availability of their
networks.
Wide Area Network (WAN) Fundamentals

A WAN is a network that connects two or more LANs that are geographically separated. WANs can use a
variety of technologies to connect LANs, such as leased lines, frame relay, and ATM.

WANs are typically used to connect business networks to the Internet, or to connect remote offices to a
corporate headquarters. WANs can also be used to connect educational institutions, government agencies,
and other organizations.

When designing a WAN, it is important to consider the following factors:

• Bandwidth: The amount of bandwidth required to support the applications and traffic that will be used
on the WAN.
• Delay: The amount of delay that is acceptable for the applications and traffic that will be used on the
WAN.
• Reliability: The level of reliability required for the WAN.
• Cost: The cost of implementing and maintaining the WAN.

Once the design considerations have been taken into account, the appropriate WAN technology can be
selected..

What is a WAN?

A wide area network (WAN) is a network that connects two or more local area networks (LANs) that are
geographically separated. WANs can use a variety of technologies to connect LANs, such as leased lines, frame
relay, ATM, and MPLS.

Purpose of WANs

WANs are used to connect businesses, schools, government agencies, and other organizations to the Internet
and to each other. WANs allow users to share resources, such as files, applications, and printers, and to
communicate with each other using email, instant messaging, and video conferencing.

WAN Technologies

There are a variety of WAN technologies available, each with its own advantages and disadvantages. Some of
the most common WAN technologies include:

• Leased lines: Leased lines are dedicated circuits that are leased from a telecommunications provider.
Leased lines offer the highest bandwidth and reliability, but they are also the most expensive WAN
technology.
• MPLS: Multiprotocol Label Switching (MPLS) is a traffic engineering protocol that is used to create
high-performance and reliable WANs. MPLS is often used by businesses to connect their offices to
each other and to the Internet.
• VPNs: Virtual private networks (VPNs) allow organizations to create secure private networks over
public networks, such as the Internet. VPNs are often used by businesses to allow employees to access
corporate resources from remote locations.

Challenges of WAN Design and Management

WANs can be complex and challenging to design and manage. Some of the challenges of WAN design and
management include:

• Choosing the right WAN technology: There are a variety of WAN technologies available, each with its
own advantages and disadvantages. The choice of WAN technology will depend on the specific needs
of the organization, such as the required bandwidth, budget, and security requirements.
• Designing a reliable WAN: WANs must be designed to be reliable and to minimize downtime. This can
be challenging, especially if the WAN spans a large geographical area.
• Managing a WAN: WANs can be complex to manage, especially if they use multiple WAN technologies.
Network administrators must be able to monitor and troubleshoot the WAN to ensure that it is
performing as expected.

Despite the challenges, WANs are an essential part of many organizations. WANs allow organizations to
connect their employees, customers, and partners, and to share resources and communicate with each other.

Here are some tips for designing and managing WANs:

• Start by understanding the needs of your organization: What kind of traffic will be carried on the WAN?
What are the bandwidth requirements? What are the security requirements?
• Evaluate different WAN technologies: There are a variety of WAN technologies available, each with its
own advantages and disadvantages. Choose the WAN technology that best meets the needs of your
organization.
• Design a reliable WAN: WANs must be designed to be reliable and to minimize downtime. This can be
done by using multiple WAN technologies and by designing the WAN with redundancy in mind.
• Implement monitoring and troubleshooting tools: WANs can be complex to manage, especially if they
use multiple WAN technologies. Implement monitoring and troubleshooting tools to help you identify
and resolve problems quickly.

By following these tips, you can design and manage a WAN that meets the needs of your organization and
provides the performance, reliability, and security that you require.

Routing Protocol Selection

The best routing protocol for a particular network will depend on a number of factors, including the size and
complexity of the network, the required bandwidth and latency, and the budget.

Here is a general guideline for selecting a routing protocol:

• Small networks: RIP is a good choice for small networks with a few routers and a simple topology.
• Medium-sized networks: EIGRP is a good choice for medium-sized networks with a variety of
topologies and bandwidth requirements.
• Large networks: OSPF is a good choice for large networks with complex topologies and high bandwidth
requirements.
• WANs: BGP is the only routing protocol that can be used to exchange routing information between
ASs.

Conclusion

RIP, EIGRP, BGP, and HSRP are all important routing protocols that are used in a variety of networks. When
selecting a routing protocol, it is important to consider the size and complexity of the network, the required
bandwidth and latency, and the budget

You might also like