06 Handout 1
06 Handout 1
IP Routing
Static Routes
These routes are manually configured by network administrators, have low system requirements, and apply to simple,
stable, and small networks. The disadvantage of static routes is that they cannot automatically adapt to network topology
changes and so require manual intervention.
Static routing manually sets up the optimal paths between the source and the destination computers.
Huawei Router Configuration
Specify a next-hop IP address
[Huawei] ip route-static ip-address { mask /mask-length } nexthop-address
for a static route.
Specify an outbound
[Huawei] ip route-static ip-address { mask /mask-length } interface-type interface-number
interface for a static route.
Specify both the outbound
[Huawei] ip route-static ip-address { mask /mask-length } interface-type interface-number [
interface and next hop for a
nexthop-address ]
static route.
Example: Configure static routes on RTA and RTC for • Packets are forwarded hop by hop. Therefore, all
communication between 10.0.0.0/24 and 20.1.1.0/24. the routers along the path from the source to the
destination must have pre-determined routes.
• Forward and backward routes must be available.
Configure RTA:
[RTA] ip route-static 20.1.1.0 255.255.255.0 10.0.0.2
Configure RTC:
[RTC] ip route-static 10.0.0.0 255.255.255.0 S1/0/0
Note: Routers and computers may or may not have a default route stored in their IP routing table. If no default route is
available, IP packets that do not match any routing entry will be silently discarded.
Dynamic Routes
These routing protocols provide different routing algorithms to adapt to network topology changes.
Static vs. Dynamic Routes
When the network scale expands, it becomes increasingly Dynamic routing protocols automatically discover and
complex to manually configure static routes. In addition, generate routes, and update routes when the topology
when the network topology changes, static routes cannot changes. These protocols reduce the workload of network
adapt to these changes in a timely and flexible manner. administrators and are used on large networks.
By Application
Routing protocols are classified as interior gateway protocols (IGPs) or exterior gateway protocols (EGPs).
A. Interior Gateway Protocol (IGP) - IGP is meant to dynamically route data across a network that you fully control and
maintain. Basically, interior protocols are meant to dynamically route data across a network that you fully control and
maintain. Example: RIP, OSPF & IS-IS
B. Exterior Gateway Protocol (BGP) - Exterior routing protocols are used to exchange routes between distinctly separate
networks that you have no administrative control over. BGP is the routing protocol used on the Internet; therefore, the
most common enterprise use is to run BGP on your internet edge when connecting to your ISP. Example: Border Gateway
Protocol (BGP)
A. DISTANCE-VECTOR ROUTING PROTOCOL - In this type of routing, all the routers send their routing tables to only their
neighboring routers.
• The routers use the received information to determine any changes that need to be made to their own routing
table. It is iterative in that this process continues on until no more information is exchanged between neighbors.
Example: Routing Information Protocol (RIP) – This is a commonly used distance vector routing that uses its routing
metric to determine the best route or shortest path a packet has to traverse from the source to a destination over a
network. RIP is a distance-vector IGP and has a preference of 100.
• RIP uses a hop count as the route cost. A hop count is the number of routers through which a packet passes to
reach its destination. RIP was designed for exchanging information within a limited size network, such as a
network of 250 routes or a maximum of 15 hops.
• A router running RIP sends the contents of its routing table to each of its adjacent routers every 30 seconds.
When a route is removed from the routing table, it is flagged as unusable by the receiving routers after 180
seconds and removed from their tables after an additional 120 seconds.
• RIP routers exchange two types of RIP messages: request and response messages.
o When a RIP router starts up, it sends a RIP request to all of its neighbors to request routing information
of the entire RIP network.
o A running RIP router can also send such a message. Upon receipt of a RIP request, a RIP router
immediately replies with a RIP response that contains the routing information.
• RIPv1 uses IP broadcast packets for its announcements. RIPv2, also allows IP multicast packets for its
announcements.
B. LINK-STATE ROUTING PROTOCOL - In this type of routing, each of the routers sends the state of its own interfaces to
all other routers only when there is a change to report. Each router uses the received information to recalculate the best
path to each network and then saves this information in its routing table.
Step 3. SPF Calculation - Each router uses the Shortest Path First (SPF) algorithm and LSDB information to calculate
routes. Each router calculates a loop-free tree with itself as the root and the shortest path. With this tree, a router
determines the optimal path to each corner of a network.
Step 4. Routing Table Generation - The router installs routes for the calculated preferred paths into its routing table.
Example: Open Shortest Path First (OSPF) – This is a link-state routing protocol developed by the IETF in 1988 that is
capable of quickly detecting topological changes within the autonomous system and establishing loop-free routes in a
short period of time, with minimum additional communication overhead for negotiating topology changes between
peering routers.
• Area - The OSPF area keyword identifies an OSPF area. The area is considered a logical group, and each group
is identified by an area ID.
• Router ID - uniquely identifies a router in an OSPF area. The router ID can be manually specified or
automatically assigned by the system.
• Cost Value - OSPF uses costs as route metrics. Each OSPF-enabled interface maintains a cost value.
• Important concepts about the relationship between OSPF routers: neighbor relationship and adjacency.
Example: IS-IS (Intermediate System-to-Intermediate System) forms neighbor adjacencies, has areas, exchanges link-
state packets, builds a link-state database, and runs the Dijkstra’s (Shortest Path First) algorithm to find the best path to
each destination, which is installed in the routing table. (Cisco)
IS-IS Terminologies
• IS (Intermediate System) is the ISO name for a router. It is the communication between intermediate systems
or routers.
• ES (End System) is a device on the network, such as a server or workstation. (Hosts)
• CLNS (Connection-Less Network Service) is a network service in the OSI stack.
• NSAP (Network Service Access Point) is a Layer-3 address for CLNS packets. This is like an IP address in the
TCP/IP stack. IS-IS uses NSAP addresses for communication, not IP addresses.
References:
Comer, D. (2019). The Internet book: Everything you need to know about computer networking and how the Internet
works. CRC Press.
Huawei. (2020). HCIA-Datacom V1.0 Training Material.
Introduction to IS-IS. In networkdirection.net [Web Article]. Retrieved on February 3, 2022 from
https://networkdirection.net/articles/routingandswitching/introductiontois-is/
Froehlich, A. (2016). In networkingcomputing.com. Comparing dynamic routing protocols [Web Article]. Retrieved on
February 3, 2022 from https://www.networkcomputing.com/data-centers/comparing-dynamic-routing-protocols
Karumanchi, N., Damodaram, A., & Rao, S. (2020). Elements of computer networking: An integrated approach. Career
Monk.
Kurose, T & Ross, K. (2021). Computer networking: A top-down approach. Pearson.
Robertazzi, T. (2017). Introduction to computer networking. Springer International.
Wright, G. (n.d.). HELLO packets – In techtarget.com [Web Article]. Retrieved on February 23, 2022 from
https://www.techtarget.com/searchnetworking/definition/HELLO-packet