What Is Routing ?
What Is Routing ?
What Is Routing ?
Destination address
Static routing
Default routing
Dynamic routing
Static Routing
IGPs are used to exchange routing information with routers in the same
autonomous system (AS)
EGPs are used to communicate between ASes.
Administrative Distances
Routing loops
Administrative Distances
If a router receives two updates listing the same remote network, the
first thing the router checks is the AD. If one of the advertised routes
has a lower AD than the other, then the route with the lowest AD will
be placed in the routing table.
If both advertised routes to the same network have the same AD,
then routing protocol metrics (such as hop count or bandwidth of the
lines) will be used to find the best path to the remote network.The
advertised route with the lowest metric will be placed in the routing
table.
But if both advertised routes have the same AD as well as the same
metrics, then the routing protocol will load-balance to the remote
network.
Default Administrative Distances
Connected interface 0
Static route 1
EIGRP 90
IGRP 100
OSPF 110
RIP 120
External EIGRP 170
Unknown 255 (this route will never be used)
Routing Protocols
There are three classes of routing protocols:
Distance vector : The distance-vector protocols find the best
path to a remote network by judging distance. Each time a packet
goes through a router, that’s called a hop. The route with the least
number of hops to the network is determined to be the best route.
The vector indicates the direction to the remote network. They send
the entire routing table to directly connected neighbors.Ex:RIP,IGRP
When Network 5 fails, Router E tells Router C. This causes Router C to stop
routing to Network 5 through Router E. But Routers A, B, and D don’t know
about Network 5 yet, so they keep sending out update information. Router C will
eventually send out its update and cause B to stop routing to Network 5, but
Routers A and D are still not updated. To them, it appears that Network 5 is still
available through Router B with a metric of 3.The problem occurs when Router
A sends out its regular 30-second “Hello, I’m still here—these are the links I
know about” message, which includes the ability to reach Network 5 and now
Routers B and D receive the wonderful news that Network 5 can be reached
from Router A, so Routers B and D then send out the information that Network 5
is available. Anypacket destined for Network 5 will go to Router A, to Router B,
Loop Avoidance
Maximum Hop Count
RIP permits a hop count of up to 15, so anything that requires
16 hops is deemed unreachable. Thus, the maximum hop count
will control how long it takes for a routing table entry to become
invalid.
Split Horizon
This reduces incorrect routing information and routing overhead
in a distance-vector network by enforcing the rule that routing
information cannot be sent back in the direction from which it was
received.
Route Poisoning
when Network 5 goes down, Router E initiates route poisoning by
advertising Network 5 as 16, or unreachable. When Router C
receives a route poisoning from Router E, it sends an update,
called a poison reverse, back to Router E. This ensures all routes
on the segment have received the poisoned route information.
Routing Information Protocol (RIP) is a true distance-vector routing
protocol.
It sends the complete routing table out to all active interfaces
every 30 seconds.
RIP only uses hop count to determine the best way to a remote
network, but it has a maximum allowable hop count of 15 by
default, meaning that 16 is deemed unreachable.
RIP version 1 uses only classful routing, which means that all
devices in the network must use the same subnet mask.
Route update timer Sets the interval (30 seconds) between periodic routing
updates, in which the router sends a complete copy of its routing table out to all
neighbors.
Route invalid timer Determines the length of time that must elapse (180
seconds) before a router determines that a route has become invalid. It will
come to this conclusion if it hasn’t heard any updates about a particular route for
that period. When that happens, the router will send out updates to all its
neighbors letting them know that the route is invalid.
Holddown timer This sets the amount of time during which routing information
is suppressed. Routes will enter into the holddown state when an update packet
is received that indicated the route is unreachable. This continues until either an
update packet is received with a better metric or until the holddown timer
expires. The default is 180 seconds.
Route flush timer Sets the time between a route becoming invalid and its
removal from the routing table (240 seconds). Before it’s removed from the
table, the router notifies its neighbors of that route’s impending demise. The
value of the route invalid timer must be less than that of the route flush timer.
RIP LAB 1 :
RIP LAB 2:
RIP Version 2 (RIPv2)
The timers and loop-avoidance schemes are the same in both RIP
versions
Both RIPv1 and RIPv2 are configured as classful addressing, (but RIPv2
is considered classless because subnet information is sent with each
route update)
Both have the same administrative distance (120)
RIP is an open standard, you can use RIP with any brand of router.
RIP V1 Vs RIP V2
Interior Gateway Routing Protocol (IGRP) is a Cisco-proprietary
distance-vector routing protocol.
Invalid timers : These specify how long a router should wait before
declaring a route invalid if it doesn’t receive a specific update about it.
The default is three times the update period.
Flush timers : These indicate how much time should pass before a
route should be flushed from the routing table. The default is seven
times the routing update period. If the update timer is 90 seconds by
default, then 7 × 90 = 630 seconds elapse before a route will be flushed
from the route table.
IGRP LAB 1 :
RIP & IGRP LAB :
Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol
that gives us a real edge over IGRP.
Each EIGRP PDM will maintain a separate series of tables containing the
routing information that applies to a specific protocol.
Neighbor Discovery
Before EIGRP routers are willing to exchange routes with each other,
they must become neighbors.There are three conditions that must be met
for neighborship establishment:
AS numbers match
The only time EIGRP advertises its entire routing table is when it
discovers a new neighbor and forms an adjacency with it
through the exchange of Hello packets. When this happens,
both neighbors advertise their entire routing tables to one
another. After each has learned its neighbor’s routes, only
changes to the routing table are propagated from then on.
EIGRP maintains three tables containing information about the internetworks.
1. Neighbor Table (records information about routers with whom neighborship relationships have been formed.)
2. Topology Table (stores the route advertisements about every route in the internetwork received from each neighbor.)
3. Routing Table (stores the routes that are currently used to make routing decisions.)
Feasible distance
This is the best metric along all paths to a remote network, including the metric
to the neighbor that is advertising that remote network. This is the route that you will find
in the routing table, because it is considered the best path. The metric of a feasible
distance is the metric reported by the neighbor (called reported distance), plus the metric
to the neighbor reporting the route.
Neighbor table
Each router keeps state information about adjacent neighbors. When a newly
discovered neighbor is learned, the address and interface of the neighbor are recorded,
and this information is held in the neighbor table, stored in RAM. There is one neighbor
table for each protocol-dependent module.
Topology table
The topology table is populated by the PDMs and acted upon by the Diffusing Update
Algorithm (DUAL). It contains all destinations advertised by neighboring routers, holding
each destination address and a list of neighbors that have advertised the destination.
For each neighbor, the advertised metric is recorded, which comes only from the
neighbor’s routing table. If the neighbor is advertising this destination, it must be using
the route to forward packets.
Feasible successor
A destination entry is moved from the topology table to the routing table
when there is a feasible successor. A feasible successor is a path whose reported
distance is less than the feasible distance, and it is considered a backup route. EIGRP
will keep up to six feasible
successors in the topology table. Only the one with the best metric (the successor).is
placed in the routing table.
Successor
A successor route is the best route to a remote network. A successor route is used by
EIGRP to forward traffic to a destination and is stored in the routing table. It is backed up
by a feasible successor route that is stored in the topology table—if one is available.
EIGRP sends updates via multicast traffic, it uses the Class D address 224.0.0.10.
If EIGRP doesn’t get a reply from a neighbor, it will switch to using unicasts to resend
the same data.
If it still doesn’t get a reply after 16 unicast attempts, the neighbor is declared dead.
EIGRP uses Diffusing Update Algorithm (DUAL) for selecting and maintaining the best
path to each remote network. This algorithm allows for the following:
DUAL provides EIGRP with possibly the fastest route convergence time among all protocols.
EIGRP Metrics
Another really sweet thing about EIGRP is that unlike many other protocols that use a
single factor to compare routes and select the best possible path, EIGRP can use a
combination of four:
Bandwidth
Delay
Load
Reliability
MTU
Like IGRP, EIGRP uses only bandwidth and delay of the line to determine the
best path to a remote network by default.
Maximum Paths and Hop Count
By default, EIGRP (and IGRP) can provide unequal cost load balancing of up to four
links.However, you can have EIGRP actually load balance across up to six links.
EIGRP (and IGRP) has a maximum hop count of 100, but can be set up to 255.
By using the no auto-summary command, EIGRP will advertise all the subnets
between the two routers. If the networks were larger, you could then provide
manual summarization on these same boundaries.
Open Shortest Path First (OSPF) is an open standards routing protocol that’s
been implemented by a wide variety of network vendors, including Cisco.
This works by using the Dijkstra algorithm. First, a shortest path tree is
constructed, and then the routing table is populated with the resulting best
paths. OSPF converges quickly, although perhaps not as quickly as EIGRP,
and it supports multiple, equal-cost routes to the same destination. But unlike
EIGRP, it only supports IP routing.
Each router in the network connects to the backbone called area 0,or the backbone area.
OSPF must have an area 0, and all routers should connect to this area if at all possible.
But routers that connect other areas to the backbone within an AS are called
Area Border Routers (ABRs). Still, at least one interface must be in area 0.
OSPF runs inside an autonomous system, but can also connect multiple autonomous
systems together. The router that connects these ASes together is called an
Autonomous System Boundary Router (ASBR).
OSPF Terminology
Link A link is a network or router interface assigned to any given network. When an
interface is added to the OSPF process, it’s considered by OSPF to be a link.
Router ID The Router ID (RID) is an IP address used to identify the router. Cisco
chooses the Router ID by using the highest IP address of all configured loopback
interfaces. If no loopback interfaces are configured with addresses, OSPF will choose
the highest IP address of all active physical interfaces.
Neighbors Neighbors are two or more routers that have an interface on a common
network,such as two routers connected on a point-to-point serial link.
Adjacency An adjacency is a relationship between two OSPF routers that permits the
direct exchange of route updates. OSPF is really picky about sharing routing
information—unlike EIGRP, which directly shares routes with all of its neighbors.
Instead, OSPF directly shares routes only with neighbors that have also established
adjacencies. And not all neighbors will become adjacent—this depends upon both the
type of network and the configuration of the routers.
Hello protocol The OSPF Hello protocol provides dynamic neighbor discovery and
maintains neighbor relationships. Hello packets and Link State Advertisements (LSAs)
build and maintain the topological database. Hello packets are addressed to 224.0.0.5.
Neighborship database The neighborship database is a list of all OSPF routers for
which Hello packets have been seen. A variety of details, including the Router ID and
state, are maintained on each router in the neighborship database.
Topology database The topology database contains information from all of the
Link State Advertisement packets that have been received for an area. The router
uses the information from the topology database as input into the Dijkstra algorithm
that computes the shortest path to every network. LSA packets are used to update
and maintain the topology database.
Link State Advertisement A Link State Advertisement (LSA) is an OSPF data
packet containing link-state and routing information that’s shared among OSPF
routers. There are different types of LSA packets. An OSPF router will exchange
LSA packets only with routers to which it has established adjacencies.
Designated router A designated router (DR) is elected whenever OSPF routers
are connected to the same multi-access network. A prime example is an Ethernet
LAN.
Backup designated router A backup designated router (BDR) is a hot standby for
the DR on multi-access links The BDR receives all routing updates from OSPF
adjacent routers, but doesn’t flood LSA updates.
OSPF areas An OSPF area is a grouping of contiguous networks and routers. All
routers in the same area share a common Area ID.
Broadcast (multi-access) Broadcast (multi-access) networks such as Ethernet
allow multiple devices to connect to (or access) the same network, as well as
provide a broadcast ability in which a single packet is delivered to all nodes on
the network. In OSPF, a DR and a BDR must be elected for each broadcast
multi-access network.
Non-broadcast multi-access Non-Broadcast Multi-Access (NBMA) networks
are types such as Frame Relay, X.25, and Asynchronous Transfer Mode (ATM).
These networks allow for multi-access, but have no broadcast ability like
Ethernet. So, NBMA networks require special OSPF configuration to function
properly and neighbor relationships must be defined.
Point-to-point Point-to-point refers to a type of network topology consisting of a
direct connection between two routers that provides a single communication
path. The point-to-point connection can be physical, as in a serial cable directly
connecting two routers, or it can be logical.
Point-to-multipoint Point-to-multipoint refers to a type of network topology
consisting of a series of connections between a single interface on one router
and multiple destination routers.All of the interfaces on all of the routers sharing
the point-to-multipoint connection belong to the same network. As with point-to-
point, no DRs or BDRs are needed.
Within an area, each router calculates the best/shortest path to every
network in that same area.This calculation is based upon the information
collected in the topology database and an algorithm called shortest path
first (SPF)