Routing Protocols. Recap & Concepts

Size: px
Start display at page:

Download "Routing Protocols. Recap & Concepts"

Transcription

1 Routing Protocols Recap & Concepts Before we start to look at routing protocols, let s review what we know so far. Each interface connects to a link: The most common link technology today is an Ethernet, a multi-access link. There can be many hosts and routers connected to the link. To send an IP packet to another system on the same link, the packet must be wrapped in a frame with the appropriate link addresses. A multi-access link connected to an interface is commonly referred to as the directly connected network or local network for that interface. This usage comes about because a network id 1 is used to recognise whether an IP address belongs to a system connected to the same multi-access link. If the destination host for a packet is not connected to the same local network as the sender, the packet must be sent to a router connected to the local network, commonly called the first-hop router. The first-hop router will forward the packet towards the destination using a link connected to some other interface of the gateway. The packet will be forwarded by intermediate routers until it eventually reaches the last-hop router, which has an interface connected to the same multi-access link as the destination. We ve described the forwarding mechanism used in the Internet: Every router and host has a forwarding table (also called a routing table), with entries that specify an address prefix, a mask (to isolate the prefix in an IP destination address), an interface to transmit frames, and (if necessary) a first-hop router to forward the packet towards its destination. To determine how to send a packet, a router or host uses the IP forwarding algorithm. The destination address D is extracted from the IP packet. 1 We can correctly say network id here because, for directly connected systems, the forwarding prefix really is the network portion of the IP address, for both IPv4 and IPv6. 1 July, 2014

2 For each entry in the forwarding table, we form the logical AND of the entry s mask with D and test whether the result matches the address prefix contained in the entry. We use the forwarding table entry associated with the longest such match. The packet will be sent using the interface specified in this entry. The link-layer (MAC) address will be the link-layer address of the destination, if the destination is directly connected to the local network, or the link-layer address of the first-hop router. To forward the packet, the packet is wrapped in a frame (an Ethernet frame, for example) with the link-layer destination address set as specified in the previous step. The frame is transmitted from the interface selected in the previous step. How do entries get into the forwarding table? The answer depends on whether the system is a router or a host. Typically, hosts do not participate in routing protocols. The initial entries in a host s forwarding table are placed there during configuration of the interface. What might we see? An entry for link-local addresses. In IPv6, this entry will specify the linklocal address prefix fe80::/10. In IPv4, this entry will specify the address prefix /16, reserved for dynamic configuration. A default entry, to be used when no other entry matches. For IPv6, this entry will specify the prefix ::/0. For IPv4, this entry will specify the prefix /0. Typically, this entry contains the IP address of a router used to forward IP packets to destinations off the local network. If the systems connected to the local network have routable IP addresses 2 in addition to link-local addresses, there must be an entry with a prefix and mask matching the IP addresses of systems directly connected to the interface. In IPv4, this information is obtained from a DHCP server or from information in configuration files 3 added by a human. In IPv6, information about on-link prefixes can also be obtained from Router Advertisements. 2 Either globally routable, or selected from the IPv6 unique-local block fc00:/7 or the IPv4 private-use IP blocks /8, /12, and /16 that are routable within an organisation. 3 The details of the configuration file structure will vary from system to system. For linux systems, /etc/sysctl.conf controls global properties like forwarding and acceptance of redirects. Configuration of individual interfaces may be in a single file (e.g., /etc/network/interfaces on an Ubuntu system) or in a collection of files in a 2 July, 2014

3 In environments with multiple routers attached to the local network, it may be useful to have explicit entries for address prefixes that specify off-link destinations so that hosts can choose the correct router to forward a packet. In IPv4, this information can be obtained from a DHCP server or specified in configuration files added by a human 4. In IPv6, information about off-link prefixes can also be obtained from Router Advertisements. Multicast addresses may be subsumed by the default entry, or there may be explicit entries. IPv4 multicast addresses have a prefix of /4. For IPv6, the multicast prefix is ff00::/8. Subsequently, routers may use ICMP redirect messages to add information to a host s forwarding table 5. System administrators can also manipulate the forwarding tables using the command line tools and configuration GUIs provided by the system. In the common case, there will be one IP network mapped onto a link, and the address prefix and mask in the forwarding table entry match the network id portion of an IP address. It s possible, though uncommon, to map multiple IP networks onto a single physical link. There may be a single forwarding table entry with an address prefix that covers all of the network ids, or there may be multiple entries with distinct prefixes. Static routes are well and good, but as the number of connected networks within an organization grows and the intranet becomes complicated and dynamic 6 it s better to automate the process of determining routes. With dynamic directory (e.g., /etc/sysconfig/network-scripts/ifcfg-dev on a Fedora system). These files are processed by the scripts or programs that initialise interfaces and the network protocol stack. 4 Specifying forwarding table entries with information in configuration files is often referred to as static routing. 5 Implementations may maintain a cache of forwarding information, with each entry in the cache labelled with a full IP address. This avoids working through the full IP forwarding algorithm for frequently used destinations. Depending on the implementation, an ICMP redirect message may result in a new entry in the forwarding table or it may result in an entry in the forwarding cache only. 6 It s useful to recall how an internet becomes dynamic as it grows. One source is planned change corresponding to organisational change. Networks come and go to match changes in the organisation s structure. Another source is unplanned change due to equipment failure. Size matters. Individual pieces (networks and components) may be stable over periods of years, but if there are 10 s of thousands of pieces, change will occur somewhere every few hours. 3 July, 2014

4 routing, routers exchange routing information using routing protocols and use this information to continuously recalculate the best routes and update their forwarding tables. Before proceeding further into routing protocols, we need to define the concept of an autonomous system and use it to distinguish two broad groups of routing protocols. An autonomous system (AS) is a group of networks (more specifically, a group of routers) under the control of a single administrative authority. It is assumed that this will result in all routers in the autonomous system using a coordinated set of routing policies. To route packets within an AS, routers will communicate information using an interior gateway protocol (IGP), which generally determines the best routes based on some measurable routing metric (most commonly hop count, but often incorporating notions of transmission time). To route packets between ASs, routers will communicate information using an exterior gateway protocol (EGP), which has provisions for defining and ranking routes based on fairly arbitrary policy issues. The underlying assumption is that within a single region of administrative control (a single AS) the only consideration is to move packets from source to destination as efificiently as possible. Once a packet begins to move between autonomous systems, political and administrative considerations become dominant, and nothing moves without explicit negotiated agreements. Company A may not want its packets to pass through a network controlled by rival Company B, or it might prefer to use ISP C because it offers a cheaper rate than ISP D. To communicate routing information, routers use routing protocols. These can be divided into three classes, based on the type of routing algorithm that is used. Distance-vector routing exchanges information in the form of {destination, metric} pairs. The metric is a property of the entire route to the destination. When a router receives news of a better route, it replaces its entry. When it receives news that a route no longer exists, it deletes the entry. No one router has any notion of the full network topology, and each believes what its neighbour says about the destinations the neighbour can reach. Link-state routing exchanges information in the form of a list of direct connections to neighbours. Each router publishes a list of {neighbour, metric} pairs which are flooded to all other routers. The metric is a property of the direct link to the immediate neighbour. Each router builds a directed 4 July, 2014

5 graph model of the full network based on this information, and then runs a shortest path calculation to determine how to reach other destinations. This procedure avoids a number of pitfalls inherent in distance-vector routing. Path-vector routing exchanges information in the form of path attributes, which provide information about characteristics of the path that a packet will traverse as it travels from the source host to the destination host. This is not the same as specifying a route. Path attributes convey qualitative information, as opposed to detailed directions. Distance-vector and link-state routing algorithms are used for interior routing protocols. Path-vector routing is used for exterior routing protocols. Distance-vector routing is disappearing. It has persisted in use in spite of its limitations, because it came first, and because it performs adequately on smallto medium-sized systems which are reasonably stable. 5 July, 2014

6 Routing Information Protocol The Routing Information Protocol () was originally defined in RFC 1058 in 1988 but was in wide use prior to publication of the standard. The de facto standard was the implementation of routed distributed as part of Berkely Unix. We re going to go directly to -2, documented in RFC 2453, Version supports only IPv4. It s essentially -1 with support for CIDR (i.e., it includes a prefix and mask as part of the information for a route). Because -2 is an incremental improvement in capability, -1 and -2 are mostly compatible if care is taken to conform to the classful addressing scheme. While we re citing RFCs, it s important to mention RFC 1812, Requirements for IP Version 4 Routers, which collects in one document a wealth of information about the implementation of an Internet router. Recall that the basic operation in a distance-vector protocol goes like this: When a route update arrives, check it against the current routing database 7. If the update came from the router that s listed as the first-hop router in the current entry for the route, use the update, even if the new metric is worse than the old one. Otherwise, if the metric included in the update is better than the metric for the existing entry for the route, replace the existing entry with the contents of the update. This will change the first-hop router for the route. If there s no existing entry for the route, add the new route. Seems simple enough. What can go wrong? Lots of things, unfortunately, unless we take some care in the implementation. Recall the count to infinity problem from Cmpt 371. The classic configuration is shown to the right. Initially, R1 can reach N in one hop, and R2 can reach N through R1 in two hops. Assume the link {R1,N} fails. R1 updates its routing table to indicate that the route to N is unusable by setting the metric to infinity. 7 Any routing algorithm will maintain data structures appropriate for the information exchanged by the algorithm and the calculations it performs on that information. Eventually, the final result of the algorithm will be used to update the forwarding table. Rather than write this out in detail for each algorithm, the notes may simply refer to the routing database. R2 R1 N 6 July, 2014

7 Then, just in time to save the day, an update arrives from R2 claiming that it can reach N in two hops. R1 happily installs the new route to N through R2, giving it a metric of three hops. When R1 sends out its next update, it claims it can reach N in three hops. R2 notices, and since its route to N is through R1, bumps its metric for the route to four hops. And sends this information to R1... This cycle will not end until R1 and R2 have counted to infinity. To guarantee finite termination, is declared to be some suitably small integer. In the case of, = 16. To avoid this count to infinity scenario between a pair of routers, the protocol requires the use of the split horizon rule when sending routing updates. The rule is don t advertise a route to the first-hop router for the route. In the more general context of a multi-access link (such as Ethernet) with multiple routers advertising on the link, the rule becomes don t advertise a route out the interface that s used by the route (i.e., the interface where the routing update arrived). A stronger technique is called split horizon with poison reverse. If router R1 uses router R2 as the first hop for a route to net N, router R1 should advertise to R2 a route to net N with a cost of. (I.e., R1 should not simply omit any mention of net N in updates to R2. It should explicitly advertise to R2 that it cannot reach net N.) The rationale for poison reverse is that if router R2 should somehow come to the mistaken belief that it can reach net N through R1, poison reverse will cause the route to be immediately discarded. Note that in an environment with many individual routes, this can result in a dramatic increase in the size of routing update messages. The explanation of poison reverse in the text is incorrect. See 3.4.3, 3.4.4, and 3.8 of RFC 2453, Version 2. For recommendations on how to implement poison reverse, see RFC 1812, F.2.2. The explanation of poison reverse is most often given in terms of a pair of routers connected by a point-to-point link. It works just as well on a multiaccess link like Ethernet, where several routers may be listening. Any router that has a viable alternative route will be advertising a reasonable metric, and that route will be adopted by all other routers. 7 July, 2014

8 Unfortunately, split horizon is not sufificient to avoid count-toinfinity if more than two routers are involved. The example from RFC 2453 is shown in the figure to the right. Suppose the network has been stable for a while, and R1 and R3 have entries in their routing table specifying a route to N using R2 as the first-hop router. (R2 will then use the link between R2 and R4 to forward packets to N, but this is not known by any router other than R2. Remember that in no router has a complete picture of the network.) R1 1 R2 1 1 R R4 1 N Suppose link {R2,R4} fails. What we d like to see happen is a quick changeover to use link {R3,R4}, previously unattractive because of its high cost. R2 will notice immediately that the link has gone down, and will change its own routing table to reflect this. But R1 and R3 will continue to advertise routes to N to each other. Since they got these routes from R2, split horizon is no help. And neither R1 or R3 are aware that R2 is in the other s route. Table 1 shows the sequence of routing updates. The first line shows the situation before link {R2, R4} fails. The second line shows the situation immediately after the failure of the link. Assume that R2 sends out updates to each neighbour at a regular interval, and that the time for an update message to R1 arrives. The third line shows the situation after R1 processes this update. The trouble really starts between the third and fourth lines. Assume that the time comes for R3 to send an update to R1, and it sends the update before it receives an update from R2. The fourth line shows the situation after R1 has processed the update from R3. A count-to-infinity cycle is inevitable at this point, even if R2 gets off an update to R3 as shown in the fifth line. The remainder of the lines follow the count-to-infinity cycle as updates flow between the routers. (For simplicity, the remaining lines assume an order where R1 updates R2, R2 updates R3, R3 updates R1,...) All through the above, router R4 has been advertising to R3 a route to N with cost 11. The cycle ends when the cost of the route through R2 exceeds the cost of the route through R4. R3 adopts the route through R4. Subsequent updates from R3 will be accepted by R1 and R2, resulting in the situation shown on the last line of the table. 8 July, 2014

9 R1 R2 R3 Dest Gate Hops Dest Gate Hops Dest Gate Hops N R2 3 N R4 2 N R2 3 initial stable state N R2 3 N R4 N R2 3 {R2,R4} fails N R2 N R4 N R2 3 R2 updates R1 N R3 4 N R4 N R2 3 R3 updates R1 N R3 4 N R4 N R2 R2 updates R3 N R3 4 N R1 5 N R2 R1 updates R2 N R3 4 N R1 5 N R2 6 R2 updates R3 N R3 7 N R1 5 N R2 6 R3 updates R1 N R3 7 N R1 8 N R2 6 R1 updates R2 N R3 7 N R1 8 N R2 9 R2 updates R3 N R3 10 N R1 8 N R2 9 R3 updates R1 N R3 10 N R1 11 N R2 9 R1 updates R2 N R3 10 N R1 11 N R4 11 R3 prefers route through R4 N R3 12 N R3 12 N R4 11 R1 and R2 now route through R3 Table 1: Routing updates for count-to-infinity example from RFC 2453 To minimise the possibility of a count-to-infinity cycle, uses a technique called triggered update. Triggered update counts on the rule that says a router must use an update from the router listed as the first hop for the route. The aim is to get the bad news to neighbours as soon as possible. Normally, routers using broadcast routing update messages every 30 seconds, plus/minus a small random delay to avoid synchronisation. The count-to-infinity problem arises when a router propagates stale information about a route. To combat the problem, triggered update requires that whenever a router changes the metric on a route, it must send out an update immediately. In the previous example, if R2 had managed to get updates to R1 and R3 before one of them updated the other, the count-to-infinity loop would have been avoided. In essence, the bad news propagates out as a tree from the router connected 9 July, 2014

10 to the failed link. Propagation ends when a router is encountered which has a route that comes from somewhere else, or when the update reaches a router where the route is absent or already has a metric of. The hope is that propagating up-to-date information immediately will minimise the number of count-to-infinity cycles that develop from propagating second-hand outdated information. Note: minimise, not eliminate. With bad timing, count-to-infinity cycles can still occur. To further reduce the chance of using an untimely update, we can apply holddown. For a fixed amount of time (on the order of 60 seconds) after receiving an update that says a route has disappeared, routers should ignore updates which offer alternative routes. This gives still more time for correct routing updates to propagate. Legitimate alternate routes will survive, because at some point they will originate from a different source. Note that neither RFC 2453 or RFC 1812 mention holddown for the protocol. It is an extension used in some implementations. All of the above problems make fairly inefificient. There can be lots of trafific once a routing change starts to propagate, and we can still have convergence problems in spite of all the effort put into minimising the time window where a count-to-infinity cycle can start. On the plus side, is simple. If an intranet is simple, fairly static, and the routers don t have to interact with routers running other routing protocols, may be adequate. That covers the basic techniques let s look at the details. -2 runs over UDP, using the well-known UDP port 520. Routers running -2 belong to two multicast groups related to routing: is all routers running -2, and is all routers on this subnet (synonymous with all routers on the local network). Each message consists of a one-word header followed by up to 25 route descriptions (called entries in the RFCs). The format of the header is command (8) version (8) must be 0 (16) The command can be one of request, reply, or several other specialpurpose commands used for router control and debugging. The version can be either 1 or 2. An explicit message length field is not necessary the length can be calculated from the size field in the UDP header. 10 July, 2014

11 The format of a entry is address family identifier (16) route tag (16) IP address (32) subnet mask (32) next hop (32) metric (32) The address family identifier specifies the protocol family of this routing entry. -1 was designed to be capable of supporting protocol families other than IP, but this has been compromised in entries included only an address and a metric, which allowed the address to occupy up to 12 bytes. IP addresses require only 4 bytes, and -2 uses the extra space for the address prefix mask ( subnet mask ) and next hop address. The route tag was intended to allow routers to distinguish between routes inside an autonomous system and routes outside the autonomous system, or more generally routes circulating within the group of routers exchanging messages vs. routes imported from outside the group. The original standard left room for various uses. The IP address and matching subnet mask are just what you d expect. The next hop field allows one router to report routes on behalf of other routers. This is intended for use in a network where distinct groups of routers exchange routing information amongst themselves, but contact between groups is limited to a set of designated routers. (For example, consider an Ethernet backbone with routers connecting to many subnetworks. A technique to reduce the amount of network trafific consumed by routing updates is to separate the routers into groups, with designated routers exchanging information between the groups. The designated router can specify that packets be sent to another router in its group, since all are on the same link.) The metric is the cost associated with the route. Traditionally, this is a hop count, but the protocol does not require this. The only restriction it imposes is that the metric be a value between 1 and = 16. In normal operation, we can identify five situations that trigger action: initialisation, request received for full routing table, update received, transmit regular update, and transmit triggered update. 11 July, 2014

12 A final situation, a request for a specific routing table entry, is intended for debugging and management. When the process initialises, it transmits a request over each active interface asking for any routers to send their complete routing tables. This request is multicast if possible using the -2 routers multicast address, By definition, a request containing a single entry with the address family field set to 0 and the metric set to 16 is a request for a router s entire routing table. Routers receiving this message should respond by sending their entire routing table. Split horizon processing is applied the requesting router could be recovering from a crash and the responding router may have routes which it obtained from the requesting router before the crash. When an update is received, the receiving router updates its tables according to the rules described previously: Use the new route information if it s an update from the first-hop router for the existing route. Use the new route if it s better than the previous known route, or if it s an entirely new route. Otherwise, ignore it. The protocol specification does suggest that if the receiving router has suspicions about the current route (i.e., the expiry timer is well along, indicating that the router that supplied the route is overdue to send an update) it might want to take preemptive action and switch to a new route. One possible result of an update message is that the metric for a route will be set to, triggering the route deletion process: When the metric is changed to, a garbage collection timer is set (typically 120 seconds, four times the 30 second update interval). The route is no longer used but is still included in update messages until the garbage collection timer expires, at which point it is purged from the routing table. 12 July, 2014

13 Every 30 seconds, routers are supposed to multicast a regular update message which includes the entire routing table, subject to the rules of split horizon processing. This is an important aspect of the protocol, because it works with a timeout mechanism to provide a way of purging dead routes. If a router does not receive an update for a route within 180 seconds, the route is marked for deletion and the route deletion process just described is initiated. A triggered update is sent as required, in response to a change in the metric for a route. Like a regular update, a triggered update is multicast if possible. As mentioned, the primary intent here is to immediately propagate correct information when a route goes down or the metric becomes worse. But appearance of a new route or a change for the better in the route metric can also trigger an update. RFC 1812 states that a triggered update is mandatory for bad news, and highly recommended for good news. In contrast to a regular update, only changed routes need to be included in a triggered update message. This implies that the protocol implementation should associate a change flag with each routing table entry, which is set when the entry is updated and cleared once all necessary triggered update messages have been sent. When a router receives a request for specific routing table entries, it responds by constructing a reply with the route information for the requested prefix, if present, setting the metric to 16 if it has no route. A request for a specific routing table entry will have the address family field set to the code for IPv4 and the address field set to the desired address. The responding router does not apply split horizon rules in response to a request for a specific route because it is assumed that this type of query is used for debugging and management. We don t want to be hiding information. Some loose ends to close out the discussion: -2 has provision for authentication; when it s used, the first entry is overloaded. The address family field is set to 0xffff and the route tag field is used to specify the type of authentication. The remaining 16 bytes 13 July, 2014

14 of the entry contain an authentication cookie. The standard defines only plain-text password authentication. More recent implementations provide encrypted authentication of various sorts. -2 applies random variations to its time delays to avoid router synchronisation. For example, when a route changes, you don t want the network flooded with triggered update messages. When a triggered update is sent, a random delay of 1 5 seconds is enforced before the router is allowed to send another update. The 30 second time delay between regularly scheduled updates is also adjusted with a random value between -5 and +5 seconds to prevent synchronization. An extension of for IPv6, ng, is described in RFC There are some changes that attempt to minimise the number of IPv6 addresses contained in a routing update. Otherwise, the algorithms and operation are unchanged. 14 July, 2014

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

RIP Version 2. The Classless Brother

RIP Version 2. The Classless Brother RIP Version 2 The Classless Brother (C) Herbert Haas 2005/03/11 1 Why RIPv2 Need for subnet information and VLSM Need for Next Hop addresses for each route entry Need for external route tags Need for multicast

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

RFC Compliance Test Report. Release 3.0

RFC Compliance Test Report. Release 3.0 .2 Type FRR FRR FRR FRR FRR FRR Commit ID 3e71b5d 5cf0c43 f633dc2 6289215 36a7e78 30283fd Commit Date 2017-04-02 2017-10-14 2017-11-08 2017-11-08 2017-11-08 ANVL-RIP-1.1 RFC 2453 s3.6 p20 Message Format

More information

Routing Information Protocol. RIP application. RIP version 1

Routing Information Protocol. RIP application. RIP version 1 Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/01 13:00:45) Friday, March 3, 2017 RIP version 1 Origin and

More information

Routing Information Protocol

Routing Information Protocol Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 18.2, 2018/11/21 13:11:09) Friday, November 23, 2018 Karst Koymans (UvA)

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

(Refer Slide Time: 01:08 to 01:25min)

(Refer Slide Time: 01:08 to 01:25min) COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers Table of Contents RIP Configuration 1 RIP Overview 1 Operation of RIP 1 Operation of RIP 2 RIP Version 2 RIP Message Format 3 Protocols and Standards 4 Configuring RIP Basic Functions 5 Configuration Prerequisites

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Routing Information Protocol

Routing Information Protocol Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 24, 2008 dr. C. P. J. Koymans (UvA) Routing Information Protocol

More information

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1 Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-1 Configuring a Static Route 1-2 Configuration Prerequisites

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

Routing Information Protocol. RIP application. RIP version 1

Routing Information Protocol. RIP application. RIP version 1 Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:38:50) Wednesday, February 24, 2010 RIP version

More information

Routing Protocols Classification

Routing Protocols Classification Routing Protocols Classification Petr Grygárek rek 1 Classification criteria Internal (IGP) / External (EGP) number of handled routes possibilities of routing politics specification Convergence Time Distance-vector

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Routing Protocols --- Exterior Gateway Protocol

Routing Protocols --- Exterior Gateway Protocol Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13

More information

Routing Information Protocol. A simple distance vector scheme

Routing Information Protocol. A simple distance vector scheme Routing Information Protocol A simple distance vector scheme RIP version 1 RFC 1058 Charles Hedrick, Rutgers University, 1988 Based on Bellman-Ford distance vector Also used as ARPANET routing protocol

More information

June Document a protocol and algorithms that are currently in wide use for routing, but which have never been formally documented.

June Document a protocol and algorithms that are currently in wide use for routing, but which have never been formally documented. Network Working Group Request for Comments: 1058 C. Hedrick Rutgers University June 1988 Routing Information Protocol Status of this Memo This RFC describes an existing protocol for exchanging routing

More information

Unicast Routing. TCP/IP class

Unicast Routing. TCP/IP class Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or

More information

Topics for This Week

Topics for This Week Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing ICS 351: Today's plan netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing Netmask exercises how many bits in this netmask: 255.128.0.0 using this netmask and the

More information

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 Static Routing Configuration... 1-1 1.1 Introduction... 1-1 1.1.1 Static Route... 1-1 1.1.2 Default Route... 1-1 1.1.3 Application Environment of Static Routing...

More information

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad Default & Static Routes and Routing Information Protocol Presented by : Mohammed Hamad When a device has multiple paths to reach a destination, it always selects one path by preferring it over others.

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

CMPE 151 Routing. Marc Mosko

CMPE 151 Routing. Marc Mosko CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

IP Routing Volume Organization

IP Routing Volume Organization IP Routing Volume Organization Manual Version 20091105-C-1.03 Product Version Release 6300 series Organization The IP Routing Volume is organized as follows: Features IP Routing Overview Static Routing

More information

ROUTING CONSORTIUM TEST SUITE

ROUTING CONSORTIUM TEST SUITE ROUTING CONSORTIUM TEST SUITE Routing Information Protocol (RIP) Over Internet Protocol Version 6 Technical Document Version 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

IPv4 to IPv6 Transition Mechanisms

IPv4 to IPv6 Transition Mechanisms IPv4 to IPv6 The mechanisms for the changeover from IPv4 to IPv6 are described in RFC 4213, updating the original mechanisms described in RFC 2893. As mentioned in the notes for IP, a portion of the IPv6

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Internet Routing Protocols Tuba Saltürk

Internet Routing Protocols Tuba Saltürk Internet Routing Protocols 15505068 Tuba Saltürk Outline Internet Routers Routing Protocol Interior Gateway Protocol (IGP) Distance- Vector Routing Protocol Routing Information Protocol (RIP) Interior

More information

Network Systems ( / ), Test 3 March 24, 2017, 13:45 15:15

Network Systems ( / ), Test 3 March 24, 2017, 13:45 15:15 Network Systems (201600146/201600197), Test 3 March 24, 2017, 13:45 15:15 This is an open-book exam: you are allowed to use the book by Peterson & Davie and the reader that belongs to this module. Furthermore,

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

Network Working Group. Obsoletes: 1723, 1388 November 1998 STD: 56 Category: Standards Track

Network Working Group. Obsoletes: 1723, 1388 November 1998 STD: 56 Category: Standards Track Network Working Group G. Malkin Request for Comments: 2453 Bay Networks Obsoletes: 1723, 1388 November 1998 STD: 56 Category: Standards Track Status of this Memo RIP Version 2 This document specifies an

More information

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside

More information

9.1. Routing Protocols

9.1. Routing Protocols 9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the

More information

Configuring RIP. RIP Configuration Task List

Configuring RIP. RIP Configuration Task List Configuring RIP This chapter describes how to configure RIP. For a complete description of the RIP commands that appear in this chapter, refer to the RIP s chapter of the Network Protocols Reference, Part

More information

Computer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica

Computer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica Dipartimento di Informatica e Sistemistica Computer Networks II RIP Routing Information Protocol Luca Becchetti Luca.Becchetti@dis.uniroma1.it A.A. 2009/2010 RIP RIP is a Distance Vector Routing Protocol

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Network layer: Overview. Network Layer Functions

Network layer: Overview. Network Layer Functions Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

Chapter 7 Routing Protocols

Chapter 7 Routing Protocols Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals

More information

CCNA IP ROUTING. Revision no.: PPT/2K605/03

CCNA IP ROUTING. Revision no.: PPT/2K605/03 CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.

More information

Nortel Ethernet Routing Switch 5000 Series Configuration IP Routing Protocols. Release: 6.1 Document Revision:

Nortel Ethernet Routing Switch 5000 Series Configuration IP Routing Protocols. Release: 6.1 Document Revision: Configuration IP Routing Protocols Release: 6.1 Document Revision: 05.01 www.nortel.com NN47200-503. . Release: 6.1 Publication: NN47200-503 Document release date: 25 May 2009 While the information in

More information

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Computer Networks ICS 651 IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Routing Information Protocol DV modified with split horizon and poisoned reverse distance

More information

BGP. BGP Overview. Formats of BGP Messages. I. Header

BGP. BGP Overview. Formats of BGP Messages. I. Header Overview Three early versions of are -1 (RFC1105), -2 (RFC1163) and -3 (RFC1267). The current version in use is -4 (RFC1771). -4 is rapidly becoming the defacto Internet exterior routing protocol standard

More information

Routing Information Protocol

Routing Information Protocol Network Working Group C. Request for Comments: 1058 Rutgers University June Routing Information Protocol Status of this Memo This RFC describes an existing protocol for exchanging routing information among

More information

IP Routing & Bridging

IP Routing & Bridging CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Lecture 12. Introduction to IP Routing. Why introduction? Routing

Lecture 12. Introduction to IP Routing. Why introduction? Routing Lecture. Introduction to IP Routing Why introduction? Routing: very complex issue need in-depth study entire books on routing our scope: give a flavour of basic routing structure and messaging give an

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem?

8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem? 1. Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network

More information

IP Addressing & Interdomain Routing. Next Topic

IP Addressing & Interdomain Routing. Next Topic IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Routing Protocols. Autonomous System (AS)

Routing Protocols. Autonomous System (AS) Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?

More information

Vorlesung Kommunikationsnetze

Vorlesung Kommunikationsnetze Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).

CS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi). Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change. RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by

More information

Routing Architecture. Objectives. Module 2 Routing Fundamentals. Author: Rolf Augstein January 2006

Routing Architecture. Objectives. Module 2 Routing Fundamentals. Author: Rolf Augstein January 2006 Routing Architecture Module 2 Routing Fundamentals Basic Problems Principles, Classification Operation Author: Rolf Augstein raugstein@rolfaugstein.com January 2006 Feel free to use this publication for

More information

FiberstoreOS IP Routing Configuration Guide

FiberstoreOS IP Routing Configuration Guide FiberstoreOS IP Routing Configuration Guide Contents 1 Configuring IP Unicast-Routing... 6 1.1 Overview...6 1.2 Topology... 6 1.3 Configuration... 6 1.4 Validation... 8 2 Configuring RIP... 10 2.1 Overview...10

More information

Network Working Group Request for Comments: 2080 Category: Standards Track Ipsilon Networks January 1997

Network Working Group Request for Comments: 2080 Category: Standards Track Ipsilon Networks January 1997 Network Working Group Request for Comments: 2080 Category: Standards Track G. Malkin Xylogics R. Minnear Ipsilon Networks January 1997 RIPng for IPv6 Status of this Memo This document specifies an Internet

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 Chapter 5 RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 RIP Version 1 RIPv1: Distance Vector, Classful Routing Protocol CCNA2-2 Chapter 5 Background and Perspective RIP evolved from the Xerox Network System

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,

More information

Helsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper

Helsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper Helsinki University of Technology Telecommunications Laboratory OSPF Routing Protocol Licenciate course seminar paper Shkumbin I. Hamiti, 08.10.1996 Communications Laboratory, TKK-HUT email: bini#tiltu.hut.fi

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Routing Overview. Information About Routing CHAPTER

Routing Overview. Information About Routing CHAPTER 21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Teldat Router. RIP Protocol

Teldat Router. RIP Protocol Teldat Router RIP Protocol Doc. DM518-I Rev. 8.00 July, 1999 INDEX Chapter 1 Introduction... 3 1. Introduction to the RIP...4 2. Routing Information Protocol...5 3. RIP Configuration...7 Chapter 2 RIP

More information

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1 Determining IP Routes, Cisco Systems, Inc. 9- Objectives Upon completion of this chapter, you will be able to complete the following tasks: Distinguish the use and operation of static and dynamic routes

More information

15-441: Computer Networks Spring 2017 Homework 3

15-441: Computer Networks Spring 2017 Homework 3 15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page

More information

FiberstoreOS IP Routing Command Line Reference

FiberstoreOS IP Routing Command Line Reference FiberstoreOS IP Routing Command Line Reference Contents 1 IP Unicast-Routing Commands...6 1.1 ip address...6 1.2 ip icmp error-interval...7 1.3 ip redirects... 8 1.4 ip unreachables...9 1.5 ip verify unicast

More information

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local

More information

Overview 4.2: Routing

Overview 4.2: Routing Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information