Routing Architecture. Objectives. Module 2 Routing Fundamentals. Author: Rolf Augstein January 2006

Size: px
Start display at page:

Download "Routing Architecture. Objectives. Module 2 Routing Fundamentals. Author: Rolf Augstein January 2006"

Transcription

1 Routing Architecture Module 2 Routing Fundamentals Basic Problems Principles, Classification Operation Author: Rolf Augstein raugstein@rolfaugstein.com January 2006 Feel free to use this publication for private, non-commercial purposes. Objectives 1. Basic understanding of routing graphs 2. Describe the process of routing through a given network 3. Identify problems with Distance-Vector and Link-State protocols 4. Understand the solution for different routing problems 5. Outline different routing classifications 6. Describe the process of route summarization 7. Understand the relationship IP addressing scheme - routing functionality Rolf Augstein 2006 All rights reserved Page 1

2 Key terms: Aggregate Route Classless Inter-Domain Routing (CIDR) Classless Routing Convergence Count-to-Infinity Distance Vector (DV) Exterior Routing Protocol EGP) Flapping Route Floating Static Fixed Length Subnet Mask (FLSM) Interior Routing Protocol (IGP) Link State (LS) Metric Poison Reverse Preference Value Prefix Routing Route Summarization Routing Hierarchy Routing Loops Smart Router Split Horizon Variable Length Subnet Mask (VLSM) Rolf Augstein 2006 All rights reserved Page 2

3 Routing Principles Routing in general is a method of finding the best way through a given network of roads or rail-tracks, for example. The term best way depends on individual parameters. It could mean the fastest, cheapest, or most comfortable one. Mathematical algorithms like Dijkstra, are used to find out the best way through a given network. The discipline dealing with this kind of problems is called the graph theory. Graph Graphs are used to show all possible ways from a source to a destination. Not all combinations of ways are possible in the typical graph below. Example: It is not possible to go directly from node C to node B You can go from node B to node F, but not same way back Theory of graphs D 8 H C F 3 1 E A 2 B G - Where are the possible paths? From A to H: Find the best way - What s the cost for each path? - What s the best path? Rolf Augstein 2006 All rights reserved Page 3

4 Further, there are different metric values through certain paths between two nodes. The metric value from node A to node C is 6. The opposite direction, node C to node A has a metric value of 5 only. Different elements are used to draw relations between certain nodes. Elements of Graphs 3 - both directions, equal cost Examples: Serial Links, Shared Medium, etc. 5 - one direction Special Links (Satellite) 10 3 ADSL - both directions, unequal cost Rolf Augstein 2006 All rights reserved Page 4

5 Important Terms A graph consists of vertices (nodes) and edges. Two vertices are adjacent, if they are connected by an edge. Example: This is a graph with 6 vertices (nodes) and 7 edges. A graph is called a complete graph, if each edge is connected to each of the others in the graph. Below are the first 5 complete graphs. In data networking, this kind of graph is often called a fully meshed network. The number of edges in a complete graph is increasing dramatically with each new node. The formula to calculate the number of edges (possible ways) in a fully meshed network is: n * ( n-1) 2 One more important term is directed graph. A digraph (directed graph) is a graph where edges are directed. This means that there are only certain possible ways through the graph. The arrows mark the direction from which the graph is determined. In this example, we have a complete graph but there is no direct path from C to B. Rolf Augstein 2006 All rights reserved Page 5

6 Basic Routing Topologies Because of the size of modern data networks, it is not possible to connect each node with all other nodes. So, fully meshed networks are normally not subject of a network design. Figures Partially meshed Fully meshed Partially meshed, Hub-and-Spoke Fully meshed networks can be found in parts of Wide Area Networks like ATM, Frame Relay or X.25. On the other hand a meshed network is more reliable because of the redundancy. But the routing becomes very complex. In IP data networks each node is represented by an IP Router or a Switch with Layer 3 capabilities. From this point of view, the graphs draw the network topology from the IP layer. In most cases the design is based on partially meshed networks. This means not all nodes are connected to each other. The design is more based on geographic issues or available bandwidth etc. The Hub-and-Spoke architecture is often used where smaller locations like SOHO or ROBO are connected to a centralized node. Rolf Augstein 2006 All rights reserved Page 6

7 Metric Criteria for finding the best way?? Metric Path length Cost factor Bandwidth Reliability.... The value metric is used in all routing procedures or protocols. In most cases the metric represents nothing more than an abstract value. Depending on the routing procedures, the metric has different meanings. Sometimes the metric counts the number of hops between two nodes. In other cases the metric is calculated out of the available bandwidths on the path, the delay, the MTU, the load, or the communication cost. Note The smaller the calculated metric, the better the way is. This is true for all dynamic and static routing procedures. Different routing protocols use different metric calculations. For this reason there is no compatibility between the metric values of dynamic routing protocols. To overcome this problem, it is possible to use route redistribution. This is covered later in this module. Rolf Augstein 2006 All rights reserved Page 7

8 Each routing protocol uses a default method to calculate the metric between the nodes. For the network administrator it is possible to influence and manipulate the metric calculation and the way these information are passed between neighbours. It is possible to alter the entire routing behaviour in a given network disregard of real physical structure and cabling. Note Therefore the administrator must clearly understand all aspects of the routing protocol and it s behaviour. Do not change metric values in a complex network structure just to find out. You can the force the entire data flow through a network to take different paths for special settings. Example: Asymmetric Routing Packets to the destination use a different path than the packets back from the destination. This is called asymmetric routing. With manipulation of the routing metrics, a router becomes an altered directed graph, a new logical topology of the data network. Rolf Augstein 2006 All rights reserved Page 8

9 Routing Classification There are some different ways to make a routing classification. Three are covered in the following. Static Routing vs. dynamic Routing Static vs. Dynamic Hmm. Which networks do I need to reach? Tell me, which networks are available Mr. Administrator Defined by Administrator Learned from Network Developed by Media-Learning.com 2005 All rights reserved 2-8 Static Routing With static routing all destination networks and useable paths must be defined in the router. These definitions are a big administrative challenge. All routers at the remote side must have a route back the originating network. The router does not learn which data packets of a session were routed earlier. The return packet within a session must be routed back therefore a back route has to be defined as well. Nevertheless, static routing still plays a role even in big networks. Rolf Augstein 2006 All rights reserved Page 9

10 Table: Static Routing Advantage No routing updates, less traffic Compatible with each router-system No flapping routes Disadvantage No adaptation when links change Complexity in bigger networks Dynamic Routing Dynamic routing or adaptive routing uses protocol updates to propagate all known networks to all adjacent nodes. All possible paths through the data network are explored and learned. So the routers can take advantage of redundant links and react automatically whenever a link between two nodes is lost. Even the back routes are learned through this dynamic mechanism. There are various dynamic routing protocols with different level of complexity. Table: Dynamic Routing Advantage All paths are propagated dynamically Adaptation when links change Disadvantage Routing Updates cause traffic Convergence, ugly route effects* More administrative knowledge An administrator must have enough knowledge regarding the update behavior between the routing nodes. They are quite different and come with tricky problems and solutions. Examples are Count-to-Infinity, Split Horizon etc.* * Problems and effects with Routing Protocols are covered later in detail. Rolf Augstein 2006 All rights reserved Page 10

11 Destination Routing vs. Source Routing Routing: Destination vs. Source Destination Routing Source Routing Routing decision based on IP Network to go Routing decision based on the Source of the IP packet Examples: RIP, OSPF Examples: Policy Routing Arriving IP Packet Destination IP Source IP Data Whenever a data packet arrives at the router, the destination IP address is checked against the routing table. If the destination network address is not defined in the routing table, the packet will be dropped. When working with static routing or dynamic routing protocols, this is the default procedure for the IP router in most cases. Routing protocols like RIP, OSPF etc. are based on destination routing. It is also possible to use the source part of an IP data packet to make a routing decision. For this to make work, an administrator must define special route maps. Example: A route map defines to forward all data packets from the network /24 to the Ethernet interface 3, and all data packets from /24 to the next hop gateway Rolf Augstein 2006 All rights reserved Page 11

12 The example shows no use of any destination IP addresses to make the routing decision. Routing decisions are not longer based on best paths with low metric. Routing becomes a matter of local policies. Note This is also called policy based routing. An administrative policy rules how routing decisions have to be made. When using this kind of routing, all rules for routing data traffic are defined statically in route maps. When the network becomes bigger, it can be very difficult to avoid loosing routes somewhere in the network. It is possible to combine destination routing with source routing within a routing node. Source routing is often used in conjunction with Quality of Service (QoS). Rolf Augstein 2006 All rights reserved Page 12

13 Interior Routing vs. Exterior Routing Interior vs. Exterior Routing Protocols IGP AS 56 EGP AS 53 IGP In larger networks it is necessary to use special routing protocols to handle the huge amount of routing information. Interior Gateway Protocols These protocols are used within an administrative area called Autonomous System (AS). Within an AS an administrator can decide with routing policy to use. Two or more Autonomous Systems can be linked together with the help of border routers. Typical routing protocols are: RIP Version 1/ 2 OSPF IS IS Cisco IGRP Cisco EIGRP Routing Information Protocol Open Shortest Path First Intermediate State Intermediate State Interior Gateway Routing Protocol Enhanced EIGRP Rolf Augstein 2006 All rights reserved Page 13

14 Note Autonomous Systems are identified by a 16 Bit number. This number is administrated from the Internet Assigned Numbers Authority (IANA). Two Internet RFCs discuss autonomous systems: RFC 1930 (Guidelines for creation, selection, and registration of an Autonomous System, March 1996) and RFC 0975 (Autonomous confederations, February 1986) According to RFC 1930, "Without exception, an AS must have only one routing policy. Here routing policy refers to how the rest of the Internet makes routing decisions based on information from your AS." Exterior Gateway Protocols With an Exterior Gateway Protocol capsulated routing information within one Autonomous System is send to a second AS. The EGP connects Autonomous Systems by delivering dynamic procedures to propagate routing changes in a controlled manner. Typical routing protocols are: EGP BGP Exterior Gateway Protocol (Old, barely used) Border Gateway Protocol BGP design and configuration can be very complex. It is mostly used in some internet areas where carriers and internet providers are working together. Rolf Augstein 2006 All rights reserved Page 14

15 Routing Operation Finding the Way Routing Tables a 1a 1 Net Gateway 1 Direct 2 Direct 3 2b 4 2b 2a 2 b 2b 3b 3 Net Gateway 1 2a 2 Direct 3 Direct 4 3c Net Gateway 1 3b 2 3b 3 Direct 4 Direct 4c 3c c 4 The basic idea behind routing protocols is, to send local routing information to adjacent routing nodes. All connected interfaces with a configured IP address, cause an entry in the local routing table. The routing table consists of information to reachable destination networks. Local networks are marked as direct connected or local. With routing update packets send in a given time interval, neighbor routers using the same routing protocol learn possible ways to IP networks. In the next step, all learned routes from adjacent routing nodes are sent again in the next update cycle. Rolf Augstein 2006 All rights reserved Page 15

16 If a routing node learns routes via OSPF routing, these routes are not updated by a different routing protocol like RIP. To make these protocols to interact, route redistribution is necessary. Next Hop 1a 1 a I can reach network 3 and 4 through my Next Hop, router 2b 2a b 2 2b 3b 3 Next Hop: 3c c Interface IP Address of the directly connected neighbor router 4c 4 All reachable IP destination networks are learned in the routing table. But the router has only a limited number of information sources. Example: Router a has only one information source, which is the adjacent router b. There is no information, telling router a that there is a third router c. But router a can reach the network 4 through router b as well. This information source is called the next-hop gateway. So after some time, a router learns all reachable networks, but is not aware of all other routers in the network. This is sometimes referred to as routers have a flat view of the network. Routers must have a valid route to the next-hop gateway. So always use the directly connected interface of the next-hop gateway as IP address. Rolf Augstein 2006 All rights reserved Page 16

17 Bellman Ford Algorithm The Bellman Ford algorithm is used to find the shortest way in a graph and is the basis of distance-vector routing protocols. Distance Vector Routing Protocol RT RT RT RT Interval n+2 Interval n+1 Interval n Broadcast Load Metric Restrictions Convergence Problem Distance Vector (DV) Routing The principle of DV routing is to send routing updates in a defined interval through all interfaces. These update packets use broadcast addresses, and contain information about all the reachable networks. The vector consists of the source address of the sending router. By this address receiving routers learn the address of the next-hop gateway over which the propagated networks can be reached. The distance describes the metric. In most cases this is simply the number of hops to a destination network. This number is restricted to a maximum of 15 hops. A typical DV protocol is the Routing Information Protocol (RIP). It is widely used and implemented in all UNIX and Windows Servers. Rolf Augstein 2006 All rights reserved Page 17

18 By depending on a fixed time interval to send the routing updates to all neighbors, routing information need a certain amount of time to travel through the network. This effect is called convergence. The use of broadcast addresses causes in the WAN part of large network some problems. The advantage of DV routing is the simple implementation and the easy way to use it in networks. Link State Algorithm Link-State algorithms are the solution for modern routing protocols. But they operate in a totally different way than the DV protocols. Link-State Routing Protocol LSA CPU Topology Database Memory RT SPF Algorithm Shortest Path First Tree Rolf Augstein 2006 All rights reserved Page 18

19 Link State (LS) Routing The basic concept of link-state routing is that every node receives a connectivity map of the network, in the form of a graph showing which nodes are connected to which other nodes. Each node independently calculates the best next hop from it for every possible destination in the network Each router builds a relationship with all other routers using a link-state protocol. Different roles like designated router, area router, border router etc. are assigned. Each node periodically makes up a short message, the link-state advertisement, (LSA). The LSA s are used to identify other nodes which are directly connected and keep track of changes in routing. All information concerning other routing nodes and reachable networks are stored in the topology database. Compared to DV routing, a LS router holds more information about the entire network and does not have a flat view only. To find the best way through all the reachable destination networks, LS routing uses the algorithm SPF. Shortest Path First (SPF) A routing node uses the stored graph to calculate all paths to each other routing nodes. The paths with the best metric values are used to forward IP data packets. The result is a spanned tree with best paths to all destination networks instead of a flat view compared to DV routing. The advantage of LS routing is quick reaction to any changes in the network topology. Rolf Augstein 2006 All rights reserved Page 19

20 Process Topology Changes Link Up-Down Keepalive Timer router% Line protocol down... or router% Line protocol up... All routes associated with interface Ethernet 0 are not valid any longer Entries in Routing Table... C is directly connected, Ethernet0 R network via Ethernet 0 R network via Ethernet 0 C is directly connected, BRI0... How does a routing node realize changes in the network topology? Usually, topology changes cause error states on the connected router interface. The line protocol goes down or the interface hardware fails. To control the functionality of the interfaces, the Operating System generates control packets which are sent through the interface. If the interface signals a problem, the operation state changes and all corresponding routes are effected in the routing table. Rolf Augstein 2006 All rights reserved Page 20

21 Routing Timer Update Time between Updates Invalid network unreachable... network possibly down... Time after the entry is marked as invalid Flushing network Route is erased from Routing table To avoid flapping interfaces and flapping routes the entire state change process uses a delay mechanism. Note The term flapping is often used to describe a failure condition, where i.e. an interface changes the state between up and down very often in small time intervals. This can cause a lot of problems and effect the entire network routing. An invalid timer controls when a route is marked as possibly unreachable or down. This timer is set 2 3 times higher than the update timer. At least two missed updates are necessary to cause a change in routing. An additionally flushing timer determines when a routing entry marked as possibly down is erased out of the routing table. Rolf Augstein 2006 All rights reserved Page 21

22 Using multiple Paths Load Balancing Route A Route B Packets are balanced through multiple ways Advantage: More Bandwidth Higher Availability When the routing process has two or more paths with equal metric to a destination network, it is possible to send the data packets along these routes. The data load is balanced. Some routing protocols can perform unequal cost load balancing with up to 5 different routes. Rolf Augstein 2006 All rights reserved Page 22

23 Load Balancing (cont.) Problem: Different Trip Times Route A 114 ms Route B 262 ms - Per Destination Load Balancing - Per Packet Load Balancing One of the main problems when performing load balancing exists in the different trip times of particular routes. This can cause problems for data application when the packets arrive in a different order then actually sent. Special care must be taken. Different techniques are available to solve the negative effects. Example A gateway has 2 two different paths to the headquarter network. The first session initiated is sent through the first known path, the second session is sent through the second path. The third session must use the first path and so on. This called Per Destination Load Balancing. When using Per Packet Load Balancing all packets regardless of the session ID are balanced over both paths. In this case the load on the different paths is balanced in a optimized manner. But the risk of packet delays with a higher rate of retransmissions is more likely. Rolf Augstein 2006 All rights reserved Page 23

24 Control Packet Lifetime Time-to-Live IP-Version 4 Header TTL TTL TTL TTL Decreasing Time-To-Live Counter when passing through router In the header of the IP packet, the field TTL takes care of data packets not travelling in the network for ever. Whenever a routing node forwards an IP packet, the TTL counter is decreased by one. A packet with TTL set to 0 is discarded by the router. Rolf Augstein 2006 All rights reserved Page 24

25 Routing Problems Each routing protocol has advantages and also disadvantages. There is no perfect routing protocol. An administrator must deal with the pros and the cons trying to find the best solution for his needs. Convergence Convergence Problem New Route to secs 240 secs 180 secs 120 secs Next Update in 60 secs Worse case scenario A major problem with DV routing is the convergence problem. New information like changes in routing take quite some time to get to all members of the routing process. The negative effect is increasing when networks become bigger and the changes occur much more often. Rolf Augstein 2006 All rights reserved Page 25

26 Count to Infinity Count to Infinity Don t worry! I have a route to ? No Route to Worse case scenario Slow convergence causes additional problems. Routers update routing information to neighbours, even if they are the source of this information. This phenomenon is called count-to-infinity, because it leads to a ping-pong effect until the maximum value for the metric is reached. So how can one overcome this kind of effects? Rolf Augstein 2006 All rights reserved Page 26

27 Triggered Updates Solution: Triggered Updates interface down Network unreachable Metric <max. Value> Neighbor receives Update with max. Metric Any other Changes are transmitted immediately Overcome Convergence Problem! The flow of negative information must be accelerated. Whenever a change in routing occurs, these changes are transmitted immediately to all adjacencies. If an entire network is unreachable, the update packets contain the metric value set to the maximum. Poison Reverse This technical term is used to indicate, that a packet with a higher metric or the maximum metric is set and sent along the reverse path trough the network to overcome problems like routing loops or count-to-infinity. Poison reverse is a triggered update to speed up the convergence of the routing protocol. Rolf Augstein 2006 All rights reserved Page 27

28 Interface Hold-down Network down Update from neighbor Timer Route Table Flush network via E0 >entering hold-down for network Accept no further Information for Network for a certain amount of time Avoidance of Routing-Loops A router should not rely on information arriving on an interface that was sent out earlier over that interface. When a route is flushed out of the routing table, new update packets for a particular route from any neighbour are not accepted for some time. A router should realize which routes were propagated through the interfaces and should not accept some routes backward. Again these kinds of problems occur mainly on DV routing protocols on networks with high convergence. Rolf Augstein 2006 All rights reserved Page 28

29 Loops Routing Loops Mrs. Easy Company Intranet with different Administrators Default Route to Default Route to Default Route to Mr. Brainbox Mr. Theory Another problem coming up sometimes is a loop in the routing information table. A routing loop can be caused by a lack of communication between different routing administrators, for example. This is a very tricky problem. It looks ridicules but it is configured very quickly. Another source for routing loops is the way DV-protocols like RIP are working as seen in previous chapter. The solution to avoid loops is the Split Horizon. Rolf Augstein 2006 All rights reserved Page 29

30 Split Horizon Split-horizon is a common solution to avoid routing loops. A cause for the route loop is that the router propagates routing information learned from a neighbour to that neighbour back. The idea of the split-horizon is not to send the routing information over the interface that has received this routing information. Split Horizon Hub and Spoke Is not propagated by RIP Propagated by RIP Can not access network ! Dynamic Routing with RIP Network Problem: Point-to-Multipoint Interfaces The Split Horizon problem comes up in switched wide area networks. In a switched network, one physical interface is configured with several instances of logical interfaces. The logical interfaces deal with the different IP networks. The routing process deals with the physical interface. So information learned from the way in on this physical interface is not sent out over the same physical interface. This is to avoid routing loops. So something that was designed to solve a problem now causes another problem. Administrators must be aware of the split horizon effect in point-to-multipoint interfaces to avoid routing misconfiguration. Rolf Augstein 2006 All rights reserved Page 30

31 Routing Interoperability Many administrators use more than one routing protocol in their network to manage various needs. This chapter covers how different routing protocols can configured to interact with each other. The Routing Order The Routing Preference OSPF Static Priority? OSPF 2 Static 1 RIP 3 RIP Choice: Which routing method should be used? Different routing protocols can be configured and activated in parallel on a router. But there is no interaction between each other. This means RIP gets all routing information for the network and a second routing protocol like OSPF calculates the best path through the some network as well. Question: So what routing paths are preferred by a data packet? Each routing protocol including static routing methods do have an assigned priority value by default. This value is called the preference. Rolf Augstein 2006 All rights reserved Page 31

32 Note: Cisco uses the same mechanism for routing interaction. This priority value is called Administrative Distance. Working with Preference Entries in Routing-Table Network By Metric Preference Route to OSPF 3 5 Route to Static 1 8 Route to RIP 3 10 Route with best preference value If there are several routes to a destination network, the first value checked is the preference value. This means the routing procedure with the highest priority is checked first. A lower preference value means more trust for the routing source. Again, within a routing procedure like OSPF, RIP, or Static, the metric value is used to define the best path. For customization purposes the preferences can be manually configured. If an administrator wants to trust a RIP derivate route more than an OSPF route, the default preference must be changed. Different manufacturers have different specifications on the preferences/ administrative distance of the routing protocols. Rolf Augstein 2006 All rights reserved Page 32

33 The following table shows the default preferences of the routers of Quidway series produced by Huawei. In the table, a value of 0" denotes the direct route, and a value of "255" denotes any route from an untrustworthy source. Table: Default Preference Values for Quidway Series Routing Protocol Preference DIRECT 0 OSPF 10 STATIC 60 RIP 100 Internal BGP 130 OSPF AS External 150 External BGP 170 UNKNOWN 255 Except the direct route, preferences of all dynamic routing protocols can be configured manually according to the users' requirement. Rolf Augstein 2006 All rights reserved Page 33

34 Floating Static Floating Static Route Use preference values to make static routes interactive ISDN Link, Backup Serial Link, 128 KB Entries in Routing-Table Network By Metric Preference Via Route to RIP 3 10 Serial Link Route to Static 1 20 ISDN If serial links goes down, ISDN backup is triggered by static route With the help of the preference one can make a static route more dynamic. By default, a static route has higher priority than all other dynamic routing procedures. One can change the behaviour, so as long as a dynamic route is present in the routing table, these routes are preferred. When for some reason the dynamic route disappears, the defined static route takes precedence. Floating static routes are often used as part of routing concepts with ISDN backup links. Rolf Augstein 2006 All rights reserved Page 34

35 Route Redistribution Route Redistribution Routing with OSPF Routing with RIP Metric 117 Metric 139? not compatible Metric 2 Metric 5 As mentioned earlier, each routing procedure uses proprietary metric calculations. To make them working together and exchange routing information, Route Redistribution can be used. With Route Redistribution, basically each routing procedure can be transferred in each other. There are a lot of considerations to make, when using redistribution. This entire technique is covered in detail in a later chapter. Administrators should have deeper understanding of the single routing procedures before using redistribution between them. Rolf Augstein 2006 All rights reserved Page 35

36 Redistribution Policy Define rules for redistribution Convert OSPF Routes to RIP: Starting Metric 4 Convert RIP Routes to OSPF: Starting Metric 9 The basic principle with route redistribution consists in the choice for special routing nodes in the network, where redistribution should be established. Example: A set of definitions rule the way, a RIP route is converted and transferred in an OSPF route and vice versa. OSPF Metric 230 is converted to RIP Metric 4 RIP Metric 3 is converted to OSPF Metric 9 All metric conversions must be set with care, so the entire routing information context makes sense. Also, the choice of the position of the router in the network redistributing routes is relevant. Rolf Augstein 2006 All rights reserved Page 36

37 Routing Design A structured network design is the fundament for implementing a useful routing strategy. Without a proper IP addressing, there is no way for scalable and stable networks. Routing Hierarchy Internet Building Areas, Domains, AS Core Edge/ Convergence Access In larger networks with structured network design, some routers will take special control and handling of routing updates. To take advantage of different routing mechanisms it is very important to have a well administrated IP address scheme. Smart Router: From the routing perspective, some routers are smarter than others. Because of the routing information they hold in their routing table, some routers may have a more detailed knowledge about the network. This is common technique to control the amount of routing information. Small routers in the access zone do not need all information about the entire network. Rolf Augstein 2006 All rights reserved Page 37

38 A good IP address plan implemented in a well-designed network has the following characteristics: Scalability Allows for large increases in the number of supported sites Predictability Exhibits predictable behavior and performance Flexibility Minimizes the impact of routers, additions, changes, or removals Rolf Augstein 2006 All rights reserved Page 38

39 The Prefix Prefix Prefix Host Classfull Routes Class A /8 Class B /16 Class C / Classless Routes Class C / For routing purposes, an IP address without a given subnet mask is worthless. To make routing decisions the subnet mask must always be considered. Instead of using the subnet mask in the dotted decimal format, a more convenient format is used. The Prefix points out, how many bits within the 32 bits of the IP address are used as the network part. So a prefix of 20 bits for an IP address like means, you deal with a class B network performing 4 bit subnetting. Rolf Augstein 2006 All rights reserved Page 39

40 Summarize Routes Route Summarization Prefix Host Subnetting - Gain more routable networks - Search common network bits for summarization Prefix Host Summarization The process of divide a network in smaller sub-networks is done by shifting the network bits to the right. (see TCP/IP fundamentals). When dealing with large networks, it is important to minimize the amount of routing information. Less routing information means less routing update traffic and less RAM (memory) needed in the router. So the process of summarize many sub-networks to one network is called Route Summarization. This is done by shifting the network bits to the left. Rolf Augstein 2006 All rights reserved Page 40

41 IP Address Management Route Summarization Route Aggregation /16 Only 1 update necessary IP subnetworks are auto-summarized based on Class A, B, C addresses By default, most routers perform auto summarization for class A, B, or C networks. Instead of propagating up to 254 subnets of the network ( to ) the summarized route /16 is used. This means an enormous improvement for the amount of routing traffic sent to the neighbour router. Note: Sometimes the term Route Aggregation is used. An aggregate route includes different sub-networks by using appropriate subnet masks. Rolf Augstein 2006 All rights reserved Page 41

42 Relevant Bits IP Address: / Bits Prefix: Marks the relevant bits for all routing decisions Logical AND What the Router does! Network: Bits to care Don t care Routing nodes need the IP address and the corresponding subnet mask to make routing decisions. Each interface needs this information as part of the configuration. With the help of the subnet mask and the logical AND operation, it is a simple process to read out the network part of the IP address. The prefix bits define the network relevant bits within an IP address. This is the reason for sending the prefix in each routing update when using routing protocols like OSPF or RIP version 2, so different subnet masks can be used within a single IP network. The older RIP version 1 is not capable of using different subnet masks in one class A, B, or C network. RIP updates are not aware of network prefix. Rolf Augstein 2006 All rights reserved Page 42

43 Sub-Subnet Host A IP Address: / / Subnet / Subnet Host B IP Address: / 19 Without the subnet mask information, it is not possible to determine the location of a given host in the network. VLSM is like using an additional subnet for a main subnet. A sub subnet describes how many subnets are used within a defined subnet. Working with VLSM is simple math, but can be complex in real live. Interesting: Only routing nodes with appropriate routing procedures must be aware of VLSM. So, not all routing protocols can be used. End systems like hosts or servers do not have to deal with VLSM. They just have to be configured with a proper IP address and mask. Rolf Augstein 2006 All rights reserved Page 43

44 VLSM Routing VLSM / / / / /16 Optimization with use of various prefix subnets Variable Length Subnet Mask is often used, to optimize the address space for a given class A, B, or C network. There are lots of small networks with few hosts. Using large subnets like 8 bits prefix actually wastes a lot of address space. Worse case is a PPP link with the need of two valid IP addresses only. With a 8 bits subnet, there are 252 wasted IP addresses! Rolf Augstein 2006 All rights reserved Page 44

45 Variable-Length Subnet Mask 254 Subnets / Aggregate Route / Subnets Use one subnet to split into smaller VLSM subnets A proven way of using VLSM is, to take a certain subnet out of the group of available subnets. Apply the new subnet mask i.e. 30 bits, so 62 new subnets are addressable. Each new subnet can address two hosts. The benefit is the gain of new smaller routable networks, which can be used to address PPP links. Note: VLSM does not mean an increasing of IP addresses at all. As a matter of fact, lots of addresses are lost because of broadcasts and network addresses. Rolf Augstein 2006 All rights reserved Page 45

46 Table: Prefix Calculation CIDR Netmask Hosts / Class Typical usage subnet / A Largest block allocation made by IANA / / / / / / / / B / ISP / large business / ISP / large business / ISP / large business / Small ISP / large business / Small ISP / large business / / / C Large LAN / Large LAN / Small LAN / Small LAN / Small LAN / / "Glue network" (point to point links) / "Useless Network", proposed for point to point links (RFC 3021) / Host route Rolf Augstein 2006 All rights reserved Page 46

47 Classless Routing Contains block of: Defined Summary Route: / CIDR: Classless Inter-Domain Routing The IP address space was divided into three main network classes, where each class had a fixed network size. The class, the length of the subnet mask and the number of hosts on the network, could always be determined from the most significant bits of the IP address. Without any other way of specifying the length of a subnet mask, routing protocols necessarily used the class of the IP address specified in route advertisements to determine the size of the routing prefixes to be set up in the routing tables. CIDR uses VLSM to allocate IP addresses to subnets according to individual needs. Thus the network/host division can occur at any bit boundary in the address. The process can be recursive, with a portion of the address space being further divided into even smaller portions, through the use of masks which cover more bits. Because the normal class distinctions are ignored, the new system is called classless routing. Rolf Augstein 2006 All rights reserved Page 47

48 Prefix aggregation Another benefit of CIDR is the possibility of routing prefix aggregation. For example, sixteen contiguous /24 networks could now be aggregated together, and advertised to the outside world as a single /20 route (if the first 20 bits of their network addresses match). Two contiguous /20s could then be aggregated to a /19, and so forth. This allows a significant reduction in the number of routes that had to be advertised over the Internet, preventing 'routing table explosion' from overwhelming routers, and stopping the Internet from expanding further. When dealing with aggregate routes within the internet the term Supernet is used sometimes. These kinds of routing mechanisms are part of BGP routing. The Border Gateway Protocol is discussed more detailed in a later module. CIDR is described in: RFC 1519 ( Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy. RFC 1518 ( Architecture for IP Address Allocation with CIDR Rolf Augstein 2006 All rights reserved Page 48

49 Discontinuous Use of Subnets Routing with RIP, Auto-summarization / / /24? Oh fine: I have two routes by RIP to Another interesting effect comes up with the discontinuous use of a class A, B, or C network, which is important to understand for routing administrators. Because routers perform auto-summarization on IP network address borders, the above situation arises for a router between two networks using discontinuous IP address spaces. From the routing perspective, there are two paths to the network with fatal consequences! It is not recommended to split IP networks and use them on different discontinuous locations. To solve the above problem, auto-summary must be disabled on both routers. But then, too many routes are propagated through the network cloud, which could lead to additional problems. Rolf Augstein 2006 All rights reserved Page 49

50 Prefix Matching Priority / 32 Host / 27 Subnet / 24 Net / 16 Block Network / 0 Default Rule: best prefix matches When using subnetting and VLSM in a network, the routing table has various entries for a network with different prefix lengths. Longest prefix match or best prefix match refers to an algorithm used to decide for the best routing entry. Because each entry of a routing table may specify a range of addresses, one destination address may match more than another routing table entry. The most specific table entry, this means the one with smallest host address range, is called the longest prefix match. Rolf Augstein 2006 All rights reserved Page 50

51 Module Review Summary Static routing is still as important as adaptive routing protocols. Adaptive routing protocols are divided in Distance-Vector and Link-State protocols. Routing decisions are based on preferences and metric calculations. Network administrators must be aware of different routing problems like Split Horizon, Convergence, Loops, or other effects depending on the routing protocol. Different routing protocols can interact with the help of routing redistribution. Network design and appropriate IP addressing schemes are important for fast and stable routing. The ability for route summarization and aggregation is the key for adaptive routing in larger networks. Rolf Augstein 2006 All rights reserved Page 51

52 Review Question 1. Outline the difference between metric and preference? 2. What are common problems of D-V routing protocols? 3. Build a small table and outline the advantages and disadvantages of L-S routing protocols. 4. What is the meaning of an adjacent router? Rolf Augstein 2006 All rights reserved Page 52

53 5. What is meant by a Floating Static Route? 6. Describe the rule best prefix matches and the relevancy to routing protocols. 7. What kind of topology is Hub-and-Spoke? 8. Describe the problems arising with a slow convergence. 9. What is the preference for a direct connected network? Why? 10. What is the meaning of asymmetric routing? Rolf Augstein 2006 All rights reserved Page 53

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

RIP Version 2. The Classless Brother

RIP Version 2. The Classless Brother RIP Version 2 The Classless Brother (C) Herbert Haas 2005/03/11 1 Why RIPv2 Need for subnet information and VLSM Need for Next Hop addresses for each route entry Need for external route tags Need for multicast

More information

Distance Vector Routing Protocols

Distance Vector Routing Protocols Distance Vector Routing Protocols Routing Protocols and Concepts Chapter 4 Version 4.0 1 Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

9.1. Routing Protocols

9.1. Routing Protocols 9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles

Building the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,

More information

Introduction to Routing

Introduction to Routing 1 Introduction to Routing Session 2 Presentation_ID.scr 1 Agenda Addressing Concepts Routing Protocols Statics and Defaults 3 ISO OSI Reference Model Routing Information Protocol (RIP and RIPv2) L7 L6

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 4.1.1 What are the three distance vector routing protocols? What are the key characteristics of RIP? What are the key characteristics of IGRP?

More information

Chapter 7 Routing Protocols

Chapter 7 Routing Protocols Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals

More information

Part II. Chapter 3. Determining IP Routes

Part II. Chapter 3. Determining IP Routes Part II Chapter 3 Routers perform two main functions: switching and routing. The switching function is the process of moving packets from an inbound interface to an outbound interface. The switching function

More information

Unit 6 Routing and Layers 3 and 4 Protocols. Chapter 6: Layers 3 and 4 Protocols

Unit 6 Routing and Layers 3 and 4 Protocols. Chapter 6: Layers 3 and 4 Protocols Unit 6 Routing and Layers 3 and 4 Protocols Chapter 6 from each textbook Chapter 6: Layers 3 and 4 Protocols 2008 ITT Educational Services Inc. IT-320 Wan Technologies : Unit 6: Slide 1 Objectives 6: Describe

More information

The most simple way to accelerate a Router is at 9.8 m/sec/sec.

The most simple way to accelerate a Router is at 9.8 m/sec/sec. Routing Introduction Direct vs. Indirect Delivery Static vs. Dynamic Routing Distance Vector vs. Link State (C) Herbert Haas 2005/03/11 The most simple way to accelerate a Router is at 9.8 m/sec/sec. Seen

More information

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table

More information

Routing Protocols Classification

Routing Protocols Classification Routing Protocols Classification Petr Grygárek rek 1 Classification criteria Internal (IGP) / External (EGP) number of handled routes possibilities of routing politics specification Convergence Time Distance-vector

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Introduction to IP Routing

Introduction to IP Routing Introduction to IP Routing Static-, Default-, Dynamic-Routing, RIP Classless/Classful Routing, Internet Routing Overview Agenda Introduction to IP Routing Static Routing Default Route Dynamic Routing RIP

More information

Why dynamic route? (1)

Why dynamic route? (1) Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update

More information

Two types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs).

Two types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). Introduction Dynamic routing is when protocols are used to find networks and update routing tables on routers. True, this is easier than using static or default routing, but it ll cost you in terms of

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 4 : Distance Vector Routing Protocols Chapter 5 : RIP version 1

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1 Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-1 Configuring a Static Route 1-2 Configuration Prerequisites

More information

Chapter 3. Introduction to Dynamic Routing Protocols. CCNA2-1 Chapter 3

Chapter 3. Introduction to Dynamic Routing Protocols. CCNA2-1 Chapter 3 Chapter 3 Introduction to Dynamic Routing Protocols CCNA2-1 Chapter 3 Introduction to Dynamic Routing Protocols Introduction to Dynamic Routing Protocols CCNA2-2 Chapter 3 Perspective and Background Dynamic

More information

COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS

COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS S.Kokila, Assistant Professor, Department of Computer Science, A.V.P College of Arts and Science, Tiruppur, Tamilnadu, India. G.Pramela, Assistant Professor, Department

More information

Routing Protocol comparison

Routing Protocol comparison Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate

More information

2008 NDP Lectures 7 th Semester

2008 NDP Lectures 7 th Semester 2008 NDP Lectures 7 th Semester Neeli R. Prasad, Associate Professor Head of Wireless Security and Sensor Networks Group Networking and Security Aalborg University Niels Jernes Vej 12, 9220 Aalborg East,

More information

IP Routing Volume Organization

IP Routing Volume Organization IP Routing Volume Organization Manual Version 20091105-C-1.03 Product Version Release 6300 series Organization The IP Routing Volume is organized as follows: Features IP Routing Overview Static Routing

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

Internet Routing Protocols Tuba Saltürk

Internet Routing Protocols Tuba Saltürk Internet Routing Protocols 15505068 Tuba Saltürk Outline Internet Routers Routing Protocol Interior Gateway Protocol (IGP) Distance- Vector Routing Protocol Routing Information Protocol (RIP) Interior

More information

SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0

SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 SEMESTER 2 Chapter 3 Introduction to Dynamic Routing Protocols V 4.0 3.1.1 What are the four routing RIP, RIPv2, EIGRP, OSPFv2 protocols that are the focus of this course? 3.1.1.2 What are routing protocols?

More information

IP Routing Tecnologie e Protocolli per Internet II rev 1

IP Routing Tecnologie e Protocolli per Internet II rev 1 IP Routing Tecnologie e Protocolli per Internet II rev 1 Andrea Detti Electronic Engineering dept. E-mail: andrea.detti@uniroma2.it Some sources: Cisco CCNA Routing and Switching ICND1 and ICND2 Slide

More information

CCNA EXPLORATION V4.0 ROUTING PROTOCOLS AND CONCEPTS ACCESSIBLE INSTRUCTOR MATERIALS POWERPOINT OBJECTIVES

CCNA EXPLORATION V4.0 ROUTING PROTOCOLS AND CONCEPTS ACCESSIBLE INSTRUCTOR MATERIALS POWERPOINT OBJECTIVES CCNA EXPLORATION V4.0 ROUTING PROTOCOLS AND CONCEPTS ACCESSIBLE INSTRUCTOR MATERIALS Prepared by Cisco Learning Institute June 23, 2008 Chapter 1 Introduction to Routing and Packet Forwarding Objectives

More information

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER

Overview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER CHAPTER 1 This chapter introduces the basic concepts for Layer 3 unicast routing protocols in Cisco NX-OS. This chapter includes the following sections: Information About Layer 3 Unicast Routing, page

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

BTEC Level 3 Extended Diploma

BTEC Level 3 Extended Diploma BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward

More information

Chapter 5 RIP version 1

Chapter 5 RIP version 1 Cisco CCNA 2 Exploration - Routing Chapter 5 RIP version 1 João José jjose@ualg.pt http://w3.ualg.pt/~jjose/cisco/ Based on: Graziani, R. (2008) CIS 82 Routing Theory and Concepts RIPv1: A Distance Vector,

More information

Configuring BGP. Cisco s BGP Implementation

Configuring BGP. Cisco s BGP Implementation Configuring BGP This chapter describes how to configure Border Gateway Protocol (BGP). For a complete description of the BGP commands in this chapter, refer to the BGP s chapter of the Network Protocols

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad Default & Static Routes and Routing Information Protocol Presented by : Mohammed Hamad When a device has multiple paths to reach a destination, it always selects one path by preferring it over others.

More information

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 Static Routing Configuration... 1-1 1.1 Introduction... 1-1 1.1.1 Static Route... 1-1 1.1.2 Default Route... 1-1 1.1.3 Application Environment of Static Routing...

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

RIPv2. Routing Protocols and Concepts Chapter 7. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public

RIPv2. Routing Protocols and Concepts Chapter 7. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public RIPv2 Routing Protocols and Concepts Chapter 7 1 Objectives Encounter and describe the limitations of RIPv1 s limitations. Apply the basic Routing Information Protocol Version 2 (RIPv2) configuration commands

More information

Exam : : Building Scalable Cisco Internetworks (BSCI) Title. Ver :

Exam : : Building Scalable Cisco Internetworks (BSCI) Title. Ver : Exam : 642-801 Title : Building Scalable Cisco Internetworks (BSCI) Ver : 03-22-05 QUESTION 1 A packet that needs to be forwarded arrives on an interface of a router. In order for a router to route data,

More information

Symbols. Numerics I N D E X

Symbols. Numerics I N D E X I N D E X Symbols? (question mark), CLI help system, 126 Numerics A 2-router BGP topology, configuring, 279 284 4-router BGP topology, configuring, 266, 276 279 ABRs (area border routers), 9, 87, 95, 141

More information

A study of WAN design, routing protocols and connectivity between Head office to Branch office

A study of WAN design, routing protocols and connectivity between Head office to Branch office A study of WAN design, routing protocols and connectivity between Head office to Branch office Dr. Anil Kumar Singh ABSTRACT Jagran Institute of Management, 620-W Block Saket Nagar, Kanpur 3.LAB SETUP

More information

Claim desired outcome

Claim desired outcome Assessment Authoring - Table of Specification (TOS) The Table of Specification (TOS) is a high-level design template for a given assessment. It identifies the claims, components skills, targeted number

More information

Overview 4.2: Routing

Overview 4.2: Routing Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer

CIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

Small additions by Dr. Enis Karaarslan, Purdue - Aaron Jarvis (Network Engineer)

Small additions by Dr. Enis Karaarslan, Purdue - Aaron Jarvis (Network Engineer) Routing Basics 1 Small additions by Dr. Enis Karaarslan, 2014 Purdue - Aaron Jarvis (Network Engineer) Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 3 IPv4

More information

Routing Information Protocol

Routing Information Protocol Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 18.2, 2018/11/21 13:11:09) Friday, November 23, 2018 Karst Koymans (UvA)

More information

Routing Protocol. Seiya Tsubone. Apr The University of Tokyo. Seiya Tsubone (The University of Tokyo) Routing Protocol Apr. 25.

Routing Protocol. Seiya Tsubone. Apr The University of Tokyo. Seiya Tsubone (The University of Tokyo) Routing Protocol Apr. 25. Routing Protocol Seiya Tsubone The University of Tokyo Apr. 25. 2013 Seiya Tsubone (The University of Tokyo) Routing Protocol Apr. 25. 2013 1 / 60 Table of Contents 1 The Concept of Routing 2 RIP 3 OSPF

More information

CCNA EXPLORATION V4.0 ROUTING PROTOCOLS AND CONCEPTS

CCNA EXPLORATION V4.0 ROUTING PROTOCOLS AND CONCEPTS CCNA EXPLORATION V4.0 ACCESSIBLE INSTRUCTOR MATERIALS COMPARISON OF NEW CURRICULA WITH EXISTING CURRICULA Prepared by Cisco Learning Institute June 23, 2008 Routing Protocols and Concepts Summary New CCNA

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Lecture 06 2016/2017 IPv4 routeing. Static routeing and dynamic routeing. Routeing protocols: RIP, RIPv2, EIGRP and OSPF. Autonomous systems and route redistribution Instituto

More information

Routing Information Protocol. RIP application. RIP version 1

Routing Information Protocol. RIP application. RIP version 1 Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/01 13:00:45) Friday, March 3, 2017 RIP version 1 Origin and

More information

Routing & Protocols 1

Routing & Protocols 1 Routing & Protocols 1 Paul Traina cisco Engineering 2 Today's Talk Terminology Routing Static Routes Interior Gateway Protocols Exterior Gateway Protocols Building an ISP network 3 Terminology network

More information

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5

Chapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 Chapter 5 RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 RIP Version 1 RIPv1: Distance Vector, Classful Routing Protocol CCNA2-2 Chapter 5 Background and Perspective RIP evolved from the Xerox Network System

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-5-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers

More information

Chapter 4: VLSM and Classless Inter Domain Routing. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved.

Chapter 4: VLSM and Classless Inter Domain Routing. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Chapter 4: VLSM and Classless Inter Domain Routing 1 What will we Learn from chapter 4? Compare and contrast classful and classless IP addressing. Review VLSM and explain the benefits of classless IP addressing.

More information

Basic IP Routing. Finding Feature Information. Information About Basic IP Routing. Variable-Length Subnet Masks

Basic IP Routing. Finding Feature Information. Information About Basic IP Routing. Variable-Length Subnet Masks This module describes how to configure basic IP routing. The Internet Protocol (IP) is a network layer (Layer 3) protocol that contains addressing information and some control information that enables

More information

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding

More information

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local

More information

IP Router. Introduction to IP Routing. Agenda. IP Routing 1

IP Router. Introduction to IP Routing. Agenda. IP Routing 1 IP Router Initially Unix workstations with several network interface cards Today specialized hardware Cisco 3600 Router Introduction to IP Routing Static-, Default-, Dynamic-Routing, RIP Classless/Classful

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

College of DuPage. CCNA3 V3.0 Switching Basics and Intermediate Routing: Module 1: Introduction to Classless Routing

College of DuPage. CCNA3 V3.0 Switching Basics and Intermediate Routing: Module 1: Introduction to Classless Routing College of DuPage CCNA3 V3.0 Switching Basics and Intermediate Routing: Module 1: Introduction to Classless Routing 3-2004 1 Overview With the phenomenal growth of the Internet and TCP/IP, virtually every

More information

CSCD 433/533 Advanced Networks Spring 2016

CSCD 433/533 Advanced Networks Spring 2016 CSCD 433/533 Advanced Networks Spring 2016 Lecture 13 Router Algorithms and Design Chapter 5 1 Topics Router Algorithms Routing in General Hierarchical routing Interior Gateway Protocols OSPF mention of

More information

Basic IP Routing. Finding Feature Information. Information About Basic IP Routing. Variable-Length Subnet Masks

Basic IP Routing. Finding Feature Information. Information About Basic IP Routing. Variable-Length Subnet Masks This module describes how to configure basic IP routing. The Internet Protocol (IP) is a network layer (Layer 3) protocol that contains addressing information and some control information that enables

More information

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery

Computer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Computer Networks ICS 651 IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Routing Information Protocol DV modified with split horizon and poisoned reverse distance

More information

Chapter 4: outline. Network Layer 4-1

Chapter 4: outline. Network Layer 4-1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link

More information

Introduction to OSPF

Introduction to OSPF Introduction to OSPF ISP/IXP Workshops ISP/IXP Workshops 1999, Cisco Systems, Inc. 1 Agenda OSPF Primer OSPF in Service Provider Networks OSPF BCP - Adding Networks OSPF Command Summary 2 OSPF Primer 3

More information

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

shortcut Tap into learning NOW! Visit  for a complete list of Short Cuts. Your Short Cut to Knowledge shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically

More information

ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6

ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6 1358_fmi.book Page 460 Thursday, May 27, 2004 2:21 PM A ABR (Area Border Router), 206, 216 access, dedicated networks, 23 access layer, three-layer hierarchical design model, 6 access lists, scalable networks,

More information

Routing Protocols. Autonomous System (AS)

Routing Protocols. Autonomous System (AS) Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1 Determining IP Routes, Cisco Systems, Inc. 9- Objectives Upon completion of this chapter, you will be able to complete the following tasks: Distinguish the use and operation of static and dynamic routes

More information

CCNA IP ROUTING. Revision no.: PPT/2K605/03

CCNA IP ROUTING. Revision no.: PPT/2K605/03 CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics

CSC458 Lecture 6. Administrivia. Inter-domain Routing IP Addressing. Midterm will Cover Following Topics (2) Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Administrivia Homework: #2 due today #3 out today, due in two weeks (same date as midterm) No lecture next week Reading Week Midterm in two weeks 60

More information

CCNP 1: Advanced Routing

CCNP 1: Advanced Routing Scope and Sequence CCNP 1: Advanced Routing Cisco Networking Academy Program Version 3.1 TABLE OF CONTENTS CCNP 1: ADVANCED ROUTING...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE

More information

Routing. Directly Connected IP Networks. Data link layer routing. ifconfig command

Routing. Directly Connected IP Networks. Data link layer routing. ifconfig command Routing Basic principles dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:21:58) Monday, February 22, 2010 Basic setup Directly connected Not directly connected

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem?

8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem? 1. Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network

More information

OSPF Commands. Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols IP2R-61

OSPF Commands. Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols IP2R-61 OSPF Commands Use the commands in this chapter to configure and monitor the Open Shortest Path First (OSPF) routing protocol. For OSPF configuration information and examples, refer to the Configuring OSPF

More information

Presentation On Routing Protocol

Presentation On Routing Protocol Presentation On Routing Protocol By Muhammad Siddiqui ISNM2003 28th Jan 2004 Networks A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area

More information