Accessible PowerPoints
Transcript of Accessible PowerPoints
-
8/9/2019 Accessible PowerPoints
1/54
CCNA EXPLORATION V4.0ROUTING PROTOCOLS AND CONCEPTS
ACCESSIBLE INSTRUCTOR MATERIALS POWERPOINT OBJECTIVES
Prepared by
Cisco Learning Institute
June 23, 2008
-
8/9/2019 Accessible PowerPoints
2/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 1
Chapter 1 – Introduction to Routing and Packet Forwarding
Objectives• Identify a router as a computer with an OS and hardware designed for the routing
process.• Demonstrate the ability to configure devices and apply addresses.• Describe the structure of a routing table.• Describe how a router determines a path and switches packets.
Router as a Computer
• Describe the basic purpose of a routero Computers that specialize in sending packets over the data network. They are
responsible for interconnecting networks by selecting the best path for a packet
to travel and forwarding packets to their destination• Routers are the network center
o Routers generally have 2 connections: WAN connection (Connection to ISP) LAN connection
• Data is sent in form of packets between 2 end devices• Routers are used to direct packet to its destination• Routers examine a packet’s destination IP address and determine the best path by
enlisting the aid of a routing table• Router components and their functions
o CPU - Executes operating system instructionso Random access memory (RAM) - Contains the running copy of configuration file.
Stores routing table. RAM contents lost when power is offo Read-only memory (ROM) - Holds diagnostic software used when router is
powered up. Stores the router’s bootstrap program.o Non-volatile RAM (NVRAM) - Stores startup configuration. This may include IP
addresses (Routing protocol, Hostname of router)o Flash memory - Contains the operating system (Cisco IOS)o Interfaces - There exist multiple physical interfaces that are used to connect
network.o Examples of interface types:
Ethernet / fast Ethernet interfaces Serial interfaces Management interfaces
• Router components• Major phases to the router boot-up process
o Test router hardware Power-On Self Test (POST) Execute bootstrap loader
-
8/9/2019 Accessible PowerPoints
3/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 2
o Locate & load Cisco IOS software Locate IOS Load IOS
o
Locate & load startup configuration file or enter setup mode Bootstrap program looks for configuration file• Verify the router boot-up process:
o The show version command is used to view information about the router duringthe bootup process. Information includes: Platform model number Image name & IOS version Bootstrap version stored in ROM Image file name & where it was loaded from Number & type of interfaces Amount of NVRAM Amount of flash Configuration register
• Router Interface is a physical connector that enables a router to send or receivepackets
• Each interface connects to a separate network• Consist of socket or jack found on the outside of a router• Types of router interfaces:
o Etherneto Fastetherneto Serialo DSL
o ISDNo Cable
• Two major groups of Router Interfaceso LAN Interfaces:
Are used to connect router to LAN network Has a layer 2 MAC address Can be assigned a Layer 3 IP address Usually consist of an RJ-45 jack
o WAN Interfaces Are used to connect routers to external networks that interconnect LANs. Depending on the WAN technology, a layer 2 address may be used.
Uses a layer 3 IP address• Routers and the Network Layer
o Routers use destination IP address to forward packets The path a packet takes is determined after a router consults information in
the routing table. After router determines the best path Packet is encapsulated into a frame Frame is then placed on network medium in form of Bits
-
8/9/2019 Accessible PowerPoints
4/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 3
o Routers Operate at Layers 1, 2 & 3o Router receives a stream of encoded bitso Bits are decoded and passed to layer 2o
Router de-encapsulates the frameo Remaining packet passed up to layer 3 Routing decision made at this layer by examining destination IP address
o Packet is then re-encapsulated & sent out outbound interface
Configure Devices and Apply Addresses
• Implementing Basic Addressing Schemes• When designing a new network or mapping an existing network you must provide
the following information in the form of a document:o Topology drawing that Illustrates physical connectivityo Address table that provides the following information:
Device name Interfaces used IP addresses Default gateway
• Basic Router Configuration• A basic router configuration should contain the following:
o Router name - Host name should be uniqueo Banner - At a minimum, banner should warn against unauthorized useo Passwords - Use strong passwordso Interface configurations - Specify interface type, IP address and subnet mask.
Describe purpose of interface. Issue no shutdown command. If DCE serial
interface issue clock rate command• After entering in the basic configuration the following tasks should be completed
o Verify basic configuration and router operations.o Save the changes on a router
• Verify Basic Router Configurationo Issue the show running-config commando Save the basic router configuration by Issuing the copy running-config startup-
config commando Additional commands that will enable you to further verify router configuration
are: Show running-config - Displays configuration currently in RAM
Show startup-config - Displays configuration file NVRAM Show IP route - Displays routing table Show interfaces - Displays all interface configurations Show IP int brief - Displays abbreviated interface configuration information
Routing Table Structure
• Routing Table is stored in ram and contains information about:
-
8/9/2019 Accessible PowerPoints
5/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 4
o Directly connected networks - this occurs when a device is connected to anotherrouter interface
o Remotely connected networks - this is a network that is not directly connected to
a particular routero Detailed information about the networks include source of information, networkaddress & subnet mask, and Ip address of next-hop router
• Show ip route command is used to view a routing table• Adding a connected network to the routing table
o Router interfaces Each router interface is a member of a different network Activated using the no shutdown command In order for static and dynamic routes to exist in routing table you must have
directly connected networks• Static routes in the routing table
o Includes: network address and subnet mask and IP address of next hop router orexit interfaceo Denoted with the code S in the routing tableo Routing tables must contain directly connected networks used to connect remote
networks before static or dynamic routing can be used• When to use static routes
o When network only consists of a few routerso Network is connected to internet only through one ISPo Hub & spoke topology is used on a large network
• Connected and Static routes• Dynamic routing protocols
o Used to add remote networks to a routing tableo Are used to discover networkso Are used to update and maintain routing tables
• Automatic network discoveryo Routers are able discover new networks by sharing routing table information
• Maintaining routing tableso Dynamic routing protocols are used to share routing information with other router
& to maintain and up date their own routing table• IP routing protocols. Example of routing protocols include:
o RIPo IGRP
o EIGRPo OSPF
• Routing Table Principleso 3 principles regarding routing tables:
Every router makes its decisions alone, based on the information it has in itsrouting table.
Different routing table may contain different information A routing table can tell how to get to a destination but not how to get back
-
8/9/2019 Accessible PowerPoints
6/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 5
• Effects of the 3 Routing Table Principleso Packets are forwarded through the network from one router to another, on a hop
by hop basiso
Packets can take path “X” to a destination but return via path “Y” (Asymmetricrouting)
Router Paths and Packet Switching
• Internet Protocol (IP) packet format contains fields that provide information about thepacket and the sending and receiving hosts
• Fields that are importance for CCNA students:o Destination IP addresso Source IP addresso Version & TTLo IP header length
o Precedence & type of serviceo Packet length
• MAC Layer Frame Format• MAC Frames are also divided into fields. They include:
o Preambleo Start of frame delimitero Destination MAC addresso Source MAC addresso Type/lengtho Data and pado Frame check sequence
• A Metric is a numerical value used by routing protocols help determine the best pathto a destinationo The smaller the metric value the better the path
• 2 types of metrics used by routing protocols are:o Hop count - this is the number of routers a packet must travel through to get to its
destinationo Bandwidth - this is the “speed” of a link also known as the data capacity of a link
• Equal cost metric is a condition where a router has multiple paths to the samedestination that all have the same metric
• To solve this dilemma, a router will use Equal Cost Load Balancing. This means therouter sends packets over the multiple exit interfaces listed in the routing table
• Path determination is a process used by a router to pick the best path to adestination
• One of 3 path determinations results from searching for the best patho Directly connected networko Remote networko No route determined
• Switching Function of Router is the process used by a router to switch a packet froman incoming interface to an outgoing interface on the same router
-
8/9/2019 Accessible PowerPoints
7/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 6
o A packet received by a router will do the following: Strips off layer 2 headers. Examines destination IP address located in Layer 3 header to find best route
to destination Re-encapsulates layer 3 packet into layer 2 frame Forwards frame out exit interface
• As a packet travels from one networking device to anothero The Source and Destination IP addresses NEVER changeo The Source & Destination MAC addresses CHANGE as packet is forwarded from
one router to the nexto TTL field decrement by one until a value of zero is reached at which point router
discards packet (prevents packets from endlessly traversing the network)• Path determination and switching function details. PC1 Wants to send something to
PC 2 here is part of what happenso
Step 1 - PC1 encapsulates packet into a frame. Frame contains R1’s destinationMAC addresso Step 2 - R1 receives Ethernet frame
R1 sees that destination MAC address matches its own MAC R1 then strips off Ethernet frame R1 Examines destination IP R1 consults routing table looking for destination IP After finding destination IP in routing table, R1 now looks up next hop IP
address R1 re-encapsulates IP packet with a new Ethernet frame R1 forwards Ethernet packet out Fa0/1 interface
•
Path determination and switching function details. PC1 Wants to send something toPC 2 here is part of what happenso Step 3 - Packet arrives at R2
R2 receives Ethernet frame R2 sees that destination MAC address matches its own MAC R2 then strips off Ethernet frame R2 Examines destination IP R2 consults routing table looking for destination IP After finding destination IP in routing table, R2 now looks up next hop IP
address R2 re-encapsulates IP packet with a new data link frame
R2 forwards Ethernet packet out S0/0 interface• Path determination and switching function details. PC1 Wants to send something to
PC 2 here is part of what happenso Step 4 - Packet arrives at R3
R3 receives PPP frame R3 then strips off PPP frame R3 Examines destination IP R3 consults routing table looking for destination IP
-
8/9/2019 Accessible PowerPoints
8/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 7
After finding destination IP in routing table, R3 is directly connected todestination via its fast Ethernet interface
R3 re-encapsulates IP packet with a new Ethernet frame R3 forwards Ethernet packet out Fa0/0 interfaceo Step 5 - IP packet arrives at PC2. Frame is decapsulated & processed by upper
layer protocols
Summary
• Routers are computers that specialize in sending data over a network.• Routers are composed of:
o Hardware i.e. CPU, Memory, System bus, Interfaceso Software used to direct the routing process
IOS Configuration file
•
Routers need to be configured. Basic configuration consists of:o Router nameo Router bannero Password(s)o Interface configurations i.e. IP address and subnet mask
• Routing tables contain the following informationo Directly connected networkso Remotely connected networkso Network addresses and subnet maskso IP address of next hop address
• Routers determine a packets path to its destination by doing the following
o Receiving an encapsulated frame & examining destination MAC address.o If the MAC address matches then Frame is de-encapsulated so that router can
examine the destination IP address.o If destination IP address is in routing table or there is a static route then Router
determines next hop IP address. Router will re-encapsulate packet withappropriate layer 2 frame and send it out to next destination.
o Process continues until packet reaches destination.o Note - only the MAC addresses will change the source and destination IP
addresses do not change.
Chapter 2 – Static Routing
Objectives
• Define the general role a router plays in networks.• Describe the directly connected networks, different router interfaces.• Examine directly connected networks in the routing table and use the CDP protocol.• Describe static routes with exit interfaces.
-
8/9/2019 Accessible PowerPoints
9/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 8
• Describe summary and default route.• Examine how packets get forwarded when using static routes.• Identify how to manage and troubleshoot static routes.
General Role of the Router
• Functions of a Routero Best Path Selectionso Forwarding packets to destination
• Introducing the Topologyo 3 1800 series routers connected via WAN linkso Each router connected to a LAN represented by a switch and a PC
• Connections of a Router for WANo A router has a DB-60 port that can support 5 different cabling standards
• Connections of a Router for Ethernet
o 2 types of connectors can be used: Straight through and Cross-over Straight through used to connect: Switch-to-Router, Switch-to-PC, Router-to-Server, Hub-to-PC, Hub-to-Server Cross-over used to connect: Switch-to-Switch, PC-to-PC, Switch-to-Hub, Hub-to-Hub, Router-to-Router
Interfaces
• Examining Router Interfaceso Show IP router command – used to view routing tableo Show Interfaces command – used to show status of an interfaceo Show IP Interface brief command – used to show a portion of the interface
informationo Show running-config command – used to show configuration file in RAM
• Configuring an Ethernet interfaceo By default all serial and Ethernet interfaces are downo To enable an interface use the No Shutdown command
• Verifying Ethernet interfaceo Show interfaces for fastEthernet 0/0 – command used to show status of fast
Ethernet porto Show ip interface briefo Show running-config
Ethernet interfaces participate in ARP
• Configuring a Serial interfaceo Enter interface configuration modeo Enter in the ip address and subnet masko Enter in the no shutdown command
• Example:o R1(config)#interface serial 0/0o R1(config-if)#ip address 172.16.2.1 255.255.255.0o R1(config-if)#no shutdown
-
8/9/2019 Accessible PowerPoints
10/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 9
• Examining Router Interfaceso Physically connecting a WAN Interface.o A WAN Physical Layer connection has sides:
Data Circuit-terminating Equipment (DCE) – This is the service providerCSU/DSU is a DCE device. Data Terminal Equipment (DTE) – Typically the router is the DTE device
• Configuring serial links in a lab environmento One side of a serial connection must be considered a DCEo This requires placing a clocking signal – use the clock rate command.o Example:
R1(config)#interface serial 0/0 R1(config-if)#clockrate 64000
o Serial Interfaces require a clock signal to control the timing of thecommunications
Routing Table and CDP Protocol
• Purpose of the debug ip routing commando Allows you to view changes that the router performs when adding or removing
routeso Example:
R2#debug ip routing IP routing debugging is on
• To configure an Ethernet interfaceo Example:
R2(config)#interface fastethernet 0/0 R2(config-if)#ip address 172.16.1.1 255.255.255.0 R2(config-if)#no shutdown
• When a router only has its interfaces configured & no other routing protocols areconfigured then:o The routing table contains only the directly connected networkso Only devices on the directly connected networks are reachable
• Checking each route in turno The ping command is used to check end to end connectivity
• Purpose of CDPo A layer 2 cisco proprietary tool used to gather information about other directly
connected Cisco devices
• Concept of neighborso 2 types of neighbors
Layer 3 neighbors Layer 2 neighbors
• CDP show commandso Show cdp neighbors command
Displays the following information:- Neighbor device ID
-
8/9/2019 Accessible PowerPoints
11/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 10
- Local interface- Holdtime value, in seconds- Neighbor device capability code-
Neighbor hardware platform- Neighbor remote port ID
o Show cdp neighbors detail command Useful in determining if an IP address configuration error
• Disabling CDPo To disable CDP globally use the following command
Router(config)#no cdp run
Static Routes with Exit Interfaces
• Purpose of a static routeo A manually configured route used when routing from a network to a stub network
•
IP route commando To configure a static route use the following command: ip routeo Example:
Router(config)# ip route network-address subnet-mask {ip-address | exit-interface
• Dissecting static route syntaxo ip route - Static route commando 172.16.1.0 – Destination network addresso 255.255.255.0 - Subnet mask of destination networko 172.16.2.2 - Serial 0/0/0 interface IP address on R2, which is the "next-hop" to
this network•
Configuring routes to 2 or more remote networkso Use the following commands for R1
R1(config)#ip route 192.168.1.0 255.255.255.0 172.16.2.2 R1(config)#ip route 192.168.2.0 255.255.255.0 172.16.2.2
• Zinin’s 3 routing principleso Principle 1: "Every router makes its decision alone, based on the information it
has in its own routing table.“o Principle 2: "The fact that one router has certain information in its routing table
does not mean that other routers have the same information.“o Principle 3: "Routing information about a path from one network to another does
not provide routing information about the reverse, or return path."
• Using Zinin’s 3 routing principles, how would you answer the following?o Would packets from PC1 reach their destination?
Yes, packets destined for 172.16.1.0/24 and 192.168.1.0/24 networks wouldreach their destination.
o Does this mean that any packets from these networks destined for 172.16.3.0/24network will reach their destination? No, because neither R2 nor R3 router has a route to the 172.16.3.0/24
network.
-
8/9/2019 Accessible PowerPoints
12/54
-
8/9/2019 Accessible PowerPoints
13/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 12
• Default Static Routeo This is a route that will match all packets. Stub routers that have a number of
static routes all exiting the same interface are good candidates for a default
route. Like route summarization this will help reduce the size of the routing table• Configuring a default static route
o Similar to configuring a static route. Except that destination IP address andsubnet mask are all zeros
o Example: Router(config)#ip route 0.0.0.0 0.0.0.0 [exit-interface | ip-address ]
• Static routes and subnet maskso The routing table lookup process will use the most specific match when
comparing destination IP address and subnet mask• Default static routes and subnet masks
o Since the subnet mask used on a default static route is 0.0.0.0 all packets willmatch• Packet forwarding with static routes. (recall Zinin’s 3 routing principles)• Router 1
o Packet arrives on R1’s Fastethernet 0/0 interface R1 does not have a route tothe destination network, 192.168.2.0/24 R1 uses the default static route
• Packet forwarding with static routes. (recall Zinin’s 3 routing principles)• Router 2
o The packet arrives on the Serial 0/0/0 interface on R2.o R2 has a static route to 192.168.2.0/24 out Serial0/0/1
• Packet forwarding with static routes. (recall Zinin’s 3 routing principles)
• Router 3o The packet arrives on the Serial0/0/1 interface on R3.o R3 has a connected route to 192.168.2.0/24 out Fastethernet 0/1
• Troubleshooting a Missing Route• Tools that can be used to isolate routing problems include:
o Ping– tests end to end connectivityo Traceroute– used to discover all of the hops (routers) along the path between 2
pointso Show IP route– used to display routing table & ascertain forwarding processo Show ip interface brief- used to show status of router interfaceso Show cdp neighbors detail– used to gather configuration information about
directly connected neighbors• Solving a Missing Route• Finding a missing or mis-configured route requires methodically using the correct
toolso Start with PING. If ping fails then use traceroute to determine where packets are
failing to arrive• Issue: show ip route to examine routing table
-
8/9/2019 Accessible PowerPoints
14/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 13
o If there is a problem with a mis-configured static route remove the static routethen reconfigure the new static route
• Solving a Missing Route
Summary
• Routerso Operate at layer 3o Functions include best path selection & forwarding packets
• Connecting Networkso WANs
Serial cables are connected to router serial ports. In the lab environmentclock rates must be configured for DCE.
o LANs Straight through cables or cross over cables are used to connect to
fastethernet port. (The type of cable used depends on what devices arebeing connected).• Cisco Discovery Protocol
o A layer 2 proprietary protocolo Used to discover information about directly connected Cisco devices
• Static Routeso This is a manually configured path that specifies how the router will get to a
certain point using a certain path.• Summary static routes
o This is several static routes that have been condensed into a single static route.• Default route
o It is the route packets use if there is no other possible match for their destinationin the routing table.
• Forwarding of packets when static route is usedo Zinin’s 3 routing principles describe how packets are forwarded.
• Troubleshooting static routes may require some of the following commands:o Pingo Tracerouteo Show IP routeo Show ip interface briefo Show cdp neighbors detail
Chapter 3 – Introduction to Dynamic Routing Protocol
Objectives
• Describe the role of dynamic routing protocols and place these protocols in thecontext of modern network design.
• Identify several ways to classify routing protocols.
-
8/9/2019 Accessible PowerPoints
15/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 14
• Describe how metrics are used by routing protocols and identify the metric typesused by dynamic routing protocols.
• Determine the administrative distance of a route and describe its importance in the
routing process.• Identify the different elements of the routing table.
Dynamic Routing Protocols
• Function(s) of Dynamic Routing Protocols:o Dynamically share information between routers.o Automatically update routing table when topology changes.o Determine best path to a destination
• The purpose of a dynamic routing protocol is to:o Discover remote networkso Maintaining up-to-date routing information
o Choosing the best path to destination networkso Ability to find a new best path if the current path is no longer available
• Components of a routing protocolo Algorithm
In the case of a routing protocol algorithms are used for facilitating routinginformation and best path determination
o Routing protocol messages These are messages for discovering neighbors and exchange of routing
information• Advantages of static routing
o It can backup multiple interfaces/networks on a router
o Easy to configureo No extra resources are neededo More secure
• Disadvantages of static routingo Network changes require manual reconfigurationo Does not scale well in large topologies
Classifying Routing Protocols
• Dynamic routing protocols are grouped according to characteristics. Examplesinclude:o RIP
o IGRPo EIGRPo OSPFo IS-ISo BGP
• Autonomous System is a group of routers under the control of a single authority• Types of routing protocols:
o Interior Gateway Protocols (IGP)
-
8/9/2019 Accessible PowerPoints
16/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 15
o Exterior Gateway Protocols (EGP)• Interior Gateway Routing Protocols (IGP)
o Used for routing inside an autonomous system & used to route within the
individual networks themselves.o Examples: RIP, EIGRP, OSPF
• Exterior Routing Protocols (EGP)o Used for routing between autonomous systemso Example: BGPv4
• IGP: Comparison of Distance Vector & Link State Routing Protocolso Distance vector
routes are advertised as vectors of distance & direction incomplete view of network topology Generally, periodic updates
o Link state complete view of network topology is created updates are not periodic
• Classful routing protocolso Do NOT send subnet mask in routing updates
• Classless routing protocolso Do send subnet mask in routing updates
• Convergence is defined as when all routers’ routing tables are at a state ofconsistency
Routing Protocols Metrics
• Metric
o A value used by a routing protocol to determine which routes are better thanothers
• Metrics used in IP routing protocolso Bandwidtho Costo Delayo Hop counto Loado Reliability
• The Metric Field in the Routing Table• Metric used for each routing protocol
o RIP - hop counto IGRP & EIGRP - Bandwidth (used by default), Delay (used by default), Load,
Reliabilityo IS-IS & OSPF – Cost, Bandwidth (Cisco’s implementation)
• Load balancingo This is the ability of a router to distribute packets among multiple same cost
paths
-
8/9/2019 Accessible PowerPoints
17/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 16
Administrat ive Distance of a Route
• Purpose of a metrico It’s a calculated value used to determine the best path to a destination
•
Purpose of Administrative Distanceo It’s a numeric value that specifies the preference of a particular route
• Identifying the Administrative Distance (AD) in a routing tableo It is the first number in the brackets in the routing table
• Dynamic Routing Protocols• Directly connected routes
o Have a default AD of 0 • Static Routes
o Administrative distance of a static route has a default value of 1• Directly connected routes
o Immediately appear in the routing table as soon as the interface is configured
Summary
• Dynamic routing protocols fulfill the following functionso Dynamically share information between routerso Automatically update routing table when topology changeso Determine best path to a destination
• Routing protocols are grouped as eithero Interior gateway protocols (IGP) Oro Exterior gateway protocols(EGP)
• Types of IGPs includeo Classless routing protocols - these protocols include subnet mask in routing
updateso Classful routing protocols - these protocols do not include subnet mask in routing
update• Metrics are used by dynamic routing protocols to calculate the best path to a
destination.• Administrative distance is an integer value that is used to indicate a router’s
“trustworthiness”• Components of a routing table include:
o Route sourceo Administrative distanceo Metric
Chapter 4 – Distance Vector Routing Protocols
Objectives
• Identify the characteristics of distance vector routing protocols.
-
8/9/2019 Accessible PowerPoints
18/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 17
• Describe the network discovery process of distance vector routing protocols usingRouting Information Protocol (RIP).
• Describe the processes to maintain accurate routing tables used by distance vector
routing protocols.• Identify the conditions leading to a routing loop and explain the implications for
router performance.• Recognize that distance vector routing protocols are in use today.
Distance Vector Routing Protocols
• Examples of Distance Vector routing protocols:o Routing Information Protocol (RIP)o Interior Gateway Routing Protocol (IGRP)o Enhanced Interior Gateway Routing Protocol (EIGRP)
• Distance Vector Technology
o The Meaning of Distance Vector: A router using distance vector routing protocols knows 2 things:
- Distance to final destination- Vector, or direction, traffic should be directed
• Characteristics of Distance Vector routing protocols:o Periodic updateso Neighborso Broadcast updateso Entire routing table is included with routing update
• Routing Protocol Algorithm:o Defined as a procedure for accomplishing a certain task
• Routing Protocol Characteristicso Criteria used to compare routing protocols includes
Time to convergence Scalability Resource usage Implementation & maintenance
Network Discovery
• Router initial start up (Cold Starts)o Initial network discovery
Directly connected networks are initially placed in routing table
• Initial Exchange of Routing Informationo If a routing protocol is configured then
Routers will exchange routing information• Routing updates received from other routers
o Router checks update for new information If there is new information:
- Metric is updated- New information is stored in routing table
-
8/9/2019 Accessible PowerPoints
19/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 18
• Exchange of Routing Informationo Router convergence is reached when
All routing tables in the network contain the same network informationo
Routers continue to exchange routing information If no new information is found then Convergence is reached• Convergence must be reached before a network is considered completely operable• Speed of achieving convergence consists of 2 interdependent categories
o Speed of broadcasting routing informationo Speed of calculating routes
Routing Table Maintenance
• Periodic Updates: RIPv1 & RIPv2o These are time intervals in which a router sends out its entire routing table
• RIP uses 4 timers
o Update timero Invalid timero Holddown timero Flush timer
• Bounded Updates: EIGRP• EIRPG routing updates are
o Partial updateso Triggered by topology changeso Boundedo Non periodic
• Triggered Updates
o Conditions in which triggered updates are sent Interface changes state Route becomes unreachable Route is placed in routing table
• Random Jittero Synchronized updates
A condition where multiple routers on multi access LAN segments transmitrouting updates at the same time
Problems with synchronized updates- Bandwidth consumption- Packet collisions
Solution to problems with synchronized updates- Used of random variable called RIP_JITTER
Routing Loops
• Routing loops areo A condition in which a packet is continuously transmitted within a series of
routers without ever reaching its destination.• Routing loops may be caused by:
-
8/9/2019 Accessible PowerPoints
20/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 19
o Incorrectly configured static routeso Incorrectly configured route redistributiono Slow convergenceo
Incorrectly configured discard routes• Routing loops can create the following issues
o Excess use of bandwidtho CPU resources may be strainedo Network convergence is degradedo Routing updates may be lost or not processed in a timely manner.
• Count to Infinityo This is a routing loop whereby packets bounce infinitely around a network.
• Setting a maximum• Distance Vector routing protocols set a specified metric value to indicate infinity.
o Once a router “counts to infinity” it marks the route as unreachable.
• Preventing loops with holddown timerso Holddown timers allow a router to not accept any changes to a route for a
specified period of time.o Point of using holddown timers
Allows routing updates to propagate through network with the most currentinformation.
• The Split Horizon Rule is used to prevent routing loops• Split Horizon rule:
o A router should not advertise a network through the interface from which theupdate came.
• Split horizon with poison reverse
o The rule states that once a router learns of an unreachable route through aninterface, advertise it as unreachable back through the same interface.
• IP & TTLo Purpose of the TTL field
The TTL field is found in an IP header and is used to prevent packets fromendlessly traveling on a network.
o How the TTL field works TTL field contains a numeric value
- The numeric value is decreased by one by every router on the route to thedestination. If numeric value reaches 0 then Packet is discarded.
Routing Protocols Today
• Factors used to determine whether to use RIP or EIGRP includeo Network sizeo Compatibility between models of routerso Administrative knowledge
• RIPo Features of RIP:
-
8/9/2019 Accessible PowerPoints
21/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 20
Supports split horizon & split horizon with poison reverse Capable of load balancing Easy to configure Works in a multi vendor router environment
• EIGRPo Features of EIGRP:
Triggered updates EIGRP hello protocol used to establish neighbor adjacencies
- Supports VLSM & route summarization- Use of topology table to maintain all routes- Classless distance vector routing protocol- Cisco proprietary protocol
Summary
•
Characteristics of Distance Vector routing protocolso Periodic updateso RIP routing updates include the entire routing tableo Neighbors are defined as routers that share a link and are configured to use the
same protocol• The network discovery process for D.V. routing protocol
o Directly connected routes are placed in routing table 1sto If a routing protocol is configured then
Routers will exchange routing informationo Convergence is reached when all network routers have the same network
information•
D.V. routing protocols maintains routing tables byo RIP sending out periodic updateso RIP using 4 different timers to ensure information is accurate and convergence
is achieved in a timely mannero EIGRP sending out triggered updates
• D.V. routing protocols may be prone to routing loopso Routing loops are a condition in which packets continuously traverse a networko Mechanisms used to minimize routing loops include defining maximum hop
count, holddown timers, split horizon, route poisoning and triggered updates• Conditions that can lead to routing loops include
o Incorrectly configured static routes
o Incorrectly configured route redistributiono Slow convergenceo Incorrectly configured discard routes
• How routing loops can impact network performance includes:o Excess use of bandwidtho CPU resources may be strainedo Network convergence is degradedo Routing updates may be lost or not processed
-
8/9/2019 Accessible PowerPoints
22/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 21
• Routing Information Protocol (RIP)o A distance vector protocol that has 2 versions
RIPv1 – a classful routing protocol RIPv2 - a classless routing protocol
o Enhanced Interior Gateway Routing Protocol (EIGRP) A distance vector routing protocols that has some features of link state routing
protocols A Cisco proprietary routing protocol
Chapter 5 – RIP version 1
Objectives
• Describe the functions, characteristics, and operation of the RIPv1 protocol.• Configure a device for using RIPv1.• Verify proper RIPv1 operation.• Describe how RIPv1 performs automatic summarization.• Configure, verify, and troubleshoot default routes propagated in a routed network
implementing RIPv1.• Use recommended techniques to solve problems related to RIPv1.
RIPv1
• RIP Characteristicso A classful, Distance Vector (DV) routing protocolo Metric = hop counto Routes with a hop count > 15 are unreachableo Updates are broadcast every 30 seconds
• RIP Message Format• RIP header - divided into 3 fields
o Command fieldo Version fieldo Must be zero
• Route Entry - composed of 3 fieldso Address family identifiero IP addresso Metric RIP Operation
• RIP uses 2 message types:o Request message
This is sent out on startup by each RIP enabled interface Requests all RIP enabled neighbors to send routing table
o Response message Message sent to requesting router containing routing table
-
8/9/2019 Accessible PowerPoints
23/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 22
• IP addresses initially divided into classeso Class Ao Class Bo
Class C• RIP is a classful routing protocol
o Does not send subnet masks in routing updates• Administrative Distance
o RIP’s default administrative distance is 120
Basic RIPv1 Configuration
• A typical topology suitable for use by RIPv1 includes:o Three router set upo No PCs attached to LANso Use of 5 different IP subnets
• Router RIP Commando To enable RIP enter:
Router rip at the global configuration prompt Prompt will look like R1(config-router)#
• Specifying Networkso Use the network command to:
Enable RIP on all interfaces that belong to this network Advertise this network in RIP updates sent to other routers every 30 seconds
Verification and Troubleshooting
• Show ip Route
• To verify and troubleshoot routingo Use the following commands:
show ip route show ip protocols debug ip rip
• show ip protocols commando Displays routing protocol configured on router
• Debug ip rip command o Used to display RIP routing updates as they are happening
• Passive interface command o Used to prevent a router from sending updates through an interface
o Example: Router(config-router)#passive-interface interface-type interface-number
• Passive interfaces
Automat ic Summarization
• Modified Topologyo The original scenario has been modified such that:
Three classful networks are used:
-
8/9/2019 Accessible PowerPoints
24/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 23
- 172.30.0.0/16- 192.168.4.0/24- 192.168.5.0/24
The 172.30.0.0/16 network is subnetted into three subnets:
- 172.30.1.0/24- 172.30.2.0/24- 172.30.3.0/24
The following devices are part of the 172.30.0.0/16 classful network address:- All interfaces on R1- S0/0/0 and Fa0/0 on R2
• Configuration Detailso To remove the RIP routing process use the following command
No router ripo To check the configuration use the following command
Show run
• Boundary Routerso RIP automatically summarizes classful networkso Boundary routers summarize RIP subnets from one major network to another
• Processing RIP Updateso 2 rules govern RIPv1 updates:
If a routing update and the interface it’s received on belong to the samenetwork then- The subnet mask of the interface is applied to the network in the routing
update If a routing update and the interface it’s received on belong to a different
network then- The classful subnet mask of the network is applied to the network in the
routing update.• Sending RIP Updates
o RIP uses automatic summarization to reduce the size of a routing table.• Advantages of automatic summarization:
o The size of routing updates is reducedo Single routes are used to represent multiple routes which results in faster
lookup in the routing table.• Disadvantage of Automatic Summarization:
o Does not support discontiguous networks
• Discontiguous Topologies do not converge with RIPv1• A router will only advertise major network addresses out interfaces that do not
belong to the advertised route.
Default Route and RIPv1
• Modified Topology: Scenario C• Default routes
-
8/9/2019 Accessible PowerPoints
25/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 24
o Packets that are not defined specifically in a routing table will go to the specifiedinterface for the default route
o Example: Customer routers use default routes to connect to an ISP router. Command used to configure a default route is ip route 0.0.0.0 0.0.0.0 s0/0/1
• Propagating the Default Route in RIPv1• Default-information originate command
o This command is used to specify that the router is to originate defaultinformation, by propagating the static default route in RIP update.
Summary
• RIP characteristics include:o Classful, distance vector routing protocolo Metric is Hop Counto Does not support VLSM or discontiguous subnets
o Updates every 30 seconds• Rip messages are encapsulated in a UDP segment with source and destination
ports of 520• Commands Used by RIP
o Rtr(config)#router rip Enables RIP routing process
o Rtr(config-router)#network Associates a network with a RIP routing process
o Rtr#debug ip rip used to view real time RIP routing updates
o Rtr(config-router)#passive-interface fa0/0
Prevent RIP updates from going out an interfaceo Rtr(config-router)#default-information originate
Used by RIP to propagate default routeso Rtr#show ip protocols
Used to display timers used by RIP
Chapter 6 – VLSM and CIDR
Objectives
• Compare and contrast classful and classless IP addressing.• Review VLSM and explain the benefits of classless IP addressing.• Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making
efficient use of scarce IPv4 addresses.
Introduction
• Prior to 1981, IP addresses used only the first 8 bits to specify the network portion ofthe address
-
8/9/2019 Accessible PowerPoints
26/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 25
• In 1981, RFC 791 modified the IPv4 32-bit address to allow for three differentclasses
• IP address space was depleting rapidly•
The Internet Engineering Task Force (IETF) introduced Classless Inter-DomainRouting (CIDR)o CIDR uses Variable Length Subnet Masking (VLSM) to help conserve address
space. VLSM is simply subnetting a subnet
Classful and Classless IP Addressing
• Classful IP addressing• As of January 2007, there are over 433 million hosts on internet• Initiatives to conserve IPv4 address space include:
o VLSM & CIDR notation (1993, RFC 1519)
o Network Address Translation (1994, RFC 1631)o Private Addressing (1996, RFC 1918)
• The High Order Bitso These are the leftmost bits in a 32 bit address
• Classes of IP addresses are identified by the decimal number of the 1st octeto Class A address begin with a 0 bit
Range of class A addresses = 0.0.0.0 to 127.255.255.255o Class B address begin with a 1 bit and a 0 bit
Range of class B addresses = 128.0.0.0 to 191.255.255.255o Class C addresses begin with two 1 bits & a 0 bit
Range of class C addresses = 192.0.0.0 to 223.255.255.255.
• The IPv4 Classful Addressing Structure (RFC 790)o An IP address has 2 parts:
The network portion- Found on the left side of an IP address
The host portion- Found on the right side of an IP address
• Purpose of a subnet masko It is used to determine the network portion of an IP address
• Classful Routing Updateso Recall that classful routing protocols (i.e. RIPv1) do not send subnet masks in
their routing updates.
The reason is that the Subnet mask is directly related to the network address• Classless Inter-domain Routing (CIDR – RFC 1517)
o Advantage of CIDR: More efficient use of IPv4 address space Route summarization
o Requires subnet mask to be included in routing update because address class ismeaningless Recall purpose of a subnet mask:
-
8/9/2019 Accessible PowerPoints
27/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 26
- To determine the network and host portion of an IP address• Classless IP Addressing• CIDR & Route Summarization
o Variable Length Subnet Masking (VLSM)o Allows a subnet to be further sub-netted according to individual needso Prefix Aggregation a.k.a. Route Summarizationo CIDR allows for routes to be summarized as a single route
• Classless Routing Protocol• Characteristics of classless routing protocols:
o Routing updates include the subnet masko Supports VLSMo Supports Route Summarization
Routing Protocol Routing Updates
Include SubnetMask
Supports VLSM Abili ty to Send
Supernet Routes
Classful No No NoClassless Yes Yes Yes
VLSM
• Classful routingo Only allows for one subnet mask for all networks
• VLSM & classless routingo This is the process of subnetting a subneto More than one subnet mask can be used
o More efficient use of IP addresses as compared to classful IP addressing• VLSM – the process of sub-netting a subnet to fit your needs
o Example: Subnet 10.1.0.0/16, 8 more bits are borrowed again, to create 256 subnets
with a /24 mask.- Mask allows for 254 host addresses per subnet- Subnets range from: 10.1.0.0 / 24 to 10.1.255.0 / 24
Classless Inter-Domain Routing (CIDR)
• Route summarization done by CIDRRoutes are summarized with masks that are less than that of the default classful mask
o Example: 172.16.0.0 / 13 is the summarized route for the 172.16.0.0 / 16 to 172.23.0.0 /
16 classful networks• Steps to calculate a route summary
o List networks in binary formato Count number of left most matching bits to determine summary route’s masko Copy the matching bits and add zero bits to determine the summarized network
address
-
8/9/2019 Accessible PowerPoints
28/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 27
Summary
• Classful IP addressingo
IPv4 addresses have 2 parts: Network portion found on left side of an IP address Host portion found on right side of an IP address
o Class A, B, & C addresses were designed to provide IP addresses for differentsized organizations
o The class of an IP address is determined by the decimal value found in the 1stoctet
o IP addresses are running out so the use of Classless Inter Domain Routing(CIDR) and Variable Length Subnet Mask (VLSM) are used to try and conserveaddress space
o Classful Routing Updates Subnet masks are not sent in routing updateso Classless IP addressing Benefit of classless IP addressing
- Can create additional network addresses using a subnet mask that fitsyour needs
Uses Classless Interdomain Routing (CIDR)• CIDR
o Uses IP addresses more efficiently through use of VLSM VLSM is the process of subnetting a subnet
o Allows for route summarization Route summarization is representing multiple contiguous routes with a single
route• Classless Routing Updates
o Subnet masks are included in updates
Chapter 7 – RIPv2
Objectives
• Encounter and describe the limitations of RIPv1’s limitations.• Apply the basic Routing Information Protocol Version 2 (RIPv2) configuration
commands and evaluate RIPv2 classless routing updates.• Analyze router output to see RIPv2 support for VLSM and CIDR.• Identify RIPv2 verification commands and common RIPv2 issues.• Configure, verify, and troubleshoot RIPv2 in “hands-on” labs.
Introduction
• Chapter focuso Difference between RIPv1 & RIPv2
RIPv1
-
8/9/2019 Accessible PowerPoints
29/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 28
- A classful distance vector routing protocol- Does not support discontiguous subnets- Does not support VLSM-
Does not send subnet mask in routing update- Routing updates are broadcast
RIPv2- A classless distance vector routing protocol that is an enhancement of
RIPv1’s features.- Next hop address is included in updates- Routing updates are multicast- The use of authentication is an option
o Similarities between RIPv1 & RIPv2 Use of timers to prevent routing loops Use of split horizon or split horizon with poison reverse
Use of triggered updates Maximum hop count of 15
RIPv1 Limitations
• Lab Topologyo Scenario:
3 router set up Topology is discontiguous There exists a static summary route Static route information can be injected into routing table updates using
redistribution.
Routers 1 & 3 contain VLSM networkso Scenario Continued VLSM
- Recall this is sub netting the subnet Private IP addresses are on LAN links Public IP addresses are used on WAN links Loopback interfaces
- These are virtual interfaces that can be pinged and added to routing table• Null Interfaces
o This is a virtual interface that does not need to be created or configured Traffic sent to a null interface is discarded
Null interfaces do not send or receive traffic• Static routes and null interfaces
o null interfaces will serve as the exit interface for static route Example of configuring a static supernet route with a null interface R2(config)#ip route 192.168.0.0 255.255.0.0 Null0
• Route redistributiono Redistribution command is way to disseminate a static route from one router to
another via a routing protocol
-
8/9/2019 Accessible PowerPoints
30/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 29
o Example R2(config-router)#redistribute static
• Verifying and Testing Connectivityo
Use the following commands: show ip interfaces brief ping traceroute
• RIPv1 – a classful routing protocolo Subnet mask are not sent in updateso Summarizes networks at major network boundarieso if network is discontiguous and RIPv1 configured convergence will not be
reached• Examining the routing tables
o To examine the contents of routing updates use the debug ip rip command
o If RIPv1 is configured then Subnet masks will not be included with the network address
• RIPv1 does not support VLSMo Reason: RIPv1 does not send subnet mask in routing updates
• RIPv1 does summarize routes to the Classful boundaryo Or uses the Subnet mask of the outgoing interface to determine which subnets to
advertise• No CIDR Support• In the diagram R2 will not include the static route in its update
o Reason: Classful routing protocols do not support CIDR routes that aresummarized with a smaller mask than the classful subnet mask
Configuring RIPv2
• Comparing RIPv1 & RIPv2 Message Formatso RIPv2 Message format is similar to RIPv1 but has 2 extensions
1st extension is the subnet mask field 2nd extension is the addition of next hop address
• Enabling and Verifying RIPv2• Configuring RIP on a Cisco router
o By default it is running RIPv1 Configuring RIPv2 on a Cisco router
- Requires using the version 2 command
- RIPv2 ignores RIPv1 updates
To verify RIPv2 is configured use the show ip protocols command• Auto-Summary & RIPv2• RIPv2 will automatically summarize routes at major network boundaries and can
also summarize routes with a subnet mask that is smaller than the classful subnetmask
• Disabling Auto-Summary in RIPv2• To disable automatic summarization issue the no auto-summary command
-
8/9/2019 Accessible PowerPoints
31/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 30
• Verifying RIPv2 Updates• When using RIPv2 with automatic summarization turned off
o Each subnet and mask has its own specific entry, along with the exit interface
and next-hop address to reach that subnet.• To verify information being sent by RIPv2 use the debug ip rip command
VLSM & CIDR
• RIPv2 and VLSM• Networks using a VLSM IP addressing scheme
o Use classless routing protocols (i.e. RIPv2) to disseminate network addressesand their subnet masks
• CIDR uses Supernettingo Supernetting is a bunch of contiguous classful networks that is addressed as a
single network.
o To verify that supernets are being sent and received use the following commands Show ip route Debug ip rip
Verifying & Troubleshooting RIPv2
• Basic Troubleshooting stepso Check the status of all linkso Check cablingo Check IP address & subnet mask configurationo Remove any unneeded configuration commands
• Commands used to verify proper operation of RIPv2
o Show ip interfaces briefo Show ip protocolso Debug ip ripo Show ip route
• Common RIPv2 Issues• When trouble shooting RIPv2 examine the following issues:
o Version Check to make sure you are using version 2
o Network statements Network statements may be incorrectly typed or missing
o Automatic summarization
If summarized routes are not needed then disable automatic summarization• Reasons why it’s good to authenticate routing information
o Prevent the possibility of accepting invalid routing updateso Contents of routing updates are encrypted
• Types of routing protocols that can use authenticationo RIPv2o EIGRPo OSPF
-
8/9/2019 Accessible PowerPoints
32/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 31
o IS-ISo BGP
Summary
RoutingProtocol
DistanceVector
Classless RoutingProtocol
Uses Hold- DownTimers
Use of SplitHorizon orSplit Horizonw/ PoisonReverse
RIPv1 Yes No Yes Yes
RIPv2 Yes Yes Yes Yes
RoutingProtocol
Max HopCount =15
AutoSummary
SupportsCIDR
SupportsVLSM
Uses Authentication
RIPv1 Yes Yes No No NoRIPv2 Yes Yes Yes Yes Yes
Chapter 8 – The Routing Table: A Closer Look
Objectives
• Describe the various route types found in the routing table structure.• Describe the routing table lookup process.• Describe routing behavior in routed networks.
Introduction
• Chapter Focus o Structure of the routing tableo Lookup process of the routing tableo Classless and classful routing behaviors
-
8/9/2019 Accessible PowerPoints
33/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 32
Routing Table Structure
• Lab Topology• 3 router setup
o R1 and R2 share a common 172.16.0.0/16 network with 172.16.0.0/24 subnets.o R2 and R3 are connected by the 192.168.1.0/24 network.o R3 also has a 172.16.4.0/24 subnet, which is disconnected, or discontiguous,
from the 172.16.0.0 network that R1 and R2 share.• Routing table entries come from the following sources
o Directly connected networkso Static routeso Dynamic routing protocols
• Level 1 Routes• As soon as the no shutdown command is issued the route is added to routing table• Cisco IP routing table is a hierarchical structure
o The reason for this is to speed up lookup process • Level 1 Routes• Have a subnet mask equal to or less than the classful mask of the network address.• Level 1 route can function as
o Default routeo Supernet routeo Network route
• Level 1 Routeso Ultimate Route
Includes either:- A next-hop address
OR - An exit interface
• Parent and Child Routeso A parent route is a level 1 routeo A parent route does not contain any next-hop IP address or exit interface
information• Automatic creation of parent routes
o Occurs any time a subnet is added to the routing table Child routes
- Child routes are level 2 routes- Child routes are a subnet of a classful network address
• Level 2 child routes contain route source & the network address of the route• Level 2 child routes are also considered ultimate routes
o Reason: they contain the next hop address &/or exit interface • Both child routes have the same subnet mask
o This means the parent route maintains the /24 mask• Diagram illustrates 2 child networks belonging to the parent route 172.16.0.0 / 24• In classless networks, child routes do not have to share the same subnet mask
-
8/9/2019 Accessible PowerPoints
34/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 33
NetworkType
Parent Route’sClassful Mask isDisplayed
Term VariablySubnetted isseen in Parent
Route in RoutingTable
Includes the #of DifferentMasks of Child
Routes
Subnet MaskIncluded witheach Child
Route Entry
Classful No No No NoClassless Yes Yes Yes Yes
• Parent & Child Routes: Classless Networks
Routing Table Lookup Process
• The Route Lookup Processo Examine level 1 routes
If best match a level 1 ultimate route and is not a parent route this route is
used to forward packeto Router examines level 2 (child) routes
If there is a match with level 2 child route then that subnet is used to forwardpacket
If no match then determine routing behavior typeo Router determines classful or classless routing behavior
If classful then packet is dropped If classless then router searches level one supernet and default routes If there exists a level 1 supernet or default route match then Packet is
forwarded. If not packet is dropped• Longest Match: Level 1 Network Routes
o Best match is also known as the longest matcho The best match is the one that has the most number of left most bits matching
between the destination IP address and the route in the routing table.• Finding the subnet mask used to determine the longest match
o Scenario: PC1 pings 192.168.1.2 Router examines level 1 route for best match There exist a match between192.168.1.2 & 192.168.1.0 / 24 Router forwards packets out s0/0/0
• The process of matchingo 1st there must be a match made between the parent route & destination IP
If a match is made then an attempt at finding a match between the destinationIP and the child route is made.
• Finding a match between packet’s destination IP address and the next route in therouting tableo The figure shows a match between the destination IP of 192.168.1.0 and the
level one IP of 192.168.1.0 / 24 then packet forwarded out s0/0/0• Level 1 Parent & Level 2 Child Routes• Before level 2 child routes are examined
-
8/9/2019 Accessible PowerPoints
35/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 34
o There must be a match between classful level one parent route and destinationIP address.
• After the match with parent route has been made Level 2 child routes will be
examined for a matcho Route lookup process searches for child routes with a match with destination IP
• How a router finds a match with one of the level 2 child routeso First router examines parent routes for a matcho If a match exists then:
Child routes are examined Child route chosen is the one with the longest match
• Example: Route Lookup Process with VLSMo The use of VLSM does not change the lookup processo If there is a match between destination IP address and the level 1 parent route
then
o Level 2 child routes will be searched
Routing Behavior
• Classful & classless routing protocolso Influence how routing table is populated
• Classful & classless routing behaviorso Determines how routing table is searched after it is filled
• Classful Routing Behavior: no ip classless• What happens if there is not a match with any level 2 child routes of the parent?
o Router must determine if the routing behavior is classless or classfulo If router is utilizing classful routing behavior then
Lookup process is terminated and packet is dropped• Classful Routing Behavior – Search Process• An example of when classful routing behavior is in effect and why the router drops
the Packeto The destination’s subnet mask is a /24 and none of the child routes left most bits
match the first 24 bits. This means packet is dropped• Classful Routing Behavior – Search Process• The reason why the router will not search beyond the child routes
o Originally networks were all classfulo This meant an organization could subnet a major network address and
“enlighten” all the organization’s routers about the subnetting
o Therefore, if the subnet was not in the routing table, the subnet did not exist andpacket was dropped
• ip Classless• Beginning with IOS 11.3, ip classless was configured by default• Classless routing behavior works for
o Discontiguous networks, ANDo CIDR supernets
• Classless Routing Behavior: ip classless
-
8/9/2019 Accessible PowerPoints
36/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 35
• Route lookup process when ip classless is in useo If classless routing behavior in effect then
Search level 1 routes Supernet routes Checked first
o If a match exists then forward packet Default routes Checked second
o If there is no match or no default route then the Packet is dropped
• Classless Routing Behavior – Search Process• Router begins search process by finding a match between destination IP and parent
routeo After finding the above mentioned match, then there is a search of the child route
• Classless Routing Behavior – Search Process• If no match is found in child routes of previous slide then
o Router continues to search the routing table for a match that may have fewer bitsin the match
• Classful vs. Classless Routing Behavioro It is recommended to use classless routing behavior
Reason: so supernet and default routes can be used whenever needed
Summary
• Content/structure of a routing tableo Routing table entries
Directly connected networks Static route
Dynamic routing protocolso Routing tables are hierarchical
Level 1 route - Have a subnet mask that is less than or equal to classful subnet mask for
the network address Level 2 route
- These are subnets of a network address• Routing table lookup process
o Begins with examining level 1 routes for best match with packet’s destination IPIf the best match = an ultimate route then Packet is forwarded
Parent route is examined- If parent route & destination IP match then Level 2 (child) routes are
examinedo Level 2 route examination
If a match between destination IP and child route found then Packetforwarded -Else
If Router is using classful routing behavior then Packet is dropped -Else If router is using classless routing behavior then
-
8/9/2019 Accessible PowerPoints
37/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 36
Router searches Level 1 supernet & default routes for a match If a match is found then Packet if forwarded -Else Packet is dropped
•
Routing behaviorso This refers to how a routing table is searched
• Classful routing behavioro Indicated by the use of the no ip classless commando Router will not look beyond child routes for a lesser match
• Classless routing behavioro Indicated by the use of the ip classless commando Router will look beyond child routes for a lesser match
Chapter 9 – EIGRP
Objectives
• Describe the background and history of Enhanced Interior Gateway Routing Protocol(EIGRP).
• Examine the basic EIGRP configuration commands and identify their purposes.• Calculate the composite metric used by EIGRP.• Describe the concepts and operation of DUAL.• Describe the uses of additional configuration commands in EIGRP.
EIGRP
• Roots of EIGRP: IGRPo Developed in 1985 to overcome RIPv1’s limited hop counto Distance vector routing protocolo Metrics used by IGRP
bandwidth (used by default) Delay (used by default) reliability load
o Discontinued support starting with IOS 12.2(13)T & 12.2(R1s4)S• EIGRP Message Format
o EIGRP Header Data link frame header - contains source and destination MAC address IP packet header - contains source & destination IP address EIGRP packet header - contains AS number Type/Length/Field - data portion of EIGRP message
o EIGRP packet header contains Opcode field Autonomous System number
o EIGRP Parameters contains
-
8/9/2019 Accessible PowerPoints
38/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 37
Weights Hold time
• TLV: IP internal containso
Metric fieldo Subnet mask fieldo Destination field
• TLV: IP external containso Fields used when external routes are imported into EIGRP routing process
• Protocol Dependent Modules (PDM) o EIGRP uses PDM to route several different protocols i.e. IP, IPX & AppleTalko PDMs are responsible for the specific routing task for each network layer protocol
• Reliable Transport Protocol (RTP)o Purpose of RTP
Used by EIGRP to transmit and receive EIGRP packets
o Characteristics of RTP Involves both reliable & unreliable delivery of EIGRP packet
- Reliable delivery requires acknowledgment from destination- Unreliable delivery does not require an acknowledgement from destination
Packets can be sent- Unicast- Multicast
Using address 224.0.0.10• EIGRP’s 5 Packet Types
o Hello packets Used to discover & form adjacencies with neighbors
o Update packets Used to propagate routing information
o Acknowledgement packets Used to acknowledge receipt of update, query & reply packets
o Query & Reply packets Used by DUAL for searching for networks Query packets
- Can use Unicast Multicast
Reply packet-
Use only Unicast• Purpose of Hello Protocol
o To discover & establish adjacencies with neighbor routers• Characteristics of hello protocol
o Time interval for sending hello packet Most networks it is every 5 seconds Multipoint non broadcast multi-access networks
-
8/9/2019 Accessible PowerPoints
39/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 38
- Unicast every 60 secondso Holdtime
This is the maximum time router should wait before declaring a neighbor
down Default holdtime- 3 times hello interval
• EIGRP Bounded Updateso EIGRP only sends update when there is a change in route statuso Partial update
A partial update includes only the route information that has changed – thewhole routing table is NOT sent
o Bounded update When a route changes, only those devices that are impacted will be notified
of the changeo
EIGRP’s use of partial bounded updates minimizes use of bandwidth• Diffusing Update Algorithm (DUAL)
o Purpose EIGRP’s primary method for preventing routing loops
o Advantage of using DUAL Provides for fast convergence time by keeping a list of loop-free backup
routes• Administrative Distance (AD)
o Defined as the trustworthiness of the source route• EIGRP default administrative distances
o Summary routes = 5o
Internal routes = 90o Imported routes = 170
• Authenticationo EIGRP can
Encrypt routing information Authenticate routing information
• Network Topologyo Topology used is the same as previous chapters with the addition of an ISP
router• EIGRP will automatically summarize routes at classful boundaries
Basic EIGRP Configuration• Autonomous System (AS) & Process IDs
o This is a collection of networks under the control of a single authority (referenceRFC 1930)
o AS Numbers are assigned by IANAo Entities needing AS numbers
ISP Internet Backbone providers
-
8/9/2019 Accessible PowerPoints
40/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 39
Institutions connecting to other institutions using AS numbers• EIGRP autonomous system number actually functions as a process ID• Process ID represents an instance of the routing protocol running on a router•
Exampleo Router(config)#router eigrp autonomous-system
• The router eigrp commando The global command that enables eigrp is router eigrp autonomous-system
All routers in the EIGRP routing domain must use the same process IDnumber (autonomous-system number)
• The Network Commando Functions of the network command
Enables interfaces to transmit & receive EIGRP updates Includes network or subnet in EIGRP updates
o Example
Router(config-router)#network network-address• The network Command with a Wildcard Mask
o This option is used when you want to configure EIGRP to advertise specificsubnets
o Example Router(config-router)#network network-address [wildcard-mask]
• Verifying EIGRPo EIGRP routers must establish adjacencies with their neighbors before any
updates can be sent or receivedo Command used to view neighbor table and verify that EIGRP has established
adjacencies with neighbors is
show ip eigrp neighbors • The show ip protocols command is also used to verify that EIGRP is enabled• Examining the Routing Table
o The show ip route command is also used to verify EIGRPo EIGRP routes are denoted in a routing table by the letter “D”o By default , EIGRP automatically summarizes routes at major network boundary
• Introducing the Null0 Summary Routeo Null0 is not a physical interfaceo In the routing table summary routes are sourced from Null0
Reason: routes are used for advertisement purposeso EIGRP will automatically include a null0 summary route as child route when 2
conditions are met At least one subnet is learned via EIGRP Automatic summarization is enabled
• R3’s routing table shows that the 172.16.0.0/16 network is automaticallysummarized by R1 & R3
EIGRP Metric Calculation
• EIGRP Composite Metric & the K Values
-
8/9/2019 Accessible PowerPoints
41/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 40
o EIGRP uses the following values in its composite metric Bandwidth, delay, reliability, and load
o The composite metric used by EIGRP formula used has values K1
K5
- K1 & K3 = 1- all other K values = 0
• Use the sh ip protocols command to verify the K values• EIGRP Metrics
o Use the show interfaces command to view metricso EIGRP Metrics
Bandwidth – EIGRP uses a static bandwidth to calculate metric Most serial interfaces use a default bandwidth value of 1.544Mbos (T1)
• EIGRP Metricso Delay is the defined as the measure of time it takes for a packet to traverse a
route It is a static value based on link type to which interface is connected
• Reliability (not a default EIGRP metric)o A measure of the likelihood that a link will failo Measure dynamically & expressed as a fraction of 255 the higher the fraction the
better the reliability• Load (not a default EIGRP metric)
o A number that reflects how much traffic is using a linko Number is determined dynamically and is expressed as a fraction of 255
The lower the fraction the less the load on the link• Using the Bandwidth Command
o Modifying the interface bandwidth Use the bandwidth command Example
- Router(config-if)#bandwidth kilobits o Verifying bandwidth
Use the show interface commando Note – bandwidth command does not change the link’s physical bandwidth
• The EIGRP metric can be determined by examining the bandwidth delay• EIGRP uses the lowest bandwidth (BW) in its metric calculation
o Calculated BW = reference BW / lowest BW(kbps) • Delay – EIGRP uses the cumulative sum of all outgoing interfaces
o Calculated Delay = the sum of outgoing interface delays• EIGRP Metric = calculated BW + calculated delay
DUAL Concepts
• The Diffusing Update Algorithm (DUAL) is used to prevent looping• Successor
o The best least cost route to a destination found in the routing table• Feasible distance
-
8/9/2019 Accessible PowerPoints
42/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 41
o The lowest calculated metric along a path to a destination network• Feasible Successors, Feasibility Condition & Reported Distance• Feasible Successor
o This is a loop free backup route to same destination as successor route• Reported distance (RD)
o The metric that a router reports to a neighbor about its own cost to that network• Feasibility Condition (FC)
o Met when a neighbor’s RD is less than the local router’s FD to the samedestination network
• Topology Table: Successor & Feasible Successor• EIGRP Topology table
o Viewed using the show ip eigrp topology command Contents of table include:
- all successor routes
- all feasible successor routes
• EIGRP Topology Table dissected• Topology Table: No Feasible Successor
o A feasible successor may not be present because the feasibility condition maynot be met In other words, the reported distance of the neighbor is greater than or equal
to the current feasible distance• Finite Sate Machine (FSM)
o An abstract machine that defines a set of possible states something can gothrough, what event causes those states and what events result form thosestates
o FSMs are used to describe how a device, computer program, or routing algorithmwill react to a set of input events
• DUAL FSMo Selects a best loop-free path to a destinationo Selects alternate routes by using information in EIGRP tables
• Finite State Machines (FSM)o To examine output from EIGRP’s finite state machine us the debug eigrp fsm
command
More EIGRP Configurations
• The Null0 Summary Routeo By default, EIGRP uses the Null0 interface to discard any packets that match the
parent route but do not match any of the child routeso EIGRP automatically includes a null0 summary route as a child route whenever
both of the following conditions exist One or subnets exists that was learned via EIGRP Automatic summarization is enabled
• Disabling Automatic Summarization
-
8/9/2019 Accessible PowerPoints
43/54
CCIISSCCOO,, IINNCC..R R OOUUTTIINNGG PPR R OOTTOOCCOOLLSS & & CCOONNCCEEPPTTSS
PPOOWWEER R PPOOIINNTT OOBBJJEECCTTII V VEESS
June 23, 2008 Page 42
o The auto-summary command permits EIGRP to automatically summarize atmajor network boundaries
o The no auto-summary command is used to disable automatic summarization This causes all EIGRP neighbors to send updates that will not beautomatically summarized
- This will cause changes to appear in both routing tables topology tables
• Manual Summarizationo Manual summarization can include supernets
Reason: EIGRP is a classless routing protocol & include subnet mask inupdate
o Command used to configure manual summarization Router(config-if)#ip summary-address eigrp as-number network-address
subnet-mask• Configuring a summary route in EIGRP• EIGRP Default Routes
o “quad zero” static default route Can be used with any currently supported routing protocol Is usually configured on a router that is connected a network outside the
EIGRP domaino EIGRP & the “Quad zero” static default route
Requires the use of the redistribute static command to disseminate defaultroute in EIGRP updates
• Fine-Tuning EIGRPo
EIGRP bandwidth utilization By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP
information The command to change the percentage of bandwidth used by EIGRP is
- Router(config-if)#ip bandwidth-percent eigrp as- number percent• Configuring Hello Intervals and Hold Times
o Hello intervals and hold times are configurable on a per-interface basiso The command to configure hello interval is
Router(config-if)#ip hello-interval eigrp as-number seconds• Changing the hello interval also requires changing the hold time to a value greater
than or equal to the hello interval
o The command to configure hold time value is Router(config-if)#ip hold-time eigrp as-number seconds
Summary
• Background & Historyo EIGRP is a derivati