SlideShare a Scribd company logo
1 of 30
Network +
Introduction to Networking
What is a network :
The word “ network “ means, “ two computers are connected using a
transmission media and are able to share their resources, transfer data.
The transmission media for the term network is either cable media or
wireless media.
Advantage of Networking :
1. Resource sharing : buy devices for all computers in same network, not
one device for one computer.
2. High reliability : all files can be copied to two or more machines, if one
goes down, we can use other.
3. Communication media : using the media. Two or more devices can be
interconnected to share resources & exchange information.
4. High speed : information can be synchronized when one user makes
changes to on line document, the other can see the change immediately.
Layer 3 Device. Works at the Network Layer
Forwards Data packets based on IP Address
This allows Routers to choose the best path thru the Network
Important Traffic regulating device on large Networks
Can have inbuilt security features-Firewall,Authentication.
1. A router is a device which is used in our network to
connect two different networks.
2. Routers, by default, will not forward any broadcasts.
3. Routers use the logical address in a network layer to
determine the next hop router or a host which is
located on a remote place.
4. Routers can use access lists, created by an
administrator, to control security on the types of
packets that are not allowed to enter or exit an
interface.
 The algorithm used for the routing protocols
defines the following processes:
 Mechanism for sending and receiving routing
information.
 Mechanism for calculating the best paths and installing
routes in the routing table.
 Mechanism for detecting and reacting to topology
changes.
 Classless (Use of VLSM) or Classful - Classless routing
protocols include the subnet mask in the updates.
 This feature supports the use of Variable Length Subnet Masking
(VLSM) and better route summarization.
 Classful routing protocols do not include the subnet mask and
cannot support VLSM.
 Time to Convergence - Time to convergence defines how
quickly the routers in the network topology share
routing information and reach a state of consistent
knowledge.
 The faster the convergence, the more preferable the protocol.
 Scalability - Scalability defines how large a network can
become based on the routing protocol that is deployed.
 The larger the network is, the more scalable the routing protocol
needs to be
 Resource Usage - Resource usage includes the
requirements of a routing protocol such as memory
space, CPU utilization, and link bandwidth
utilization
 Higher resource requirements necessitate more powerful
hardware to support the routing protocol operation in
addition to the packet forwarding processes.
 Implementation and Maintenance - Implementation
and maintenance describes the level of knowledge
that is required for a network administrator to
implement and maintain the network based on the
routing protocol deployed.
Static Routing
The command syntax
Ip route [ destination_network] [ Destination subnet mask ] [
<next hop ip address >or <exit interface type><No.> ]
This list describes each command in the string
ip route : the command used to create the static routing.
destination_network : the network you are placing in the
routing table.
mask : the subnet mask being used on the network.
next hop address : the address of the next hop router that will
receive the packet and forward it on the remote network.
 A router using a distance vector routing
protocol does not have the knowledge of the
entire path to a destination network.
 The router only knows
 The direction or interface in which packets should be
forwarded and
 The distance or how far it is to the destination
network
 Some distance vector routing protocols call for
the router to periodically broadcast the entire
routing table to each of its neighbors.
 This method is inefficient because the updates
not only consume bandwidth but also consume
router CPU resources to process the updates.
Distance Vector Routing Protocols
16
1. Each router establishes a relationship (“adjacency”)
with its neighbors
2.Each router generates link state advertisements (LSAs)
which are distributed to all routers
LSA = (link id, state of the link, cost, neighbors of the link)
3. Each router maintains a database of all received
LSAs (topological database or link state database), which
describes the network has a graph with weighted
edges
4. Each router uses its link state database to run a
shortest path algorithm (Dijikstra’s algorithm) to
produce the shortest path to each network
17
 With distance vector routing, each node has
information only about the next hop:
 Node A: to reach F go to B
 Node B: to reach F go to D
 Node D: to reach F go to E
 Node E: go directly to F
 Distance vector routing makes
poor routing decisions if
directions are not completely
correct
(e.g., because a node is down).
 If parts of the directions incorrect, the routing may be incorrect until the
routing algorithms has re-converged.
A B C
D E F
18
 In link state routing, each node has a complete map
of the topology
 If a node fails, each
node can calculate
the new route
 Difficulty: All nodes need to
have a consistent view of the
network
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP.
Because like IGRP, EIGRP uses the concept of an autonomous system to describe the
set of contiguous routers that run the same routing protocol and share routing
information. But unlike IGRP, EIGRP includes the subnet mask in its route updates.
EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum
hop count of 255.
There are no. of powerful features for EIGRP, the main ones are listed here :
It uses max hop count of 255
It is a classless routing protocol
It is sometimes referred to as a hybrid routing protocol
Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table.
EIGRP uses RTP ( Reliable Transport Protocol ) for communication
It uses Dual ( Diffusing update algorithm ) for the selection of best path
Supports all layer 3 protocols(IPv4,IPX and IPv6)
Supports VLSM/CIDR
Configuring OSPF :
These two elements are the basic elements of OSPF configuration :
Enabling OSPF
Configuring OSPF areas
Enabling OSPF
Router( config )# router ospf ?
<1-65535>
A value in the range 1-65535 identifies the ospf process ID. It’s a unique no.
on this router that groups a series of ospf configuration commands under a
specific process. Different ospf routers don’t have to use the same process ID
in order to communicate.
Configuring OSPF areas
Router# config t
Router( config t )# router ospf 1
Router( config – router )# network 10.0.0.0 0.255.255.255 area 0
ROUTING
ROUTING
ROUTING

More Related Content

What's hot

Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
Sudhansu Dash
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 

What's hot (20)

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Report on Router
Report on RouterReport on Router
Report on Router
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 

Similar to ROUTING

All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
Ravi Kodoli
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
sherifmeetme
 

Similar to ROUTING (20)

C0343015019
C0343015019C0343015019
C0343015019
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
four
fourfour
four
 
Group 1
Group 1Group 1
Group 1
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

ROUTING

  • 1.
  • 2. Network + Introduction to Networking What is a network : The word “ network “ means, “ two computers are connected using a transmission media and are able to share their resources, transfer data. The transmission media for the term network is either cable media or wireless media. Advantage of Networking : 1. Resource sharing : buy devices for all computers in same network, not one device for one computer. 2. High reliability : all files can be copied to two or more machines, if one goes down, we can use other. 3. Communication media : using the media. Two or more devices can be interconnected to share resources & exchange information. 4. High speed : information can be synchronized when one user makes changes to on line document, the other can see the change immediately.
  • 3. Layer 3 Device. Works at the Network Layer Forwards Data packets based on IP Address This allows Routers to choose the best path thru the Network Important Traffic regulating device on large Networks Can have inbuilt security features-Firewall,Authentication.
  • 4. 1. A router is a device which is used in our network to connect two different networks. 2. Routers, by default, will not forward any broadcasts. 3. Routers use the logical address in a network layer to determine the next hop router or a host which is located on a remote place. 4. Routers can use access lists, created by an administrator, to control security on the types of packets that are not allowed to enter or exit an interface.
  • 5.  The algorithm used for the routing protocols defines the following processes:  Mechanism for sending and receiving routing information.  Mechanism for calculating the best paths and installing routes in the routing table.  Mechanism for detecting and reacting to topology changes.
  • 6.
  • 7.  Classless (Use of VLSM) or Classful - Classless routing protocols include the subnet mask in the updates.  This feature supports the use of Variable Length Subnet Masking (VLSM) and better route summarization.  Classful routing protocols do not include the subnet mask and cannot support VLSM.  Time to Convergence - Time to convergence defines how quickly the routers in the network topology share routing information and reach a state of consistent knowledge.  The faster the convergence, the more preferable the protocol.  Scalability - Scalability defines how large a network can become based on the routing protocol that is deployed.  The larger the network is, the more scalable the routing protocol needs to be
  • 8.  Resource Usage - Resource usage includes the requirements of a routing protocol such as memory space, CPU utilization, and link bandwidth utilization  Higher resource requirements necessitate more powerful hardware to support the routing protocol operation in addition to the packet forwarding processes.  Implementation and Maintenance - Implementation and maintenance describes the level of knowledge that is required for a network administrator to implement and maintain the network based on the routing protocol deployed.
  • 9.
  • 10. Static Routing The command syntax Ip route [ destination_network] [ Destination subnet mask ] [ <next hop ip address >or <exit interface type><No.> ] This list describes each command in the string ip route : the command used to create the static routing. destination_network : the network you are placing in the routing table. mask : the subnet mask being used on the network. next hop address : the address of the next hop router that will receive the packet and forward it on the remote network.
  • 11.
  • 12.
  • 13.  A router using a distance vector routing protocol does not have the knowledge of the entire path to a destination network.  The router only knows  The direction or interface in which packets should be forwarded and  The distance or how far it is to the destination network
  • 14.  Some distance vector routing protocols call for the router to periodically broadcast the entire routing table to each of its neighbors.  This method is inefficient because the updates not only consume bandwidth but also consume router CPU resources to process the updates.
  • 16. 16 1. Each router establishes a relationship (“adjacency”) with its neighbors 2.Each router generates link state advertisements (LSAs) which are distributed to all routers LSA = (link id, state of the link, cost, neighbors of the link) 3. Each router maintains a database of all received LSAs (topological database or link state database), which describes the network has a graph with weighted edges 4. Each router uses its link state database to run a shortest path algorithm (Dijikstra’s algorithm) to produce the shortest path to each network
  • 17. 17  With distance vector routing, each node has information only about the next hop:  Node A: to reach F go to B  Node B: to reach F go to D  Node D: to reach F go to E  Node E: go directly to F  Distance vector routing makes poor routing decisions if directions are not completely correct (e.g., because a node is down).  If parts of the directions incorrect, the routing may be incorrect until the routing algorithms has re-converged. A B C D E F
  • 18. 18  In link state routing, each node has a complete map of the topology  If a node fails, each node can calculate the new route  Difficulty: All nodes need to have a consistent view of the network A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP. Because like IGRP, EIGRP uses the concept of an autonomous system to describe the set of contiguous routers that run the same routing protocol and share routing information. But unlike IGRP, EIGRP includes the subnet mask in its route updates. EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum hop count of 255. There are no. of powerful features for EIGRP, the main ones are listed here : It uses max hop count of 255 It is a classless routing protocol It is sometimes referred to as a hybrid routing protocol Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table. EIGRP uses RTP ( Reliable Transport Protocol ) for communication It uses Dual ( Diffusing update algorithm ) for the selection of best path Supports all layer 3 protocols(IPv4,IPX and IPv6) Supports VLSM/CIDR
  • 25.
  • 26.
  • 27. Configuring OSPF : These two elements are the basic elements of OSPF configuration : Enabling OSPF Configuring OSPF areas Enabling OSPF Router( config )# router ospf ? <1-65535> A value in the range 1-65535 identifies the ospf process ID. It’s a unique no. on this router that groups a series of ospf configuration commands under a specific process. Different ospf routers don’t have to use the same process ID in order to communicate. Configuring OSPF areas Router# config t Router( config t )# router ospf 1 Router( config – router )# network 10.0.0.0 0.255.255.255 area 0