SlideShare a Scribd company logo
1 of 30
Network +
Introduction to Networking
What is a network :
The word “ network “ means, “ two computers are connected using a
transmission media and are able to share their resources, transfer data.
The transmission media for the term network is either cable media or
wireless media.
Advantage of Networking :
1. Resource sharing : buy devices for all computers in same network, not
one device for one computer.
2. High reliability : all files can be copied to two or more machines, if one
goes down, we can use other.
3. Communication media : using the media. Two or more devices can be
interconnected to share resources & exchange information.
4. High speed : information can be synchronized when one user makes
changes to on line document, the other can see the change immediately.
Layer 3 Device. Works at the Network Layer
Forwards Data packets based on IP Address
This allows Routers to choose the best path thru the Network
Important Traffic regulating device on large Networks
Can have inbuilt security features-Firewall,Authentication.
1. A router is a device which is used in our network to
connect two different networks.
2. Routers, by default, will not forward any broadcasts.
3. Routers use the logical address in a network layer to
determine the next hop router or a host which is
located on a remote place.
4. Routers can use access lists, created by an
administrator, to control security on the types of
packets that are not allowed to enter or exit an
interface.
 The algorithm used for the routing protocols
defines the following processes:
 Mechanism for sending and receiving routing
information.
 Mechanism for calculating the best paths and installing
routes in the routing table.
 Mechanism for detecting and reacting to topology
changes.
 Classless (Use of VLSM) or Classful - Classless routing
protocols include the subnet mask in the updates.
 This feature supports the use of Variable Length Subnet Masking
(VLSM) and better route summarization.
 Classful routing protocols do not include the subnet mask and
cannot support VLSM.
 Time to Convergence - Time to convergence defines how
quickly the routers in the network topology share
routing information and reach a state of consistent
knowledge.
 The faster the convergence, the more preferable the protocol.
 Scalability - Scalability defines how large a network can
become based on the routing protocol that is deployed.
 The larger the network is, the more scalable the routing protocol
needs to be
 Resource Usage - Resource usage includes the
requirements of a routing protocol such as memory
space, CPU utilization, and link bandwidth
utilization
 Higher resource requirements necessitate more powerful
hardware to support the routing protocol operation in
addition to the packet forwarding processes.
 Implementation and Maintenance - Implementation
and maintenance describes the level of knowledge
that is required for a network administrator to
implement and maintain the network based on the
routing protocol deployed.
Static Routing
The command syntax
Ip route [ destination_network] [ Destination subnet mask ] [
<next hop ip address >or <exit interface type><No.> ]
This list describes each command in the string
ip route : the command used to create the static routing.
destination_network : the network you are placing in the
routing table.
mask : the subnet mask being used on the network.
next hop address : the address of the next hop router that will
receive the packet and forward it on the remote network.
 A router using a distance vector routing
protocol does not have the knowledge of the
entire path to a destination network.
 The router only knows
 The direction or interface in which packets should be
forwarded and
 The distance or how far it is to the destination
network
 Some distance vector routing protocols call for
the router to periodically broadcast the entire
routing table to each of its neighbors.
 This method is inefficient because the updates
not only consume bandwidth but also consume
router CPU resources to process the updates.
Distance Vector Routing Protocols
16
1. Each router establishes a relationship (“adjacency”)
with its neighbors
2.Each router generates link state advertisements (LSAs)
which are distributed to all routers
LSA = (link id, state of the link, cost, neighbors of the link)
3. Each router maintains a database of all received
LSAs (topological database or link state database), which
describes the network has a graph with weighted
edges
4. Each router uses its link state database to run a
shortest path algorithm (Dijikstra’s algorithm) to
produce the shortest path to each network
17
 With distance vector routing, each node has
information only about the next hop:
 Node A: to reach F go to B
 Node B: to reach F go to D
 Node D: to reach F go to E
 Node E: go directly to F
 Distance vector routing makes
poor routing decisions if
directions are not completely
correct
(e.g., because a node is down).
 If parts of the directions incorrect, the routing may be incorrect until the
routing algorithms has re-converged.
A B C
D E F
18
 In link state routing, each node has a complete map
of the topology
 If a node fails, each
node can calculate
the new route
 Difficulty: All nodes need to
have a consistent view of the
network
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP.
Because like IGRP, EIGRP uses the concept of an autonomous system to describe the
set of contiguous routers that run the same routing protocol and share routing
information. But unlike IGRP, EIGRP includes the subnet mask in its route updates.
EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum
hop count of 255.
There are no. of powerful features for EIGRP, the main ones are listed here :
It uses max hop count of 255
It is a classless routing protocol
It is sometimes referred to as a hybrid routing protocol
Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table.
EIGRP uses RTP ( Reliable Transport Protocol ) for communication
It uses Dual ( Diffusing update algorithm ) for the selection of best path
Supports all layer 3 protocols(IPv4,IPX and IPv6)
Supports VLSM/CIDR
Configuring OSPF :
These two elements are the basic elements of OSPF configuration :
Enabling OSPF
Configuring OSPF areas
Enabling OSPF
Router( config )# router ospf ?
<1-65535>
A value in the range 1-65535 identifies the ospf process ID. It’s a unique no.
on this router that groups a series of ospf configuration commands under a
specific process. Different ospf routers don’t have to use the same process ID
in order to communicate.
Configuring OSPF areas
Router# config t
Router( config t )# router ospf 1
Router( config – router )# network 10.0.0.0 0.255.255.255 area 0
ROUTING
ROUTING
ROUTING

More Related Content

What's hot

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocolCCNAStudyGuide
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routingMd. Mashiur Rahman
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK Amar Panchal
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 

What's hot (20)

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Report on Router
Report on RouterReport on Router
Report on Router
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 

Similar to ROUTING

Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 

Similar to ROUTING (20)

C0343015019
C0343015019C0343015019
C0343015019
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
four
fourfour
four
 
Group 1
Group 1Group 1
Group 1
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 

Recently uploaded

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 

Recently uploaded (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

ROUTING

  • 1.
  • 2. Network + Introduction to Networking What is a network : The word “ network “ means, “ two computers are connected using a transmission media and are able to share their resources, transfer data. The transmission media for the term network is either cable media or wireless media. Advantage of Networking : 1. Resource sharing : buy devices for all computers in same network, not one device for one computer. 2. High reliability : all files can be copied to two or more machines, if one goes down, we can use other. 3. Communication media : using the media. Two or more devices can be interconnected to share resources & exchange information. 4. High speed : information can be synchronized when one user makes changes to on line document, the other can see the change immediately.
  • 3. Layer 3 Device. Works at the Network Layer Forwards Data packets based on IP Address This allows Routers to choose the best path thru the Network Important Traffic regulating device on large Networks Can have inbuilt security features-Firewall,Authentication.
  • 4. 1. A router is a device which is used in our network to connect two different networks. 2. Routers, by default, will not forward any broadcasts. 3. Routers use the logical address in a network layer to determine the next hop router or a host which is located on a remote place. 4. Routers can use access lists, created by an administrator, to control security on the types of packets that are not allowed to enter or exit an interface.
  • 5.  The algorithm used for the routing protocols defines the following processes:  Mechanism for sending and receiving routing information.  Mechanism for calculating the best paths and installing routes in the routing table.  Mechanism for detecting and reacting to topology changes.
  • 6.
  • 7.  Classless (Use of VLSM) or Classful - Classless routing protocols include the subnet mask in the updates.  This feature supports the use of Variable Length Subnet Masking (VLSM) and better route summarization.  Classful routing protocols do not include the subnet mask and cannot support VLSM.  Time to Convergence - Time to convergence defines how quickly the routers in the network topology share routing information and reach a state of consistent knowledge.  The faster the convergence, the more preferable the protocol.  Scalability - Scalability defines how large a network can become based on the routing protocol that is deployed.  The larger the network is, the more scalable the routing protocol needs to be
  • 8.  Resource Usage - Resource usage includes the requirements of a routing protocol such as memory space, CPU utilization, and link bandwidth utilization  Higher resource requirements necessitate more powerful hardware to support the routing protocol operation in addition to the packet forwarding processes.  Implementation and Maintenance - Implementation and maintenance describes the level of knowledge that is required for a network administrator to implement and maintain the network based on the routing protocol deployed.
  • 9.
  • 10. Static Routing The command syntax Ip route [ destination_network] [ Destination subnet mask ] [ <next hop ip address >or <exit interface type><No.> ] This list describes each command in the string ip route : the command used to create the static routing. destination_network : the network you are placing in the routing table. mask : the subnet mask being used on the network. next hop address : the address of the next hop router that will receive the packet and forward it on the remote network.
  • 11.
  • 12.
  • 13.  A router using a distance vector routing protocol does not have the knowledge of the entire path to a destination network.  The router only knows  The direction or interface in which packets should be forwarded and  The distance or how far it is to the destination network
  • 14.  Some distance vector routing protocols call for the router to periodically broadcast the entire routing table to each of its neighbors.  This method is inefficient because the updates not only consume bandwidth but also consume router CPU resources to process the updates.
  • 16. 16 1. Each router establishes a relationship (“adjacency”) with its neighbors 2.Each router generates link state advertisements (LSAs) which are distributed to all routers LSA = (link id, state of the link, cost, neighbors of the link) 3. Each router maintains a database of all received LSAs (topological database or link state database), which describes the network has a graph with weighted edges 4. Each router uses its link state database to run a shortest path algorithm (Dijikstra’s algorithm) to produce the shortest path to each network
  • 17. 17  With distance vector routing, each node has information only about the next hop:  Node A: to reach F go to B  Node B: to reach F go to D  Node D: to reach F go to E  Node E: go directly to F  Distance vector routing makes poor routing decisions if directions are not completely correct (e.g., because a node is down).  If parts of the directions incorrect, the routing may be incorrect until the routing algorithms has re-converged. A B C D E F
  • 18. 18  In link state routing, each node has a complete map of the topology  If a node fails, each node can calculate the new route  Difficulty: All nodes need to have a consistent view of the network A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP. Because like IGRP, EIGRP uses the concept of an autonomous system to describe the set of contiguous routers that run the same routing protocol and share routing information. But unlike IGRP, EIGRP includes the subnet mask in its route updates. EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum hop count of 255. There are no. of powerful features for EIGRP, the main ones are listed here : It uses max hop count of 255 It is a classless routing protocol It is sometimes referred to as a hybrid routing protocol Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table. EIGRP uses RTP ( Reliable Transport Protocol ) for communication It uses Dual ( Diffusing update algorithm ) for the selection of best path Supports all layer 3 protocols(IPv4,IPX and IPv6) Supports VLSM/CIDR
  • 25.
  • 26.
  • 27. Configuring OSPF : These two elements are the basic elements of OSPF configuration : Enabling OSPF Configuring OSPF areas Enabling OSPF Router( config )# router ospf ? <1-65535> A value in the range 1-65535 identifies the ospf process ID. It’s a unique no. on this router that groups a series of ospf configuration commands under a specific process. Different ospf routers don’t have to use the same process ID in order to communicate. Configuring OSPF areas Router# config t Router( config t )# router ospf 1 Router( config – router )# network 10.0.0.0 0.255.255.255 area 0