SlideShare a Scribd company logo
Routing Protocol Basis
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Route technology is the key point that
internet is running continuously.
Route is a very interesting and complex
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 2
Route is a very interesting and complex
task, and eternal topic.
Upon completion of this course, you will be
able to :
Know the concept of route
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 3
Know the classification of routing
protocol
Understand the routing process of data
packet in the network
Understand the structure of routing table
What’s The Route?
A route is the path information to guide IP packets to be
transferred.
Destination
network N
E0/1
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 4
Other networks
E0/0 S0/0
E0/1
RTA
RTB
RTC
The Key Function of routing
Check the destination of the data packet
Confirm the information resource
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 5
Discover possible route
Select best route
Validate and maintain route information
Routing Table Establishment
E0/0
E1/0
10.1.1.0
192.168.2.0
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 6
protocol destination interface
DIRECT 10.1.1.0 E0/0
OSPF 192.168.2.0 E1/0
Routes—Discovered by Data Link Layer
[RTB]display ip routing-table
Routing Tables: Public
Destinations : 8 Routes : 8
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30
RTA
10.1.2.0/24
.1
.1 .2
.2
RTB
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 7
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0/0/0
10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
……
10.1.2.1/32 Direct 0 0 127.0.0.1 InLoopBack0
10.1.2.2/32 Direct 0 0 10.1.2.2 Serial0/0/1
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
RTC
Routes—Static Route
[RTA] display ip routing-table
Routing Tables: Public
RTB
2.2.2.2/32
10.1.1.0/30
RTA
.1 .2
Configure static route towards
destination network 2.2.2.2/32
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 8
Routing Tables: Public
Destinations : 8 Routes : 8
Destination/Mask Proto Pre Cost NextHop Interface
2.2.2.2/32 Static 60 0 10.1.2.2 Ethernet0
10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0
10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
10.1.1.2/32 Direct 0 0 10.1.1.2 Serial0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
Routes—Discovered by Dynamic Routing
Protocol
[RTB]display ip routing-table
Routing Tables: Public
10.1.2.0/24
.1
OSPF
RIP
RTA
RTC
172.16.1.1/32
.2
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 9
Routing Tables: Public
Destinations : 10 Routes : 10
Destination/Mask Proto Pre Cost NextHop Interface
10.1.1.0/30 Direct 0 0 10.1.1.2 Serial0/0/0
10.1.1.1/32 Direct 0 0 10.1.1.1 Serial0/0/0
……
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
172.16.1.1/32 OSPF 10 1563 10.1.2.2 Serial0/0/1
192.168.1.0/24 RIP 100 1 10.1.1.1 Serial0/0/0
10.1.1.0/8
RTB
.1
192.168.2.1/24
.2
Static and Dynamic Route
Static route Dynamic route
The route configured
manually by network
The route that router gets
from other routers via
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 10
manually by network
administrator
When network topological
is changed, administrator
need to update static route
routing protocol
When network topological
is changed, routers will
update route information
automatically
Routing Protocol
Routing protocol is like language that used to exchange information between
routers, routers shares network status and network reachable information via
routing protocol.
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 11
routing protocol.
The communication peers must run same protocols that used to exchange
routing information.
Routing protocol define a set of rules about communication between the routers
Routing protocol maintains routing table and provide the best forwarding path.
Routing Protocols Classification——Working
Area
IGPs:
:
:
:RIP OSPF ISIS
EGPs:
:
:
:BGP
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 12
AS100 AS200
Routing Protocols Classification——Protocol
Algorithm
According to protocol algorithm
Distance-Vector routing protocol
− It includes RIP and BGP. Thereinto, BGP is also called
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 13
− It includes RIP and BGP. Thereinto, BGP is also called
Path-Vector routing protocol.
Link-State routing protocol
− It is also called the shortest path first routing protocol,
includes OSPF and IS-IS.
Routing Protocols Classification——Service
Application
According to service application, routing protocol can be divide
into the following types:
Unicast Routing Protocol: includes RIP、OSPF、BGP and IS-
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 14
Unicast Routing Protocol: includes RIP、OSPF、BGP and IS-
IS and so on.
Multicast Routing Protocol : includes DVMRP、PIM-SM、PIM-
DM and so on.
Routing Table
[Quidway] display ip routing-table
Routing Tables:
Destination/Mask proto pref Metric Nexthop Interface
0.0.0.0/0 Static 60 0 120.0.0.2 Serial0/0
8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 15
8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1
9.0.0.0/8 OSPF 10 50 20.0.0.2 Ethernet0/0
9.1.0.0/16 RIP 100 4 120.0.0.2 Serial0/0
11.0.0.0/8 Static 60 0 120.0.0.2 Serial0/1
20.0.0.0/8 Direct 0 0 20.0.0.1 Ethernet0/2
20.0.0.1/32 Direct 0 0 127.0.0.1 LoopBack0
Preference of Routing Protocol
If there are multiple routes, the route with higher preference (the
smaller value, the higher preference) will be used to guide IP packet
to be transferred.
RIP OSPF
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 16
Routing table
10.0.0.0 R0
10.0.0.0 R1
10.0.0.0 R1
Preference of Routing Protocol
The default route preference on VRP platform is shown in the
following table
Routing protocol Preference
DIRECT 0
OSPF 10
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 17
OSPF 10
IS-IS 15
STATIC 60
RIP 100
OSPF ASE 150
IBGP 255
EBGP 255
Untrustworthy 255
Route Metric
There are two routes from router A to D :
Path1: A→B→C→D ,the total route metric is 9
Path2: A→E→F→C→D , the total route metric is 12
The router first selects the smaller metric route, and take it into the
routing table.
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 18
2
5 2
6
3
1
A
B D
F
C
E
routing table.
Equal Cost Multi-Path (ECMP)
Equal Cost Multi-Path
There are several routes towards the same destination with same route
metric, if the route preference is same, these routes are all added into the
routing table, IP packet will be transferred over these link by turns.
Two equal cost multi-path from A to D:
A→B→C→D,total metric 5+5+8=18
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 19
A→B→C→D,total metric 5+5+8=18
A→C→D, total metric 10+8=18
5
8
5
10
A
B
C D
Equal Cost Multi-Path
[RTB] display ip routing-table
Routing Tables: Public
Destinations : 13 Routes : 15
Destination/Mask Proto Pre Cost NextHop Interface
3.3.3.0/24 Direct 0 0 3.3.3.2 Serial2
3.3.3.1/32 Direct 0 0 3.3.3.1 Serial2
3.3.3.2/32 Direct 0 0 127.0.0.1 InLoopBack0
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 20
10.1.1.1/32 Static 60 0 1.1.1.1 Serial0
Static 60 0 2.2.2.1 Serial1
Static 60 0 3.3.3.1 Serial2
20.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0
127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
Equal Cost Multi-Path
realizes load-balance
The Longest Match
Destination makes
logical AND operation
Lookup routing table
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 21
match
logical AND operation
with mask
Compare the destination
address in the routing table
Select the longest
matched route
The Example of Longest Match
[Quidway] display ip routing-table
Routing Tables:
Destination/Mask proto pref Metric Nexthop Interface
0.0.0.0/0 Static 60 0 120.0.0.2 Serial0/0
The data packet of destination 9.1.2.1 will match the route 9.1.0.0/16
HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 22
8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1
9.0.0.0/8 OSPF 10 50 20.0.0.2 Ethernet0/0
9.1.0.0/16 RIP 100 4 120.0.0.2 Serial0/0
11.0.0.0/8 Static 60 0 120.0.0.2 Serial0/1
20.0.0.0/8 Direct 0 0 20.0.0.1 Ethernet0/2
20.0.0.1/32 Direct 0 0 127.0.0.1 LoopBack0
Thank You
www.huawei.com
T

More Related Content

Similar to 2) Routing Protocol Basis.pdf

Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview Questions
Duane Bodle
 
Umts transmission features presentation v1[1].0
Umts transmission features presentation v1[1].0Umts transmission features presentation v1[1].0
Umts transmission features presentation v1[1].0
Abi Putra Taufik
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.pptmashiur
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PROIDEA
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
Rebecca Buono
 
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol SupportCloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
VMware Tanzu
 
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptxRAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
MuhammadShahFaisal1
 
5G Transport Network Technology.pptx
5G Transport Network Technology.pptx5G Transport Network Technology.pptx
5G Transport Network Technology.pptx
ssuseraab93e
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
Dani Royman Simanjuntak
 
IRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port NetworkIRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port Network
IRJET Journal
 
Lte network planning_huawei_pdf
Lte network planning_huawei_pdfLte network planning_huawei_pdf
Lte network planning_huawei_pdf
NumanKapsal
 
289271089-Training-for-LTE-Parameter-Planning-V3.pdf
289271089-Training-for-LTE-Parameter-Planning-V3.pdf289271089-Training-for-LTE-Parameter-Planning-V3.pdf
289271089-Training-for-LTE-Parameter-Planning-V3.pdf
FrancescovanBeek1
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
ManuelRojas960410
 
Lipa sipto overview
Lipa sipto overviewLipa sipto overview
Lipa sipto overview
AmareshPrasadGrahach
 
Enabling Key Applications for Transport SDN - Optinet China 2020
Enabling Key Applications for Transport SDN - Optinet China 2020Enabling Key Applications for Transport SDN - Optinet China 2020
Enabling Key Applications for Transport SDN - Optinet China 2020
Leah Wilkinson
 

Similar to 2) Routing Protocol Basis.pdf (20)

Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview Questions
 
Umts transmission features presentation v1[1].0
Umts transmission features presentation v1[1].0Umts transmission features presentation v1[1].0
Umts transmission features presentation v1[1].0
 
ETE405-lec9.ppt
ETE405-lec9.pptETE405-lec9.ppt
ETE405-lec9.ppt
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPNPLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
PLNOG 4: Emil Gągała - Deploying Next-Generation Multicast VPN
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol SupportCloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
Cloud Foundry Summit 2015: Cloud Foundry and IoT Protocol Support
 
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptxRAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
RAO ABDUL KHALIQ-Probation Presentations-V1.0.pptx
 
5G Transport Network Technology.pptx
5G Transport Network Technology.pptx5G Transport Network Technology.pptx
5G Transport Network Technology.pptx
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
IRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port NetworkIRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port Network
 
Lte network planning_huawei_pdf
Lte network planning_huawei_pdfLte network planning_huawei_pdf
Lte network planning_huawei_pdf
 
289271089-Training-for-LTE-Parameter-Planning-V3.pdf
289271089-Training-for-LTE-Parameter-Planning-V3.pdf289271089-Training-for-LTE-Parameter-Planning-V3.pdf
289271089-Training-for-LTE-Parameter-Planning-V3.pdf
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
Lipa sipto overview
Lipa sipto overviewLipa sipto overview
Lipa sipto overview
 
Enabling Key Applications for Transport SDN - Optinet China 2020
Enabling Key Applications for Transport SDN - Optinet China 2020Enabling Key Applications for Transport SDN - Optinet China 2020
Enabling Key Applications for Transport SDN - Optinet China 2020
 
Networking
NetworkingNetworking
Networking
 
Bigbgp
BigbgpBigbgp
Bigbgp
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

2) Routing Protocol Basis.pdf

  • 1. Routing Protocol Basis HUAWEI TECHNOLOGIES CO., LTD. All rights reserved www.huawei.com
  • 2. Route technology is the key point that internet is running continuously. Route is a very interesting and complex HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 2 Route is a very interesting and complex task, and eternal topic.
  • 3. Upon completion of this course, you will be able to : Know the concept of route HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 3 Know the classification of routing protocol Understand the routing process of data packet in the network Understand the structure of routing table
  • 4. What’s The Route? A route is the path information to guide IP packets to be transferred. Destination network N E0/1 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 4 Other networks E0/0 S0/0 E0/1 RTA RTB RTC
  • 5. The Key Function of routing Check the destination of the data packet Confirm the information resource HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 5 Discover possible route Select best route Validate and maintain route information
  • 6. Routing Table Establishment E0/0 E1/0 10.1.1.0 192.168.2.0 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 6 protocol destination interface DIRECT 10.1.1.0 E0/0 OSPF 192.168.2.0 E1/0
  • 7. Routes—Discovered by Data Link Layer [RTB]display ip routing-table Routing Tables: Public Destinations : 8 Routes : 8 Destination/Mask Proto Pre Cost NextHop Interface 10.1.1.0/30 RTA 10.1.2.0/24 .1 .1 .2 .2 RTB HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 7 Destination/Mask Proto Pre Cost NextHop Interface 10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0/0/0 10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0 …… 10.1.2.1/32 Direct 0 0 127.0.0.1 InLoopBack0 10.1.2.2/32 Direct 0 0 10.1.2.2 Serial0/0/1 127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0 127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0 RTC
  • 8. Routes—Static Route [RTA] display ip routing-table Routing Tables: Public RTB 2.2.2.2/32 10.1.1.0/30 RTA .1 .2 Configure static route towards destination network 2.2.2.2/32 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 8 Routing Tables: Public Destinations : 8 Routes : 8 Destination/Mask Proto Pre Cost NextHop Interface 2.2.2.2/32 Static 60 0 10.1.2.2 Ethernet0 10.1.1.0/30 Direct 0 0 10.1.1.1 Serial0 10.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0 10.1.1.2/32 Direct 0 0 10.1.1.2 Serial0 127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0 127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0
  • 9. Routes—Discovered by Dynamic Routing Protocol [RTB]display ip routing-table Routing Tables: Public 10.1.2.0/24 .1 OSPF RIP RTA RTC 172.16.1.1/32 .2 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 9 Routing Tables: Public Destinations : 10 Routes : 10 Destination/Mask Proto Pre Cost NextHop Interface 10.1.1.0/30 Direct 0 0 10.1.1.2 Serial0/0/0 10.1.1.1/32 Direct 0 0 10.1.1.1 Serial0/0/0 …… 127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0 172.16.1.1/32 OSPF 10 1563 10.1.2.2 Serial0/0/1 192.168.1.0/24 RIP 100 1 10.1.1.1 Serial0/0/0 10.1.1.0/8 RTB .1 192.168.2.1/24 .2
  • 10. Static and Dynamic Route Static route Dynamic route The route configured manually by network The route that router gets from other routers via HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 10 manually by network administrator When network topological is changed, administrator need to update static route routing protocol When network topological is changed, routers will update route information automatically
  • 11. Routing Protocol Routing protocol is like language that used to exchange information between routers, routers shares network status and network reachable information via routing protocol. HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 11 routing protocol. The communication peers must run same protocols that used to exchange routing information. Routing protocol define a set of rules about communication between the routers Routing protocol maintains routing table and provide the best forwarding path.
  • 12. Routing Protocols Classification——Working Area IGPs: : : :RIP OSPF ISIS EGPs: : : :BGP HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 12 AS100 AS200
  • 13. Routing Protocols Classification——Protocol Algorithm According to protocol algorithm Distance-Vector routing protocol − It includes RIP and BGP. Thereinto, BGP is also called HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 13 − It includes RIP and BGP. Thereinto, BGP is also called Path-Vector routing protocol. Link-State routing protocol − It is also called the shortest path first routing protocol, includes OSPF and IS-IS.
  • 14. Routing Protocols Classification——Service Application According to service application, routing protocol can be divide into the following types: Unicast Routing Protocol: includes RIP、OSPF、BGP and IS- HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 14 Unicast Routing Protocol: includes RIP、OSPF、BGP and IS- IS and so on. Multicast Routing Protocol : includes DVMRP、PIM-SM、PIM- DM and so on.
  • 15. Routing Table [Quidway] display ip routing-table Routing Tables: Destination/Mask proto pref Metric Nexthop Interface 0.0.0.0/0 Static 60 0 120.0.0.2 Serial0/0 8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 15 8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1 9.0.0.0/8 OSPF 10 50 20.0.0.2 Ethernet0/0 9.1.0.0/16 RIP 100 4 120.0.0.2 Serial0/0 11.0.0.0/8 Static 60 0 120.0.0.2 Serial0/1 20.0.0.0/8 Direct 0 0 20.0.0.1 Ethernet0/2 20.0.0.1/32 Direct 0 0 127.0.0.1 LoopBack0
  • 16. Preference of Routing Protocol If there are multiple routes, the route with higher preference (the smaller value, the higher preference) will be used to guide IP packet to be transferred. RIP OSPF HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 16 Routing table 10.0.0.0 R0 10.0.0.0 R1 10.0.0.0 R1
  • 17. Preference of Routing Protocol The default route preference on VRP platform is shown in the following table Routing protocol Preference DIRECT 0 OSPF 10 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 17 OSPF 10 IS-IS 15 STATIC 60 RIP 100 OSPF ASE 150 IBGP 255 EBGP 255 Untrustworthy 255
  • 18. Route Metric There are two routes from router A to D : Path1: A→B→C→D ,the total route metric is 9 Path2: A→E→F→C→D , the total route metric is 12 The router first selects the smaller metric route, and take it into the routing table. HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 18 2 5 2 6 3 1 A B D F C E routing table.
  • 19. Equal Cost Multi-Path (ECMP) Equal Cost Multi-Path There are several routes towards the same destination with same route metric, if the route preference is same, these routes are all added into the routing table, IP packet will be transferred over these link by turns. Two equal cost multi-path from A to D: A→B→C→D,total metric 5+5+8=18 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 19 A→B→C→D,total metric 5+5+8=18 A→C→D, total metric 10+8=18 5 8 5 10 A B C D
  • 20. Equal Cost Multi-Path [RTB] display ip routing-table Routing Tables: Public Destinations : 13 Routes : 15 Destination/Mask Proto Pre Cost NextHop Interface 3.3.3.0/24 Direct 0 0 3.3.3.2 Serial2 3.3.3.1/32 Direct 0 0 3.3.3.1 Serial2 3.3.3.2/32 Direct 0 0 127.0.0.1 InLoopBack0 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 20 10.1.1.1/32 Static 60 0 1.1.1.1 Serial0 Static 60 0 2.2.2.1 Serial1 Static 60 0 3.3.3.1 Serial2 20.1.1.1/32 Direct 0 0 127.0.0.1 InLoopBack0 127.0.0.0/8 Direct 0 0 127.0.0.1 InLoopBack0 127.0.0.1/32 Direct 0 0 127.0.0.1 InLoopBack0 Equal Cost Multi-Path realizes load-balance
  • 21. The Longest Match Destination makes logical AND operation Lookup routing table HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 21 match logical AND operation with mask Compare the destination address in the routing table Select the longest matched route
  • 22. The Example of Longest Match [Quidway] display ip routing-table Routing Tables: Destination/Mask proto pref Metric Nexthop Interface 0.0.0.0/0 Static 60 0 120.0.0.2 Serial0/0 The data packet of destination 9.1.2.1 will match the route 9.1.0.0/16 HUAWEI TECHNOLOGIES CO., LTD.. All rights reserved Page 22 8.0.0.0/8 RIP 100 3 120.0.0.2 Serial0/1 9.0.0.0/8 OSPF 10 50 20.0.0.2 Ethernet0/0 9.1.0.0/16 RIP 100 4 120.0.0.2 Serial0/0 11.0.0.0/8 Static 60 0 120.0.0.2 Serial0/1 20.0.0.0/8 Direct 0 0 20.0.0.1 Ethernet0/2 20.0.0.1/32 Direct 0 0 127.0.0.1 LoopBack0