More Related Content
PPT
PDF
PPTX
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx PPTX
PPTX
PPT
Routing.pptbbbbbbbbbbbbbbbbbbbbbnbbnbbbbnbb PPTX
PPT
Similar to 33 Routing Basics for cisco networking and
PDF
PDF
introduction to network and computer security PPT
PPT
routing-Network182912222222222918298181.ppt PPT
Network_Layerengineering computer science.ppt PPT
Day 8 1 introducing routing n PPTX
PPTX
PPT
DOCX
PPT
PPTX
PPTX
Et3003 sem2-1314-9 network layers vi (routing protocols) PPTX
PPT
PPT
PPT
PPTX
PPT
09 module determinig ip routes PPTX
Recently uploaded
PDF
Achieving Interoperability in Healthcare IT: A Strategic Guide PDF
Artificial Intelligence(AI) full Book.pdf PDF
Video Infrastructure_ Streaming Architecture and Delivery Systems.pdf PPT
HDTV and DTV Standards: The United States Opts for a Digital HDTV Standard PDF
Beyond BBB: Practical Alternatives to Posterior Approximation in Bayesian Neu... PPTX
Pizza Chain Market Data Scraping for Better Insights Report.pptx PDF
What is Voice User Interface (VUI) Definition & Examples.pdf PPTX
Information about Trusted Platform Module(TPM) PDF
Xemelgo - RFID Industry Predictions for 2026 PPTX
Introduction to Computer Network Concepts.pptx PDF
Navigating the Spectrum of Advanced AI – Agentic, Autonomous, and Autopoietic... PDF
Small Business Automation: A Comprehensive Cost and ROI Guide PDF
MAD (1).pdf Mobile application develipment PPTX
Large Language Model. LLM Audit Artificial Intelligence PDF
Regenerative Agriculture Finance : Environmental impact PDF
A Brief Introduction About Christopher Elwell Woburn PDF
Ai In Courts Ai in courts AI in court AI in court PDF
250 Prompts - ChatGPT acting as your Assistant PPTX
AI Bot Traffic Surge: Retail Fraud Threat for Age-Restricted Websites PPTX
Compare and contrast types of attacks.pptx 33 Routing Basics for cisco networking and
- 1.
1
© CSS Corp| Confidential | www.csscorp.com
© CSS Corp | Confidential | www.csscorp.com
Routing Basics
- 2.
2
© CSS Corp| Confidential | www.csscorp.com
• Routing
• Routing Protocol
• Classful Subnetting
• Classful and Classless Updates
• Dynamic Routing protocol
• Distance Vector Protocols
• Link State Routing Protocols
Learning Objective
- 3.
3
© CSS Corp| Confidential | www.csscorp.com
Routing
• To route, a router needs to know:
• Destination addresses
• Sources it can learn from
• Possible routes
• Best route
• Maintain and verify routing information
- 4.
4
© CSS Corp| Confidential | www.csscorp.com
Routing
Routers must learn destinations that are not directly connected
- 5.
5
© CSS Corp| Confidential | www.csscorp.com
Static Routes
Configure unidirectional static routes to and from a
stub network to allow communications to occur
- 6.
6
© CSS Corp| Confidential | www.csscorp.com
Static Route Example
- 7.
- 8.
8
© CSS Corp| Confidential | www.csscorp.com
Routing Protocol
• Routing protocols are used
between routers to
determine paths and
maintain routing tables.
• Once the path is
determined a router can
route a routed protocol
- 9.
9
© CSS Corp| Confidential | www.csscorp.com
Autonomous Systems:
Interior or Exterior Routing Protocols
• An autonomous system is a collection of networks
under a common administrative domain
• IGPs operate within an autonomous system
• EGPs connect different autonomous systems
9
- 10.
10
© CSS Corp| Confidential | www.csscorp.com
Classes of Routing Protocols
- 11.
11
© CSS Corp| Confidential | www.csscorp.com
Distance Vector Routing Protocols
Pass periodic copies of routing table to neighbor routers
and accumulate distance vectors
- 12.
12
© CSS Corp| Confidential | www.csscorp.com
Distance Vector—Sources of Information
and Discovering Routes
Routers discover the best path to destinations from each neighbor
- 13.
13
© CSS Corp| Confidential | www.csscorp.com
Distance Vector—Selecting Best Route
with Metrics
- 14.
14
© CSS Corp| Confidential | www.csscorp.com
Maintaining Routing Information Problem
Each node maintains the distance from itself to each
possible destination network
- 15.
15
© CSS Corp| Confidential | www.csscorp.com
Maintaining Routing Information Problem
Slow convergence produces inconsistent routing
- 16.
16
© CSS Corp| Confidential | www.csscorp.com
Maintaining Routing Information Problem
Router C concludes that the best path to network
10.4.0.0 is through Router B
- 17.
17
© CSS Corp| Confidential | www.csscorp.com
Maintaining Routing Information Problem
Router A updates its table to reflect the new but
erroneous hop count
- 18.
18
© CSS Corp| Confidential | www.csscorp.com
Symptom: Counting to Infinity
• Packets for network 10.4.0.0 bounce between routers A, B, and C
• Hop count for network 10.4.0.0 counts to infinity
- 19.
19
© CSS Corp| Confidential | www.csscorp.com
Solution: Defining a Maximum
Define a limit on the number of hops to prevent infinite
loops
- 20.
20
© CSS Corp| Confidential | www.csscorp.com
Solution: Split Horizon
It is never useful to send information about a route back in
the direction from which the original packet came
- 21.
21
© CSS Corp| Confidential | www.csscorp.com
Solution: Route Poisoning
Routers set the distance of routes that have gone down to infinity
- 22.
22
© CSS Corp| Confidential | www.csscorp.com
Solution: Poison Reverse
- 23.
23
© CSS Corp| Confidential | www.csscorp.com
Solution: Hold-Down Timers
Router keeps an entry for the network possibly down
state, allowing time for other routers to recompute for this
topology change
- 24.
24
© CSS Corp| Confidential | www.csscorp.com
Solution: Triggered Updates
Router sends updates when a change in its routing table
occurs
- 25.
25
© CSS Corp| Confidential | www.csscorp.com
• Classful routing protocols do not include the subnet mask
with the route advertisement
• Within the same network, consistency of the subnet
masks is assumed
• Summary routes are exchanged between foreign networks
• Example of classful routing protocols:
RIPv1 (RIP Version 1)
IGRP
Classful Routing Review
- 26.
26
© CSS Corp| Confidential | www.csscorp.com
Classful Routes
• Sub network routes are shared by devices within the same
network
• Summary routes are exchanged between foreign networks
• Summary routes are automatically created at Class A, B, and C
network boundaries
- 27.
27
© CSS Corp| Confidential | www.csscorp.com
Classful Subnetting Requirements
• All router interfaces within the same network must have the same
subnet mask (Fixed-length subnet masking)
• This approach may not fully utilize available allocation of host
addresses
• All subnets of the same major network must be contiguous
- 28.
28
© CSS Corp| Confidential | www.csscorp.com
• Classless routing protocols include the subnet mask with the
route advertisement
• Classless routing protocols support Variable-length subnet
masking (VLSM)
• Summary routes can be manually controlled within the network
• Example of classless routing protocols:
OSPF
EIGRP
RIPv2
IS-IS
BGP
Classless Routing Overview
- 29.
29
© CSS Corp| Confidential | www.csscorp.com
Classless Subnetting Requirements
• Router interfaces within the same network can have different subnet masks
• Variable-length subnet masking (VLSM) is supported
• This approach maximizes allocation of available host addresses
- 30.
30
© CSS Corp| Confidential | www.csscorp.com
Classful and Classless Updates
- 31.
31
© CSS Corp| Confidential | www.csscorp.com
• A procedure for passing reachability information about networks to
other routers.
• A procedure for receiving reachability information from other routers
• A procedure for determining optimal routes based on the
reachability information it has and for recording this information in a
route table
• A procedure for reacting to, compensating for, and advertising
topology changes in an internetwork
• Note: Most routing protocols fall into one of two classes: distance
vector or link state.
Dynamic Routing protocol
- 32.
32
© CSS Corp| Confidential | www.csscorp.com
• Distance vector algorithms are based on the work done of
R. E. Bellman, L. R. Ford, and D. R. Fulkerson and for this
reason occasionally are referred to as Bellman-Ford or
Ford-Fulkerson algorithms.
• The name distance vector is derived from the fact that
routes are advertised as vectors of (distance, direction)
• Router depends on its neighbors for information, which
the neighbors in turn may have learned from their
neighbors, and so on, distance vector routing is
sometimes facetiously referred to as "routing by rumor."
Distance Vector Routing Protocols
- 33.
33
© CSS Corp| Confidential | www.csscorp.com
Distance Vector Protocols
With Distance Vector routing protocols, routers broadcast
their routing tables to its adjacent neighbors at periodic
intervals.
- 34.
34
© CSS Corp| Confidential | www.csscorp.com
• Routing Information Protocol (RIP) for IP
• Xerox Networking System's XNS RIP
• Novell's IPX RIP
• Cisco's Internet Gateway Routing Protocol (IGRP)
• DEC's DNA Phase IV
• AppleTalk's Routing Table Maintenance Protocol (RTMP)
Distance vector routing protocols
- 35.
35
© CSS Corp| Confidential | www.csscorp.com
• Periodic Updates
• Neighbors
• Broadcast Updates
• Full Routing Table Updates
• Routing by Rumor
• Route Invalidation Timers
• Split Horizon
• Counting to Infinity
• Triggered Updates
• Holddown Timers
Distance vector Routing Protocols
Characteristics
- 36.
36
© CSS Corp| Confidential | www.csscorp.com
• Routers originates information about itself, its directly
connected links and the state of those links.
• This information is passed around from router to router, each
router making a copy of it, but never changing it.
• The ultimate objective is that every router has identical
information about the internetwork, and each router will
independently calculate its own best paths.
• Link state protocols, sometimes called shortest path first or
distributed database protocols, are built around a well-known
algorithm from graph theory, E. W. Dijkstra'a shortest path
algorithm.
Link-State Routing Protocols Overview
- 37.
37
© CSS Corp| Confidential | www.csscorp.com
• Open Shortest Path First (OSPF) for IP
• The ISO's Intermediate System to Intermediate
• System (IS-IS) for CLNS and IP
• DEC's DNA Phase V
• Novell's NetWare Link Services Protocol (NLSP)
Link State Routing Protocols
- 38.
38
© CSS Corp| Confidential | www.csscorp.com
Link-State Routing Protocols Overview
- 39.
39
© CSS Corp| Confidential | www.csscorp.com
• Link-state routers keep track of
Their Neighbors
All the routers in the network, or at least within the same area
Best paths toward a destination
Basic Terms of Link-State Routing
Protocols
- 40.
40
© CSS Corp| Confidential | www.csscorp.com
• Neighbor table, formally known as an adjacency database
(list of neighbors we are aware of)
• Topology table, typically referred to as a link-state database
—LSDB (routers and links in the area/network)
• Routing table, commonly named a forwarding database (list
of best paths to destinations)
Basic Terms—Link-State Data
Structures
- 41.
41
© CSS Corp| Confidential | www.csscorp.com
• Routers find the best paths to destinations by applying the
Dijkstra Shortest Path First (SPF) algorithm to the link-state
database
Every router in the area places itself into the root of the tree
that is built
Best path is calculated with respect to the lowest
Total cost of links to a specific destination
Best routes are put into the forwarding database
Basic Terms—The Best Path Calculation
- 42.
42
© CSS Corp| Confidential | www.csscorp.com
Basic Terms—Link - State Environment
- 43.
43
© CSS Corp| Confidential | www.csscorp.com
• Link-state routing requires a hierarchical network structure
Enforced by some LS protocols (for example, OSPF)
Some LS protocols are more tolerant (IS-IS)
• Two level hierarchy—areas
Backbone or level-2 area
Non-backbone or level-1 area
Link-State Data Structure—Network
Hierarchy
- 44.
44
© CSS Corp| Confidential | www.csscorp.com
Link-State Data Structure—Network
Hierarchy Example
• Minimizes routing table entries
• Localizes impact of a topology change within an
area
- 45.
45
© CSS Corp| Confidential | www.csscorp.com
• The foundation for best-path calculation is the LS database
LS database has to be identical on all the routers in
the area—identical view
Routers know everything about their respective area
Routers know about the nearest exit point(s) to other
areas or other routing domains
LS Data Structures Link-State Database
- 46.
46
© CSS Corp| Confidential | www.csscorp.com
• Routers discover neighbors by exchanging Hello packets
Routers declare neighbors “UP” after checking some
parameters/options in the Hello packet
Some routers become adjacent
(tightly connected neighbors)—
“good neighbors”
Adjacent routers exchange topology information
LS Data Structures—Adjacency Database
- 47.
47
© CSS Corp| Confidential | www.csscorp.com
• Upon establishing neighbor relationship, routers exchange
their pictures of the network
Full picture—link-state database (LSDB)—is built by
link-state packets (LS packets)
LS packets report the states of links and routers
LS packets are flooded reliably throughout the area/ network
LS packets are sequenced, aged and periodically refreshed
LS Data Structures—Link-State Packets
- 48.
48
© CSS Corp| Confidential | www.csscorp.com
• Routers maintain the consistency of the link-state database
Routers check their neighbor relationship by
sending and receiving periodic hello packets
Routers report changes in the network (immediately/ depending
on timers)
Receivers of a link-state packet normally flood it further
Routers periodically resend their part of the “network map”
(even if no changes)
LS Data Structures—
Link-State Maintenance
- 49.
49
© CSS Corp| Confidential | www.csscorp.com
LS Data Structures—LS Advertisement
Operation
- 50.
50
© CSS Corp| Confidential | www.csscorp.com
• Benefits
Fast convergence—changes reported immediately by
the source affected
Robustness against routing loops:
— Routers know the topology
— LS packets are sequenced and acknowledged
By careful (hierarchical) network design, resources
can be utilized optimally
Benefits of Link-State Routing
- 51.
51
© CSS Corp| Confidential | www.csscorp.com
• Routing protocols are used between routers to determine
paths and maintain routing tables.
• Once the path is determined a router can route a routed
protocol.
• An autonomous system is a collection of networks under a
common administrative domain
• Classless routing protocols support Variable-length subnet
masking (VLSM)
• A procedure for passing reachability information about
networks to other routers.
• Distance vector algorithms are occasionally are referred
to as Bellman-Ford or Ford-Fulkerson algorithms.
Conclusion
- 52.
52
© CSS Corp| Confidential | www.csscorp.com
© CSS Corp
The information contained herein is subject to change without
notice. All other trademarks mentioned herein are the property of
their respective owners.
Thank You