- Basics of Routing
- Static Routing/Dynamic Routing
- Classification of Dynamic Routing
- Administrative Distance and Metric
- Link State Routing and Distance Vector Routing
- Routing Information Protocol (RIP)
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
NAT (network address translation) & PAT (port address translation)Netwax Lab
Network Address Translation (NAT) is designed for IP address conservation. It enables private IP
networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router,
usually connecting two networks together, and translates the private (not globally unique) addresses in
the internal network into legal addresses, before packets are forwarded to another network.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
NAT (network address translation) & PAT (port address translation)Netwax Lab
Network Address Translation (NAT) is designed for IP address conservation. It enables private IP
networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router,
usually connecting two networks together, and translates the private (not globally unique) addresses in
the internal network into legal addresses, before packets are forwarded to another network.
A
PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
CCNA is associate level career certification. It is an International certification course. Which is helpful to improve your career path in networking field. It gives lot of opportunity for Engineers and lots of opportunity having lots of job.
But now in these days,
This International course is offered by SMS Institute of Technology, Lucknow
So ,
There is no need to go anywhere for the training on CCNA Course Certification during summer Training.
I want to give this information because lots of people think about this course. But they have no any other way like - going to the training institute that offers CCNA Training But they give the certification on Own training Institute That is invalid Because CCNA is a International course Certification and these certificate are come on the email Id.
But Now this course Certification offers by SMS Institute of Technology But the certificate are valid through out the world.
Learn more at blog : --
https://solutionbyexpert.blogspot.com/2020/08/become-expert-secret-of-success-ii.html
#coding
#coding development skill program
#java
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesSubhajit Sahu
Highlighted notes while studying the Course:
Advanced Computer Networks
Article: All About Routers: Types Of Routers, Routing Table And IP Routing
By: SoftwareTestingHelp
About SoftwareTestingHelp
Helping our community since 2006! Most popular portal for Software professionals with 100 million+ visits and 300,000+ followers! You will absolutely love our tutorials on QA Testing, Development, Software Tools and Services Reviews and
more!
he Associate level of Cisco Certifications can begin directly with CCNA for network installation, operations and troubleshooting or CCDA for network design. Think of the Associate Level as the foundation level of networking certification.
CCNA is associate level career certification. It is an International certification course. Which is helpful to improve your career path in networking field. It gives lot of opportunity for Engineers and lots of opportunity having lots of job.
But now in these days,
This International course is offered by SMS Institute of Technology, Lucknow
So ,
There is no need to go anywhere for the training on CCNA Course Certification during summer Training.
I want to give this information because lots of people think about this course. But they have no any other way like - going to the training institute that offers CCNA Training But they give the certification on Own training Institute That is invalid Because CCNA is a International course Certification and these certificate are come on the email Id.
But Now this course Certification offers by SMS Institute of Technology But the certificate are valid through out the world.
Learn more at blog : --
https://solutionbyexpert.blogspot.com/2020/08/become-expert-secret-of-success-ii.html
#coding
#coding development skill program
#java
CCNA ppt designed on project remote connectivity using frame relay, and many more... best for project purpose. anyone want project will also contact me..
All About Routers: Types Of Routers, Routing Table And IP Routing : NotesSubhajit Sahu
Highlighted notes while studying the Course:
Advanced Computer Networks
Article: All About Routers: Types Of Routers, Routing Table And IP Routing
By: SoftwareTestingHelp
About SoftwareTestingHelp
Helping our community since 2006! Most popular portal for Software professionals with 100 million+ visits and 300,000+ followers! You will absolutely love our tutorials on QA Testing, Development, Software Tools and Services Reviews and
more!
What is the internet, really? It is a network of networks which are all interconnected to various degrees. Where they interconnect is typically at an internet exchange (IX) or internet exchange point (IXP). IX are important because they make the internet (and especially their user's networks) more resilient (robust and fault tolerant), more performant (higher bandwidth & lower latency), and quite often more cost effective. It's not difficult to connect to an IX but you do need to know the basic requirements, process, and best practices. You can also use a new open-source automation platform, called PeerCtl, to make connecting over an IX even easier.
These slides are from a talk I gave on 4 May 2023 in Albuquerque, NM, USA.
The talk covers:
* What is the Internet, really?
* What is an Internet Exchange (IX)?
* Why are IX’ (and interconnection) important?
* How-To Start Interconnecting
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
4. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 4
ROUTER BOOTUP PROCESS
Three stage process
Perform POST (Power On Self Test) and load Bootstrap Program
Locate and load the Cisco IOS software
Bootstrap Program performs this task
By default IOS is stored in flash memory
Locate Startup Configuration file or enter in Setup Mode.
Bootstrap searches for startup config (present in NVRAM)
Or else goes in Setup Mode.
6. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 6
EDITING COMMANDS FOR NETWORK GEEKS
Commands Explanation
Ctrl+A Moves the cursor to the begining of the line
Ctrl+E Moves the cursor to the end of the line
Esc+B Moves back one Word
Esc+F Moves forward one Word
Ctrl+R Redisplays a line
Ctrl+U Erases a line
Ctrl+W Erases a word
Ctrl+Z Ends configuration mode
TAB Finishes command for you
7. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 7
EDITING COMMANDS FOR NETWORK GEEKS
Commands Explanation
Ctrl+P Shows Last entered command
Ctrl+N Shows Previous commands entered
Show history Show last 10 commands entered by default
Show terminal Shows terminal configurations and history buffer size
Terminal history size Changes buffer size (max 256)
8. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 8
BASIC CONFIGURATION AND IMPORTANT
COMMANDS
Configuring Hostname:
Router(config)# hostname <NAME>
Configuring Banner:
Router(config)#banner motd ^c <TYPE THE BANNER>
Configuring Password:
Router(config)#enable password
Router(config)#enable secret
Interface configuration
Router(config)#
…and many more
10. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 10
ROUTING
IMPORTANT STATEMENTS:
For end to end communication, it is not enough to have only forwarding
path, but having reverse path is also important.
If you can reach one host on a network that does not mean you can reach all
hosts on that network.
Initially router knows only about its directly connected neighbors, hence
can only communicate with them.
Router must know the route to reach the destination network
11. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 11
STATIC vs DYNAMIC
There are two ways to provide routes to the router
Static Routing
Provide the route manually
Not very helpful in larger network
Better when there is a need to provide a specific route
Dynamic Routing
Configuring Routing Protocols on routers
Very useful in larger network
Calculates the best path automatically
12. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 12
LEARNING A ROUTE THROUGH MULTIPLE
ROUTING PROTOCOLS
PROBLEM:
If a route is learnt from static entry/any routing protocol and same is learnt from
other routing protocol and both paths are different, then which path to prefer?
SOLUTION:
Administrative Distance (AD)
This is a value associated with each routing protocol and also with static route.
Lower the AD value better the path.
So, the router will prefer the path dictated by the one with LOWER AD value.
13. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft 13
ONE ROUTING PROTOCOL MULTIPLE PATHS
PROBLEM:
If there is only one Routing Protocol running on the router and it receives two
different routes to reach same network, then which one to prefer?
SOLUTION:
Metric:
This is a value associated with the path. Every routing protocol has a way to
calculate its own metric. Lower the Metric Better the path and hence preferred.
14. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DYNAMIC ROUTING- ROUTING PROTOCOLS
Routing protocols can be categorized as
Interior Gateway Protocol
Exterior Gateway Protocol
Routing Protocols can also be categorized as
Classful Protocols
Classless Protocols
…and also as
Link state Routing
Distance Vector Routing
14
16. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CLASSFUL ROUTING
Classful Routing Protocols do not send subnet mask with
its route information
Classful Routing automatically summarizes the mask at
Classful boundaries.
May lead to Sub-optimal paths.
Examples of Classful Routing Protocols:
• RIP Version 1 (RIPv1)
• IGRP
16
18. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DISTANCE VECTOR ROUTING PROTOCOL
These are the protocols in which…
Updates are sent periodically (every 30/90 seconds)
Entire Routing Table is sent as an update
Updates are broadcasted
Updates are sent to directly connected neighbors only and not to
the entire group
Routers don’t have end-to-end visibility of the entire network,
Directly connected neighbors are the worlds
Convergence is slow.
RIP, IGRP and BGP are DISTANCE VECTOR Routing Protocols
18
19. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ROUTING INFORMATION PROTOCOL
Used for smaller networks
Metric: Hop Count
Maximum Hop Count: 15
Administrative Distance: 120
Load Balancing: over equal metric path (4 by default)
RIP versions: RIPv1 and RIPv2
RIPv1 sends updates on Broadcast address
RIPv2 sends updates on Multicast address 224.0.0.9
Encrypted Authentication between 2 RIPv2 routers
19
20. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
RIP TIMERS
• Update Timer: (default: 30 sec): Indicates how often the router will send out a routing
update
• Invalid Timer: (default: 180 sec): Indicates how long the route will remain in the
routing table before it gets invalid, if no new updates are received
• Hold-Down Timer: (default: 180 sec): Indicate how long RIP will suppress the route
that it has placed in HOLD state.
– HOLD state:
• Invalid timer has expired.
• Update received for a router marking that route with Metric 16 (unreachable)
• An update received from a router, with a higher metric than what is currently in
the routing table. (to prevent loops)
• Flush Timer: (default: 240 sec): Indicates how long a route can stay in the routing table
before its been flushed, if updates are not received
20
21. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
LINK STATE ROUTING PROTOCOL
These are the protocols in which
Updates are triggered and not periodic
Updates are incremental, entire routing table is not sent as a part of
routing update
Updates are sent as a multicast and not as broadcast
Convergence is fast as updates are triggered
Routers have end to end visibility of entire network through
topology table.
OSPF and ISIS are Link State Routing Protocols
21
22. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ADVANCED DISTANCE VECTOR ROUTING PROTOCOL
Combination of both Distance vector and Link State routing
protocols
Best features of both are used in this
Best feature of D.V Simple Configuration
Best feature of L.S triggered updates, convergence is fast
etc.
Used only in EIGRP
22
23. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL
(EIGRP)
Classless Routing Protocol
Cisco Proprietary Protocol
Advanced Distance Vector Protocol
Uses DUAL (Diffusion Update Algorithm) to determine Best Path to
reach destinations
Neighbors are formed with only directly connected routers
Mostly the EIGRP traffic is sent on Multicast Address 224.0.0.10
Updates are incremental and triggered
Summarization can be done on any router interface manually
Administrative Distance:
Internal EIGRP : Routes originating within local AS- 90
External EIGRP: Routes coming from outside AS- 170
Summary EIGRP: 5
23
24. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP
Maintains 3 tables
Neighbor Table: List of all neighbor routers
Topology Table: List of all routes in the AS
Routing Table: Best routes to reach all networks
Load Balancing:
Load balancing on unequal metric path is possible.
Default value: 4; Max Value: 6
24
25. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP OPERATION
When routers are up, they exchange Multicast Hellos.
Neighbor relation is formed after this exchange. Only directly
connected routers can become neighbors
Topology table will be exchanged, till every router reaches converged
state
After every router reaches converged state…
No more exchange of Topology table, only updates will be sent after
modification in the network topology.
EIGRP DUAL is run to find the best path to reach all networks
Multicast echoes are exchanged to check the connectivity (Keep
Alive)
25
26. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP METRIC
EIGRP is called COMPOSIT METRIC
Bandwidth (K1) and Delay of the line (K3) is used by default to
calculate the distance Metric
Reliability (K4/K5), MTU and Load (K2) are the other 3 parameters
that can be considered
By default:
EIGRP METRIC=
10000000
𝐵𝑊 (𝐾𝑏𝑝𝑠)
+ delay * 256
26
27. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
EIGRP- EXTRA
EIGRP elects Next Best path at the same time, when it elects BEST
PATH
Best Path is called as SUCCESSOR
Next Best Path is called as FEASIBLE SUCCESSOR
RULES:
For a path to be considered as a feasible successor, its Advertised
Distance should be less than current Feasible Distance.
For a path to be considered as a valid path, its AD should be less
than 2 times current FD
27
29. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OPEN SHORTEST PATH FIRST- OSPF
Linked State Routing Protocol
Metric: COST
Higher the Bandwidth Lower the Cost, Lower the Cost Better the Path.
𝐶𝑂𝑆𝑇 =
108
𝐵𝑊
Determine the Best Path to reach all networks: Dijkstra Shortest Path
Algorithm
AD Value: 110
Sends Mask as a part of updates hence supports VLSM
Updates are triggered
Load Balancing on EQUAL costs path
Multicast Address: 224.0.0.5 and 224.0.0.6
Every OSPF router carries the visibility of the entire network with the help of
Link State Database
29
31. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
THE PROBLEM
OSPF is a highly scalable protocol and can scale up to 1000s of routers.
Has end to end visibility every router knows about all routes to reach
entire networks
Updates are triggered after each Network Modification. This includes
addition/deletion of the route from routing table
High Process Utilization
High Bandwidth Utilization
High Memory Utilization
Solution: Summarization
31
33. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
CONCEPT OF AREA
All areas must connect to Area 0- One interface of ABR must
be connected to AREA 0
All routers in an area have the same Topology Table
Purpose: Localizing updates within a area
Automatic Summarization is done at the ABR/ASBR only
Hierarchical design is required
33
34. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF ROUTER ID
In OSPF neighbors are identified by their RIDs
RID is the highest IP of LOOPBACK interface.
In absence of LOOPBACK interface, it’s the IP of highest ACTIVE
INTERFACE when router starts
RID is also Hardcoded in the configuration using router id command-
Highest Preference
34
35. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF NEIGHBOR RELATIONSHIP
Determining own Router ID
Hardcoded
Loopback
Physical
Add interfaces to Link State Database dictated by Network Command
Send Hello on those interfaces
This is DOWN state: Sending Hello but still waiting to hear back
Receives Hello
Goes in INIT state
Checks: Hello/Dead timer, Authentication password, Area ID, Net mask
must be identical
Other parameters: DR/BDR IP address, Router ID and Router Priority
Reaches TWO WAY state.
35
36. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF NEIGHBOR RELATIONSHIP
Determines Master-Slave Relationship
Determines who will send the routing first
This is an EX_START ST
Higher priority Masters
Master sends Database Description Packets (DBD) like cliff notes
Slave sends DBDs
DBDs are Acknowledged and Reviewed
Router Goes in LOADING state
First slave reviews the DBD and asks for missing info through LINK STATE REQUEST
to Master
Master sends response in terms of LINK STATE UPDATES
Master sends LSR and Slave responds back with LSU
Neighbors are Synchronized
This is the FULL STATE
Now, Dijkstra’s SPF algorithm is applied to chose the Best Path and put it in the
routing table
Keep Alive are sent
36
37. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
DR/BDR
37
DR/BDR listen on 224.0.0.6
DROTHERS listen on 224.0.0.5
DR/BDR is only for shared segments
DR/BDR election is based on Router
Priority (Default: 1)
If Router Priority is equal then the
Tie Breaker is the Router ID
DROTHERS DO NOT need to
exchange their entire Routing info
with each other. Send it to only DR
and BDR
Hence can stuck in TWO WAY state
38. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
OSPF PACKETS
Hello:
Sent every 10/30 sec
Contains- Router ID, DR/BDR, Subnet Mask, Neighbors, Hello/Dead Intervals,
Auth Password, Router Priority, Area ID
Neighbor relationship formation and keep alive
Data-Base Description:
Cliff notes sent in Ex-start state
Link State Request:
Sent in Loading state for requesting detailed information about a Network
Link State Update:
Response LSR
Contain Multiple LSA
Link State Advertisement:
Response of each sub request
Link State Acknowledgement:
Reliability Mechanism
OSPF itself is a Reliability Protocol
38
39. contact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraftcontact@networkraft.com www.facebook.com/networkraft www.linkedin.com/company/networkraft
LSA TYPES
LSA 1 (Router LSA): contains a list of links local to the
router and generated by all the routers in the area
LSA 2 (Network LSA): Generated by DR, contains list of all
routers attached to it
LSA 3 (Network Summary LSA): Generated by ABRs; Used
for inter-area communication
LSA 4 (ASBR Summary LSA): Route to reach ASBR
LSA 5 (External LSA): Generated by ASBR and contains
routes to reach destinations outside local AS.
39