EIGRP is an enhanced distance vector routing protocol developed by Cisco that provides faster convergence properties and lower usage of bandwidth compared to IGRP. EIGRP forms neighbor relationships to dynamically learn of route changes and failures. It uses the Diffusing Update Algorithm (DUAL) to select optimal routes and maintain three tables - the neighbor table, topology table, and routing table. EIGRP supports classless routing, variable length subnet masking, and multi-protocol routing. It provides rapid convergence, efficient bandwidth usage, and independence from routed protocols through features like partial route updates, hello packets, and protocol-dependent modules.
EIGRP supports secondary addresses and forms neighbor relationships only over primary addresses. It is recommended to configure all routers on a subnet with primary addresses from the same subnet to avoid neighbor issues. EIGRP does not use areas like other link-state protocols but can filter and aggregate routing information at interfaces to control route propagation. More than one EIGRP autonomous system can be configured on a router. Load balancing options in EIGRP include offset-lists and policy-based routing. By default, EIGRP can load balance up to 4 equal-cost paths but this can be configured up to 32 paths or set to 1 to disable balancing.
EIGRP is an enhanced interior gateway routing protocol that has characteristics of both distance vector and link state routing. It supports features like classless routing, VLSM, route summarization, incremental updates, and load balancing. The maximum hop count for EIGRP is 224 and it uses the multicast address 224.0.0.10. EIGRP applies an administrative distance of 90 for internal routes and 170 for external routes.
This document compares the performance of link recovery between the EIGRP and OSPF routing protocols through simulation. It finds that EIGRP has faster retransmission times than OSPF when there is a failure in a data transmission link. Specifically, before a link fails the average transmission time is 17.5ms for OSPF and 17.1ms for EIGRP, and after a link fails the times increase to 29ms for OSPF and 28.4ms for EIGRP. Therefore, the research shows that EIGRP has better performance than OSPF in retransmitting data after a link fails.
Testing tool for an automated ticketing systemVladimirZitoli
This document describes a testing tool for an automated ticketing system. The tool uses a stepper motor controlled by a microcontroller to vary the height of QR codes being scanned by an obliterating machine. The microcontroller firmware implements TCP/IP communication using LwIP to query the machine and check the scan results. It initializes the stepper motor driver, establishes the network connection, and enters a query-response loop to test the machine's performance at different code heights.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protoco...IJORCS
This document proposes a new single routing protocol called BIGP that can function as both an interior gateway protocol (IGP) and an exterior gateway protocol (EGP). BIGP uses two algorithms - Algorithm1 for intra-autonomous system routing similar to IGPs, and Algorithm2 for inter-autonomous system routing similar to BGP. BIGP packet headers contain care bits to indicate the routing mode. Routing tables store intra- and inter-AS routing information separately to optimize path computation. The protocol aims to improve on IGP and BGP scalability and convergence issues.
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration.
The document discusses several interior gateway routing protocols: IGRP is a distance-vector protocol that uses a composite metric and supports unequal-cost load balancing and multipath routing. EIGRP is a hybrid link-state and distance-vector protocol that provides fast convergence, less overhead, and supports six path load balancing. OSPF is a link-state protocol that uses the Shortest Path First algorithm to determine the shortest route and provides advantages like being open, loop-free, scalable, and hierarchical with multicasting support. It maintains a two-layer hierarchy of backbone and off-backbone areas to conserve router resources and handle external routes.
EIGRP supports secondary addresses and forms neighbor relationships only over primary addresses. It is recommended to configure all routers on a subnet with primary addresses from the same subnet to avoid neighbor issues. EIGRP does not use areas like other link-state protocols but can filter and aggregate routing information at interfaces to control route propagation. More than one EIGRP autonomous system can be configured on a router. Load balancing options in EIGRP include offset-lists and policy-based routing. By default, EIGRP can load balance up to 4 equal-cost paths but this can be configured up to 32 paths or set to 1 to disable balancing.
EIGRP is an enhanced interior gateway routing protocol that has characteristics of both distance vector and link state routing. It supports features like classless routing, VLSM, route summarization, incremental updates, and load balancing. The maximum hop count for EIGRP is 224 and it uses the multicast address 224.0.0.10. EIGRP applies an administrative distance of 90 for internal routes and 170 for external routes.
This document compares the performance of link recovery between the EIGRP and OSPF routing protocols through simulation. It finds that EIGRP has faster retransmission times than OSPF when there is a failure in a data transmission link. Specifically, before a link fails the average transmission time is 17.5ms for OSPF and 17.1ms for EIGRP, and after a link fails the times increase to 29ms for OSPF and 28.4ms for EIGRP. Therefore, the research shows that EIGRP has better performance than OSPF in retransmitting data after a link fails.
Testing tool for an automated ticketing systemVladimirZitoli
This document describes a testing tool for an automated ticketing system. The tool uses a stepper motor controlled by a microcontroller to vary the height of QR codes being scanned by an obliterating machine. The microcontroller firmware implements TCP/IP communication using LwIP to query the machine and check the scan results. It initializes the stepper motor driver, establishes the network connection, and enters a query-response loop to test the machine's performance at different code heights.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protoco...IJORCS
This document proposes a new single routing protocol called BIGP that can function as both an interior gateway protocol (IGP) and an exterior gateway protocol (EGP). BIGP uses two algorithms - Algorithm1 for intra-autonomous system routing similar to IGPs, and Algorithm2 for inter-autonomous system routing similar to BGP. BIGP packet headers contain care bits to indicate the routing mode. Routing tables store intra- and inter-AS routing information separately to optimize path computation. The protocol aims to improve on IGP and BGP scalability and convergence issues.
Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer network for automating routing decisions and configuration.
The document discusses several interior gateway routing protocols: IGRP is a distance-vector protocol that uses a composite metric and supports unequal-cost load balancing and multipath routing. EIGRP is a hybrid link-state and distance-vector protocol that provides fast convergence, less overhead, and supports six path load balancing. OSPF is a link-state protocol that uses the Shortest Path First algorithm to determine the shortest route and provides advantages like being open, loop-free, scalable, and hierarchical with multicasting support. It maintains a two-layer hierarchy of backbone and off-backbone areas to conserve router resources and handle external routes.
Implementation of switching controller for the internet routerIAEME Publication
This document summarizes an academic journal article that implements and analyzes a switching controller for an internet router. Specifically:
- The article designs and implements a greedy scheduling algorithm on an FPGA to control the switching of packets between inputs and outputs of a router.
- Two design options for the scheduler are proposed and their performance is analyzed in terms of speed and scalability.
- The implementation is tested and shown to allow scheduling of routers with hundreds of ports within 60 nanoseconds, suitable for high-capacity internet routers.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
The document provides an overview of the Blackfin processor architecture in 3 parts. The core consists of arithmetic units, an addressing unit, register files, and a sequencer. It supports SIMD operations and dual data fetching. The arithmetic units include ALUs, multipliers, and a barrel shifter. The addressing unit supports various addressing modes. The sequencer handles instruction fetching and program flow. It has a fully interlocked pipeline.
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Networkijtsrd
There are many routing protocols out there today, some old and some new, but all are used for the same purpose. In general, to ideally select routes between any two nodes on a computer network and disseminate information. Routing of data packets is one of the important process in the internet. A routing protocol specifies the method of communication among routers used in the inter connection of networks. This paper takes into consideration three of such routing protocols RIP, OSPF, and EIGRP , expresses them and analyzes their way of operation. In this paper, we have analyzed and simulated a proposed Local Area Network using different routing protocols. So, configuration of these different routing protocols are done using CISCO packet tracer simulator. Khaing Khaing Wai "Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27928.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/27928/analysis-of-rip-eigrp-and-ospf-routing-protocols-in-a-network/khaing-khaing-wai
This report provides an introduction to the Border Gateway Protocol (BGP). It defines BGP as the protocol that manages how packets are routed across the internet through the exchange of routing information between edge routers. It explains that BGP directs packets between autonomous systems (AS) and uses routing policies to choose among multiple paths and control routing information redistribution. The report also describes the two types of BGP - external BGP (eBGP) which performs inter-AS routing, and internal BGP (iBGP) which performs intra-AS routing. It concludes that BGP has proven to be scalable and effective for managing and exchanging routing information within and between autonomous systems on the internet.
In this modern internet era, routing protocol
plays an important role. They forward the packets form source
to destination. There are many routing protocols are used. In
this paper, we evaluated the performance of different routing
protocol like RIP and OSPF for IPv6. OPNET simulation tool
14.5 is used to evaluate the performance of RIP and OSPF in
three network models in which two network models will
perform on one routing protocol only while the third are used to
evaluate the performance of these routing protocol are packet
delay variation, end to end delay, traffic received, traffic sent,
response time, jitter, page response time, object response time,
traffic dropped for IPv6 Etc. we designed three scenarios to
compare their performance.
International Journal of Computational Engineering Research(IJCER)ijceronline
The document describes the implementation of the Serial Peripheral Interface (SPI) protocol in a Field Programmable Gate Array (FPGA) device. Both the SPI master and SPI slave components are designed using VHDL code and a state machine diagram. The SPI master and slave are simulated and the received data is analyzed by transmitting data from the master to the slave and receiving an acknowledgement back. Key aspects of the SPI protocol implemented include the clock polarity, clock phase, and the VHDL code used to design the master and slave components in the FPGA.
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
This document discusses the introduction and configuration of the EIGRP routing protocol. It explains that EIGRP maintains three tables: the neighbor table, topology table containing feasible successors, and routing table containing successor routes. The document also mentions debugging and troubleshooting tools for EIGRP including variance, debug ip eigrp, and show ip EIGRP neighbors. Finally, it defines advertised distance and feasible distance metrics and indicates there will be hands-on labs for configuring EIGRP.
The document provides an overview of the memory hierarchy, bus structure, and additional features of the Blackfin processor core architecture. It describes the Blackfin's use of a memory hierarchy from fast L1 memory to slower L3 memory. It also discusses the internal bus structure, configurable memory that can be used as cache or SRAM, cache management, direct memory access, power management modes, debugging support, and where to find additional resources on Blackfin processors.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
This document discusses different types of routing protocols:
- Nonroutable protocols are used in small peer-to-peer networks without network addressing. Routed protocols contain network layer addressing to pass between multiple networks.
- Interior Gateway Protocols (IGPs) like RIP, IGRP, and OSPF are used within an autonomous system (AS). Exterior Gateway Protocols like BGP are used between ASes.
- Distance-vector protocols broadcast full routing tables periodically. Link-state protocols broadcast link updates, which routers use to independently calculate paths via SPF algorithm.
This chapter discusses different types of routing protocols, including nonroutable protocols designed for small networks, routed protocols that can pass between multiple networks, and routing protocols used by routers to determine optimal paths. It describes interior gateway protocols like RIP, IGRP, and OSPF, as well as exterior gateway protocols like BGP. Distance-vector protocols periodically broadcast full routing tables, while link-state protocols broadcast link updates. The chapter also covers static routing and configuring default routes.
BGP is an inter-autonomous system routing protocol that exchanges routing and reachability information between autonomous systems on the internet. It allows traffic to be rerouted to alternate paths if the primary route fails. BGP uses TCP port 179 to send triggered updates when there are changes in the network and maintains routing tables to track routes from multiple autonomous systems to determine the best paths. However, receiving full routing tables from multiple ISPs can require significant memory and resources for routers.
This document discusses GTP load balancing techniques using Cubro products. It describes how outer IP load balancing alone is insufficient and can cause issues. It recommends using inner IP load balancing along with session correlation and control plan correlation to properly handle subscriber sessions across network changes. This is achieved using Packetmasters and Sessionmasters working together. Scaling to handle higher traffic is possible by upgrading devices and adding more powerful units like the EXA24160.
Implementation of switching controller for the internet routerIAEME Publication
This document summarizes an academic journal article that implements and analyzes a switching controller for an internet router. Specifically:
- The article designs and implements a greedy scheduling algorithm on an FPGA to control the switching of packets between inputs and outputs of a router.
- Two design options for the scheduler are proposed and their performance is analyzed in terms of speed and scalability.
- The implementation is tested and shown to allow scheduling of routers with hundreds of ports within 60 nanoseconds, suitable for high-capacity internet routers.
BGP is the exterior gateway protocol that connects different autonomous systems on the internet. It allows for the exchange of routing and reachability information between these systems. BGP operates using a finite state machine to manage the states of connections between peers. It establishes TCP connections between routers to exchange routing updates and keep connections alive through regular keepalive messages. BGP version 4, defined in RFC 4271, is the current standard implementation which supports features like classless inter-domain routing and route aggregation.
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
The document provides an overview of the Blackfin processor architecture in 3 parts. The core consists of arithmetic units, an addressing unit, register files, and a sequencer. It supports SIMD operations and dual data fetching. The arithmetic units include ALUs, multipliers, and a barrel shifter. The addressing unit supports various addressing modes. The sequencer handles instruction fetching and program flow. It has a fully interlocked pipeline.
Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Networkijtsrd
There are many routing protocols out there today, some old and some new, but all are used for the same purpose. In general, to ideally select routes between any two nodes on a computer network and disseminate information. Routing of data packets is one of the important process in the internet. A routing protocol specifies the method of communication among routers used in the inter connection of networks. This paper takes into consideration three of such routing protocols RIP, OSPF, and EIGRP , expresses them and analyzes their way of operation. In this paper, we have analyzed and simulated a proposed Local Area Network using different routing protocols. So, configuration of these different routing protocols are done using CISCO packet tracer simulator. Khaing Khaing Wai "Analysis of RIP, EIGRP, and OSPF Routing Protocols in a Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27928.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-network/27928/analysis-of-rip-eigrp-and-ospf-routing-protocols-in-a-network/khaing-khaing-wai
This report provides an introduction to the Border Gateway Protocol (BGP). It defines BGP as the protocol that manages how packets are routed across the internet through the exchange of routing information between edge routers. It explains that BGP directs packets between autonomous systems (AS) and uses routing policies to choose among multiple paths and control routing information redistribution. The report also describes the two types of BGP - external BGP (eBGP) which performs inter-AS routing, and internal BGP (iBGP) which performs intra-AS routing. It concludes that BGP has proven to be scalable and effective for managing and exchanging routing information within and between autonomous systems on the internet.
In this modern internet era, routing protocol
plays an important role. They forward the packets form source
to destination. There are many routing protocols are used. In
this paper, we evaluated the performance of different routing
protocol like RIP and OSPF for IPv6. OPNET simulation tool
14.5 is used to evaluate the performance of RIP and OSPF in
three network models in which two network models will
perform on one routing protocol only while the third are used to
evaluate the performance of these routing protocol are packet
delay variation, end to end delay, traffic received, traffic sent,
response time, jitter, page response time, object response time,
traffic dropped for IPv6 Etc. we designed three scenarios to
compare their performance.
International Journal of Computational Engineering Research(IJCER)ijceronline
The document describes the implementation of the Serial Peripheral Interface (SPI) protocol in a Field Programmable Gate Array (FPGA) device. Both the SPI master and SPI slave components are designed using VHDL code and a state machine diagram. The SPI master and slave are simulated and the received data is analyzed by transmitting data from the master to the slave and receiving an acknowledgement back. Key aspects of the SPI protocol implemented include the clock polarity, clock phase, and the VHDL code used to design the master and slave components in the FPGA.
BGP Techniques for Network Operators, by Philip Smith.
A presentation given at APRICOT 2016’s BGP Techniques for Network Operators (Part 1 and 2) sessions on 23 February 2016.
This document provides an overview of BGP path selection attributes and techniques for manipulating them, including BGP weight and AS path prepending. It begins by explaining that BGP selects the best path based on attributes rather than lowest metric like IGPs. It then details the priority of each attribute and provides a quick overview of each. The remainder focuses on BGP weight, explaining how it influences local path selection and can be set per neighbor or using route maps. It also covers AS path prepending and how it can be used to prepend an AS path inbound or outbound to influence path selection.
The document provides an overview of the Border Gateway Protocol (BGP) including:
- BGP establishes neighbor relationships to exchange routing information between autonomous systems (ASes). It uses path attributes like AS_PATH to choose the best route and prevent routing loops.
- BGP classifies neighbors as internal (iBGP) or external (eBGP) depending on if they are in the same AS or different ASes. iBGP does not modify the AS_PATH while eBGP does.
- Techniques like route reflectors, confederations, and multiprotocol BGP are used to improve scalability within large ASes. Route filtering uses features like prefix-lists, route-maps and regular expressions to control route
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
This document discusses the introduction and configuration of the EIGRP routing protocol. It explains that EIGRP maintains three tables: the neighbor table, topology table containing feasible successors, and routing table containing successor routes. The document also mentions debugging and troubleshooting tools for EIGRP including variance, debug ip eigrp, and show ip EIGRP neighbors. Finally, it defines advertised distance and feasible distance metrics and indicates there will be hands-on labs for configuring EIGRP.
The document provides an overview of the memory hierarchy, bus structure, and additional features of the Blackfin processor core architecture. It describes the Blackfin's use of a memory hierarchy from fast L1 memory to slower L3 memory. It also discusses the internal bus structure, configurable memory that can be used as cache or SRAM, cache management, direct memory access, power management modes, debugging support, and where to find additional resources on Blackfin processors.
The document provides an overview of Border Gateway Protocol (BGP) which is the routing protocol used to exchange routes between institutions and the KAREN network. BGP allows different autonomous systems (AS) to exchange routing information and is more than just a routing protocol as it contains additional route attributes that are used for policy rules. BGP can operate internally within an AS or externally between ASes to control route propagation based on commercial agreements.
This document discusses different types of routing protocols:
- Nonroutable protocols are used in small peer-to-peer networks without network addressing. Routed protocols contain network layer addressing to pass between multiple networks.
- Interior Gateway Protocols (IGPs) like RIP, IGRP, and OSPF are used within an autonomous system (AS). Exterior Gateway Protocols like BGP are used between ASes.
- Distance-vector protocols broadcast full routing tables periodically. Link-state protocols broadcast link updates, which routers use to independently calculate paths via SPF algorithm.
This chapter discusses different types of routing protocols, including nonroutable protocols designed for small networks, routed protocols that can pass between multiple networks, and routing protocols used by routers to determine optimal paths. It describes interior gateway protocols like RIP, IGRP, and OSPF, as well as exterior gateway protocols like BGP. Distance-vector protocols periodically broadcast full routing tables, while link-state protocols broadcast link updates. The chapter also covers static routing and configuring default routes.
BGP is an inter-autonomous system routing protocol that exchanges routing and reachability information between autonomous systems on the internet. It allows traffic to be rerouted to alternate paths if the primary route fails. BGP uses TCP port 179 to send triggered updates when there are changes in the network and maintains routing tables to track routes from multiple autonomous systems to determine the best paths. However, receiving full routing tables from multiple ISPs can require significant memory and resources for routers.
This document discusses GTP load balancing techniques using Cubro products. It describes how outer IP load balancing alone is insufficient and can cause issues. It recommends using inner IP load balancing along with session correlation and control plan correlation to properly handle subscriber sessions across network changes. This is achieved using Packetmasters and Sessionmasters working together. Scaling to handle higher traffic is possible by upgrading devices and adding more powerful units like the EXA24160.
This document discusses how living a meaningful life is not about wealth, fame, or accomplishments, but rather about the positive impact you have on others. It argues that what will truly matter at the end of life is not what you accumulated, but what you contributed through your integrity, compassion, sacrifices, and character. These qualities can create lasting memories and feelings of loss for those who knew you after you are gone. Choosing to live a life that matters is a choice, not by circumstance, and involves sharing beautiful things with others to spread more positive experiences in the world.
This document discusses uranium mining and milling in Namibia. It provides the following key points:
1) Namibia is the 4th largest producer of uranium in the world, with uranium only being used for peaceful purposes in overseas nuclear power stations.
2) Uranium mining is a major contributor to Namibia's economy and export earnings. The industry is expected to continue growing significantly.
3) Effective regulation and stewardship of the uranium industry is important to balance economic benefits with environmental and social impacts. The document outlines Namibia's regulatory framework and initiatives by the uranium industry and government to ensure responsible development
El documento presenta información sobre Bernardo Tello López, un profesor de matemáticas y computación en Chile que enseña en el Liceo José Toribio Medina en Rio Negro, Chile. Proporciona su correo electrónico y enlaces de redes sociales. Además, describe varias plataformas educativas como Edmodo, Wix, PowToon y cómo se pueden utilizar para mejorar la enseñanza y el aprendizaje.
This document discusses various WordPress plugins that can enhance a website. It begins by introducing the author and their experience. It then provides an overview of WordPress and explains that plugins add functionality. Several plugin categories are covered, including performance, backups, analytics, editing, contact forms, and email marketing. Specific plugins are described within each category, noting their features and benefits. The overall purpose is to help users choose the right plugins to improve their WordPress site.
This document provides information about the services offered by Jinnius, a creative advertising agency located in Karachi, Pakistan. It lists the CEO and various department heads, and describes services such as holographic advertising, branded/normal SMS services, website design/development, software development, missed call solutions, social media marketing and email marketing. Contact information is provided at the end.
Upgrade 11.2.0.1 rac db to 11.2.0.2 in linuxmaclean liu
The document provides steps to upgrade an Oracle database from 11.2.0.1 to 11.2.0.2 on Linux. It details downloading the 11.2.0.2 patch set, installing the new 11.2.0.2 database software in a new location using OUI, and preparing the database for upgrade by cleaning data dictionary tables, taking backups, and collecting statistics. The preparation steps help ensure a smooth upgrade of the database instance and data dictionary to the new version.
1. The document provides instructions for closing work orders in Dtelnet/Jupiter and Oracle, including viewing quantities on hand, issuing and scrapping WIP, moving work orders to the next step, and returning parts.
2. Key steps include verifying lot numbers, selecting the correct source type and reason for scrapping, and using the view material requirements tool to match closing quantities.
3. Transactions over $15 must be returned to a location before scrapping, and anything over $100 scrapped from a location requires a cycle count request email.
John whaley 10mythsaboutfindinga-softwareitjobSony Prasad
This document discusses 10 common myths about finding software/IT jobs. It is authored by John Whaley, CTO and founder of MokaFive. The myths addressed include that jobs are hard to find, it's okay to lie or exaggerate on resumes, requirements listed in job postings are absolute, staying at one company for a long time builds experience, technical skills are all that matter for IT jobs, higher salaries should always be prioritized over other factors, and bigger companies always have more opportunities. The document provides the realities of each myth and offers tips for things like resume writing, interviewing, negotiating salaries, and getting promotions.
Aston Hall is a grand Jacobean mansion located in Birmingham, England built between 1628-1635 by Thomas Holte. It reflects Holte's wealth and status at the time. During the English Civil War, King Charles I stayed at Aston Hall before losing the Battle of Edgehill. This resulted in Parliamentarians attacking and damaging the mansion in retaliation for its support of the Royalists. Today the mansion is a museum that shows evidence of damage from the war and tells the story of its role in the civil war, though most of the original furnishings are gone. Local legends say the mansion is haunted by ghosts of former residents like Holte's daughter.
Lignin is a polymer that strengthens plant cell walls and interferes with degradation. It is formed from monolignols like coniferyl alcohol through enzymes like laccase. The structure of lignin varies between gymnosperms, dicots, and monocots depending on whether it contains vanillin, syringaldehyde, or both. Lignin biosynthesis involves the synthesis of monolignols, their transport and storage as glucosides, and deglycosylation back into monolignols for polymerization into lignin through oxidative enzymes.
This document discusses a process involving several steps. It first mentions two introductory items before moving on to three additional steps. The final step briefly notes wrapping things up.
Assessing the biological effects form low dose exposures similar to medical a...Leishman Associates
Nghi Phan investigated the biological effects of low dose radiation exposures similar to medical and occupational doses. Specifically, Phan assessed genetic damage, DNA damage, and cell death in mice exposed to a single 20 mSv dose, similar to a CT scan, and repeated 20 mSv exposures over 10 weeks for a total of 400 mSv. The study found evidence of genetic damage and DNA damage from both single and repeated exposures. Repeated exposures did not increase levels of chromosomal damage or cell death compared to spontaneous levels, but may induce an adaptive response. The results indicate assays can detect effects below 20 mSv and differences exist between single and repeated low dose exposures.
The document discusses the key concepts of EIGRP including its hybrid nature, neighbor establishment process, metric calculations, and use of successors and feasible successors. EIGRP forms neighbor relationships by exchanging Hello packets to verify matching AS numbers and K-values. It calculates metrics based on bandwidth, delay, and other configurable factors, and uses the DUAL algorithm to determine the best path and maintain backup paths as feasible successors to speed convergence.
Packet Tracer: Routing protocols EIGRP and OSPFRafat Khandaker
The document summarizes an experiment in Packet Tracer where the routing protocols EIGRP and OSPF were implemented on a simulated enterprise network with multiple hosts and routers. EIGRP and OSPF were configured on the 3 routers to exchange routing update tables and allow routing between all hosts. The experiment demonstrated how each protocol operates, including configuration of EIGRP with autonomous system numbers and OSPF with areas to establish routing adjacencies between routers. Pings between hosts across the routers confirmed correct routing was achieved with both protocols.
The chapter discusses EIGRP and OSPF routing protocols. It provides information on configuring and verifying EIGRP, including EIGRP tables, metrics, neighbor discovery using hello packets, and terminology such as feasible successors. It also covers configuring and verifying OSPF, as well as using wildcards.
EIGRP is a proprietary routing protocol developed by Cisco that is based on distance-vector routing. It uses the Diffusing Update Algorithm to quickly converge on routes and prevent routing loops. EIGRP calculates composite metrics for routes using factors like bandwidth and delay to determine the best path. It elects successors and feasible successors for routes to provide primary and backup paths. EIGRP also uses neighbor tables, topology tables, and routing tables to store routing information and make forwarding decisions.
The document provides information on Cisco Nexus 5000 Layer 3 switching including:
- An overview of EIGRP fundamentals such as neighbor discovery, route metrics, and the Diffusing Update Algorithm.
- Details on EIGRP configuration and operation in NX-OS versus IOS including differences in CLI, route redistribution, and VRF support.
- Configuration examples that highlight similarities and differences between NX-OS and IOS for EIGRP tasks like interface configuration, authentication, and summarization.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
This document contains frequently asked questions (FAQs) about EIGRP. Some key points covered include:
- EIGRP does not require an ip default-network command to propagate a default route and redistributes default routes directly.
- The eigrp log-neighbor-changes command makes troubleshooting neighbor resets easier by determining why an EIGRP neighbor was reset.
- EIGRP supports secondary addresses but routers should have primary addresses in the same subnet for proper neighbor formation.
- EIGRP has protocol-independent and -dependent debug commands as well as show commands to display neighbor, topology, and traffic information.
- The "serno" on EIGRP topology entries refers to the serial
EIGRP is a proprietary routing protocol developed by Cisco that uses a composite metric and has fast convergence properties. It functions as a hybrid of distance-vector and link-state routing protocols, sending subnet mask and VLSM information in updates. EIGRP forms neighbor relationships through periodic hello messages and establishes three key tables - Neighbor, Topology, and Routing - to store neighbor, route, and best path information. It utilizes five packet types and reliable transport to efficiently share routing updates.
This document provides an overview of the network layer and some of its key protocols. It begins with an introduction to the network layer and its main responsibilities, including routing packets between subnets that may have different addressing schemes or protocols. It then discusses some of the network layer's main functionalities and features. The remainder of the document defines and describes several important network layer protocols, including EIGRP, ICMP, IGMP, IPv4, and others. It provides high-level explanations of how these protocols function and their roles within the network layer.
Comparision between the most common routing protocols used by a networking geek in a largescale environment.Gives a detailed view into its application and advantages. Credited to Lucent technologies project documentation.
EIGRP and OSPF are hybrid and link-state routing protocols respectively. EIGRP uses the DUAL algorithm and metric system to determine the best paths, while OSPF uses the Dijkstra algorithm and link state advertisements. Both protocols form neighbor relationships to exchange routing information, but OSPF requires adjacencies and is more restrictive in sharing routes between areas.
Route redistribution involves sharing routes between different routing protocols. Challenges include incompatible metrics between protocols and routing loops or suboptimal paths that can occur from redistributing routes back into their origin domain. Route maps, distribution lists, and adjusting administrative distances can control redistribution and prevent issues like feedback of routes into their source protocol.
Redistribution is necessary when routing protocols connect and must pass routes between the two.
Route Redistribution involves placing the routes learned from one routing domain, such as RIP, into
another routing domain, such as EIGRP.
While running a single routing protocol throughout your entire IP internetwork is desirable, multiprotocol routing is common for a number of reasons, such as company mergers, multiple departments
managed by multiple network administrators, and multi-vendor environments. Running different
routing protocols is often part of a network design.
This document summarizes a research paper that compares the performance of three routing protocols - EIGRP, OSPF, and RIP. The researchers designed identical network topologies to implement each protocol in Cisco Packet Tracer and OPNET simulations. They measured convergence duration and traffic sent to analyze differences. Simulation results showed that EIGRP had the fastest convergence time when links failed or recovered. OSPF generated the most initial traffic as it fully maps the network. EIGRP and OSPF used bandwidth more efficiently than RIP. The researchers concluded that EIGRP is generally the best choice for networks due to its fast convergence and efficient bandwidth usage.
The document discusses various topics relating to EIGRP implementation including:
- Establishing EIGRP neighbor relationships and different network environments where EIGRP can operate like Frame Relay and MPLS networks.
- Building the EIGRP topology table by exchanging routing information with neighbors, calculating EIGRP metrics and selecting the best path.
- Optimizing EIGRP behavior such as using stub routing and route summarization to reduce queries when a route becomes active.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work differently in advertising routes and calculating the best paths. It also discusses how routers use the forwarding information base and administrative distances to select the best path for forwarding packets.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work, and compares their algorithms. It also discusses how routers use prefix length and administrative distance to select the best path for forwarding packets.
Introduction to EIGRP [IP Routing] - Cisco SystemsHoàng Hải Nguyễn
EIGRP is an enhanced version of IGRP that provides faster convergence times and greater efficiency. It uses the same distance vector routing protocol as IGRP but improves on it with technologies like DUAL and reliable transport. EIGRP supports various network layers, has capabilities for neighbor discovery, route tagging for external routes, and operates in a way that ensures rapid synchronization across all routers during topology changes.
EIGRP is a Cisco proprietary routing protocol based on IGRP that combines features of link-state and distance-vector protocols, using four main components: neighbor discovery, reliable transport, DUAL finite state machine, and protocol-dependent modules to exchange five types of packets and allow configuration and debugging similar to IGRP.
2. EIGRP
Overview
Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-proprietary routing
protocol based on Interior Gateway Routing Protocol (IGRP).
Unlike IGRP, which is a classful routing protocol, EIGRP supports classless
interdomain routing Novell Routing Information Protocol (RIP) and AppleTalk
Routing Table Maintenance Protocol (RTMP), serving both IPX and AppleTalk
networks with powerful efficiency.
EIGRP is often described as a hybrid routing protocol, offering the best of distance
vector and link-state algorithms.
EIGRP is an advanced routing protocol that relies on features commonly associated
with link-state protocols. Some of the best features of OSPF, such as partial updates
and neighbour discovery are similarly put to use by EIGRP. However, EIGRP is
easier to configure than OSPF.
EIGRP is an ideal choice for large, multi-protocol networks built primarily on Cisco
routers.
This module covers common EIGRP configuration tasks. Particular attention is paid
to the ways in which EIGRP establishes relationships with adjacent routers, calculates
primary and backup routes, and when necessary, responds to failures in known routes
to a particular destination.
A network is made up of many devices, protocols, and media that allow data
communication to happen. When one piece of the network does not work properly,
one or two users may be unable to communicate, or the entire network may fail. In
either case, the network administrator must quickly identify and troubleshoot
problems when they arise. Network problems commonly result from the following:
• Mistyped commands
• Incorrectly constructed or incorrectly placed access lists
• Misconfigured routers, switches, or other network devices
• Bad physical connections
A network administrator should approach troubleshooting in a methodical manner,
using a general problem-solving model. It is often useful to check for physical layer
problems first and then move up the layers in an organized manner. Although this
module will focus on troubleshooting the operation of routing protocols, which work
at Layer 3, it is important to eliminate any problems that may exist at lower layers.
Troubleshooting of EIGRP including:
• Troubleshoot a RIP routing process using show and debug commands
• Troubleshoot an IGRP routing process using show and debug commands
• Troubleshoot an EIGRP routing process using show and debug commands
• Troubleshoot an OSPF routing process using show and debug commands
2
3. EIGRP
EIGRP Concepts
Comparing EIGRP with IGRP
Cisco released EIGRP in 1994 as a scalable, improved version of its proprietary
distance vector routing protocol, IGRP. The same distance vector technology found in
IGRP is used in EIGRP, and the underlying distance information remains the same.
EIGRP improves the convergence properties and the operating efficiency significantly
over IGRP. This allows for an improved architecture while retaining the existing
investment in IGRP.
Comparisons between EIGRP and IGRP fall into the following major categories:
• Compatibility mode
• Metric calculation
• Hop count
• Automatic protocol redistribution
• Route tagging
IGRP and EIGRP are compatible with each other. This compatibility provides
seamless interoperability with IGRP routers. This is important so users can take
advantage of the benefits of both protocols. EIGRP offers multiprotocol support, but
IGRP does not.
EIGRP and IGRP use different metric calculations. EIGRP scales the metric of IGRP
by a factor of 256. That is because EIGRP uses a metric that is 32 bits long, and IGRP
uses a 24-bit metric. By multiplying or dividing by 256, EIGRP can easily exchange
information with IGRP.
IGRP has a maximum hop count of 255. EIGRP has a maximum hop count limit of
224. This is more than adequate to support the largest, properly designed
internetworks.
Enabling dissimilar routing protocols such as OSPF and RIP to share information
requires advanced configuration. Redistribution, the sharing of routes, is automatic
between IGRP and EIGRP as long as both processes use the same autonomous system
(AS) number. In Figure 3.1, RTB automatically redistributes EIGRP-learned routes to
the IGRP AS, and vice versa.
3
4. EIGRP
Figure 3.1
EIGRP will tag routes learned from IGRP or any outside source as external because
they did not originate from EIGRP routers. IGRP cannot differentiate between
internal and external routes.
Figure 3.2
Notice that in the show ip route command output for the routers in Figure 3.2,
EIGRP routes are flagged with D, and external routes are denoted by EX. RTA
identifies the difference between the network learned via EIGRP (172.16.0.0) and the
network that was redistributed from IGRP (192.168.1.0). In the RTC table, the IGRP
protocol makes no such distinction. RTC, which is running IGRP only, just sees IGRP
routes, despite the fact that both 10.1.1.0 and 172.16.0.0 were redistributed from
EIGRP.
4
5. EIGRP
EIGRP concepts and terminology
EIGRP routers keep route and topology information readily available in RAM, so
they can react quickly to changes. Like OSPF, EIGRP saves this information in
several tables and databases.
EIGRP saves routes that are learned in specific ways. Routes are given a particular
status and can be tagged to provide additional useful information.
EIGRP maintains three tables:
• Neighbour table
• Topology table
• Routing table
The neighbour table is the most important table in EIGRP. Each EIGRP router
maintains a neighbour table that lists adjacent routers. This table is comparable to the
adjacency database used by OSPF. There is a neighbour table for each protocol that
EIGRP supports.
Figure 3.3 EIGRP Neighbour Table
When newly discovered neighbours are learned, the address and interface of the
neighbour is recorded. This information is stored in the neighbour data structure.
When a neighbour sends a hello packet, it advertises a hold time. The hold time is the
amount of time a router treats a neighbour as reachable and operational. In other
words, if a hello packet is not heard within the hold time, then the hold time expires.
When the hold time expires, the Diffusing Update Algorithm (DUAL), which is the
EIGRP distance vector algorithm, is informed of the topology change and must
recalculate the new topology.
The topology table is made up of all the EIGRP routing tables in the autonomous
system. DUAL takes the information supplied in the neighbour table and the topology
table and calculates the lowest cost routes to each destination.
Figure 3.4 EIGRP Routing Table
5
6. EIGRP
By tracking this information, EIGRP routers can identify and switch to alternate
routes quickly. The information that the router learns from the DUAL is used to
determine the successor route, which is the term used to identify the primary or best
route. A copy is also placed in the topology table.
Every EIGRP router maintains a topology table for each configured network protocol.
All learned routes to a destination are maintained in the topology table.
The topology table includes the following fields:
Feasible distance (FD is 2195456) 200.10.10.10 – The feasible distance (FD) is the
lowest calculated metric to each destination. For example, the feasible distance to
32.0.0.0 is 90 as indicated by FD is equal 90.
Route source (via 200.10.10.10) – The source of the route is the identification
number of the router that originally advertised that route. This field is populated only
for routes learned externally from the EIGRP network. Route tagging can be
particularly useful with policy-based routing. For example, the route source to
32.0.0.0 is 200.10.10.10 via 200.10.10.10.
Reported distance (FD/RD) – The reported distance (RD) of the path is the distance
reported by an adjacent neighbour to a specific destination. For example, the reported
distance to 32.0.0.0 is 2195456 as indicated by (90/2195456).
Interface information – The interface through which the destination is reachable
Route status – Routes are identified as being either passive (P), which means that the
route is stable and ready for use, or active (A), which means that the route is in the
process of being recomputed by DUAL.
The EIGRP routing table holds the best routes to a destination. This information is
retrieved from the topology table. Each EIGRP router maintains a routing table for
each network protocol.
Figure 3.5
A successor is a route selected as the primary route to use to reach a destination.
DUAL identifies this route from the information contained in the neighbour and
topology tables and places it in the routing table. There can be up to four successor
routes for any particular route. These can be of equal or unequal cost and are
6
7. EIGRP
identified as the best loop-free paths to a given destination. A copy of the successor
routes is also placed in the topology table.
A feasible successor (FS) is a backup route. These routes are identified at the same
time the successors are identified, but they are only kept in the topology table.
Multiple feasible successors for a destination can be retained in the topology table
although it is not mandatory.
Figure 3.6 Alternative routes using EIGRP Successors and Feasible Successors
Figure 3.7 EIGRP Successors and Feasible Successors
A router views its feasible successors as neighbours downstream, or closer to the
destination than it is. Feasible successor cost is computed by the advertised cost of the
7
8. EIGRP
neighbour router to the destination. If a successor route goes down, the router will
look for an identified feasible successor. This route will be promoted to successor
status. A feasible successor must have a lower advertised cost than the existing
successor cost to the destination. If a feasible successor is not identified from the
existing information, the router places an Active status on a route and sends out query
packets to all neighbours in order to recompute the current topology. The router can
identify any new successor or feasible successor routes from the new data that is
received from the reply packets that answer the query requests. The router will then
place a Passive status on the route.
The topology table can record additional information about each route. EIGRP
classifies routes as either internal or external. EIGRP adds a route tag to each route to
identify this classification. Internal routes originate from within the EIGRP
autonomous system (AS).
External routes originate outside the EIGRP AS. Routes learned or redistributed from
other routing protocols, such as Routing Information Protocol (RIP), OSPF, and
IGRP, are external. Static routes originating outside the EIGRP AS are external. The
tag can be configured to a number between 0-255 to customize the tag.
Figure 3.8 Viewing EIGRP Tag Information
EIGRP design features
EIGRP operates quite differently from IGRP. EIGRP is an advanced distance vector
routing protocol and acts as a link-state protocol when updating neighbours and
maintaining routing information. The advantages of EIGRP over simple distance
vector protocols include the following:
• Rapid convergence
• Efficient use of bandwidth
• Support for variable-length subnet mask (VLSM) and classless interdomain
routing (CIDR). Unlike IGRP, EIGRP offers full support for classless IP by
exchanging subnet masks in routing updates.
8
9. EIGRP
• Multiple network-layer support
• Independence from routed protocols.
Protocol-dependent modules (PDMs) protect EIGRP from lengthy revision. Evolving
routed protocols, such as IP, may require a new protocol module but not necessarily a
reworking of EIGRP itself.
EIGRP routers converge quickly because they rely on DUAL. DUAL guarantees
loop-free operation at every instant throughout a route computation allowing all
routers involved in a topology change to synchronize at the same time.
EIGRP makes efficient use of bandwidth by sending partial, bounded updates and
causes minimal consumption of bandwidth when the network is stable. EIGRP routers
make partial, incremental updates rather than sending their complete tables. This is
similar to OSPF operation, but unlike OSPF routers, EIGRP routers send these partial
updates only to the routers that need the information, not to all routers in an area. For
this reason, they are called bounded updates. Instead of using timed routing updates,
EIGRP routers keep in touch with each other using small hello packets. Though
exchanged regularly, hello packets do not use up a significant amount of bandwidth.
EIGRP supports IP, IPX, and AppleTalk through protocol-dependent modules
(PDMs). EIGRP can redistribute IPX RIP and SAP information to improve overall
performance. In effect, EIGRP can take over for these two protocols. An EIGRP
router will receive routing and service updates, updating other routers only when
changes in the SAP or routing tables occur. Routing updates occur as they would in
any EIGRP network, using partial updates.
EIGRP can also take over for the AppleTalk Routing Table Maintenance Protocol
(RTMP). As a distance vector routing protocol, RTMP relies on periodic and
complete exchanges of routing information. To reduce overhead, EIGRP redistributes
AppleTalk routing information using event-driven updates. EIGRP also uses a
configurable composite metric to determine the best route to an AppleTalk network.
RTMP uses hop count, which can result in suboptimal routing. AppleTalk clients
expect RTMP information from local routers, so EIGRP for AppleTalk should be run
only on a clientless network, such as a wide-area network (WAN) link.
EIGRP technologies
EIGRP includes many new technologies, each of which represents an improvement
in operating efficiency, speed of convergence, or functionality relative to IGRP and
other routing protocols. These technologies fall into one of the following four
categories:
1. Neighbour discovery and recovery
2. Reliable Transport Protocol
3. DUAL finite-state machine algorithm
4. Protocol-dependent modules
Simple distance vector routers do not establish any relationship with their neighbours.
RIP and IGRP routers merely broadcast or multicast updates on configured interfaces.
In contrast, EIGRP routers actively establish relationships with their neighbours,
much the same way that OSPF routers do.
9
10. EIGRP
EIGRP routers establish adjacencies as described in Figure 3.9.
Figure 3.9 Neighbour routers exchange routing tables
EIGRP routers establish adjacencies with neighbour routers by using small hello
packets. Hellos are sent by default every five seconds. An EIGRP router assumes that
as long as it is receiving hello packets from known neighbours, those neighbours and
their routes remain viable or passive. By forming adjacencies, EIGRP routers do the
following:
• Dynamically learn of new routes that join their network
• Identify routers that become either unreachable or inoperable
• Rediscover routers that had previously been unreachable
Reliable Transport Protocol (RTP) is a transport-layer protocol that can guarantee
ordered delivery of EIGRP packets to all neighbours. On an IP network, hosts use
TCP to sequence packets and ensure their timely delivery. However, EIGRP is
protocol-independent. This means it does not rely on TCP/IP to exchange routing
information the way that RIP, IGRP, and OSPF do. To stay independent of IP, EIGRP
uses RTP as its own proprietary transport-layer protocol to guarantee delivery of
routing information.
EIGRP can call on RTP to provide reliable or unreliable service as the situation
warrants. For example, hello packets do not require the overhead of reliable delivery
because they are frequent and should be kept small. Nevertheless, the reliable delivery
of other routing information can actually speed convergence, because EIGRP routers
are not waiting for a timer to expire before they retransmit.
With RTP, EIGRP can multicast and unicast to different peers simultaneously, which
allows for maximum efficiency.
The centrepiece of EIGRP is the Diffusing Update Algorithm (DUAL), which is the
EIGRP route-calculation engine. The full name of this technology is DUAL finite-
state machine (FSM). An FSM is an algorithm machine, not a mechanical device with
moving parts. FSMs define a set of possible states that something can go through,
what events cause those states, and what events result from those states. Designers use
10
11. EIGRP
FSMs to describe how a device, computer program, or routing algorithm will react to
a set of input events. The DUAL FSM contains all the logic used to calculate and
compare routes in an EIGRP network.
DUAL tracks all the routes advertised by neighbours. Composite metrics of each
route are used to compare them. DUAL also guarantees that each path is loop free.
DUAL inserts lowest cost paths into the routing table. These primary routes are
known as successor routes. A copy of the successor routes is also placed in the
topology table.
Figure 3.10 Example of DUAL
EIGRP keeps important route and topology information readily available in a
neighbour table and a topology table. These tables supply DUAL with comprehensive
route information in case of network disruption. DUAL selects alternate routes
quickly by using the information in these tables. If a link goes down, DUAL looks for
an alternative route path, or feasible successor, in the topology table.
One of the best features of EIGRP is its modular design. Modular, layered designs
prove to be the most scalable and adaptable. Support for routed protocols, such as IP,
IPX, and AppleTalk, are included in EIGRP through PDMs. In theory, EIGRP can
easily adapt to new or revised routed protocols, such as IPv6, by adding protocol-
dependent modules.
Each PDM is responsible for all functions related to its specific routed protocol. The
IP-EIGRP module is responsible for the following:
• Sending and receiving EIGRP packets that bear IP data
• Notifying DUAL of new IP routing information that is received
• Maintaining the results of DUAL routing decisions in the IP routing table
11
12. EIGRP
• Redistributing routing information that was learned by other IP-capable
routing protocols
EIGRP data structure
Like OSPF, EIGRP relies on different types of packets to maintain its various tables
and establish complex relationships with neighbour routers.
The five EIGRP packet types are:
• Hello
• Acknowledgment
• Update
• Query
• Reply
Hello Packets
EIGRP relies on hello packets to discover, verify, and rediscover neighbour routers.
Rediscovery occurs if EIGRP routers do not receive hellos from each other for a Hold
Time interval but then re-establish communication.
Figure 3.11 EIGRP Neighbour Table
Figure 3.12 The Default Hello Interval
EIGRP routers send hellos at a fixed but configurable interval, called the hello
interval. The default hello interval depends on the bandwidth of the interface. On IP
networks, EIGRP routers send hellos to the multicast IP address 224.0.0.10.
An EIGRP router stores information about neighbours in the neighbour table. The
neighbour table includes the Sequence Number (Seq No) field to record the number of
the last received EIGRP packet that each neighbour sent. The neighbour table also
includes a Hold Time field which records the time the last packet was received.
Packets should be received within the Hold Time interval period to maintain a
Passive state. The Passive state is a reachable and operational status.
If a neighbour is not heard from for the duration of the Hold Time, EIGRP considers
that neighbour down, and DUAL must step in to re-evaluate the routing table. By
12
13. EIGRP
default, the Hold Time is three times the hello interval, but an administrator can
configure both timers as desired.
OSPF requires neighbour routers to have the same hello and dead intervals to
communicate. EIGRP has no such restriction. Neighbour routers learn about each of
the other respective timers via the exchange of hello packets. Then they use that
information to forge a stable relationship regardless of unlike timers.
Hello packets are always sent unreliably. This means that no acknowledgment is
transmitted.
Acknowledgment Packets
An EIGRP router uses acknowledgment packets to indicate receipt of any EIGRP
packet during a reliable exchange. Reliable Transport Protocol (RTP) can provide
reliable communication between EIGRP hosts. To be reliable, a sender's message
must be acknowledged by the recipient. Acknowledgment packets, which are hello
packets without data, are used for this purpose. Unlike multicast hellos,
acknowledgment packets are unicast. Acknowledgments can be made by attaching
them to other kinds of EIGRP packets, such as reply packets.
Update Packets
Update packets are used when a router discovers a new neighbour. An EIGRP router
sends unicast update packets to that new neighbour so that it can add to its topology
table. More than one update packet may be needed to convey all the topology
information to the newly discovered neighbour.
Update packets are also used when a router detects a topology change. In this case,
the EIGRP router sends a multicast update packet to all neighbours, which alerts them
to the change. All update packets are sent reliably.
Query Packets
An EIGRP router uses query packets whenever it needs specific information from one
or all of its neighbours. A reply packet is used to respond to a query.
Reply Packets
If an EIGRP router loses its successor and cannot find a feasible successor for a route,
DUAL places the route in the Active state. A query is then multicasted to all
neighbours in an attempt to locate a successor to the destination network. Neighbours
must send replies that either provide information on successors or indicate that no
information is available. Queries can be multicast or unicast, while replies are always
unicast. Both packet types are sent reliably.
EIGRP algorithm
The sophisticated DUAL algorithm results in the exceptionally fast convergence of
EIGRP. To better understand convergence with DUAL, consider the example in
Figure 3.13. Each router has constructed a topology table that contains information
about how to route to destination Network A.
13
14. EIGRP
Figure 3.13
Each topology table identifies the following:
• The routing protocol or EIGRP
• The lowest cost of the route, which is called Feasible Distance (FD)
• The cost of the route as advertised by the neighbouring router, which is called
Reported Distance (RD)
The Topology heading identifies the preferred primary route, called the successor
route (Successor), and, where identified, the backup route, called the feasible
successor (FS). Note that it is not necessary to have an identified feasible successor.
The EIGRP network will follow a sequence of actions to bring about convergence
between the routers, which currently have the following topology information:
• Router C has one successor route by way of Router B.
• Router C has one feasible successor route by way of Router D.
• Router D has one successor route by way of Router B.
• Router D has no feasible successor route.
• Router E has one successor route by way of Router D.
• Router E has no feasible successor.
The feasible successor route selection rules are specified in Figure 3.14.
14
15. EIGRP
Figure 3.14
The following example demonstrates how each router in the topology will carry out
the feasible successor selection rules when the route from Router D to Router B goes
down:
In Router D: see fig 3.15
Figure 3.15
Route by way of Router B is removed from the topology table.
• This is the successor route. Router D has no feasible successor identified.
• Router D must complete a new route computation.
15
16. EIGRP
In Router C:
Route to Network A by way of Router D is down.
• Route by way of Router D is removed from the table.
• This is the feasible successor route for Router C.
In Router D: see fig 3.16
Figure 3.16
Router D has no feasible successor. It cannot switch to an identified alternative
backup route.
• Router D must recompute the topology of the network. The path to destination
Network A is set to Active.
• Router D sends a query packet to all connected neighbours, Router C and
Router E, requesting topology information.
• Router C does have a previous entry for Router D.
• Router D does not have a previous entry for Router E.
In Router E:
Route to Network A through Router D is down.
• The route by way of Router D is taken down.
• This is the successor route for Router E.
• Router E does not have a feasible route identified.
16
17. EIGRP
• Note that the Reported Distance cost of routing by way of Router C is 3, the
same cost as the successor route by way of Router D.
In Router C: see fig 3.17
Figure 3.17
Router E sends a query packet to Router C.
• Router C removes Router E from the table.
• Router C replies to Router D with new route to Network A.
In Router D:
Route status to destination Network A is still marked as Active. Computing has not
been completed yet.
• Router C has replied to Router D to confirm that a route to destination
Network A is available with a cost of 5.
• Router D is still waiting for a reply from Router E.
In Router E:
Router E has no feasible successor to reach destination Network A.
• Router E, therefore, tags the status of the route to destination network as
Active.
• Router E will have to recompute the network topology.
• Router E removes the route by way of Router D from the table.
• Router E sends a query to Router C, requesting topology information.
17
18. EIGRP
• Router E already has an entry by way of Router C. It is at a cost of 3, the same
as the successor route.
In Router E: see fig 3.18
Figure 3.18
Router C replies with an RD of 3.
• Router E can now set the route by way of Router C as the new successor with
an FD of 4 and an RD of 3.
• Router E replaces the “Active” status of the route to destination Network A
with a “Passive Status”.
Note that a route will have a “Passive Status” by default, as long as hello packets
are being received. In this example, only “Active Status” routes are flagged.
18
19. EIGRP
In Router E: see fig 3.19
Figure 3.19
Router E sends a reply to Router D informing of Router E topology information.
In Router D:
Router D receives the reply packed from Router E, informing of Router E topology
information.
• Router D enters this data for the route to destination Network A by way of
Router E.
• This route becomes an additional successor route as the cost is the same as
routing by way of Router C and the RD is less than the FD cost of 5.
Convergence has occurred among all EIGRP routers using the DUAL algorithm.
19
20. EIGRP
EIGRP Configuration
Configuring EIGRP
Despite the complexity of DUAL, configuring EIGRP can be relatively simple.
EIGRP configuration commands vary depending on the protocol that is to be routed.
Some examples of these protocols are IP, IPX, and AppleTalk. This section covers
EIGRP configuration for the IP protocol.
Figure 3.20
Perform the following steps to configure EIGRP for IP:
Use the following to enable EIGRP and define the autonomous system:
router(config)#router eigrp [autonomous-system-number]
The autonomous system number is used to identify all routers that belong within the
internetwork. This value must match all routers within the internetwork.
Indicate which networks belong to the EIGRP autonomous system on the local router
by using the following command:
router(config-router)#network [network-number]
The network-number is the network number that determines which interfaces of the
router are participating in EIGRP and which networks are advertised by the router.
The network command configures only connected networks. For example, network
3.1.0.0, which is on the far left of the main Figure, is not directly connected to Router
A. Consequently, that network is not part of the configuration of Router A.
When configuring serial links using EIGRP, it is important to configure the
bandwidth setting on the interface. If the bandwidth for these interfaces is not
20
21. EIGRP
changed, EIGRP assumes the default bandwidth on the link instead of the true
bandwidth. If the link is slower, the router may not be able to converge, routing
updates might become lost, or suboptimal path selection may result. To set the
interface bandwidth, use the following syntax:
router(config-if)#bandwidth [kilobits]
The bandwidth command is only used by the routing process and should be set to
match the line speed of the interface.
Cisco also recommends adding the following command to all EIGRP configurations:
router(config-if)#eigrp log-neighbor-changes
This command enables the logging of neighbour adjacency changes to monitor the
stability of the routing system and to help detect problems.
Configuring EIGRP summarization
EIGRP automatically summarizes routes at the classful boundary. This is the
boundary where the network address ends, as defined by class-based addressing. This
means that even though RTC is connected only to the subnet 2.1.1.0, it will advertise
that it is connected to the entire Class A network, 2.0.0.0. In most cases auto
summarization is beneficial because it keeps routing tables as compact as possible.
However, automatic summarization may not be the preferred option in certain
instances. For example, if there are discontiguous subnetworks, auto-summarization
must be disabled for routing to work properly. To turn off auto-summarization, use
the following command:
router(config-router)#no auto-summary
Figure 3.21 EIGRP automatically summarizes based on class
21
22. EIGRP
Figure 3.22
With EIGRP, a summary address can be manually configured by configuring a prefix
network. Manual summary routes are configured on a per-interface basis, so the
interface that will propagate the route summary must be selected first. Then the
summary address can be defined with the ip summary-address eigrp command:
router(config-if)#ip summary-address eigrp [autonomous-
system-number] [ip-address mask] [administrative-
distance]
EIGRP summary routes have an administrative distance of 5 by default. Optionally,
they can be configured for a value between 1 and 255.
In Figure 3.23, RTC can be configured using the commands shown:
Figure 3.23 Manual summarization with EIGRP
RTC(config)#router eigrp 2446
RTC(config-router)#no auto-summary
22
23. EIGRP
RTC(config-router)#exit
RTC(config)#interface serial 0/0
RTC(config-if)#ip summary-address eigrp 2446 2.1.0.0
255.255.0.0
Therefore, RTC will add a route to its table as follows:
D 2.1.0.0/16 is a summary, 00:00:22, Null0
Notice that the summary route is sourced from Null0 and not from an actual interface.
This is because this route is used for advertisement purposes and does not represent a
path that RTC can take to reach that network. On RTC, this route has an
administrative distance of 5.
RTD is not aware of the summarization but accepts the route. The route is assigned
the administrative distance of a normal EIGRP route, which is 90 by default.
In the configuration for RTC, auto-summarization is turned off with the no auto-
summary command. If auto-summarization was not turned off, RTD would receive
two routes, the manual summary address, which is 2.1.0.0 /16, and the automatic,
classful summary address, which is 2.0.0.0 /8.
In most cases when manually summarizing, the no auto-summary command should be
issued.
Verifying basic EIGRP
Verifying EIGRP operation is performed by the use of various show commands.
Figure 3.24 lists the key EIGRP show commands and briefly discusses their
functions.
Figure 3.24
23
24. EIGRP
The Cisco IOS debug feature also provides useful EIGRP monitoring commands.
Figure 3.25
Building neighbour tables
Simple distance vector routers do not establish any relationship with their
neighbours. RIP and IGRP routers merely broadcast or multicast updates on
configured interfaces. In contrast, EIGRP routers actively establish relationships with
their neighbours as do OSPF routers.
Figure 3.26
The neighbour table is the most important table in EIGRP. Each EIGRP router
maintains a neighbour table that lists adjacent routers. This table is comparable to the
adjacency database used by OSPF. There is a neighbour table for each protocol that
EIGRP supports.
EIGRP routers establish adjacencies with neighbour routers by using small hello
packets. Hellos are sent by default every five seconds.
24
25. EIGRP
Figure 3.27
An EIGRP router assumes that, as long as it is receiving hello packets from known
neighbours, those neighbours and their routes remain viable or passive. By forming
adjacencies, EIGRP routers do the following:
• Dynamically learn of new routes that join their network
• Identify routers that become either unreachable or inoperable
• Rediscover routers that had previously been unreachable
The following fields are found in a neighbour table:
Neighbour address – This is the network layer address of the neighbour router.
Hold Time – This is the interval to wait without receiving anything from a neighbour
before considering the link unavailable. Originally, the expected packet was a hello
packet, but in current Cisco IOS software releases, any EIGRP packets received after
the first hello will reset the timer.
Smooth Round-Trip Timer (SRTT) – This is the average time that it takes to send
and receive packets from a neighbour. This timer is used to determine the retransmit
interval (RTO).
Queue count (Q Cnt) – This is the number of packets waiting in a queue to be sent.
If this value is constantly higher than zero, there may be a congestion problem at the
router. A zero means that there are no EIGRP packets in the queue.
Sequence Number (Seq No) – This is the number of the last packet received from
that neighbour. EIGRP uses this field to acknowledge a transmission of a neighbour
and to identify packets that are out of sequence. The neighbour table is used to
support reliable, sequenced delivery of packets and can be regarded as analogous to
the TCP protocol used in the reliable delivery of IP packets.
25
26. EIGRP
Discover routes
EIGRP routers keep route and topology information available in RAM, so changes
can be reacted to quickly. Like OSPF, EIGRP keeps this information in several tables
or databases.
The EIGRP distance vector algorithm, DUAL, uses the information gathered in the
neighbour and topology tables and calculates the lowest cost route to the destination.
The primary route is called the successor route. When calculated, DUAL places the
successor route in the routing table and a copy in the topology table.
DUAL also attempts to calculate a backup route in case the successor route fails. This
is called the feasible successor route. When calculated, DUAL places the feasible
route in the topology table. This route can be called upon if the successor route to a
destination becomes unreachable or unreliable.
Select routes
If a link goes down, DUAL looks for an alternative route path, or feasible successor,
in the topology table. If a feasible successor is not found, the route is flagged as
Active, or unusable at present. Query packets are sent to neighbouring routers
requesting topology information. DUAL uses this information to recalculate successor
and feasible successor routes to the destination.
Once DUAL has completed these calculations, the successor route is placed in the
routing table. Then both the successor route and feasible successor route are placed in
the topology table. The route to the final destination will now pass from an ‘Active’
status to a ‘Passive’ status. This means that the route is now operational and reliable.
Figure 3.28
26
27. EIGRP
The sophisticated algorithm of DUAL results in EIGRP having exceptionally fast
convergence. To better understand convergence using DUAL, consider the example in
Figure 3.29. All routers have built a topology table that contains information about
how to route to destination network Z.
Figure 3.29
Each table identifies the following:
• The routing protocol or EIGRP
• The lowest cost of the route or Feasible Distance (FD)
• The cost of the route as advertised by the neighbouring router or Reported
Distance (RD)
Figure 3.30 EIGRP successors and feasible successors
27
28. EIGRP
The Topology heading identifies the preferred primary route, which is called the
successor route (Successor). If it is identified, the Topology heading will also identify
the backup route, which is called the feasible successor (FS). Note that it is not
necessary to have an identified feasible successor.
Maintaining routing tables
DUAL tracks all routes advertised by neighbours using the composite metric of each
route to compare them. DUAL also guarantees that each path is loop-free.
Lowest-cost paths are then inserted by the DUAL algorithm into the routing table.
These primary routes are known as successor routes. A copy of the successor paths is
placed in the topology table.
EIGRP keeps important route and topology information readily available in a
neighbour table and a topology table. These tables supply DUAL with comprehensive
route information in case of network disruption. DUAL selects alternate routes
quickly by using the information in these tables.
If a link goes down, DUAL looks for an alternative route path, or feasible successor,
in the topology table. If a feasible successor is not found, the route is flagged as
active, or unusable at present. Query packets are sent to neighbouring routers
requesting topology information. DUAL uses this information to recalculate successor
and feasible successor routes to the destination.
Once DUAL has completed these calculations, the successor route is placed in the
routing table. Then both the successor route and feasible successor route are placed in
the topology table. The route to the final destination will now pass from an active
status to a passive status. This means that the route is now operational and reliable.
EIGRP routers establish and maintain adjacencies with neighbour routers by using
small hello packets. Hellos are sent by default every five seconds. An EIGRP router
assumes that, as long as it is receiving hello packets from known neighbours, those
neighbours and their routes remain viable, or passive.
When newly discovered neighbours are learned, the address and interface of the
neighbour is recorded. This information is stored in the neighbour data structure.
28
29. EIGRP
When a neighbour sends a hello packet, it advertises a Hold Time. The Hold Time is
the amount of time a router treats a neighbour as reachable and operational. In other
words, if a hello packet is not heard from within the hold time, the hold time expires.
When the hold time expires, DUAL is informed of the topology change, and must
recalculate the new topology.
In the example in Figures 3.31 – 3.33, DUAL must reconstruct the topology following
the discovery of a broken link between router D and router B.
The new successor routes will be placed in the updated routing table.
Figure 3.31
Figure 3.32
29
30. EIGRP
Figure 3.33
Troubleshooting Routing Protocols
Routing protocol troubleshooting process
All routing protocol troubleshooting should begin with a logical sequence, or process
flow. This process flow is not a rigid outline for troubleshooting an internetwork.
However, it is a foundation from which a network administrator can build a problem-
solving process to suit a particular environment.
1. When analyzing a network failure, make a clear problem statement.
Define the problem in terms of a set of symptoms and potential causes.
To properly analyse the problem, identify the general symptoms and then ascertain
what kinds of problems or causes could result in these symptoms. For example, hosts
might not be responding to service requests from clients, which is a symptom.
Possible causes might include a Misconfigured host, bad interface cards or missing
router configuration commands.
2. Gather the facts needed to help isolate possible causes.
Define the problem in a set of symptoms and potential causes. Ask questions to
affected users, network administrators, managers and other key people.
Collect information from sources such as network management systems, protocol
analyser traces, output from router diagnostic commands or software release notes.
3. Consider possible problems based on the facts that have been gathered.
Using these facts can help to eliminate some of the potential problems from the list
Depending on the data, it might be possible to eliminate hardware as a problem so
that the focus can then be placed on software problems.
At every opportunity, try to narrow the number of potential problems to create an
efficient plan of action.
30
31. EIGRP
4. Create an action plan based on the remaining potential problems.
Begin with the most likely problem and devise a plan in which only one variable is
changed.
Changing only one variable at a time helps to reproduce a given solution to a specific
problem. Do not try to alter more than one variable at a time. Suc an action might
solve the problem, however identifying the specific change that eliminated the
symptom becomes far more difficult and will not help to solve the problem if it occurs
in the future.
5. Implement the action plan, performing each step carefully while testing to
see whether the symptom disappears.
6. Analyze the results to determine whether the problem has been resolved.
If it has, then the process is complete.
7. If the problem has not been resolved, create an action plan based on the
next most likely problem in the list. Return to Step 4, change one variable at a
time, and repeat the process until the problem is solved.
8. Once the actual cause of the problem is identified, try to solve it.
It is important at this point to document the problem and solution for future
reference.
If all attempts up to this point have failed, it might be necessary now to ask for
technical support from the manufacturer of the suspect equipment.
Alternative resources include professional experts or technical engineers to help
complete the troubleshooting process.
Cisco routers provide numerous integrated commands to assist in monitoring and
troubleshooting an internetwork:
• show commands help monitor installation behaviour and normal network
behaviour, as well as isolate problem areas.
o show commands can help monitor router behaviour during initial
installation
o Monitor normal network operation
o Isolating problem interfaces, nodes, media and applications
o Determining when a network is congested
o Determining the status of servers, clients or other neighbours
• debug commands assist in the isolation of protocol and configuration
problems
• TCP/IP network tools such as ping, traceroute, and telnet
o Extended ping refines basic ping operation for finer control
o ping quickly tests end-to-end network connectivity
o traceroute is used to identify bottlenecks or possibly locate broken
network connections
31
32. EIGRP
o telnet can be used to test proper end to end network connectivity
Cisco IOS show commands are among the most important tools for understanding
the status of a router, detecting neighbouring routers, monitoring the network in
general, and isolating problems in the network.
EXEC debug commands can provide a wealth of information about interface traffic,
internal error messages, protocol-specific diagnostic packets, and other useful
troubleshooting data. Use debug commands to isolate problems, not to monitor
normal network operation. Only use debug commands to look for specific types of
traffic or problems. Before using the debug command, narrow the problems to a
likely subset of causes. Use the show debugging command to view which
debugging features are enabled.
Troubleshooting RIP configuration
The most common problem found in Routing Information Protocol (RIP) that
prevents RIP routes from being advertised is the variable-length subnet mask
(VLSM). This is because RIP Version 1 does not support VLSM. If the RIP routes are
not being advertised, check the following:
• Layer 1 or Layer 2 connectivity issues exist.
• VLSM subnetting is configured. VLSM subnetting cannot be used with RIP
v1.
• Mismatched RIP v1 and RIP v2 routing configurations exist.
• Network statements are missing or incorrectly assigned.
• The outgoing interface is down.
• The advertised network interface is down.
The show ip protocols command provides information about the parameters
and current state of the active routing protocol process. RIP sends updates to the
interfaces in the specified networks.
Figure 3.34
32
33. EIGRP
If interface FastEthernet 0/1 was configured but the network was not
added to RIP routing, no updates would be sent out or received from the interface.
Use the debug ip rip EXEC command to display information on RIP routing
transactions. The no debug ip rip, no debug all, or undebug all
commands will turn off all debugging.
Figure 3.35 shows that the router being debugged has received an update from another
router at source address 192.168.3.1. That router sent information about two
destinations in the routing table update. The router being debugged also sent updates.
Both routers broadcasted address 255.255.255.255 as the destination. The number in
parentheses is the source address encapsulated into the IP header.
Figure 3.35
An entry most likely caused by a malformed packet from the transmitter is shown in
the following output:
RIP: bad version 128 from 160.89.80.43
Troubleshooting IGRP configuration
Interior Gateway Routing Protocol (IGRP) is an advanced distance vector routing
protocol developed by Cisco in the middle 1980s. IGRP has several features that
differentiate it from other distance vector routing protocols such as RIP.
33
34. EIGRP
Use the router igrp autonomous-system command to enable the IGRP
routing process:
R1(config)#router igrp 100
Use the router configuration network network-number command to enable
interfaces to participate in the IGRP update process:
R1(config-router)#network 172.30.0.0
R1(config-router)#network 192.168.3.0
Verify IGRP configuration with the show running-configuration and show
ip protocols commands:
R1#show ip protocols
Figure 3.36
Verify IGRP operation with the show ip route command:
R1#show ip route
Figure 3.37
If IGRP does not appear to be working correctly, check the following:
• Layer 1 or Layer 2 connectivity issues exist.
• Autonomous system numbers on IGRP routers are mismatched.
• Network statements are missing or incorrectly assigned.
34
35. EIGRP
• The outgoing interface is down.
• The advertised network interface is down.
To view IGRP debugging information, use the following commands:
debug ip igrp transactions [host ip address] to view IGRP
transaction information
debug ip igrp events [host ip address] to view routing update
information
To turn off debugging, use the no debug ip igrp command.
If a network becomes inaccessible, routers running IGRP send triggered updates to
neighbours to inform them. A neighbour router will then respond with poison reverse
updates and keep the suspect network in a holddown state for 280 seconds.
Troubleshooting EIGRP configuration
Normal EIGRP operation is stable, efficient in bandwidth utilization, and relatively
simple to monitor and troubleshoot.
Use the router eigrp [autonomous-system] command to enable the
EIGRP routing process:
R1(config)#router eigrp 100
To exchange routing updates, each router in the EIGRP network must be configured
with the same autonomous system number.
Use the router configuration network network-number command to enable
interfaces to participate in the EIGRP update process:
R1(config-router)#network 172.30.0.0
R1(config-router)#network 192.168.3.0
Verify EIGRP configuration with the show running-configuration and
show ip protocols commands:
R1#show ip protocols
Figure 3.38
35
36. EIGRP
Some possible reasons why EIGRP may not be working correctly are:
• Layer 1 or Layer 2 connectivity issues exist.
• Autonomous system numbers on EIGRP routers are mismatched.
• The link may be congested or down.
• The outgoing interface is down.
• The advertised network interface is down.
• Auto-summarization is enabled on routers with discontiguous subnets. Use no
auto-summary to disable automatic network summarization.
One of the most common reasons for a missing neighbour is a failure on the actual
link. Another possible cause of missing neighbours is an expired holddown timer.
Since hellos are sent every 5 seconds on most networks, the hold-time value in a
show ip eigrp neighbours command output should normally be a value
between 10 and 15.
Figure 3.39
To effectively monitor and troubleshoot an EIGRP network, use the commands
described in Figures 3.40 – 3.41.
Figure 3.40
36
37. EIGRP
Figure 3.41
Troubleshooting OSPF configuration
Open Shortest Path First (OSPF) is a link-state protocol. A link is an interface on a
router. The state of the link is a description of that interface and of its relationship to
its neighbouring routers. For example, a description of the interface would include the
IP address, the mask, the type of network to which it is connected, the routers
connected to that network, and so on. This information forms a link-state database.
The majority of problems encountered with OSPF relate to the formation of
adjacencies and the synchronization of the link-state databases. The show ip ospf
neighbor command is useful for troubleshooting adjacency formation. OSPF
configuration commands are shown in Figure 3.42.
Figure 3.42
Use the debug ip ospf events privileged EXEC command to display the
following information about OSPF-related events:
• Adjacencies
• Flooding information
• Designated router selection
• Shortest path first (SPF) calculation
If a router configured for OSPF routing is not seeing an OSPF neighbour on an
attached network, perform the following tasks:
37
38. EIGRP
Verify that both routers have been configured with the same IP mask, OSPF hello
interval, and OSPF dead interval.
Verify that both neighbours are part of the same area.
To display information about each Open Shortest Path First (OSPF) packet received,
use the debug ip ospf packet privileged EXEC command. The no form of
this command disables debugging output.
The debug ip ospf packet command produces one set of information for each
packet received. The output varies slightly, depending on which authentication is used
Summary
An understanding of the following key points should have been achieved:
• Differences between EIGRP and IGRP
• Key concepts, technologies, and data structures of EIGRP
• EIGRP convergence and the basic operation of the Diffusing Update
Algorithm, or DUAL
• Basic EIGRP configuration
• Configuring EIGRP route summarization
• The processes used by EIGRP to build and maintain routing tables
• Verifying EIGRP operations
• The eight-step process for general troubleshooting
• Applying a logical process to routing troubleshooting
• Troubleshooting a RIP routing process using show and debug commands
• Troubleshooting an IGRP routing process using show and debug commands
• Troubleshooting an EIGRP routing process using show and debug commands
• Troubleshooting an OSPF routing process using show and debug commands
38