SlideShare a Scribd company logo
1 of 31
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-1
Medium-Sized Routed Network Construction
Reviewing Routing
Operations
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-2
Static Route
 Uses a route that a
network administrator
enters into the router
manually
Dynamic Route
 Uses a route that a
network routing protocol
adjusts automatically for
topology or traffic changes
Static vs. Dynamic Routes
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-3
What Is a Dynamic Routing Protocol?
 Routing protocols are
used between routers to
determine paths to remote
networks and maintain
those networks in the
routing tables.
 After the path is determined,
a router can route a routed
protocol to the learned networks.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-4
 An autonomous system is a collection of networks within
a common administrative domain.
 Interior gateway protocols operate within an autonomous system.
 Exterior gateway protocols connect different autonomous systems.
Autonomous Systems: Interior and
Exterior Routing Protocols
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-5
Classes of Routing Protocols
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-6
Selecting the Best Route Using Metrics
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-7
Administrative Distance:
Ranking Routing Sources
Routers choose the routing source with the
best administrative distance:
 OSPF has an administrative distance of 110.
 EIGRP has an administrative distance of 90.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-8
Distance Vector Routing Protocols
Routers pass periodic copies of their routing table to
neighboring routers and accumulate distance vectors.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-9
Sources of Information and
Discovering Routes
Routers discover the best path to destinations from each neighbor.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-10
Maintaining Routing Information
Updates proceed step by step from router to router.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-11
Inconsistent Routing Entries:
Counting to Infinity and Routing Loops
Each node maintains the distance from itself
to each possible destination network.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-12
Counting to Infinity
Slow convergence produces inconsistent routing.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-13
Counting to Infinity (Cont.)
Router C concludes that the best path to
network 10.4.0.0 is through router B.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-14
Counting to Infinity (Cont.)
Router A updates its table to reflect
the new but erroneous hop count.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-15
Counting to Infinity (Cont.)
The hop count for network 10.4.0.0 counts to infinity.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-16
Solution to Counting to Infinity:
Defining a Maximum
A limit is set on the number of hops to prevent infinite loops.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-17
Routing Loops
Packets for network 10.4.0.0 bounce
(loop) between routers B and C.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-18
Solution to Routing Loops: Split Horizon
It is never useful to send information about a route back
in the direction from which the original information came.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-19
Solution to Routing Loops:
Route Poisoning and Poison Reverse
Routers advertise the distance of routes
that have gone down to infinity.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-20
Solution to Routing Loops:
Route Poisoning and Poison Reverse (Cont.)
Poison reverse overrides split horizon.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-21
Solution to Routing Loops:
Hold-Down Timers
The router keeps an entry for the “possibly down” state in the network,
allowing time for other routers to recompute for this topology change.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-22
Triggered Updates
The router sends updates when a change in its routing table occurs.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-23
Eliminating Routing Loops
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-24
Eliminating Routing Loops (Cont.)
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-25
Eliminating Routing Loops (Cont.)
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-26
Link-State Routing Protocols
After an initial flood of LSAs, link-state routers pass small,
event-triggered link-state updates to all other routers.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-27
OSPF Hierarchical Routing
 Consists of areas and autonomous systems
 Minimizes routing update traffic
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-28
Link-State Routing Protocol Algorithms
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-29
 Benefits of link-state routing:
– Fast convergence:
 Changes are reported immediately by the affected source
– Robustness against routing loops:
 Routers know the topology
 Link-state packets are sequenced and acknowledged
– Hierarchical network design enables optimization of resources.
 Drawbacks of link-state routing:
– Significant demands for resources:
 Memory (three tables: adjacency, topology, forwarding)
 CPU (Dijkstra’s algorithm can be intensive, especially when there are many
instabilities)
– Requires very strict network design
– Configuration can be complex when tuning various parameters and
when design is complex
Benefits and Drawbacks of Link-State Routing
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-30
Summary
 Dynamic routing requires administrators to configure either a
distance vector or link-state routing protocol.
 Distance vector routing protocols incorporate solutions such as
split horizon, route poisoning, and hold-down timers to prevent
routing loops.
 Link-state routing protocols scale to large network infrastructures
better than distance vector routing protocols, but they require
more planning to implement.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-31

More Related Content

What's hot (20)

Icnd210 s08l05
Icnd210 s08l05Icnd210 s08l05
Icnd210 s08l05
 
Icnd210 s08l02
Icnd210 s08l02Icnd210 s08l02
Icnd210 s08l02
 
Icnd210 cag
Icnd210 cagIcnd210 cag
Icnd210 cag
 
Icnd210 s08l01
Icnd210 s08l01Icnd210 s08l01
Icnd210 s08l01
 
Icnd210 s02l02
Icnd210 s02l02Icnd210 s02l02
Icnd210 s02l02
 
Icnd210 s08l03
Icnd210 s08l03Icnd210 s08l03
Icnd210 s08l03
 
Icnd210 s01l02
Icnd210 s01l02Icnd210 s01l02
Icnd210 s01l02
 
Icnd210 s01l01
Icnd210 s01l01Icnd210 s01l01
Icnd210 s01l01
 
Icnd210 s06l01
Icnd210 s06l01Icnd210 s06l01
Icnd210 s06l01
 
CCNA Icnd110 s06l01
 CCNA Icnd110 s06l01 CCNA Icnd110 s06l01
CCNA Icnd110 s06l01
 
Icnd210 s07l02
Icnd210 s07l02Icnd210 s07l02
Icnd210 s07l02
 
Icnd210 s06l02
Icnd210 s06l02Icnd210 s06l02
Icnd210 s06l02
 
CCNA Icnd110 s05l05
CCNA Icnd110 s05l05CCNA Icnd110 s05l05
CCNA Icnd110 s05l05
 
CCNA Icnd110 s05l03
CCNA Icnd110 s05l03CCNA Icnd110 s05l03
CCNA Icnd110 s05l03
 
Icnd210 s04l01
Icnd210 s04l01Icnd210 s04l01
Icnd210 s04l01
 
Icnd210 s00
Icnd210 s00Icnd210 s00
Icnd210 s00
 
CCNA Icnd110 s02l07
CCNA Icnd110 s02l07CCNA Icnd110 s02l07
CCNA Icnd110 s02l07
 
CCNA Icnd110 s02l08
 CCNA Icnd110 s02l08 CCNA Icnd110 s02l08
CCNA Icnd110 s02l08
 
CCNA Icnd110 s06l02
CCNA Icnd110 s06l02CCNA Icnd110 s06l02
CCNA Icnd110 s06l02
 
Eigrp authentication
Eigrp authenticationEigrp authentication
Eigrp authentication
 

Similar to Icnd210 s03l01

18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routingCYBERINTELLIGENTS
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamicallyteknetir
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyVuz Dở Hơi
 
KPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_finalKPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_finalFisal Anwari
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyYaser Rahmati
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2Joshua Torres
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7Nil Menon
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2Irsandi Hasan
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5Chaing Ravuth
 
Network basics 2 eng. moaath alshaikh
Network basics 2 eng. moaath alshaikhNetwork basics 2 eng. moaath alshaikh
Network basics 2 eng. moaath alshaikhMoaath alshaikh
 
Exploration routing chapter_4
Exploration routing chapter_4Exploration routing chapter_4
Exploration routing chapter_4Joshua Torres
 
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptSunny1710
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Dân Chơi
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4Irsandi Hasan
 

Similar to Icnd210 s03l01 (20)

CCNA Icnd110 s04l01
CCNA Icnd110 s04l01CCNA Icnd110 s04l01
CCNA Icnd110 s04l01
 
18 link state - balanced hybrid routing
18   link state - balanced hybrid  routing18   link state - balanced hybrid  routing
18 link state - balanced hybrid routing
 
Chapter 18 : routing dynamically
Chapter 18 : routing dynamicallyChapter 18 : routing dynamically
Chapter 18 : routing dynamically
 
CCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing DynamicallyCCNAv5 - S2: Chapter 7 Routing Dynamically
CCNAv5 - S2: Chapter 7 Routing Dynamically
 
KPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_finalKPUCC-Rs instructor ppt_chapter7_final
KPUCC-Rs instructor ppt_chapter7_final
 
Chapter 07 - Routing Dynamically
Chapter 07 - Routing DynamicallyChapter 07 - Routing Dynamically
Chapter 07 - Routing Dynamically
 
Exploration routing chapter_2
Exploration routing chapter_2Exploration routing chapter_2
Exploration routing chapter_2
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2CCNA Exploration 2 - Chapter 2
CCNA Exploration 2 - Chapter 2
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5CCNA3 Verson6 Chapter5
CCNA3 Verson6 Chapter5
 
Network basics 2 eng. moaath alshaikh
Network basics 2 eng. moaath alshaikhNetwork basics 2 eng. moaath alshaikh
Network basics 2 eng. moaath alshaikh
 
Day 3.2 routing
Day 3.2 routing Day 3.2 routing
Day 3.2 routing
 
CCNA Icnd110 s01l07
CCNA Icnd110 s01l07CCNA Icnd110 s01l07
CCNA Icnd110 s01l07
 
Exploration routing chapter_4
Exploration routing chapter_4Exploration routing chapter_4
Exploration routing chapter_4
 
Distance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.pptDistance Vector Routing Protocols.ppt
Distance Vector Routing Protocols.ppt
 
Day 20.2 frame relay
Day 20.2 frame relay Day 20.2 frame relay
Day 20.2 frame relay
 
Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011Ccna 2 chapter 10 v4.0 answers 2011
Ccna 2 chapter 10 v4.0 answers 2011
 
CCNA Icnd110 s05l01
CCNA Icnd110 s05l01CCNA Icnd110 s05l01
CCNA Icnd110 s05l01
 
CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4CCNA Exploration 2 - Chapter 4
CCNA Exploration 2 - Chapter 4
 

More from computerlenguyen (8)

Icnd210 s07l03
Icnd210 s07l03Icnd210 s07l03
Icnd210 s07l03
 
Icnd210 s07l01
Icnd210 s07l01Icnd210 s07l01
Icnd210 s07l01
 
Icnd210 s06l03
Icnd210 s06l03Icnd210 s06l03
Icnd210 s06l03
 
Icnd210 s05l03
Icnd210 s05l03Icnd210 s05l03
Icnd210 s05l03
 
Icnd210 s05l02
Icnd210 s05l02Icnd210 s05l02
Icnd210 s05l02
 
Icnd210 s04l03
Icnd210 s04l03Icnd210 s04l03
Icnd210 s04l03
 
Icnd210 s04l02
Icnd210 s04l02Icnd210 s04l02
Icnd210 s04l02
 
Icnd210 s03l03
Icnd210 s03l03Icnd210 s03l03
Icnd210 s03l03
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Icnd210 s03l01

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-1 Medium-Sized Routed Network Construction Reviewing Routing Operations
  • 2. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-2 Static Route  Uses a route that a network administrator enters into the router manually Dynamic Route  Uses a route that a network routing protocol adjusts automatically for topology or traffic changes Static vs. Dynamic Routes
  • 3. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-3 What Is a Dynamic Routing Protocol?  Routing protocols are used between routers to determine paths to remote networks and maintain those networks in the routing tables.  After the path is determined, a router can route a routed protocol to the learned networks.
  • 4. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-4  An autonomous system is a collection of networks within a common administrative domain.  Interior gateway protocols operate within an autonomous system.  Exterior gateway protocols connect different autonomous systems. Autonomous Systems: Interior and Exterior Routing Protocols
  • 5. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-5 Classes of Routing Protocols
  • 6. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-6 Selecting the Best Route Using Metrics
  • 7. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-7 Administrative Distance: Ranking Routing Sources Routers choose the routing source with the best administrative distance:  OSPF has an administrative distance of 110.  EIGRP has an administrative distance of 90.
  • 8. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-8 Distance Vector Routing Protocols Routers pass periodic copies of their routing table to neighboring routers and accumulate distance vectors.
  • 9. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-9 Sources of Information and Discovering Routes Routers discover the best path to destinations from each neighbor.
  • 10. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-10 Maintaining Routing Information Updates proceed step by step from router to router.
  • 11. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-11 Inconsistent Routing Entries: Counting to Infinity and Routing Loops Each node maintains the distance from itself to each possible destination network.
  • 12. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-12 Counting to Infinity Slow convergence produces inconsistent routing.
  • 13. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-13 Counting to Infinity (Cont.) Router C concludes that the best path to network 10.4.0.0 is through router B.
  • 14. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-14 Counting to Infinity (Cont.) Router A updates its table to reflect the new but erroneous hop count.
  • 15. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-15 Counting to Infinity (Cont.) The hop count for network 10.4.0.0 counts to infinity.
  • 16. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-16 Solution to Counting to Infinity: Defining a Maximum A limit is set on the number of hops to prevent infinite loops.
  • 17. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-17 Routing Loops Packets for network 10.4.0.0 bounce (loop) between routers B and C.
  • 18. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-18 Solution to Routing Loops: Split Horizon It is never useful to send information about a route back in the direction from which the original information came.
  • 19. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-19 Solution to Routing Loops: Route Poisoning and Poison Reverse Routers advertise the distance of routes that have gone down to infinity.
  • 20. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-20 Solution to Routing Loops: Route Poisoning and Poison Reverse (Cont.) Poison reverse overrides split horizon.
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-21 Solution to Routing Loops: Hold-Down Timers The router keeps an entry for the “possibly down” state in the network, allowing time for other routers to recompute for this topology change.
  • 22. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-22 Triggered Updates The router sends updates when a change in its routing table occurs.
  • 23. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-23 Eliminating Routing Loops
  • 24. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-24 Eliminating Routing Loops (Cont.)
  • 25. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-25 Eliminating Routing Loops (Cont.)
  • 26. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-26 Link-State Routing Protocols After an initial flood of LSAs, link-state routers pass small, event-triggered link-state updates to all other routers.
  • 27. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-27 OSPF Hierarchical Routing  Consists of areas and autonomous systems  Minimizes routing update traffic
  • 28. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-28 Link-State Routing Protocol Algorithms
  • 29. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-29  Benefits of link-state routing: – Fast convergence:  Changes are reported immediately by the affected source – Robustness against routing loops:  Routers know the topology  Link-state packets are sequenced and acknowledged – Hierarchical network design enables optimization of resources.  Drawbacks of link-state routing: – Significant demands for resources:  Memory (three tables: adjacency, topology, forwarding)  CPU (Dijkstra’s algorithm can be intensive, especially when there are many instabilities) – Requires very strict network design – Configuration can be complex when tuning various parameters and when design is complex Benefits and Drawbacks of Link-State Routing
  • 30. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-30 Summary  Dynamic routing requires administrators to configure either a distance vector or link-state routing protocol.  Distance vector routing protocols incorporate solutions such as split horizon, route poisoning, and hold-down timers to prevent routing loops.  Link-state routing protocols scale to large network infrastructures better than distance vector routing protocols, but they require more planning to implement.
  • 31. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—3-31

Editor's Notes

  1. <number> Purpose: This figure introduces students to static and dynamic routes. Emphasize: Static knowledge is administered manually—a network administrator enters it into the router’s configuration. The administrator must manually update this static route entry whenever an internetwork topology change requires an update. Static knowledge can be private—by default it is not conveyed to other routers as part of an update process. You can, however, configure the router to share this knowledge. Dynamic knowledge works differently. After the network administrator enters configuration commands to start dynamic routing, route knowledge is updated automatically by a routing process. Whenever new topology information is received from the internetwork, routers update neighbors about the route change.
  2. <number> Purpose: This figure introduces students to routing protocols and compares routing protocols to routed protocols. Emphasize: If network 10.120.2.0 wants to know about network 172.16.2.0, it must learn it from its S0 (or possibly S1) interface. Note: The two routing protocols that will be taught in this course are RIP and IGRP. They are both distance vector routing protocols.
  3. <number> Purpose: This figure discusses autonomous systems, IGPs and EGPs. Emphasize: Introduce the interior/exterior distinctions for routing protocols, as follows: Interior routing protocols are used within a single autonomous system Exterior routing protocols are used to communicate between autonomous systems The design criteria for an interior routing protocol require it to find the best path through the network. In other words, the metric and how that metric is used is the most important element in an interior routing protocol. Exterior protocols are used to exchange routing information between networks that do not share a common administration. IP exterior gateway protocols require the following three sets of information before routing can begin: A list of neighbor (or peer) routers or access servers with which to exchange routing information A list of networks to advertise as directly reachable The autonomous system number of the local router
  4. <number> Purpose: This figure introduces the three classes of routing protocols. Emphasize: There is no single best routing protocol. Note: Distance vector routing protocol operation is covered in detail later in this course. Link state and hybrid are only briefly explained after the distance vector discussion. Refer students to the ACRC to learn more about link-state and hybrid routing protocols.
  5. <number> Emphasize: How the routing algorithm defines “best” determines the most important characteristics of each routing algorithm. Hop count—Some routing protocols use hop count as their metric. Hop count refers to the number of routers a packet must go through to reach a destination. The lower the hop count, the better the path. Path length is used to indicate the sum of the hops to a destination. As indicated in the figure, RIP uses hop count for its metric. Ticks—Metric used with Novell IPX to reflect delay. Each tick is 1/18th of a second. Cost—Factor used by some routing protocols to determine the best path to a destination; the lower the cost, the better the path. Path cost is the sum of the costs associated with each link to a destination. Bandwidth—Although bandwidth is the rating of a link’s maximum throughput, routing through links with greater bandwidth does not always provide the best routes. For example, if a high-speed link is busy, sending a packet through a slower link might be faster. As indicated in the figure with highlighting, delay and bandwidth comprise the default metric for IGRP. Delay—Depends on many factors, including the bandwidth of network links, the length of queues at each router in the path, network congestion on links, and the physical distance to be traveled. A conglomeration of variables that change with internetwork conditions, delay is a common and useful metric. As indicated in the figure with highlighting, delay and bandwidth comprise the default metric for IGRP. Load—Dynamic factor can be based on a variety of measures, including CPU use and packets processed per second. Monitoring these parameters on a continual basis can itself be resource intensive.
  6. <number> Purpose: This figure introduces administrative distance. Emphasize: An administrative distance is a rating of the trustworthiness of a routing information source, such as an individual router or a group of routers. In a large network, some routing protocols and some routers can be more reliable than others as sources of routing information. The default administrative distance for static routes and various routing protocols is listed in the Student Guide. The lower the distance, the more trustworthy the route is. For example, in the figure, the packet would learn the route learned via IGRP.
  7. <number> Purpose: This figure introduces the distance vector routing algorithm, the first of the classes of routing protocols, and outlines how it operates. Emphasize: Distance vector algorithms do not allow a router to know the exact topology of an internetwork. This information is somewhat analogous to the information found on signs at a highway intersection. A sign points toward a road leading away from the intersection and indicates the distance to the destination. Further down the highway, another sign also points toward the destination, but now the distance to the destination is shorter. As long as each successive point on the path shows that the distance to the destination is successively shorter, the traffic is following the best path.
  8. <number> Layer 3 of 3 Emphasize: Layer 3 adds the final entries received some time later that have distances of 2 from routers A and C.
  9. <number> Layer 3 of 3 Layer 3 adds router B, which receives the updated routing table from router A. In turn, router B will perform its own process to update its routing table given this new topology update from router A. Distance vector updates occur step by step. Typically, a router sends updates by multicasting its table on each configured port, but other methods, such as sending the table only to preconfigured neighbors, are employed by some routing algorithms. Multicast is used by the RIP2, OSPF, and EIGRP routing protocols. RIP and IGRP use broadcast. The routing table can be sent routinely and periodically, or whenever a change in the topology is discovered. Updates sent when changes occur are called triggered updates.
  10. <number> Slide 1 of 4 Purpose: This figure describes the first of the general problems that a distance vector protocol could face without the corrective influence of some countermeasure. Emphasize: Layer 1 shows the original state of the network and routing tables. All routers have consistent knowledge and correct routing tables. In this example, the cost function is hop count, so the cost of each link is 1. Router C is directly connected to network 10.4.0.0 with a distance of 0. Router A’s path to network 10.4.0.0 is through router B, with a hop count of 2.
  11. <number> Slide 2 of 4 Emphasize: In Layer 2, router C has detected the failure of network 10.4.0.0 and stops routing packets out its E0 interface. However, router A has not yet received notification of the failure and still believes it can access network 10.4.0.0 through router B. Router A’s routing table still reflects a path to network 10.4.0.0 with a distance of 2.
  12. <number> Slide 3 of 4 Emphasize: Because router B’s routing table indicates a path to network 10.4.0.0, router C believes it now has a viable path to 10.4.0.0 through router B. Router C updates its routing table to reflect a path to network 10.4.0.0 with a hop count of 2.
  13. <number> Slide 4 of 4 Emphasize: In Layer 4, router A receives the new routing table from router B, detects the modified distance vector to network 10.4.0.0, and recalculates its own distance vector to network 10.4.0.0 as 3. If all routers in an internetwork do not have up-to-date, accurate information about the state of the internetwork, they might use incorrect routing information to make a routing decision. The use of incorrect information might cause packets to take less-than-optimum paths or paths that return packets to routers that they have already visited.
  14. <number> Purpose: This figure describes another of the general problems that a distance vector protocol could face without the corrective influence of some countermeasure. Emphasize: Both routers conclude that the best path to network 10.4.0.0 is through each other and continue to bounce packets destined for network 10.4.0.0 between each other, incrementing the distance vector by 1 each time. This condition, called count to infinity, continuously loops packets around the network, despite the fundamental fact that the destination network 10.4.0.0 is down. While the routers are counting to infinity, the invalid information allows a routing loop to exist. A related concept is the Time-to-Live (TTL) parameter. The TTL is a packet parameter that decreases each time a router processes the packet. When the TTL reaches zero, a router discards or drops the packet without forwarding it. A packet caught in a routing loop is removed from the internetwork when its TTL expires.
  15. <number> Purpose: This figure describes a corrective measure that attempts to solve the routing loop problems that a distance vector protocol could face. Emphasize: Routing loops occur only when routing knowledge being propagated has not yet reached the entire internetwork—when the internetwork has not converged after a change. Fast convergence minimizes the chance for a routing loop to occur, but even the smallest interval leaves the possibility open. To avoid prolonging the count-to-infinity time span, distance vector protocols define infinity as some maximum number. This number refers to a routing metric, such as a hop count. With this approach, the routing protocol permits the routing loop until the metric exceeds its maximum allowed value. This example shows this defined maximum as 16 hops. Once the metric value exceeds the maximum, network 10.4.0.0 is considered unreachable.
  16. <number> Slide 4 of 4 Emphasize: In Layer 4, router A receives the new routing table from router B, detects the modified distance vector to network 10.4.0.0, and recalculates its own distance vector to network 10.4.0.0 as 3. If all routers in an internetwork do not have up-to-date, accurate information about the state of the internetwork, they might use incorrect routing information to make a routing decision. The use of incorrect information might cause packets to take less-than-optimum paths or paths that return packets to routers that they have already visited.
  17. <number> Purpose: This figure introduces the corrective measure known as “split horizon.” The split horizon technique attempts to solve routing loops. Emphasize: The split horizon technique attempts to eliminate routing loops and speed up convergence. The rule of split horizon is that it is never useful to send information about a route back in the direction from which the original packet came. In the example: Router C originally announced a route to network 10.4.0.0 to router B. It makes no sense for router B to announce to router C that router B has access to network 10.4.0.0 through router C. Given that router B passed the announcement of its route to network 10.4.0.0 to router A, it makes no sense for router A to announce its distance from network 10.4.0.0 to router B. Because router B has no alternative path to network 10.4.0.0, router B concludes that network 10.4.0.0 is inaccessible. In its basic form, the split-horizon technique simply omits from the message any information about destinations routed on the link. This strategy relies either on routes never being announced or on old announcements fading away through a timeout mechanism. Split horizon also improves performance by eliminating unnecessary routing updates. Under normal circumstances, sending routing information back to the source of the information is unnecessary.
  18. <number> 1, 95, 133
  19. <number> Purpose: This figure explains poison reverse. Emphasize: Poison reverse overrides the split-horizon solution.
  20. <number> Purpose: This figure describes how hold-down timers avoid the general problems that a routing protocol could face. Emphasize: Hold-down timers are used to prevent regular update messages from inappropriately reinstating a route that may have gone bad. Hold-downs tell routers to hold any changes that might affect routes for some period of time. The hold-down period is usually calculated to be just greater than the period of time necessary to update the entire network with a routing change. Note: A network administrator can configure the hold-down timers on several routers to work together in tandem.
  21. <number> Purpose: This figure describes how triggered updates avoid the general problems that a routing protocol could face. Emphasize: Normally, new routing tables are sent to neighboring routers on a regular basis. A triggered update is a new routing table that is sent immediately, in response to some change. Each update triggers a routing table change in the adjacent routers, which, in turn, generate triggered updates notifying their adjacent neighbors of the change. This wave propagates throughout that portion of the network where routes went through the link. Triggered updates would be sufficient if we could guarantee that the wave of updates reached every appropriate router immediately. However, there are two problems: Packets containing the update message can be dropped or corrupted by some link in the network. The triggered updates do not happen instantaneously. It is possible that a router that has not yet received the triggered update will issue a regular update at just the wrong time, causing the bad route to be reinserted in a neighbor that had already received the triggered update. Coupling triggered updates with holddowns is designed to get around these problems. Because the hold-down rule says that when a route is removed, no new route will be accepted for the same destination for some period of time, the triggered update has time to propagate throughout the network.
  22. <number> Slide 2 of 6 Purpose: This figure continues to describe how the solution works to prevent routing loops in a more complex network design. Emphasize: Describe that routers D and A both set their hold-down timers and send triggered updates to router E about the status of network 10.4.0.0. Router E also sets its hold-down timer.
  23. <number> Slide 4 of 6 Purpose: This figure continues to describe how the solution works to prevent routing loops in a more complex network design. Emphasize: While in hold-down state, routers A, D, and E will still attempt to forward packets to network 10.4.0.0.
  24. <number> Slide 5 of 6 Purpose: This figure continues to describe how the solution works to prevent routing loops in a more complex network design. Emphasize: When the link is back up, router B will send a triggered update to router A and router D, notifying them that network 10.4.0.0 is active.
  25. <number> Purpose: This figure introduces the link-state routing algorithm, the second of the classes of routing protocols, and outlines how it operates. Emphasize: In contrast with the analogy about the distance vector information being like individual road signs that show distance, link-state information is somewhat analogous to a road map with a “you are here” pointer showing the map reader’s current location. This larger perspective indicates the shortest path to the destination. Each router has its own map of the complete topology. Link-state routing is not covered further in this course. Refer students interested in more details to the ACRC course.
  26. <number>
  27. <number>