SlideShare une entreprise Scribd logo
1  sur  35
IP ROUTING
By
Anil Kumar Vishwakarma
MCA,MCTS,CCNA
ROUTING BASICS
The term routing is used for taking a packet from one device and
sending it through the network to another device on a different network.
To be able to route packets, a router must know, at a minimum, the
following:
• Destination address
• Neighbor routers from which it can learn about remote
networks
• Possible routes to all remote networks
• The best route to each remote network
• How to maintain and verify routing information
ROUTE TYPES
CONFIGURING STATICIP ROUTING
 Static routing has the following benefits:
 There is no overhead on the router CPU, which means you could
possibly buy a cheaper router than if you were using dynamic
routing.
 There is no bandwidth usage between routers, which means you
could possibly save money on WAN links.
 It adds security, because the administrator can choose to allow
routing access to certain networks only.
 Static routing has the following disadvantages:
 The administrator must really understand the internetwork and
how each router is connected in order to configure routes correctly.
 If a network is added to the internetwork, the administrator has to
add a route to it on all routers—by hand.
 It’s not feasible in large networks because maintaining it would be
a full-time job in itself.
STATIC ROUTING
 Static Routes built by using IP route command
DEFAULT ROUTING
 Default routes are used to route packets with destinations that do not
match any of the other routes in the routing table.
 Routers are typically configured with a default route for Internet-
bound traffic, since it is often impractical and unnecessary to
maintain routes to all networks in the Internet.
 A default route is actually a special static route that uses this format:
ip route 0.0.0.0 0.0.0.0 [next-hop-address]
VERIFYING STATIC ROUTE CONFIGURATION
 It is important to verify that they are present in the routing table and
that routing is working as expected.
 The command show run is used to view the active configuration in
RAM to verify that the static route was entered correctly.
Router#sh run
 The show ip route command is used to make sure that the static
route is present in the routing table.
Router#sh ip route
TROUBLESHOOTING STATIC ROUTE
If any problem in connection between networks follow this steps:
1. verifying static routes (by using sh ip route) to make sure the route
found in routing table.
2. If the problem exists, run a traceroute command.
DYNAMIC ROUTING OVERVIEW
 Routing protocols
 Routed protocol
 Autonomous systems
 Purpose of a routing protocol and
autonomous systems
 Identifying the classes of routing protocols
ROUTING PROTOCOLS
 It is the communication used between routers.
 It allows one router to share information with other routers regarding
the networks .
 The information a router gets from another router, using a routing
protocol, is used to build and maintain a routing table.
 Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
ROUTED PROTOCOL
 It is used to direct user traffic.
 It provides enough information in its network layer address to
allow a packet to be forwarded from one host to another
based on the addressing scheme.
 Examples of routed protocols are: IP and IPX.
AUTONOMOUS SYSTEMS
 An autonomous system (AS) is a collection of networks under a
common administration sharing a common routing strategy.
 To the outside world, an AS is viewed as a single entity.
 The AS may be run by one or more operators while presenting a
consistent view of routing to the external world.
PURPOSE OF A ROUTING PROTOCOL AND
AUTONOMOUS SYSTEMS
 The goal of a routing protocol is to build and maintain the routing
table.
 Routers use routing protocols to manage information received from
other routers .
 Autonomous systems (AS) provide the division of the global
internetwork into smaller and more manageable networks.
 Each AS has its own set of rules and policies and an AS number that
will uniquely distinguish it from other autonomous systems
throughout the world.
THE TYPES OF ROUTING PROTOCOLS
Most routing algorithms can be classified into one of two categories:
1. Distance Vector
The distance vector routing approach determines the direction
(vector) and distance to any link in the internetwork.
As an example: RIP and IGRP.
2. Link State
The link-state approach, also called shortest path first, recreates the
exact topology of the entire internetwork.
As an example: OSPF.
3. Hybrid
Mixed between distance vector and link state
As an example: EIGRP.
DISTANCE VECTOR ROUTING
 Distance vector routing updates
 Distance vector routing loop issues
 Defining a maximum count
 Elimination routing loops through split
horizon
 Route poisoning
 Preventing routing loops with holddown
timers
DISTANCE VECTOR ROUTING UPDATES
 Routing table updates occur periodically or when the topology in a
distance vector protocol network changes.
 Distance vector algorithms call for each router to send its entire
routing table to each of its adjacent neighbors.
 The administrative distance (AD) is used to rate the trustworthiness
of routing information received on a router from a neighbor router.
 An administrative distance is an integer from 0 to 255, where 0 is the
most trusted and 255 means no traffic will be passed via this route.
 If a router receives two updates listing the same remote network, the
first thing the router checks is the AD.
 If one of the advertised routes has a lower AD than the other, then
the route with the lowest AD will be placed in the routing table.
 If both advertised routes to the same network have the same
AD, then routing protocol metrics will be used to find the best path to
the remote network.
 The routing tables include information about the total path cost as
defined by the metrics.
DISTANCE VECTOR ROUTING LOOP ISSUES
DISTANCE VECTOR ROUTING LOOP ISSUES
 Routing loops can occur when inconsistent routing tables are not
updated due to slow convergence in a changing network.
 Just before the failure of Network 1, all routers have consistent
knowledge and correct routing tables.
 When Network 1 fails, Router E sends an update to Router A.
 Router A stops routing packets to Network 1, but Routers B, C, and D
continue to do so because they have not yet been informed of the
failure.
 When Router A sends out its update, Routers B and D stop routing to
Network 1.
 However, Router C has not received an update, so Network 1 is still
reachable via Router B.
 Now Router C sends a periodic update to Router D, indicating a path
to Network 1 by way of Router B.
 Router D changes its routing table to reflect this good, but incorrect,
information, and propagates the information to Router A.
 Router A propagates the information to Routers B and E, and so on.
 Any packet destined for Network 1 will now loop from Router C to B
to A to D and back to again to C.
DEFINING A MAXIMUM COUNT
The invalid updates of Network 1 will continue to loop until some other
process stops the looping. This condition, called count to infinity
DEFINING A MAXIMUM COUNT
ELIMINATION LOOPS BY SPLIT HORIZON
Split horizon reduces incorrect routing information and routing overhead
in a distance-vector network by enforcing the rule that routing
information cannot be sent back in the direction from which it was
received.
ROUTE POISONING
 Route poisoning is used to overcome large routing loops and offer
explicit information when a subnet or network is not accessible.
 This is usually accomplished by setting the hop count to one more than
the maximum.
HOLDDOWN TIMERS
A holddown prevents regular update messages from reinstating a route that
is going up and down (called flapping).
ROUTING INFORMATION PROTOCOL
 Characteristics.
 RIP Timers.
 Configuring RIP Routing.
 Verifying the RIP Routing Tables.
 Holding Down RIP Propagations.
RIP CHARACTERISTICS
 Vector Distance Protocol.
 Open standard protocol.
 RIP works well in small networks.
 Default AD (administrative distance) is 120.
 Hop count is (number of routers) used as Metric for path selection.
 Maximum Hop count is 15.
RIP v2RIP v1
Classless RoutingClassful Routing
Support for VLSMNo support for VLSM
Support for discontiguous networksNo support for discontiguous
networks
Use broadcast or multicast to
deliver routing updates.
Use broadcast to deliver routing
updates.
RIP TIMERS
 Route update timer: Sets the interval (typically 30 seconds) between
periodic routing updates, in which the router sends a complete copy of its
routing table out to all neighbors.
 Route invalid timer: Determines the length of time that must elapse
(180 seconds) before a router determines that a route has become
invalid.
 Route flush timer: Sets the time between a route becoming invalid and
its removal from the routing table (240 seconds).
 Holddown timer: routes will enter into the holddown state when an
update packet is received that indicated the route is unreachable.
The default is 180 seconds.
CONFIGURING RIP ROUTING
VERIFYING THE RIP ROUTING TABLES
 Two of the most common commands are the show ip route command
and the show ip protocols command.
 The show ip protocols command shows which routing protocols are
carrying IP traffic on the router.
 Another command use to for troubleshooting, debug ip rip. To cancel
this opertaon, use this command undebug all.
HOLDING DOWN RIP PROPAGATIONS
 You probably don’t want your RIP network advertised everywhere on
your LAN and WAN.
 The easiest way is through the passive-interface command.
 This command prevents RIP update broadcasts from being sent out a
defined interface, but that same interface can still receive RIP updates.
Router#config t
Router(config)#router rip
Router(config-router)#network 192.168.10.0
Router(config-router)#passive-interface s0/0
INTERIOR GATEWAY ROUTING PROTOCOL
 Characteristics.
 IGRP Timers.
 Configuring IGRP routing.
 Verifying IGRP routing table.
IGRP CHARACTERISTICS
 Vector Distance Protocol.
 Cisco-proprietary protocol.
 IGRP can works well in large networks.
 Default AD (administrative distance) is 100.
 Uses an autonomous system number.
 Uses bandwidth and delay of the line as metric.
 Maximum Hop count is 255.
 Classful Routing.
 Don’t support VLSM and discontiguous networks.
IGRP TIMERS
 Update timers These specify how frequently routing-update
messages should be sent. The default is 90 seconds.
 Invalid timers These specify how long a router should wait before
declaring a route invalid if it doesn’t receive a specific update about
it. The default is three times the update period (270 sec).
 Flush timers The default is seven times the routing update period.
If the update timer is 90 seconds by default, then 7 90 = 630
seconds elapse before a route will be flushed from the route table.
 Holddown timers These specify the holddown period. The default
is three times the update timer period plus 10 seconds (280 sec).
CONFIGURING IGRP ROUTING
 The command used to configure IGRP is the same as the one
used to configure RIP routing with one important difference: you
use an autonomous system (AS) number.
Router#config t
Router(config)#router igrp 10
Router(config-router)#net 192.168.10.0
 To Delete routing table built by IGRP, use this command.
Router(config)# no router igrp 10
VERIFYING IGRP ROUTING TABLE
 To verify that IGRP has been configured properly, enter the show ip
route command and look for IGRP routes signified by an "I".
 Additional command
show ip protocols
debug ip igrp events
debug ip igrp transactions
Thank You

Contenu connexe

Tendances (20)

Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Dynamic Routing RIP
Dynamic Routing RIPDynamic Routing RIP
Dynamic Routing RIP
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ospf
OspfOspf
Ospf
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric VanderburgCCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
 
Routing
RoutingRouting
Routing
 
CCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrpCCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrp
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
 

En vedette

Routing 2016
Routing 2016Routing 2016
Routing 2016APNIC
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 

En vedette (15)

Firewall
FirewallFirewall
Firewall
 
Network security
 Network security Network security
Network security
 
Routing 2016
Routing 2016Routing 2016
Routing 2016
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Firewall
FirewallFirewall
Firewall
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 

Similaire à IP ROUTING

Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing nCYBERINTELLIGENTS
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxsazia7
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Dân Chơi
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdfapexjaipur
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hkVivek Singh
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 

Similaire à IP ROUTING (20)

Group 1
Group 1Group 1
Group 1
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
Day 10 rip
Day 10 ripDay 10 rip
Day 10 rip
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hk
 
computer communications
computer communicationscomputer communications
computer communications
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 

Plus de anilinvns

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012anilinvns
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OSanilinvns
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOSanilinvns
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSanilinvns
 
Disk management server
Disk management serverDisk management server
Disk management serveranilinvns
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basicsanilinvns
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 

Plus de anilinvns (17)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
Wds
WdsWds
Wds
 
Disk management server
Disk management serverDisk management server
Disk management server
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Dernier

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

IP ROUTING

  • 1. IP ROUTING By Anil Kumar Vishwakarma MCA,MCTS,CCNA
  • 2. ROUTING BASICS The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. To be able to route packets, a router must know, at a minimum, the following: • Destination address • Neighbor routers from which it can learn about remote networks • Possible routes to all remote networks • The best route to each remote network • How to maintain and verify routing information
  • 4. CONFIGURING STATICIP ROUTING  Static routing has the following benefits:  There is no overhead on the router CPU, which means you could possibly buy a cheaper router than if you were using dynamic routing.  There is no bandwidth usage between routers, which means you could possibly save money on WAN links.  It adds security, because the administrator can choose to allow routing access to certain networks only.  Static routing has the following disadvantages:  The administrator must really understand the internetwork and how each router is connected in order to configure routes correctly.  If a network is added to the internetwork, the administrator has to add a route to it on all routers—by hand.  It’s not feasible in large networks because maintaining it would be a full-time job in itself.
  • 5. STATIC ROUTING  Static Routes built by using IP route command
  • 6. DEFAULT ROUTING  Default routes are used to route packets with destinations that do not match any of the other routes in the routing table.  Routers are typically configured with a default route for Internet- bound traffic, since it is often impractical and unnecessary to maintain routes to all networks in the Internet.  A default route is actually a special static route that uses this format: ip route 0.0.0.0 0.0.0.0 [next-hop-address]
  • 7. VERIFYING STATIC ROUTE CONFIGURATION  It is important to verify that they are present in the routing table and that routing is working as expected.  The command show run is used to view the active configuration in RAM to verify that the static route was entered correctly. Router#sh run  The show ip route command is used to make sure that the static route is present in the routing table. Router#sh ip route
  • 8. TROUBLESHOOTING STATIC ROUTE If any problem in connection between networks follow this steps: 1. verifying static routes (by using sh ip route) to make sure the route found in routing table. 2. If the problem exists, run a traceroute command.
  • 9. DYNAMIC ROUTING OVERVIEW  Routing protocols  Routed protocol  Autonomous systems  Purpose of a routing protocol and autonomous systems  Identifying the classes of routing protocols
  • 10. ROUTING PROTOCOLS  It is the communication used between routers.  It allows one router to share information with other routers regarding the networks .  The information a router gets from another router, using a routing protocol, is used to build and maintain a routing table.  Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
  • 11. ROUTED PROTOCOL  It is used to direct user traffic.  It provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme.  Examples of routed protocols are: IP and IPX.
  • 12. AUTONOMOUS SYSTEMS  An autonomous system (AS) is a collection of networks under a common administration sharing a common routing strategy.  To the outside world, an AS is viewed as a single entity.  The AS may be run by one or more operators while presenting a consistent view of routing to the external world.
  • 13. PURPOSE OF A ROUTING PROTOCOL AND AUTONOMOUS SYSTEMS  The goal of a routing protocol is to build and maintain the routing table.  Routers use routing protocols to manage information received from other routers .  Autonomous systems (AS) provide the division of the global internetwork into smaller and more manageable networks.  Each AS has its own set of rules and policies and an AS number that will uniquely distinguish it from other autonomous systems throughout the world.
  • 14. THE TYPES OF ROUTING PROTOCOLS Most routing algorithms can be classified into one of two categories: 1. Distance Vector The distance vector routing approach determines the direction (vector) and distance to any link in the internetwork. As an example: RIP and IGRP. 2. Link State The link-state approach, also called shortest path first, recreates the exact topology of the entire internetwork. As an example: OSPF. 3. Hybrid Mixed between distance vector and link state As an example: EIGRP.
  • 15. DISTANCE VECTOR ROUTING  Distance vector routing updates  Distance vector routing loop issues  Defining a maximum count  Elimination routing loops through split horizon  Route poisoning  Preventing routing loops with holddown timers
  • 16. DISTANCE VECTOR ROUTING UPDATES  Routing table updates occur periodically or when the topology in a distance vector protocol network changes.  Distance vector algorithms call for each router to send its entire routing table to each of its adjacent neighbors.  The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router.  An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route.  If a router receives two updates listing the same remote network, the first thing the router checks is the AD.  If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table.  If both advertised routes to the same network have the same AD, then routing protocol metrics will be used to find the best path to the remote network.  The routing tables include information about the total path cost as defined by the metrics.
  • 17. DISTANCE VECTOR ROUTING LOOP ISSUES
  • 18. DISTANCE VECTOR ROUTING LOOP ISSUES  Routing loops can occur when inconsistent routing tables are not updated due to slow convergence in a changing network.  Just before the failure of Network 1, all routers have consistent knowledge and correct routing tables.  When Network 1 fails, Router E sends an update to Router A.  Router A stops routing packets to Network 1, but Routers B, C, and D continue to do so because they have not yet been informed of the failure.  When Router A sends out its update, Routers B and D stop routing to Network 1.  However, Router C has not received an update, so Network 1 is still reachable via Router B.  Now Router C sends a periodic update to Router D, indicating a path to Network 1 by way of Router B.  Router D changes its routing table to reflect this good, but incorrect, information, and propagates the information to Router A.  Router A propagates the information to Routers B and E, and so on.  Any packet destined for Network 1 will now loop from Router C to B to A to D and back to again to C.
  • 19. DEFINING A MAXIMUM COUNT The invalid updates of Network 1 will continue to loop until some other process stops the looping. This condition, called count to infinity
  • 21. ELIMINATION LOOPS BY SPLIT HORIZON Split horizon reduces incorrect routing information and routing overhead in a distance-vector network by enforcing the rule that routing information cannot be sent back in the direction from which it was received.
  • 22. ROUTE POISONING  Route poisoning is used to overcome large routing loops and offer explicit information when a subnet or network is not accessible.  This is usually accomplished by setting the hop count to one more than the maximum.
  • 23. HOLDDOWN TIMERS A holddown prevents regular update messages from reinstating a route that is going up and down (called flapping).
  • 24. ROUTING INFORMATION PROTOCOL  Characteristics.  RIP Timers.  Configuring RIP Routing.  Verifying the RIP Routing Tables.  Holding Down RIP Propagations.
  • 25. RIP CHARACTERISTICS  Vector Distance Protocol.  Open standard protocol.  RIP works well in small networks.  Default AD (administrative distance) is 120.  Hop count is (number of routers) used as Metric for path selection.  Maximum Hop count is 15. RIP v2RIP v1 Classless RoutingClassful Routing Support for VLSMNo support for VLSM Support for discontiguous networksNo support for discontiguous networks Use broadcast or multicast to deliver routing updates. Use broadcast to deliver routing updates.
  • 26. RIP TIMERS  Route update timer: Sets the interval (typically 30 seconds) between periodic routing updates, in which the router sends a complete copy of its routing table out to all neighbors.  Route invalid timer: Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid.  Route flush timer: Sets the time between a route becoming invalid and its removal from the routing table (240 seconds).  Holddown timer: routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. The default is 180 seconds.
  • 28. VERIFYING THE RIP ROUTING TABLES  Two of the most common commands are the show ip route command and the show ip protocols command.  The show ip protocols command shows which routing protocols are carrying IP traffic on the router.  Another command use to for troubleshooting, debug ip rip. To cancel this opertaon, use this command undebug all.
  • 29. HOLDING DOWN RIP PROPAGATIONS  You probably don’t want your RIP network advertised everywhere on your LAN and WAN.  The easiest way is through the passive-interface command.  This command prevents RIP update broadcasts from being sent out a defined interface, but that same interface can still receive RIP updates. Router#config t Router(config)#router rip Router(config-router)#network 192.168.10.0 Router(config-router)#passive-interface s0/0
  • 30. INTERIOR GATEWAY ROUTING PROTOCOL  Characteristics.  IGRP Timers.  Configuring IGRP routing.  Verifying IGRP routing table.
  • 31. IGRP CHARACTERISTICS  Vector Distance Protocol.  Cisco-proprietary protocol.  IGRP can works well in large networks.  Default AD (administrative distance) is 100.  Uses an autonomous system number.  Uses bandwidth and delay of the line as metric.  Maximum Hop count is 255.  Classful Routing.  Don’t support VLSM and discontiguous networks.
  • 32. IGRP TIMERS  Update timers These specify how frequently routing-update messages should be sent. The default is 90 seconds.  Invalid timers These specify how long a router should wait before declaring a route invalid if it doesn’t receive a specific update about it. The default is three times the update period (270 sec).  Flush timers The default is seven times the routing update period. If the update timer is 90 seconds by default, then 7 90 = 630 seconds elapse before a route will be flushed from the route table.  Holddown timers These specify the holddown period. The default is three times the update timer period plus 10 seconds (280 sec).
  • 33. CONFIGURING IGRP ROUTING  The command used to configure IGRP is the same as the one used to configure RIP routing with one important difference: you use an autonomous system (AS) number. Router#config t Router(config)#router igrp 10 Router(config-router)#net 192.168.10.0  To Delete routing table built by IGRP, use this command. Router(config)# no router igrp 10
  • 34. VERIFYING IGRP ROUTING TABLE  To verify that IGRP has been configured properly, enter the show ip route command and look for IGRP routes signified by an "I".  Additional command show ip protocols debug ip igrp events debug ip igrp transactions