SlideShare une entreprise Scribd logo
1  sur  30
Network +
Introduction to Networking
What is a network :
The word “ network “ means, “ two computers are connected using a
transmission media and are able to share their resources, transfer data.
The transmission media for the term network is either cable media or
wireless media.
Advantage of Networking :
1. Resource sharing : buy devices for all computers in same network, not
one device for one computer.
2. High reliability : all files can be copied to two or more machines, if one
goes down, we can use other.
3. Communication media : using the media. Two or more devices can be
interconnected to share resources & exchange information.
4. High speed : information can be synchronized when one user makes
changes to on line document, the other can see the change immediately.
Layer 3 Device. Works at the Network Layer
Forwards Data packets based on IP Address
This allows Routers to choose the best path thru the Network
Important Traffic regulating device on large Networks
Can have inbuilt security features-Firewall,Authentication.
1. A router is a device which is used in our network to
connect two different networks.
2. Routers, by default, will not forward any broadcasts.
3. Routers use the logical address in a network layer to
determine the next hop router or a host which is
located on a remote place.
4. Routers can use access lists, created by an
administrator, to control security on the types of
packets that are not allowed to enter or exit an
interface.
 The algorithm used for the routing protocols
defines the following processes:
 Mechanism for sending and receiving routing
information.
 Mechanism for calculating the best paths and installing
routes in the routing table.
 Mechanism for detecting and reacting to topology
changes.
 Classless (Use of VLSM) or Classful - Classless routing
protocols include the subnet mask in the updates.
 This feature supports the use of Variable Length Subnet Masking
(VLSM) and better route summarization.
 Classful routing protocols do not include the subnet mask and
cannot support VLSM.
 Time to Convergence - Time to convergence defines how
quickly the routers in the network topology share
routing information and reach a state of consistent
knowledge.
 The faster the convergence, the more preferable the protocol.
 Scalability - Scalability defines how large a network can
become based on the routing protocol that is deployed.
 The larger the network is, the more scalable the routing protocol
needs to be
 Resource Usage - Resource usage includes the
requirements of a routing protocol such as memory
space, CPU utilization, and link bandwidth
utilization
 Higher resource requirements necessitate more powerful
hardware to support the routing protocol operation in
addition to the packet forwarding processes.
 Implementation and Maintenance - Implementation
and maintenance describes the level of knowledge
that is required for a network administrator to
implement and maintain the network based on the
routing protocol deployed.
Static Routing
The command syntax
Ip route [ destination_network] [ Destination subnet mask ] [
<next hop ip address >or <exit interface type><No.> ]
This list describes each command in the string
ip route : the command used to create the static routing.
destination_network : the network you are placing in the
routing table.
mask : the subnet mask being used on the network.
next hop address : the address of the next hop router that will
receive the packet and forward it on the remote network.
 A router using a distance vector routing
protocol does not have the knowledge of the
entire path to a destination network.
 The router only knows
 The direction or interface in which packets should be
forwarded and
 The distance or how far it is to the destination
network
 Some distance vector routing protocols call for
the router to periodically broadcast the entire
routing table to each of its neighbors.
 This method is inefficient because the updates
not only consume bandwidth but also consume
router CPU resources to process the updates.
Distance Vector Routing Protocols
16
1. Each router establishes a relationship (“adjacency”)
with its neighbors
2.Each router generates link state advertisements (LSAs)
which are distributed to all routers
LSA = (link id, state of the link, cost, neighbors of the link)
3. Each router maintains a database of all received
LSAs (topological database or link state database), which
describes the network has a graph with weighted
edges
4. Each router uses its link state database to run a
shortest path algorithm (Dijikstra’s algorithm) to
produce the shortest path to each network
17
 With distance vector routing, each node has
information only about the next hop:
 Node A: to reach F go to B
 Node B: to reach F go to D
 Node D: to reach F go to E
 Node E: go directly to F
 Distance vector routing makes
poor routing decisions if
directions are not completely
correct
(e.g., because a node is down).
 If parts of the directions incorrect, the routing may be incorrect until the
routing algorithms has re-converged.
A B C
D E F
18
 In link state routing, each node has a complete map
of the topology
 If a node fails, each
node can calculate
the new route
 Difficulty: All nodes need to
have a consistent view of the
network
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
A B C
D E F
Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP.
Because like IGRP, EIGRP uses the concept of an autonomous system to describe the
set of contiguous routers that run the same routing protocol and share routing
information. But unlike IGRP, EIGRP includes the subnet mask in its route updates.
EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum
hop count of 255.
There are no. of powerful features for EIGRP, the main ones are listed here :
It uses max hop count of 255
It is a classless routing protocol
It is sometimes referred to as a hybrid routing protocol
Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table.
EIGRP uses RTP ( Reliable Transport Protocol ) for communication
It uses Dual ( Diffusing update algorithm ) for the selection of best path
Supports all layer 3 protocols(IPv4,IPX and IPv6)
Supports VLSM/CIDR
Configuring OSPF :
These two elements are the basic elements of OSPF configuration :
Enabling OSPF
Configuring OSPF areas
Enabling OSPF
Router( config )# router ospf ?
<1-65535>
A value in the range 1-65535 identifies the ospf process ID. It’s a unique no.
on this router that groups a series of ospf configuration commands under a
specific process. Different ospf routers don’t have to use the same process ID
in order to communicate.
Configuring OSPF areas
Router# config t
Router( config t )# router ospf 1
Router( config – router )# network 10.0.0.0 0.255.255.255 area 0
ROUTING
ROUTING
ROUTING

Contenu connexe

Tendances

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocolCCNAStudyGuide
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2Hossam El-Deen Osama
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routingMd. Mashiur Rahman
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK Amar Panchal
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 

Tendances (20)

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Computer network layers
Computer network layersComputer network layers
Computer network layers
 
Report on Router
Report on RouterReport on Router
Report on Router
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Answer sheet of switching &amp; routing
Answer sheet of switching &amp; routingAnswer sheet of switching &amp; routing
Answer sheet of switching &amp; routing
 
COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK COMPLETE COMPUTER NETWORK
COMPLETE COMPUTER NETWORK
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 

Similaire à ROUTING

Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986sherifmeetme
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 

Similaire à ROUTING (20)

C0343015019
C0343015019C0343015019
C0343015019
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
four
fourfour
four
 
Group 1
Group 1Group 1
Group 1
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986Networking hardware-objectives-identify-major-hardware4986
Networking hardware-objectives-identify-major-hardware4986
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

ROUTING

  • 1.
  • 2. Network + Introduction to Networking What is a network : The word “ network “ means, “ two computers are connected using a transmission media and are able to share their resources, transfer data. The transmission media for the term network is either cable media or wireless media. Advantage of Networking : 1. Resource sharing : buy devices for all computers in same network, not one device for one computer. 2. High reliability : all files can be copied to two or more machines, if one goes down, we can use other. 3. Communication media : using the media. Two or more devices can be interconnected to share resources & exchange information. 4. High speed : information can be synchronized when one user makes changes to on line document, the other can see the change immediately.
  • 3. Layer 3 Device. Works at the Network Layer Forwards Data packets based on IP Address This allows Routers to choose the best path thru the Network Important Traffic regulating device on large Networks Can have inbuilt security features-Firewall,Authentication.
  • 4. 1. A router is a device which is used in our network to connect two different networks. 2. Routers, by default, will not forward any broadcasts. 3. Routers use the logical address in a network layer to determine the next hop router or a host which is located on a remote place. 4. Routers can use access lists, created by an administrator, to control security on the types of packets that are not allowed to enter or exit an interface.
  • 5.  The algorithm used for the routing protocols defines the following processes:  Mechanism for sending and receiving routing information.  Mechanism for calculating the best paths and installing routes in the routing table.  Mechanism for detecting and reacting to topology changes.
  • 6.
  • 7.  Classless (Use of VLSM) or Classful - Classless routing protocols include the subnet mask in the updates.  This feature supports the use of Variable Length Subnet Masking (VLSM) and better route summarization.  Classful routing protocols do not include the subnet mask and cannot support VLSM.  Time to Convergence - Time to convergence defines how quickly the routers in the network topology share routing information and reach a state of consistent knowledge.  The faster the convergence, the more preferable the protocol.  Scalability - Scalability defines how large a network can become based on the routing protocol that is deployed.  The larger the network is, the more scalable the routing protocol needs to be
  • 8.  Resource Usage - Resource usage includes the requirements of a routing protocol such as memory space, CPU utilization, and link bandwidth utilization  Higher resource requirements necessitate more powerful hardware to support the routing protocol operation in addition to the packet forwarding processes.  Implementation and Maintenance - Implementation and maintenance describes the level of knowledge that is required for a network administrator to implement and maintain the network based on the routing protocol deployed.
  • 9.
  • 10. Static Routing The command syntax Ip route [ destination_network] [ Destination subnet mask ] [ <next hop ip address >or <exit interface type><No.> ] This list describes each command in the string ip route : the command used to create the static routing. destination_network : the network you are placing in the routing table. mask : the subnet mask being used on the network. next hop address : the address of the next hop router that will receive the packet and forward it on the remote network.
  • 11.
  • 12.
  • 13.  A router using a distance vector routing protocol does not have the knowledge of the entire path to a destination network.  The router only knows  The direction or interface in which packets should be forwarded and  The distance or how far it is to the destination network
  • 14.  Some distance vector routing protocols call for the router to periodically broadcast the entire routing table to each of its neighbors.  This method is inefficient because the updates not only consume bandwidth but also consume router CPU resources to process the updates.
  • 16. 16 1. Each router establishes a relationship (“adjacency”) with its neighbors 2.Each router generates link state advertisements (LSAs) which are distributed to all routers LSA = (link id, state of the link, cost, neighbors of the link) 3. Each router maintains a database of all received LSAs (topological database or link state database), which describes the network has a graph with weighted edges 4. Each router uses its link state database to run a shortest path algorithm (Dijikstra’s algorithm) to produce the shortest path to each network
  • 17. 17  With distance vector routing, each node has information only about the next hop:  Node A: to reach F go to B  Node B: to reach F go to D  Node D: to reach F go to E  Node E: go directly to F  Distance vector routing makes poor routing decisions if directions are not completely correct (e.g., because a node is down).  If parts of the directions incorrect, the routing may be incorrect until the routing algorithms has re-converged. A B C D E F
  • 18. 18  In link state routing, each node has a complete map of the topology  If a node fails, each node can calculate the new route  Difficulty: All nodes need to have a consistent view of the network A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F A B C D E F
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Enhanced IGRP is a distance vector routing protocol. Why it is called enhanced IGRP. Because like IGRP, EIGRP uses the concept of an autonomous system to describe the set of contiguous routers that run the same routing protocol and share routing information. But unlike IGRP, EIGRP includes the subnet mask in its route updates. EIGRP is some times referred to as a Hybrid routing protocol. EIGRP has a maximum hop count of 255. There are no. of powerful features for EIGRP, the main ones are listed here : It uses max hop count of 255 It is a classless routing protocol It is sometimes referred to as a hybrid routing protocol Like IGRP, EIGRP uses AS ( autonomous system number ) to share it’s routing table. EIGRP uses RTP ( Reliable Transport Protocol ) for communication It uses Dual ( Diffusing update algorithm ) for the selection of best path Supports all layer 3 protocols(IPv4,IPX and IPv6) Supports VLSM/CIDR
  • 25.
  • 26.
  • 27. Configuring OSPF : These two elements are the basic elements of OSPF configuration : Enabling OSPF Configuring OSPF areas Enabling OSPF Router( config )# router ospf ? <1-65535> A value in the range 1-65535 identifies the ospf process ID. It’s a unique no. on this router that groups a series of ospf configuration commands under a specific process. Different ospf routers don’t have to use the same process ID in order to communicate. Configuring OSPF areas Router# config t Router( config t )# router ospf 1 Router( config – router )# network 10.0.0.0 0.255.255.255 area 0