SlideShare une entreprise Scribd logo
1  sur  27
Sybex CCNA 640-802
Chapter 6: IP Routing
Instructor & Todd Lammle
Chapter 6 Objectives
• Understanding IP routing
• Static routing
• Dynamic routing
– RIP
– RIPv2
– Verifying routing
2
To route a router need to know:
– Remote Networks
– Neighbor Routers
– All Possible routes to remote network
– The absolute best route to all remote
networks
– Maintain and verify the routing information
What is Routing?
C B AD
Basic Path Selection
What interface will the router send out a packet
if it has destination address of 10.10.10.18?
Simple IP Routing
172.16.1.0
BA
172.16.2.0
172.16.2.2
172.16.1.2172.16.2.1 172.16.1.1
e0 e0
>ping 172.16.1.2>ping 172.16.1.2
B
172.16.3.1 172.16.3.2
s0
s0
Host A
Host B
Routing/PDU Example:
Host A Web browses to the HTTP
Server….
3. The destination port number in a segment header will have a value
of __
1. The destination address of a frame will be the
_______________________
2. The destination IP address of a packet will be the IP address of
the________________________________
172.16.3.2
SO
Static Routes
172.16.1.0
B
172.16.3.1
A B
Stub Network
172.16.2.0
SO
A
Routes must be unidirectional
ip route remote network
[mask]
{address|interface}
[distance]
[permanent]
Router(config)#ip route remote_network mask next_hop
Static Route Configuration
ip route 172.16.1.0 255.255.255.0 172.16.3.2
or
ip route 172.16.1.0 255.255.255.0 s0
Static Route Example
172.16.3.2
SO
172.16.1.0
B
172.16.3.1
A B
Stub Network
172.16.2.0
SO
Default Routes
172.16.3.2
SO
172.16.1.0
B
172.16.3.1
A B
Stub Network
172.16.2.0
SO
ip route 0.0.0.0 0.0.0.0 172.16.3.1
ip classless
• Routing protocols are used between
routers to:
– Determine the path of a packet through a network
– Maintain routing tables
– Examples?
• Routed protocols are:
– Assigned to an interface
– Once the path is determined by the Routing
protocol, determines method of delivery
– Examples?
Routing vs. Routed
Autonomous System 1 Autonomous System 2
IGPs: RIP, IGRP EGPs: BGP
Routing Protocols
• An autonomous system is a collection of
networks under a common administrative
domain.
• IGPs operate within an autonomous system.
• EGPs connect different autonomous systems.
Classful Routing Overview
Classful routing protocols do
not include the subnet mask
with the route advertisement.
– Within the same network, consistency of the
subnet masks is assumed.
– Summary routes are exchanged between
foreign networks.
– Examples of classful routing protocols:
• RIP Version 1 (RIPv1)
• IGRP
Classless Routing Overview
Classless routing protocols
include the subnet mask with
the route advertisement.
– Classless routing protocols support
variable-length subnet masking (VLSM).
– Summary routes can be manually
controlled within the network.
– Examples of classless routing protocols:
• RIP Version 2 (RIPv2)
• EIGRP
• OSPF
• IS-IS
IGRP
Administrative
Distance=100
Router D
Router BRouter A
Router C
RIP
Administrative
Distance=120
Default Administrative Distance
Directly Connected: 0
Static Route: 1
RIP: 120
IGRP: 100
EIGRP: 90
OSPF: 110
Administrative Distance
C B AD
Routing
Table
Routing
Table
Routing
Table
Routing
Table
Routing
Table
Routing
Table
Routing
Table
Routing
Table
Distance—How far
Vector—In which direction
Distance—How far
Vector—In which direction
Distance vector algorithms do not allow a router to know the
exact topology of an internetwork.
All routers just broadcast their entire routing table out all active
interfaces on periodic time intervals
Distance Vector
Discovering Routes
Discovering Routes
Routing Loops
Router Loops
64kbps
T1
T1 T1
– Hop count metric selects the path, 16 is unreachable
– Full route table broadcast every 30 seconds
– Load balance maximum of 6 equal cost paths (default = 4)
– RIPv2 supports VLSM and Discontiguous networks
RIP Overview
Router(config)#router rip
Router(config-router)#network network-number*
network 172.16.0.0
network 192.168.10.0
router RIP
network 172.16.0.0
network 10.0.0.0
router RIP
*Network is a classful network address.
Every device on network uses the same subnet mask
172.16.10.0 192.168.10.010.3.5.0
RIP Routing Configuration
RIP Version 2
• Allows the use of variable length subnet
masks (VLSM) by sending subnet mask
information with each route update
• Distance Vector – same AD, and
timers.
• Easy configuration, just add the
command “version 2” under the router
rip configuration
router rip
network 10.0.0.0
version 2
Discontiguous Addressing
• Two networks of the same classful networks
are separated by a different network address
192.168.10.0/24
10.1.1.0/24
192.168.10.0/24
– RIPv1 and IGRP do not advertise subnet masks, and therefore
cannot support discontiguous subnets.
– OSPF, EIGRP, and RIPv2 can advertise subnet masks, and
therefore can support discontiguous subnets.
Passive Interface
Maybe you don’t want to send RIP updates
out your router interface connected to the
Internet. Use the passive-interface
command:
Router(config)#router rip
Router(config-router)#passive-interface
serial0
This allows a router to receive route updates on an interface,
but not send updates via that interface
S0 Gateway
Internet
Updates
X
Verifying RIP
Router#show ip protocols
Router#show ip route
Router#debug ip rip
Router#undebug all (un all)
Summary
– Open your books and go through all the
written labs and the review questions.
– Review the answers in class.
27

Contenu connexe

Tendances

Rip protocol
Rip protocolRip protocol
Rip protocolr123027
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksDani Royman Simanjuntak
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack CounterKHNOG
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutionsSiddhi Viradiya
 
RIP (routing information protocol)
RIP (routing information protocol)RIP (routing information protocol)
RIP (routing information protocol)Netwax Lab
 
How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)IT Tech
 
Лекц 9
Лекц 9Лекц 9
Лекц 9Muuluu
 
IGRP and EIGRP
IGRP and EIGRPIGRP and EIGRP
IGRP and EIGRPIT Tech
 
How to configure interior gateway routing protocol (igrp)
How to configure interior gateway routing protocol (igrp)How to configure interior gateway routing protocol (igrp)
How to configure interior gateway routing protocol (igrp)IT Tech
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)waqasahmad1995
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9VISHNU N
 
Router Information Protocol
Router Information ProtocolRouter Information Protocol
Router Information Protocolraysoumik
 
Exploration Routing Chapter 7
Exploration Routing Chapter 7Exploration Routing Chapter 7
Exploration Routing Chapter 7jayhawkins
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Bgp Basic Labs
Bgp Basic LabsBgp Basic Labs
Bgp Basic Labssami36
 

Tendances (20)

Rip protocol
Rip protocolRip protocol
Rip protocol
 
Rip
RipRip
Rip
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 
network convergence problem and solutions
network convergence  problem and solutionsnetwork convergence  problem and solutions
network convergence problem and solutions
 
RIP (routing information protocol)
RIP (routing information protocol)RIP (routing information protocol)
RIP (routing information protocol)
 
How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)How to Configure Routing Information Protocol (RIP)
How to Configure Routing Information Protocol (RIP)
 
Rip 1 rip 2
Rip 1 rip 2Rip 1 rip 2
Rip 1 rip 2
 
Лекц 9
Лекц 9Лекц 9
Лекц 9
 
IGRP and EIGRP
IGRP and EIGRPIGRP and EIGRP
IGRP and EIGRP
 
Igrp
IgrpIgrp
Igrp
 
How to configure interior gateway routing protocol (igrp)
How to configure interior gateway routing protocol (igrp)How to configure interior gateway routing protocol (igrp)
How to configure interior gateway routing protocol (igrp)
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
 
Router Information Protocol
Router Information ProtocolRouter Information Protocol
Router Information Protocol
 
Exploration Routing Chapter 7
Exploration Routing Chapter 7Exploration Routing Chapter 7
Exploration Routing Chapter 7
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Bgp Basic Labs
Bgp Basic LabsBgp Basic Labs
Bgp Basic Labs
 

En vedette (8)

Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
Chapter13ccna
Chapter13ccnaChapter13ccna
Chapter13ccna
 
Chapter8ccna
Chapter8ccnaChapter8ccna
Chapter8ccna
 
Chapter11ccna
Chapter11ccnaChapter11ccna
Chapter11ccna
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Chapter12ccna
Chapter12ccnaChapter12ccna
Chapter12ccna
 
Ceyccna3
Ceyccna3Ceyccna3
Ceyccna3
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 

Similaire à Chapter6ccna (20)

Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Chapter6ccna
Chapter6ccnaChapter6ccna
Chapter6ccna
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
CCNA Icnd110 s05l05
CCNA Icnd110 s05l05CCNA Icnd110 s05l05
CCNA Icnd110 s05l05
 
CCNA part 5 routing
CCNA part 5 routingCCNA part 5 routing
CCNA part 5 routing
 
Chapter07
Chapter07Chapter07
Chapter07
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdfChapter 2-IP Routing.pdf
Chapter 2-IP Routing.pdf
 
ENSA_Module_2.pptx
ENSA_Module_2.pptxENSA_Module_2.pptx
ENSA_Module_2.pptx
 
ENSA_Module_2.pptx
ENSA_Module_2.pptxENSA_Module_2.pptx
ENSA_Module_2.pptx
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Router configuration
Router configurationRouter configuration
Router configuration
 
Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014Ccnav5.org ccna 3-v50_final_exam_2014
Ccnav5.org ccna 3-v50_final_exam_2014
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 
Chapter7ccna
Chapter7ccnaChapter7ccna
Chapter7ccna
 

Dernier

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Chapter6ccna

  • 1. Sybex CCNA 640-802 Chapter 6: IP Routing Instructor & Todd Lammle
  • 2. Chapter 6 Objectives • Understanding IP routing • Static routing • Dynamic routing – RIP – RIPv2 – Verifying routing 2
  • 3. To route a router need to know: – Remote Networks – Neighbor Routers – All Possible routes to remote network – The absolute best route to all remote networks – Maintain and verify the routing information What is Routing? C B AD
  • 4. Basic Path Selection What interface will the router send out a packet if it has destination address of 10.10.10.18?
  • 5. Simple IP Routing 172.16.1.0 BA 172.16.2.0 172.16.2.2 172.16.1.2172.16.2.1 172.16.1.1 e0 e0 >ping 172.16.1.2>ping 172.16.1.2 B 172.16.3.1 172.16.3.2 s0 s0 Host A Host B
  • 6. Routing/PDU Example: Host A Web browses to the HTTP Server…. 3. The destination port number in a segment header will have a value of __ 1. The destination address of a frame will be the _______________________ 2. The destination IP address of a packet will be the IP address of the________________________________
  • 7. 172.16.3.2 SO Static Routes 172.16.1.0 B 172.16.3.1 A B Stub Network 172.16.2.0 SO A Routes must be unidirectional
  • 8. ip route remote network [mask] {address|interface} [distance] [permanent] Router(config)#ip route remote_network mask next_hop Static Route Configuration
  • 9. ip route 172.16.1.0 255.255.255.0 172.16.3.2 or ip route 172.16.1.0 255.255.255.0 s0 Static Route Example 172.16.3.2 SO 172.16.1.0 B 172.16.3.1 A B Stub Network 172.16.2.0 SO
  • 10. Default Routes 172.16.3.2 SO 172.16.1.0 B 172.16.3.1 A B Stub Network 172.16.2.0 SO ip route 0.0.0.0 0.0.0.0 172.16.3.1 ip classless
  • 11. • Routing protocols are used between routers to: – Determine the path of a packet through a network – Maintain routing tables – Examples? • Routed protocols are: – Assigned to an interface – Once the path is determined by the Routing protocol, determines method of delivery – Examples? Routing vs. Routed
  • 12. Autonomous System 1 Autonomous System 2 IGPs: RIP, IGRP EGPs: BGP Routing Protocols • An autonomous system is a collection of networks under a common administrative domain. • IGPs operate within an autonomous system. • EGPs connect different autonomous systems.
  • 13. Classful Routing Overview Classful routing protocols do not include the subnet mask with the route advertisement. – Within the same network, consistency of the subnet masks is assumed. – Summary routes are exchanged between foreign networks. – Examples of classful routing protocols: • RIP Version 1 (RIPv1) • IGRP
  • 14. Classless Routing Overview Classless routing protocols include the subnet mask with the route advertisement. – Classless routing protocols support variable-length subnet masking (VLSM). – Summary routes can be manually controlled within the network. – Examples of classless routing protocols: • RIP Version 2 (RIPv2) • EIGRP • OSPF • IS-IS
  • 15. IGRP Administrative Distance=100 Router D Router BRouter A Router C RIP Administrative Distance=120 Default Administrative Distance Directly Connected: 0 Static Route: 1 RIP: 120 IGRP: 100 EIGRP: 90 OSPF: 110 Administrative Distance
  • 16. C B AD Routing Table Routing Table Routing Table Routing Table Routing Table Routing Table Routing Table Routing Table Distance—How far Vector—In which direction Distance—How far Vector—In which direction Distance vector algorithms do not allow a router to know the exact topology of an internetwork. All routers just broadcast their entire routing table out all active interfaces on periodic time intervals Distance Vector
  • 21. 64kbps T1 T1 T1 – Hop count metric selects the path, 16 is unreachable – Full route table broadcast every 30 seconds – Load balance maximum of 6 equal cost paths (default = 4) – RIPv2 supports VLSM and Discontiguous networks RIP Overview
  • 22. Router(config)#router rip Router(config-router)#network network-number* network 172.16.0.0 network 192.168.10.0 router RIP network 172.16.0.0 network 10.0.0.0 router RIP *Network is a classful network address. Every device on network uses the same subnet mask 172.16.10.0 192.168.10.010.3.5.0 RIP Routing Configuration
  • 23. RIP Version 2 • Allows the use of variable length subnet masks (VLSM) by sending subnet mask information with each route update • Distance Vector – same AD, and timers. • Easy configuration, just add the command “version 2” under the router rip configuration router rip network 10.0.0.0 version 2
  • 24. Discontiguous Addressing • Two networks of the same classful networks are separated by a different network address 192.168.10.0/24 10.1.1.0/24 192.168.10.0/24 – RIPv1 and IGRP do not advertise subnet masks, and therefore cannot support discontiguous subnets. – OSPF, EIGRP, and RIPv2 can advertise subnet masks, and therefore can support discontiguous subnets.
  • 25. Passive Interface Maybe you don’t want to send RIP updates out your router interface connected to the Internet. Use the passive-interface command: Router(config)#router rip Router(config-router)#passive-interface serial0 This allows a router to receive route updates on an interface, but not send updates via that interface S0 Gateway Internet Updates X
  • 26. Verifying RIP Router#show ip protocols Router#show ip route Router#debug ip rip Router#undebug all (un all)
  • 27. Summary – Open your books and go through all the written labs and the review questions. – Review the answers in class. 27

Notes de l'éditeur

  1. Once you create an internetwork by connecting your WANs and LANs to a router, you then need to configure logical network addresses, such as IP addresses, to all hosts on the internetwork so that they can communicate across that internetwork. The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. Routers don’t care about hosts—they only care about networks and the best path to each network. The logical network address of the destination host is used to get packets to a network through a routed network, then the hardware address of the host is used to deliver the packet from a router to the correct destination host.
  2. The router will packet switch the packet to the FastEthernet 0/0 interface and then frame it and send it out the LAN
  3. The IP routing process is fairly simple and doesn’t change, regardless of the size of network you have. For an example, we’ll describe step by step what happens when Host A wants to communicate with Host B on a different network. In this example, a user on Host A pings Host B’s IP address.
  4. This slide represents how segments, packets and frames are used to send data from HostA to the HTTP server. It’s important to remember that frames are “ALWAYS” on a local network and hardware addressees are used. Packets are used to route a segment from one network to another network Segments are used to rebuild a datastream on a remote host, in this case, the HTTP server. 3. The destination port number in a segment header will have a value of 80 1. The destination address of a frame will be the MAC address of the E0 interface of the Lab_A router 2. The destination IP address of a packet will be the IP address of the network interface of the HTTP server
  5. Static routing occurs when you manually add routes in each router’s routing table. There are pros and cons to static routing, but that’s true for all routing processes. Things that are good about static routing: -No overhead on the router CPU -No bandwidth usage between routers -Security (because the administrator can only allow routing to certain networks) Things that aren’t so good about static routing: -The administrator must really understand the internetwork and how each router is connected super well in order to configure routes correctly. -If a network is added to the internetwork, the administrator has to add a route to it on all routers—by hand. -It just won’t work for you in large networks because maintaining it would be a full-time job in itself.
  6. Here’s the command you use to add a static route to a routing table: ip route [ destination_network ] [ mask ] [ next-hop_address or exitinterface ] [ administrative_distance ] [permanent] This list describes each command in the string: Ip route: The command used to create the static route. Destination network: The network you’re placing in the routing table. Mask: The subnet mask being used on the network. Next-hop address: The address of the next-hop router that will receive the packet and forward it to the remote network. This is a router interface that’s on a directly connected network. You must be able to ping the router interface before you add the route. Exit interface: You can use it in place of the next-hop address if you want, but it’s got to be on a point-to-point link, like a WAN. This command won’t work on a LAN like Ethernet. Administrative distance: By default, static routes have an administrative distance of 1. You can change the default value by adding an administrative weight at the end of the command. Permanent: If the interface is shut down, or the router can’t communicate to the next-hop router, the route will automatically be discarded from the routing table. Choosing the permanent option keeps the entry in the routing table no matter what happens.
  7. This slide shows an example of a simple static route command.
  8. We use default routing to send packets with a remote destination network not in the routing table to the next-hop router. You can only use default routing on stub networks—those with only one exit port out of the network.
  9. A routing protocol is used by routers to dynamically find all the networks in the internetwork and to ensure that all routers have the same routing table. Basically, a routing protocol determines the path of a packet through an internetwork. Examples of routing protocols are RIP, IGRP, EIGRP and OSPF. Okay—once all routers know about all networks, a routed protocol can be used to send user data (packets) through the established enterprise. Routed protocols are assigned to an interface and determine the method of packet delivery. Examples of routed protocols are IP and IPX.
  10. There are two types of routing protocols used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). IGPs are used to exchange routing information with routers in the same autonomous system (AS). An AS is a collection of networks under a common administrative domain, which basically means that all routers sharing the same routing table information are in the same AS. EGPs are used to communicate between ASs. An example of an EGP is Border Gateway Protocol (BGP), which is discussed in the GlobalNet CCNP course.
  11. Classful routing means that all devices in the network must use the same subnet mask.
  12. Prefix routing does send subnet mask information with the route updates. This is called classless routing .
  13. 5 The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router. An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route. If a router receives two updates listing the same remote network, the first thing the router checks is the AD. If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table. If both advertised routes to the same network have the same AD, then routing protocol metrics (such as hop count or bandwidth of the lines) will be used to find the best path to the remote network. The advertised route with the lowest metric will be placed in the routing table. But if both advertised routes have the same AD as well as the same metrics, then the routing protocol will load-balance to the remote network.
  14. The distance-vector protocols find the best path to a remote network by judging distance. Each time a packet goes through a router, that’s called a hop . The route with the least number of hops to the network is determined to be the best route. The vector indicates the direction to the remote network. Both RIP and IGRP are distance-vector routing protocols.
  15. Routers, when powered up and the interfaces are enabled, have only their directly connected networks in the routing table
  16. 5 Routing Information Protocol (RIP) is a true distance-vector routing protocol. It sends the complete routing table out to all active interfaces every 30 seconds. RIP only uses hop count to determine the best way to a remote network, but it has a maximum allowable hop count of 15 by default, meaning that 16 is deemed unreachable. RIP works well in small networks, but it’s inefficient on large networks with slow WAN links or on networks with a large number of routers installed. RIP version 1 uses only classful routing , which means that all devices in the network must use the same subnet mask.
  17. To configure RIP routing, just turn on the protocol with the router rip command and tell the RIP routing protocol which networks to advertise. That’s it. Understand that RIP is configured with classful routing network addresses!
  18. Easy configuration, just add the command “version 2” under the router rip configuration. RIPv2 is the preferred choice over RIPv1 because it supports VLSM and discontiguous networks.
  19. If you create VLSM network, sometimes you may find that the backbone connecting buildings together is a different class of network. This is called discontiguous addressing. By default routing protocols will not work across discontiguous networks. By using the “no auto-summary” command on the network boundaries, routing protocols will be able do work across a discontiguous addressed network.
  20. You probably don’t want your RIP network advertised everywhere on your LAN and WAN—there’s not a whole lot to be gained by advertising your RIP network to the Internet, now is there? No worries—there are a few different ways to stop unwanted RIP updates from propagating across your LANs and WANs. The easiest one is through the passive-interface command. This command prevents RIP update broadcasts from being sent out a defined interface, but that same interface can still receive RIP updates.
  21. Show ip protocols: show routing protocols information and timers Show protocols: show routed protocol information Show ip route: displays the routing table Debug ip rip: show rip updates being sent and received on your router Undebug all or no debug ip rip: turns off debugging