SlideShare une entreprise Scribd logo
1  sur  28
IP Routing

BY
Mr.Sourabh Badve
Chapter Objectives







Explain Protocols
Explain Routing Metrics
Discuss Routing Mechanisms
Explain Routing Algorithms
Set up routing
Recall






The router configuration files are located in:
 RAM
 NVRAM
 TFTP Server
Protocol that gives the information about locally
attached and remote devices in the network is
termed as Cisco Discovery Protocol (CDP)
CDP global parameters include:
 CDP timer
 CDP holdtime
Goals of Routing




Routing process ensures that appropriate packets
are routed from the source to the destination
Goals of routing include:
 Stability
 Provides with a robust network
 Dynamic update of the network paths
 Information is safe while transmitting
IP Routing with One Router
IP Routing with Three Routers
Process of Routing Packets within a
Router
Routing Metrics




Routing metrics are values that allow the routers
decide the best route for the data packet
Different routing metrics include:
 Hops
 Bandwidth
 Load
 Cost
 Reliability
Dynamic Routing




The phenomena in which the routing protocols are
assigned the job of finding the path to route the
packets and update the routing tables
Two types of dynamic routing protocols include:
 Interior routing protocols
 Exterior routing protocols
Administrative Distance





An integer assigned to every routing protocol, which
determines the reliability of the routing protocol is
termed as administrative distance (AD)
The integer is in the range of 0 to 255
Lower the AD, more reliable is the routing
information provided by the routing protocol
AD of Routing Protocols
Routed Source

Default AD

Connected Interface

0

Static Route

1

Enhanced Interior Gateway Routing Protocol 90
(EIGRP)

Interior Gateway Routing Protocol (IGRP)

100

Open Shortest Path First (OSPF)

110

Routing Information Protocol (RIP)

120

External EIGRP

170

Unknown

255 (This route will never be
used)
Interior Routing Protocols




The protocols used to route the packets inside an
autonomous system, are termed as Interior Routing
protocols
Interior routing protocols include:
 Routing Information Protocol (RIP)
 Open Shortest Path First (OSPF)
 Interior Gateway Routing Protocol (IGRP)
 Enhanced Interior Gateway Routing Protocol
(EIGRP)
 Intermediate System to Intermediate System (IS – IS)
Exterior Routing Protocols




The routing protocols that communicate between
the two or more Autonomous Systems (AS) are
termed as Exterior routing protocols
Exterior Routing Protocols include:
 Exterior Gateway Protocols (EGP)
 Border Gateway Protocol (BGP)
Routing Tables




The routing tables then decide the best path to the
route the packet, which also includes the next hop
address
Information contained in the routing table include:
 Destination
 Next hop address
 Outgoing interface
 Routing Protocols
Static Routing




The phenomena of adding routes manually to the
routing table, is termed as static routing
This is feasible in small networks, but not in large
networks
Routing Information Protocol (RIP)




RIP allows routers to exchange their routing tables
at a predefined interval
Characteristics of RIP include:
 Uses hop count metric
 Supports 15 hop-count limit
 Supports six equal-cost paths
Distance Vector concept








The routers connected to the neighboring networks
update the list of networks and the hop counts in the
routing table
The connected routers update the routing table with
the network information
The routers connected to the distant networks
construct a new routing table
The network information of the connected routers
combined with the new routing table entries is
passed to all the neighboring routing tables
RIP Timers




RIP timers are used to keep a track of the various
routes connected
The different RIP timers include:
 Route update timer
 Route invalid timer
 Holddown timer
 Route Flush timer
Enhancements in RIPv2




RIPv2 was created to overcome the drawbacks of
RIPv1
RIPv2 enhancements include:
 Multicasting
 Triggered updates
 Classless protocol
 Authentication
Case Study
The Hyderabad branch of the Blue Diamond Steel
Company has 10 routers connected in the network.
Initially, the network administrator had configured the
network to use static routes to route the packets
containing the data and to communicate between the
networks. Now the company has decided employ
more than 100 employees for their operations in
Software Management, Human Resource, Detailing,
Business Development and Sales. This requires the
company to add five more networks to the existing
ones.
Problem

The network administrator has to manually add
routes to all the networks connected and then
send the packets
Solution

The network administrator decided to use RIP, which
is a dynamic routing protocol. It can add the routes
to the network automatically and uses hop count as
its metric to route the packets and can be used to
connect small networks
Summary - I





Routing occurs at the network layer of the OSI
model
Protocols are a set of rules that define data transfer
The routing protocols can be classified based on
their routing abilities as:
 Interior Routing Protocols
 Exterior Routing Protocols
Summary - II




Interior Routing protocols can be classified as:
 Routing Information Protocol (RIP)
 Open Shortest Path First (OSPF)
 Interior Gateway Routing Protocol (IGRP)
 Enhanced Intermediate System to Intermediate
System (EIGRP)
 Intermediate System to Intermediate System
Exterior Routing protocols can be classified as:
 Exterior Gateway Protocol (EGP)
 Border Gateway Protocol (BGP)
Summary - III










Routing metrics are cost values that enable routers
decide the best route for the data packet
When a router forwards a data packet to a network
segment, it is counted as a single hop
Bandwidth measures the amount of data that can
travel over the network segment in a fixed amount of
time
Delay specifies the amount of time that a router takes
to process and transfer a data packet to the next
device on the network
The delay is represented with a µ symbol
Summary - IV









Load refers to the amount of traffic on a particular link
relative to the total capacity of the link
The load value 255 indicates 100% traffic congestion
Direct interfaces consist of routes that are local to the
router
Routed protocols consist of protocols that define
routing and addressing
Routing protocols are a set of rules that are
implemented on a router to determine the best path to
route the packets
Summary - V










Routing protocols can be classified into Interior
Routing Protocols and Exterior Routing Protocols
Every router has a routing table based on which the
data packets are forwarded to the destinations
Static routes are the routes that the administrator
manually enters in the routing table
Static routes are used in temporary connections
such as dial-up networks
The router automatically collects and stores dynamic
routes in the routing table
Summary - VI


Enhancements in RIPv2 include:
 Supports multicast updates against broadcast
updates
 Uses triggered updates to share its routing
information with the neighbors, when a change
occurs
 Supports Variable-Length Subnet Masking
(VSLM)
 Allows you to select the routers you want to
participate in RIPv2

Contenu connexe

Tendances

Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.Editor IJMTER
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Exploration Routing Chapter 4
Exploration Routing Chapter 4Exploration Routing Chapter 4
Exploration Routing Chapter 4thanh cong
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPLouis K. H. Kuo
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 

Tendances (20)

Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Ppp
PppPpp
Ppp
 
LTE Procedures
LTE ProceduresLTE Procedures
LTE Procedures
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
Exploration Routing Chapter 4
Exploration Routing Chapter 4Exploration Routing Chapter 4
Exploration Routing Chapter 4
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Umts 18 19
Umts 18 19Umts 18 19
Umts 18 19
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 

Similaire à Ip routing

3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configurationSourabh Badve
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPIRJET Journal
 

Similaire à Ip routing (20)

ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
C0343015019
C0343015019C0343015019
C0343015019
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Group 1
Group 1Group 1
Group 1
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Routing basic
Routing basicRouting basic
Routing basic
 
Ip routing
Ip routingIp routing
Ip routing
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
 

Plus de Sourabh Badve

Plus de Sourabh Badve (7)

Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Cryptography
CryptographyCryptography
Cryptography
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Dernier

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Dernier (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Ip routing

  • 2. Chapter Objectives      Explain Protocols Explain Routing Metrics Discuss Routing Mechanisms Explain Routing Algorithms Set up routing
  • 3. Recall    The router configuration files are located in:  RAM  NVRAM  TFTP Server Protocol that gives the information about locally attached and remote devices in the network is termed as Cisco Discovery Protocol (CDP) CDP global parameters include:  CDP timer  CDP holdtime
  • 4. Goals of Routing   Routing process ensures that appropriate packets are routed from the source to the destination Goals of routing include:  Stability  Provides with a robust network  Dynamic update of the network paths  Information is safe while transmitting
  • 5. IP Routing with One Router
  • 6. IP Routing with Three Routers
  • 7. Process of Routing Packets within a Router
  • 8. Routing Metrics   Routing metrics are values that allow the routers decide the best route for the data packet Different routing metrics include:  Hops  Bandwidth  Load  Cost  Reliability
  • 9. Dynamic Routing   The phenomena in which the routing protocols are assigned the job of finding the path to route the packets and update the routing tables Two types of dynamic routing protocols include:  Interior routing protocols  Exterior routing protocols
  • 10. Administrative Distance    An integer assigned to every routing protocol, which determines the reliability of the routing protocol is termed as administrative distance (AD) The integer is in the range of 0 to 255 Lower the AD, more reliable is the routing information provided by the routing protocol
  • 11. AD of Routing Protocols Routed Source Default AD Connected Interface 0 Static Route 1 Enhanced Interior Gateway Routing Protocol 90 (EIGRP) Interior Gateway Routing Protocol (IGRP) 100 Open Shortest Path First (OSPF) 110 Routing Information Protocol (RIP) 120 External EIGRP 170 Unknown 255 (This route will never be used)
  • 12. Interior Routing Protocols   The protocols used to route the packets inside an autonomous system, are termed as Interior Routing protocols Interior routing protocols include:  Routing Information Protocol (RIP)  Open Shortest Path First (OSPF)  Interior Gateway Routing Protocol (IGRP)  Enhanced Interior Gateway Routing Protocol (EIGRP)  Intermediate System to Intermediate System (IS – IS)
  • 13. Exterior Routing Protocols   The routing protocols that communicate between the two or more Autonomous Systems (AS) are termed as Exterior routing protocols Exterior Routing Protocols include:  Exterior Gateway Protocols (EGP)  Border Gateway Protocol (BGP)
  • 14. Routing Tables   The routing tables then decide the best path to the route the packet, which also includes the next hop address Information contained in the routing table include:  Destination  Next hop address  Outgoing interface  Routing Protocols
  • 15. Static Routing   The phenomena of adding routes manually to the routing table, is termed as static routing This is feasible in small networks, but not in large networks
  • 16. Routing Information Protocol (RIP)   RIP allows routers to exchange their routing tables at a predefined interval Characteristics of RIP include:  Uses hop count metric  Supports 15 hop-count limit  Supports six equal-cost paths
  • 17. Distance Vector concept     The routers connected to the neighboring networks update the list of networks and the hop counts in the routing table The connected routers update the routing table with the network information The routers connected to the distant networks construct a new routing table The network information of the connected routers combined with the new routing table entries is passed to all the neighboring routing tables
  • 18. RIP Timers   RIP timers are used to keep a track of the various routes connected The different RIP timers include:  Route update timer  Route invalid timer  Holddown timer  Route Flush timer
  • 19. Enhancements in RIPv2   RIPv2 was created to overcome the drawbacks of RIPv1 RIPv2 enhancements include:  Multicasting  Triggered updates  Classless protocol  Authentication
  • 20. Case Study The Hyderabad branch of the Blue Diamond Steel Company has 10 routers connected in the network. Initially, the network administrator had configured the network to use static routes to route the packets containing the data and to communicate between the networks. Now the company has decided employ more than 100 employees for their operations in Software Management, Human Resource, Detailing, Business Development and Sales. This requires the company to add five more networks to the existing ones.
  • 21. Problem The network administrator has to manually add routes to all the networks connected and then send the packets
  • 22. Solution The network administrator decided to use RIP, which is a dynamic routing protocol. It can add the routes to the network automatically and uses hop count as its metric to route the packets and can be used to connect small networks
  • 23. Summary - I    Routing occurs at the network layer of the OSI model Protocols are a set of rules that define data transfer The routing protocols can be classified based on their routing abilities as:  Interior Routing Protocols  Exterior Routing Protocols
  • 24. Summary - II   Interior Routing protocols can be classified as:  Routing Information Protocol (RIP)  Open Shortest Path First (OSPF)  Interior Gateway Routing Protocol (IGRP)  Enhanced Intermediate System to Intermediate System (EIGRP)  Intermediate System to Intermediate System Exterior Routing protocols can be classified as:  Exterior Gateway Protocol (EGP)  Border Gateway Protocol (BGP)
  • 25. Summary - III      Routing metrics are cost values that enable routers decide the best route for the data packet When a router forwards a data packet to a network segment, it is counted as a single hop Bandwidth measures the amount of data that can travel over the network segment in a fixed amount of time Delay specifies the amount of time that a router takes to process and transfer a data packet to the next device on the network The delay is represented with a µ symbol
  • 26. Summary - IV      Load refers to the amount of traffic on a particular link relative to the total capacity of the link The load value 255 indicates 100% traffic congestion Direct interfaces consist of routes that are local to the router Routed protocols consist of protocols that define routing and addressing Routing protocols are a set of rules that are implemented on a router to determine the best path to route the packets
  • 27. Summary - V      Routing protocols can be classified into Interior Routing Protocols and Exterior Routing Protocols Every router has a routing table based on which the data packets are forwarded to the destinations Static routes are the routes that the administrator manually enters in the routing table Static routes are used in temporary connections such as dial-up networks The router automatically collects and stores dynamic routes in the routing table
  • 28. Summary - VI  Enhancements in RIPv2 include:  Supports multicast updates against broadcast updates  Uses triggered updates to share its routing information with the neighbors, when a change occurs  Supports Variable-Length Subnet Masking (VSLM)  Allows you to select the routers you want to participate in RIPv2