SlideShare une entreprise Scribd logo
1  sur  28
IP Routing

BY
Mr.Sourabh Badve
Chapter Objectives







Explain Protocols
Explain Routing Metrics
Discuss Routing Mechanisms
Explain Routing Algorithms
Set up routing
Recall






The router configuration files are located in:
 RAM
 NVRAM
 TFTP Server
Protocol that gives the information about locally
attached and remote devices in the network is
termed as Cisco Discovery Protocol (CDP)
CDP global parameters include:
 CDP timer
 CDP holdtime
Goals of Routing




Routing process ensures that appropriate packets
are routed from the source to the destination
Goals of routing include:
 Stability
 Provides with a robust network
 Dynamic update of the network paths
 Information is safe while transmitting
IP Routing with One Router
IP Routing with Three Routers
Process of Routing Packets within a
Router
Routing Metrics




Routing metrics are values that allow the routers
decide the best route for the data packet
Different routing metrics include:
 Hops
 Bandwidth
 Load
 Cost
 Reliability
Dynamic Routing




The phenomena in which the routing protocols are
assigned the job of finding the path to route the
packets and update the routing tables
Two types of dynamic routing protocols include:
 Interior routing protocols
 Exterior routing protocols
Administrative Distance





An integer assigned to every routing protocol, which
determines the reliability of the routing protocol is
termed as administrative distance (AD)
The integer is in the range of 0 to 255
Lower the AD, more reliable is the routing
information provided by the routing protocol
AD of Routing Protocols
Routed Source

Default AD

Connected Interface

0

Static Route

1

Enhanced Interior Gateway Routing Protocol 90
(EIGRP)

Interior Gateway Routing Protocol (IGRP)

100

Open Shortest Path First (OSPF)

110

Routing Information Protocol (RIP)

120

External EIGRP

170

Unknown

255 (This route will never be
used)
Interior Routing Protocols




The protocols used to route the packets inside an
autonomous system, are termed as Interior Routing
protocols
Interior routing protocols include:
 Routing Information Protocol (RIP)
 Open Shortest Path First (OSPF)
 Interior Gateway Routing Protocol (IGRP)
 Enhanced Interior Gateway Routing Protocol
(EIGRP)
 Intermediate System to Intermediate System (IS – IS)
Exterior Routing Protocols




The routing protocols that communicate between
the two or more Autonomous Systems (AS) are
termed as Exterior routing protocols
Exterior Routing Protocols include:
 Exterior Gateway Protocols (EGP)
 Border Gateway Protocol (BGP)
Routing Tables




The routing tables then decide the best path to the
route the packet, which also includes the next hop
address
Information contained in the routing table include:
 Destination
 Next hop address
 Outgoing interface
 Routing Protocols
Static Routing




The phenomena of adding routes manually to the
routing table, is termed as static routing
This is feasible in small networks, but not in large
networks
Routing Information Protocol (RIP)




RIP allows routers to exchange their routing tables
at a predefined interval
Characteristics of RIP include:
 Uses hop count metric
 Supports 15 hop-count limit
 Supports six equal-cost paths
Distance Vector concept








The routers connected to the neighboring networks
update the list of networks and the hop counts in the
routing table
The connected routers update the routing table with
the network information
The routers connected to the distant networks
construct a new routing table
The network information of the connected routers
combined with the new routing table entries is
passed to all the neighboring routing tables
RIP Timers




RIP timers are used to keep a track of the various
routes connected
The different RIP timers include:
 Route update timer
 Route invalid timer
 Holddown timer
 Route Flush timer
Enhancements in RIPv2




RIPv2 was created to overcome the drawbacks of
RIPv1
RIPv2 enhancements include:
 Multicasting
 Triggered updates
 Classless protocol
 Authentication
Case Study
The Hyderabad branch of the Blue Diamond Steel
Company has 10 routers connected in the network.
Initially, the network administrator had configured the
network to use static routes to route the packets
containing the data and to communicate between the
networks. Now the company has decided employ
more than 100 employees for their operations in
Software Management, Human Resource, Detailing,
Business Development and Sales. This requires the
company to add five more networks to the existing
ones.
Problem

The network administrator has to manually add
routes to all the networks connected and then
send the packets
Solution

The network administrator decided to use RIP, which
is a dynamic routing protocol. It can add the routes
to the network automatically and uses hop count as
its metric to route the packets and can be used to
connect small networks
Summary - I





Routing occurs at the network layer of the OSI
model
Protocols are a set of rules that define data transfer
The routing protocols can be classified based on
their routing abilities as:
 Interior Routing Protocols
 Exterior Routing Protocols
Summary - II




Interior Routing protocols can be classified as:
 Routing Information Protocol (RIP)
 Open Shortest Path First (OSPF)
 Interior Gateway Routing Protocol (IGRP)
 Enhanced Intermediate System to Intermediate
System (EIGRP)
 Intermediate System to Intermediate System
Exterior Routing protocols can be classified as:
 Exterior Gateway Protocol (EGP)
 Border Gateway Protocol (BGP)
Summary - III










Routing metrics are cost values that enable routers
decide the best route for the data packet
When a router forwards a data packet to a network
segment, it is counted as a single hop
Bandwidth measures the amount of data that can
travel over the network segment in a fixed amount of
time
Delay specifies the amount of time that a router takes
to process and transfer a data packet to the next
device on the network
The delay is represented with a µ symbol
Summary - IV









Load refers to the amount of traffic on a particular link
relative to the total capacity of the link
The load value 255 indicates 100% traffic congestion
Direct interfaces consist of routes that are local to the
router
Routed protocols consist of protocols that define
routing and addressing
Routing protocols are a set of rules that are
implemented on a router to determine the best path to
route the packets
Summary - V










Routing protocols can be classified into Interior
Routing Protocols and Exterior Routing Protocols
Every router has a routing table based on which the
data packets are forwarded to the destinations
Static routes are the routes that the administrator
manually enters in the routing table
Static routes are used in temporary connections
such as dial-up networks
The router automatically collects and stores dynamic
routes in the routing table
Summary - VI


Enhancements in RIPv2 include:
 Supports multicast updates against broadcast
updates
 Uses triggered updates to share its routing
information with the neighbors, when a change
occurs
 Supports Variable-Length Subnet Masking
(VSLM)
 Allows you to select the routers you want to
participate in RIPv2

Contenu connexe

Tendances

Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.Editor IJMTER
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principleDrAlneami
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Exploration Routing Chapter 4
Exploration Routing Chapter 4Exploration Routing Chapter 4
Exploration Routing Chapter 4thanh cong
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPLouis K. H. Kuo
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 

Tendances (20)

Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Ppp
PppPpp
Ppp
 
LTE Procedures
LTE ProceduresLTE Procedures
LTE Procedures
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
ConfigureTwo networks principle
ConfigureTwo networks principleConfigureTwo networks principle
ConfigureTwo networks principle
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 
Exploration Routing Chapter 4
Exploration Routing Chapter 4Exploration Routing Chapter 4
Exploration Routing Chapter 4
 
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPPElementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
Elementary procedures for Circuit-Switched (CS) Call Control (CC) in 3GPP
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Umts 18 19
Umts 18 19Umts 18 19
Umts 18 19
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 

Similaire à Ip routing

3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configurationSourabh Badve
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGramya marichamy
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPIRJET Journal
 

Similaire à Ip routing (20)

ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Basic router configuration
Basic router configurationBasic router configuration
Basic router configuration
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
C0343015019
C0343015019C0343015019
C0343015019
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Group 1
Group 1Group 1
Group 1
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Routing basic
Routing basicRouting basic
Routing basic
 
Ip routing
Ip routingIp routing
Ip routing
 
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRPPerformance Analysis of Routing Protocols RIP, OSPF and EIGRP
Performance Analysis of Routing Protocols RIP, OSPF and EIGRP
 

Plus de Sourabh Badve

Plus de Sourabh Badve (7)

Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Cryptography
CryptographyCryptography
Cryptography
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Ip routing

  • 2. Chapter Objectives      Explain Protocols Explain Routing Metrics Discuss Routing Mechanisms Explain Routing Algorithms Set up routing
  • 3. Recall    The router configuration files are located in:  RAM  NVRAM  TFTP Server Protocol that gives the information about locally attached and remote devices in the network is termed as Cisco Discovery Protocol (CDP) CDP global parameters include:  CDP timer  CDP holdtime
  • 4. Goals of Routing   Routing process ensures that appropriate packets are routed from the source to the destination Goals of routing include:  Stability  Provides with a robust network  Dynamic update of the network paths  Information is safe while transmitting
  • 5. IP Routing with One Router
  • 6. IP Routing with Three Routers
  • 7. Process of Routing Packets within a Router
  • 8. Routing Metrics   Routing metrics are values that allow the routers decide the best route for the data packet Different routing metrics include:  Hops  Bandwidth  Load  Cost  Reliability
  • 9. Dynamic Routing   The phenomena in which the routing protocols are assigned the job of finding the path to route the packets and update the routing tables Two types of dynamic routing protocols include:  Interior routing protocols  Exterior routing protocols
  • 10. Administrative Distance    An integer assigned to every routing protocol, which determines the reliability of the routing protocol is termed as administrative distance (AD) The integer is in the range of 0 to 255 Lower the AD, more reliable is the routing information provided by the routing protocol
  • 11. AD of Routing Protocols Routed Source Default AD Connected Interface 0 Static Route 1 Enhanced Interior Gateway Routing Protocol 90 (EIGRP) Interior Gateway Routing Protocol (IGRP) 100 Open Shortest Path First (OSPF) 110 Routing Information Protocol (RIP) 120 External EIGRP 170 Unknown 255 (This route will never be used)
  • 12. Interior Routing Protocols   The protocols used to route the packets inside an autonomous system, are termed as Interior Routing protocols Interior routing protocols include:  Routing Information Protocol (RIP)  Open Shortest Path First (OSPF)  Interior Gateway Routing Protocol (IGRP)  Enhanced Interior Gateway Routing Protocol (EIGRP)  Intermediate System to Intermediate System (IS – IS)
  • 13. Exterior Routing Protocols   The routing protocols that communicate between the two or more Autonomous Systems (AS) are termed as Exterior routing protocols Exterior Routing Protocols include:  Exterior Gateway Protocols (EGP)  Border Gateway Protocol (BGP)
  • 14. Routing Tables   The routing tables then decide the best path to the route the packet, which also includes the next hop address Information contained in the routing table include:  Destination  Next hop address  Outgoing interface  Routing Protocols
  • 15. Static Routing   The phenomena of adding routes manually to the routing table, is termed as static routing This is feasible in small networks, but not in large networks
  • 16. Routing Information Protocol (RIP)   RIP allows routers to exchange their routing tables at a predefined interval Characteristics of RIP include:  Uses hop count metric  Supports 15 hop-count limit  Supports six equal-cost paths
  • 17. Distance Vector concept     The routers connected to the neighboring networks update the list of networks and the hop counts in the routing table The connected routers update the routing table with the network information The routers connected to the distant networks construct a new routing table The network information of the connected routers combined with the new routing table entries is passed to all the neighboring routing tables
  • 18. RIP Timers   RIP timers are used to keep a track of the various routes connected The different RIP timers include:  Route update timer  Route invalid timer  Holddown timer  Route Flush timer
  • 19. Enhancements in RIPv2   RIPv2 was created to overcome the drawbacks of RIPv1 RIPv2 enhancements include:  Multicasting  Triggered updates  Classless protocol  Authentication
  • 20. Case Study The Hyderabad branch of the Blue Diamond Steel Company has 10 routers connected in the network. Initially, the network administrator had configured the network to use static routes to route the packets containing the data and to communicate between the networks. Now the company has decided employ more than 100 employees for their operations in Software Management, Human Resource, Detailing, Business Development and Sales. This requires the company to add five more networks to the existing ones.
  • 21. Problem The network administrator has to manually add routes to all the networks connected and then send the packets
  • 22. Solution The network administrator decided to use RIP, which is a dynamic routing protocol. It can add the routes to the network automatically and uses hop count as its metric to route the packets and can be used to connect small networks
  • 23. Summary - I    Routing occurs at the network layer of the OSI model Protocols are a set of rules that define data transfer The routing protocols can be classified based on their routing abilities as:  Interior Routing Protocols  Exterior Routing Protocols
  • 24. Summary - II   Interior Routing protocols can be classified as:  Routing Information Protocol (RIP)  Open Shortest Path First (OSPF)  Interior Gateway Routing Protocol (IGRP)  Enhanced Intermediate System to Intermediate System (EIGRP)  Intermediate System to Intermediate System Exterior Routing protocols can be classified as:  Exterior Gateway Protocol (EGP)  Border Gateway Protocol (BGP)
  • 25. Summary - III      Routing metrics are cost values that enable routers decide the best route for the data packet When a router forwards a data packet to a network segment, it is counted as a single hop Bandwidth measures the amount of data that can travel over the network segment in a fixed amount of time Delay specifies the amount of time that a router takes to process and transfer a data packet to the next device on the network The delay is represented with a µ symbol
  • 26. Summary - IV      Load refers to the amount of traffic on a particular link relative to the total capacity of the link The load value 255 indicates 100% traffic congestion Direct interfaces consist of routes that are local to the router Routed protocols consist of protocols that define routing and addressing Routing protocols are a set of rules that are implemented on a router to determine the best path to route the packets
  • 27. Summary - V      Routing protocols can be classified into Interior Routing Protocols and Exterior Routing Protocols Every router has a routing table based on which the data packets are forwarded to the destinations Static routes are the routes that the administrator manually enters in the routing table Static routes are used in temporary connections such as dial-up networks The router automatically collects and stores dynamic routes in the routing table
  • 28. Summary - VI  Enhancements in RIPv2 include:  Supports multicast updates against broadcast updates  Uses triggered updates to share its routing information with the neighbors, when a change occurs  Supports Variable-Length Subnet Masking (VSLM)  Allows you to select the routers you want to participate in RIPv2