SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
IP ROUTING
By
Anil Kumar Vishwakarma
MCA,MCTS,CCNA
ROUTING BASICS
The term routing is used for taking a packet from one device and
sending it through the network to another device on a different network.
To be able to route packets, a router must know, at a minimum, the
following:
• Destination address
• Neighbor routers from which it can learn about remote
networks
• Possible routes to all remote networks
• The best route to each remote network
• How to maintain and verify routing information
ROUTE TYPES
CONFIGURING STATICIP ROUTING
 Static routing has the following benefits:
 There is no overhead on the router CPU, which means you could
possibly buy a cheaper router than if you were using dynamic
routing.
 There is no bandwidth usage between routers, which means you
could possibly save money on WAN links.
 It adds security, because the administrator can choose to allow
routing access to certain networks only.
 Static routing has the following disadvantages:
 The administrator must really understand the internetwork and
how each router is connected in order to configure routes correctly.
 If a network is added to the internetwork, the administrator has to
add a route to it on all routers—by hand.
 It’s not feasible in large networks because maintaining it would be
a full-time job in itself.
STATIC ROUTING
 Static Routes built by using IP route command
DEFAULT ROUTING
 Default routes are used to route packets with destinations that do
not match any of the other routes in the routing table.
 Routers are typically configured with a default route for
Internet-bound traffic, since it is often impractical and
unnecessary to maintain routes to all networks in the Internet.
 A default route is actually a special static route that uses this
format:
ip route 0.0.0.0 0.0.0.0 [next-hop-address]
VERIFYING STATIC ROUTE CONFIGURATION
 It is important to verify that they are present in the routing table
and that routing is working as expected.
 The command show run is used to view the active configuration
in RAM to verify that the static route was entered correctly.
Router#sh run
 The show ip route command is used to make sure that the
static route is present in the routing table.
Router#sh ip route
TROUBLESHOOTING STATIC ROUTE
If any problem in connection between networks follow this steps:
1. verifying static routes (by using sh ip route) to make sure the
route found in routing table.
2. If the problem exists, run a traceroute command.
DYNAMIC ROUTING OVERVIEW
 Routing protocols
 Routed protocol
 Autonomous systems
 Purpose of a routing protocol and
autonomous systems
 Identifying the classes of routing protocols
ROUTING PROTOCOLS
 It is the communication used between routers.
 It allows one router to share information with other routers
regarding the networks .
 The information a router gets from another router, using a
routing protocol, is used to build and maintain a routing table.
 Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
ROUTED PROTOCOL
 It is used to direct user traffic.
 It provides enough information in its network layer address
to allow a packet to be forwarded from one host to another
based on the addressing scheme.
 Examples of routed protocols are: IP and IPX.
AUTONOMOUS SYSTEMS
 An autonomous system (AS) is a collection of networks under a
common administration sharing a common routing strategy.
 To the outside world, an AS is viewed as a single entity.
 The AS may be run by one or more operators while presenting a
consistent view of routing to the external world.
PURPOSE OF A ROUTING PROTOCOL AND
AUTONOMOUS SYSTEMS
 The goal of a routing protocol is to build and maintain the routing
table.
 Routers use routing protocols to manage information received
from other routers .
 Autonomous systems (AS) provide the division of the global
internetwork into smaller and more manageable networks.
 Each AS has its own set of rules and policies and an AS number
that will uniquely distinguish it from other autonomous systems
throughout the world.
THE TYPES OF ROUTING PROTOCOLS
Most routing algorithms can be classified into one of two categories:
1. Distance Vector
The distance vector routing approach determines the direction
(vector) and distance to any link in the internetwork.
As an example: RIP and IGRP.
2. Link State
The link-state approach, also called shortest path first, recreates
the exact topology of the entire internetwork.
As an example: OSPF.
3. Hybrid
Mixed between distance vector and link state
As an example: EIGRP.
DISTANCE VECTOR ROUTING
 Distance vector routing updates
 Distance vector routing loop issues
 Defining a maximum count
 Elimination routing loops through split
horizon
 Route poisoning
 Preventing routing loops with holddown
timers
DISTANCE VECTOR ROUTING UPDATES
 Routing table updates occur periodically or when the topology in a
distance vector protocol network changes.
 Distance vector algorithms call for each router to send its entire
routing table to each of its adjacent neighbors.
 The administrative distance (AD) is used to rate the trustworthiness
of routing information received on a router from a neighbor router.
 An administrative distance is an integer from 0 to 255, where 0 is the
most trusted and 255 means no traffic will be passed via this route.
 If a router receives two updates listing the same remote network, the
first thing the router checks is the AD.
 If one of the advertised routes has a lower AD than the other, then
the route with the lowest AD will be placed in the routing table.
 If both advertised routes to the same network have the same AD,
then routing protocol metrics will be used to find the best path to the
remote network.
 The routing tables include information about the total path cost
as defined by the metrics.
DISTANCE VECTOR ROUTING LOOP
ISSUES
DISTANCE VECTOR ROUTING LOOP ISSUES
 Routing loops can occur when inconsistent routing tables are not
updated due to slow convergence in a changing network.
 Just before the failure of Network 1, all routers have consistent
knowledge and correct routing tables.
 When Network 1 fails, Router E sends an update to Router A.
 Router A stops routing packets to Network 1, but Routers B, C, and D
continue to do so because they have not yet been informed of the
failure.
 When Router A sends out its update, Routers B and D stop routing to
Network 1.
 However, Router C has not received an update, so Network 1 is still
reachable via Router B.
 Now Router C sends a periodic update to Router D, indicating a path
to Network 1 by way of Router B.
 Router D changes its routing table to reflect this good, but incorrect,
information, and propagates the information to Router A.
 Router A propagates the information to Routers B and E, and so on.
 Any packet destined for Network 1 will now loop from Router C to B
to A to D and back to again to C.
DEFINING A MAXIMUM COUNT
The invalid updates of Network 1 will continue to loop until some other
process stops the looping. This condition, called count to infinity
DEFINING A MAXIMUM COUNT
ELIMINATION LOOPS BY SPLIT HORIZON
Split horizon reduces incorrect routing information and routing overhead
in a distance-vector network by enforcing the rule that routing
information cannot be sent back in the direction from which it was
received.
ROUTE POISONING
 Route poisoning is used to overcome large routing loops and offer
explicit information when a subnet or network is not accessible.
 This is usually accomplished by setting the hop count to one more
than the maximum.
HOLDDOWN TIMERS
A holddown prevents regular update messages from reinstating a route that
is going up and down (called flapping).
ROUTING INFORMATION
PROTOCOL
 Characteristics.
 RIP Timers.
 Configuring RIP Routing.
 Verifying the RIP Routing Tables.
 Holding Down RIP Propagations.
RIP CHARACTERISTICS
 Vector Distance Protocol.
 Open standard protocol.
 RIP works well in small networks.
 Default AD (administrative distance) is 120.
 Hop count is (number of routers) used as Metric for path selection.
 Maximum Hop count is 15.
RIP v2RIP v1
Classless RoutingClassful Routing
Support for VLSMNo support for VLSM
Support for discontiguous networksNo support for discontiguous
networks
Use broadcast or multicast to
deliver routing updates.
Use broadcast to deliver routing
updates.
RIP TIMERS
 Route update timer: Sets the interval (typically 30 seconds) between
periodic routing updates, in which the router sends a complete copy of its
routing table out to all neighbors.
 Route invalid timer: Determines the length of time that must elapse
(180 seconds) before a router determines that a route has become
invalid.
 Route flush timer: Sets the time between a route becoming invalid and
its removal from the routing table (240 seconds).
 Holddown timer: routes will enter into the holddown state when an
update packet is received that indicated the route is unreachable.
The default is 180 seconds.
CONFIGURING RIP ROUTING
VERIFYING THE RIP ROUTING
TABLES
 Two of the most common commands are the show ip route command
and the show ip protocols command.
 The show ip protocols command shows which routing protocols are
carrying IP traffic on the router.
 Another command use to for troubleshooting, debug ip rip. To
cancel this opertaon, use this command undebug all.
HOLDING DOWN RIP
PROPAGATIONS
 You probably don’t want your RIP network advertised everywhere on
your LAN and WAN.
 The easiest way is through the passive-interface command.
 This command prevents RIP update broadcasts from being sent out a
defined interface, but that same interface can still receive RIP updates.
Router#config t
Router(config)#router rip
Router(config-router)#network 192.168.10.0
Router(config-router)#passive-interface s0/0
INTERIOR GATEWAY ROUTING
PROTOCOL
 Characteristics.
 IGRP Timers.
 Configuring IGRP routing.
 Verifying IGRP routing table.
IGRP CHARACTERISTICS
 Vector Distance Protocol.
 Cisco-proprietary protocol.
 IGRP can works well in large networks.
 Default AD (administrative distance) is 100.
 Uses an autonomous system number.
 Uses bandwidth and delay of the line as metric.
 Maximum Hop count is 255.
 Classful Routing.
 Don’t support VLSM and discontiguous networks.
IGRP TIMERS
 Update timers These specify how frequently routing-update
messages should be sent. The default is 90 seconds.
 Invalid timers These specify how long a router should wait before
declaring a route invalid if it doesn’t receive a specific update about
it. The default is three times the update period (270 sec).
 Flush timers The default is seven times the routing update period.
If the update timer is 90 seconds by default, then 7 * 90 = 630
seconds elapse before a route will be flushed from the route table.
 Holddown timers These specify the holddown period. The default
is three times the update timer period plus 10 seconds (280 sec).
CONFIGURING IGRP ROUTING
 The command used to configure IGRP is the same as the one
used to configure RIP routing with one important difference: you
use an autonomous system (AS) number.
Router#config t
Router(config)#router igrp 10
Router(config-router)#net 192.168.10.0
 To Delete routing table built by IGRP, use this command.
Router(config)# no router igrp 10
VERIFYING IGRP ROUTING TABLE
 To verify that IGRP has been configured properly, enter the show
ip route command and look for IGRP routes signified by an "I".
 Additional command
show ip protocols
debug ip igrp events
debug ip igrp transactions
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Contiki IoT simulation
Contiki IoT simulationContiki IoT simulation
Contiki IoT simulationnabati
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 

Was ist angesagt? (20)

AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Contiki IoT simulation
Contiki IoT simulationContiki IoT simulation
Contiki IoT simulation
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Transport layer
Transport layer Transport layer
Transport layer
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Iso layers
Iso layersIso layers
Iso layers
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 

Andere mochten auch

Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 
Ατμοσφαιρική πίεση
Ατμοσφαιρική πίεσηΑτμοσφαιρική πίεση
Ατμοσφαιρική πίεσηΑστραδενή
 
Lan And Wan
Lan And WanLan And Wan
Lan And Wandan
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
Network standards
Network standardsNetwork standards
Network standardshspatalia
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes salamassh
 
Math1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary ConversionMath1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary Conversiongcmath1003
 
Cisco Router Security
Cisco Router SecurityCisco Router Security
Cisco Router Securitykktamang
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranetTej Kiran
 
Types of Network
Types of NetworkTypes of Network
Types of NetworkAvishek Kar
 

Andere mochten auch (20)

Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Network Security
Network SecurityNetwork Security
Network Security
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Ατμοσφαιρική πίεση
Ατμοσφαιρική πίεσηΑτμοσφαιρική πίεση
Ατμοσφαιρική πίεση
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Lan And Wan
Lan And WanLan And Wan
Lan And Wan
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
CCNA Chapter1
CCNA Chapter1CCNA Chapter1
CCNA Chapter1
 
CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Network standards
Network standardsNetwork standards
Network standards
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
Math1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary ConversionMath1003 1.11 - Hex to Binary Conversion
Math1003 1.11 - Hex to Binary Conversion
 
ARP
ARPARP
ARP
 
Cisco Router Security
Cisco Router SecurityCisco Router Security
Cisco Router Security
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 

Ähnlich wie Day 2 IP ROUTING

Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing nCYBERINTELLIGENTS
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxsazia7
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Dân Chơi
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdfapexjaipur
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 

Ähnlich wie Day 2 IP ROUTING (20)

Group 1
Group 1Group 1
Group 1
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Ospf
OspfOspf
Ospf
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
Day 10 rip
Day 10 ripDay 10 rip
Day 10 rip
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 

Mehr von anilinvns

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012anilinvns
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OSanilinvns
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHINGanilinvns
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOSanilinvns
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGanilinvns
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSanilinvns
 
Disk management server
Disk management serverDisk management server
Disk management serveranilinvns
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basicsanilinvns
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 

Mehr von anilinvns (19)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
LAYER 2 SWITCHING
LAYER 2 SWITCHINGLAYER 2 SWITCHING
LAYER 2 SWITCHING
 
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Day 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHINGDay 4 LAYER 2 SWITCHING
Day 4 LAYER 2 SWITCHING
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
Wds
WdsWds
Wds
 
Disk management server
Disk management serverDisk management server
Disk management server
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Kürzlich hochgeladen

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Day 2 IP ROUTING

  • 1. IP ROUTING By Anil Kumar Vishwakarma MCA,MCTS,CCNA
  • 2. ROUTING BASICS The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. To be able to route packets, a router must know, at a minimum, the following: • Destination address • Neighbor routers from which it can learn about remote networks • Possible routes to all remote networks • The best route to each remote network • How to maintain and verify routing information
  • 4. CONFIGURING STATICIP ROUTING  Static routing has the following benefits:  There is no overhead on the router CPU, which means you could possibly buy a cheaper router than if you were using dynamic routing.  There is no bandwidth usage between routers, which means you could possibly save money on WAN links.  It adds security, because the administrator can choose to allow routing access to certain networks only.  Static routing has the following disadvantages:  The administrator must really understand the internetwork and how each router is connected in order to configure routes correctly.  If a network is added to the internetwork, the administrator has to add a route to it on all routers—by hand.  It’s not feasible in large networks because maintaining it would be a full-time job in itself.
  • 5. STATIC ROUTING  Static Routes built by using IP route command
  • 6. DEFAULT ROUTING  Default routes are used to route packets with destinations that do not match any of the other routes in the routing table.  Routers are typically configured with a default route for Internet-bound traffic, since it is often impractical and unnecessary to maintain routes to all networks in the Internet.  A default route is actually a special static route that uses this format: ip route 0.0.0.0 0.0.0.0 [next-hop-address]
  • 7. VERIFYING STATIC ROUTE CONFIGURATION  It is important to verify that they are present in the routing table and that routing is working as expected.  The command show run is used to view the active configuration in RAM to verify that the static route was entered correctly. Router#sh run  The show ip route command is used to make sure that the static route is present in the routing table. Router#sh ip route
  • 8. TROUBLESHOOTING STATIC ROUTE If any problem in connection between networks follow this steps: 1. verifying static routes (by using sh ip route) to make sure the route found in routing table. 2. If the problem exists, run a traceroute command.
  • 9. DYNAMIC ROUTING OVERVIEW  Routing protocols  Routed protocol  Autonomous systems  Purpose of a routing protocol and autonomous systems  Identifying the classes of routing protocols
  • 10. ROUTING PROTOCOLS  It is the communication used between routers.  It allows one router to share information with other routers regarding the networks .  The information a router gets from another router, using a routing protocol, is used to build and maintain a routing table.  Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
  • 11. ROUTED PROTOCOL  It is used to direct user traffic.  It provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme.  Examples of routed protocols are: IP and IPX.
  • 12. AUTONOMOUS SYSTEMS  An autonomous system (AS) is a collection of networks under a common administration sharing a common routing strategy.  To the outside world, an AS is viewed as a single entity.  The AS may be run by one or more operators while presenting a consistent view of routing to the external world.
  • 13. PURPOSE OF A ROUTING PROTOCOL AND AUTONOMOUS SYSTEMS  The goal of a routing protocol is to build and maintain the routing table.  Routers use routing protocols to manage information received from other routers .  Autonomous systems (AS) provide the division of the global internetwork into smaller and more manageable networks.  Each AS has its own set of rules and policies and an AS number that will uniquely distinguish it from other autonomous systems throughout the world.
  • 14. THE TYPES OF ROUTING PROTOCOLS Most routing algorithms can be classified into one of two categories: 1. Distance Vector The distance vector routing approach determines the direction (vector) and distance to any link in the internetwork. As an example: RIP and IGRP. 2. Link State The link-state approach, also called shortest path first, recreates the exact topology of the entire internetwork. As an example: OSPF. 3. Hybrid Mixed between distance vector and link state As an example: EIGRP.
  • 15. DISTANCE VECTOR ROUTING  Distance vector routing updates  Distance vector routing loop issues  Defining a maximum count  Elimination routing loops through split horizon  Route poisoning  Preventing routing loops with holddown timers
  • 16. DISTANCE VECTOR ROUTING UPDATES  Routing table updates occur periodically or when the topology in a distance vector protocol network changes.  Distance vector algorithms call for each router to send its entire routing table to each of its adjacent neighbors.  The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router.  An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route.  If a router receives two updates listing the same remote network, the first thing the router checks is the AD.  If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table.  If both advertised routes to the same network have the same AD, then routing protocol metrics will be used to find the best path to the remote network.  The routing tables include information about the total path cost as defined by the metrics.
  • 17. DISTANCE VECTOR ROUTING LOOP ISSUES
  • 18. DISTANCE VECTOR ROUTING LOOP ISSUES  Routing loops can occur when inconsistent routing tables are not updated due to slow convergence in a changing network.  Just before the failure of Network 1, all routers have consistent knowledge and correct routing tables.  When Network 1 fails, Router E sends an update to Router A.  Router A stops routing packets to Network 1, but Routers B, C, and D continue to do so because they have not yet been informed of the failure.  When Router A sends out its update, Routers B and D stop routing to Network 1.  However, Router C has not received an update, so Network 1 is still reachable via Router B.  Now Router C sends a periodic update to Router D, indicating a path to Network 1 by way of Router B.  Router D changes its routing table to reflect this good, but incorrect, information, and propagates the information to Router A.  Router A propagates the information to Routers B and E, and so on.  Any packet destined for Network 1 will now loop from Router C to B to A to D and back to again to C.
  • 19. DEFINING A MAXIMUM COUNT The invalid updates of Network 1 will continue to loop until some other process stops the looping. This condition, called count to infinity
  • 21. ELIMINATION LOOPS BY SPLIT HORIZON Split horizon reduces incorrect routing information and routing overhead in a distance-vector network by enforcing the rule that routing information cannot be sent back in the direction from which it was received.
  • 22. ROUTE POISONING  Route poisoning is used to overcome large routing loops and offer explicit information when a subnet or network is not accessible.  This is usually accomplished by setting the hop count to one more than the maximum.
  • 23. HOLDDOWN TIMERS A holddown prevents regular update messages from reinstating a route that is going up and down (called flapping).
  • 24. ROUTING INFORMATION PROTOCOL  Characteristics.  RIP Timers.  Configuring RIP Routing.  Verifying the RIP Routing Tables.  Holding Down RIP Propagations.
  • 25. RIP CHARACTERISTICS  Vector Distance Protocol.  Open standard protocol.  RIP works well in small networks.  Default AD (administrative distance) is 120.  Hop count is (number of routers) used as Metric for path selection.  Maximum Hop count is 15. RIP v2RIP v1 Classless RoutingClassful Routing Support for VLSMNo support for VLSM Support for discontiguous networksNo support for discontiguous networks Use broadcast or multicast to deliver routing updates. Use broadcast to deliver routing updates.
  • 26. RIP TIMERS  Route update timer: Sets the interval (typically 30 seconds) between periodic routing updates, in which the router sends a complete copy of its routing table out to all neighbors.  Route invalid timer: Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid.  Route flush timer: Sets the time between a route becoming invalid and its removal from the routing table (240 seconds).  Holddown timer: routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. The default is 180 seconds.
  • 28. VERIFYING THE RIP ROUTING TABLES  Two of the most common commands are the show ip route command and the show ip protocols command.  The show ip protocols command shows which routing protocols are carrying IP traffic on the router.  Another command use to for troubleshooting, debug ip rip. To cancel this opertaon, use this command undebug all.
  • 29. HOLDING DOWN RIP PROPAGATIONS  You probably don’t want your RIP network advertised everywhere on your LAN and WAN.  The easiest way is through the passive-interface command.  This command prevents RIP update broadcasts from being sent out a defined interface, but that same interface can still receive RIP updates. Router#config t Router(config)#router rip Router(config-router)#network 192.168.10.0 Router(config-router)#passive-interface s0/0
  • 30. INTERIOR GATEWAY ROUTING PROTOCOL  Characteristics.  IGRP Timers.  Configuring IGRP routing.  Verifying IGRP routing table.
  • 31. IGRP CHARACTERISTICS  Vector Distance Protocol.  Cisco-proprietary protocol.  IGRP can works well in large networks.  Default AD (administrative distance) is 100.  Uses an autonomous system number.  Uses bandwidth and delay of the line as metric.  Maximum Hop count is 255.  Classful Routing.  Don’t support VLSM and discontiguous networks.
  • 32. IGRP TIMERS  Update timers These specify how frequently routing-update messages should be sent. The default is 90 seconds.  Invalid timers These specify how long a router should wait before declaring a route invalid if it doesn’t receive a specific update about it. The default is three times the update period (270 sec).  Flush timers The default is seven times the routing update period. If the update timer is 90 seconds by default, then 7 * 90 = 630 seconds elapse before a route will be flushed from the route table.  Holddown timers These specify the holddown period. The default is three times the update timer period plus 10 seconds (280 sec).
  • 33. CONFIGURING IGRP ROUTING  The command used to configure IGRP is the same as the one used to configure RIP routing with one important difference: you use an autonomous system (AS) number. Router#config t Router(config)#router igrp 10 Router(config-router)#net 192.168.10.0  To Delete routing table built by IGRP, use this command. Router(config)# no router igrp 10
  • 34. VERIFYING IGRP ROUTING TABLE  To verify that IGRP has been configured properly, enter the show ip route command and look for IGRP routes signified by an "I".  Additional command show ip protocols debug ip igrp events debug ip igrp transactions