SlideShare ist ein Scribd-Unternehmen logo
1 von 35
IP ROUTING
By
Anil Kumar Vishwakarma
MCA,MCTS,CCNA
ROUTING BASICS
The term routing is used for taking a packet from one device and
sending it through the network to another device on a different network.
To be able to route packets, a router must know, at a minimum, the
following:
• Destination address
• Neighbor routers from which it can learn about remote
networks
• Possible routes to all remote networks
• The best route to each remote network
• How to maintain and verify routing information
ROUTE TYPES
CONFIGURING STATICIP ROUTING
 Static routing has the following benefits:
 There is no overhead on the router CPU, which means you could
possibly buy a cheaper router than if you were using dynamic
routing.
 There is no bandwidth usage between routers, which means you
could possibly save money on WAN links.
 It adds security, because the administrator can choose to allow
routing access to certain networks only.
 Static routing has the following disadvantages:
 The administrator must really understand the internetwork and
how each router is connected in order to configure routes correctly.
 If a network is added to the internetwork, the administrator has to
add a route to it on all routers—by hand.
 It’s not feasible in large networks because maintaining it would be
a full-time job in itself.
STATIC ROUTING
 Static Routes built by using IP route command
DEFAULT ROUTING
 Default routes are used to route packets with destinations that do not
match any of the other routes in the routing table.
 Routers are typically configured with a default route for Internet-
bound traffic, since it is often impractical and unnecessary to
maintain routes to all networks in the Internet.
 A default route is actually a special static route that uses this format:
ip route 0.0.0.0 0.0.0.0 [next-hop-address]
VERIFYING STATIC ROUTE CONFIGURATION
 It is important to verify that they are present in the routing table and
that routing is working as expected.
 The command show run is used to view the active configuration in
RAM to verify that the static route was entered correctly.
Router#sh run
 The show ip route command is used to make sure that the static
route is present in the routing table.
Router#sh ip route
TROUBLESHOOTING STATIC ROUTE
If any problem in connection between networks follow this steps:
1. verifying static routes (by using sh ip route) to make sure the route
found in routing table.
2. If the problem exists, run a traceroute command.
DYNAMIC ROUTING OVERVIEW
 Routing protocols
 Routed protocol
 Autonomous systems
 Purpose of a routing protocol and
autonomous systems
 Identifying the classes of routing protocols
ROUTING PROTOCOLS
 It is the communication used between routers.
 It allows one router to share information with other routers regarding
the networks .
 The information a router gets from another router, using a routing
protocol, is used to build and maintain a routing table.
 Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
ROUTED PROTOCOL
 It is used to direct user traffic.
 It provides enough information in its network layer address to
allow a packet to be forwarded from one host to another
based on the addressing scheme.
 Examples of routed protocols are: IP and IPX.
AUTONOMOUS SYSTEMS
 An autonomous system (AS) is a collection of networks under a
common administration sharing a common routing strategy.
 To the outside world, an AS is viewed as a single entity.
 The AS may be run by one or more operators while presenting a
consistent view of routing to the external world.
PURPOSE OF A ROUTING PROTOCOL AND
AUTONOMOUS SYSTEMS
 The goal of a routing protocol is to build and maintain the routing
table.
 Routers use routing protocols to manage information received from
other routers .
 Autonomous systems (AS) provide the division of the global
internetwork into smaller and more manageable networks.
 Each AS has its own set of rules and policies and an AS number that
will uniquely distinguish it from other autonomous systems
throughout the world.
THE TYPES OF ROUTING PROTOCOLS
Most routing algorithms can be classified into one of two categories:
1. Distance Vector
The distance vector routing approach determines the direction
(vector) and distance to any link in the internetwork.
As an example: RIP and IGRP.
2. Link State
The link-state approach, also called shortest path first, recreates the
exact topology of the entire internetwork.
As an example: OSPF.
3. Hybrid
Mixed between distance vector and link state
As an example: EIGRP.
DISTANCE VECTOR ROUTING
 Distance vector routing updates
 Distance vector routing loop issues
 Defining a maximum count
 Elimination routing loops through split
horizon
 Route poisoning
 Preventing routing loops with holddown
timers
DISTANCE VECTOR ROUTING UPDATES
 Routing table updates occur periodically or when the topology in a
distance vector protocol network changes.
 Distance vector algorithms call for each router to send its entire
routing table to each of its adjacent neighbors.
 The administrative distance (AD) is used to rate the trustworthiness
of routing information received on a router from a neighbor router.
 An administrative distance is an integer from 0 to 255, where 0 is the
most trusted and 255 means no traffic will be passed via this route.
 If a router receives two updates listing the same remote network, the
first thing the router checks is the AD.
 If one of the advertised routes has a lower AD than the other, then
the route with the lowest AD will be placed in the routing table.
 If both advertised routes to the same network have the same
AD, then routing protocol metrics will be used to find the best path to
the remote network.
 The routing tables include information about the total path cost as
defined by the metrics.
DISTANCE VECTOR ROUTING LOOP ISSUES
DISTANCE VECTOR ROUTING LOOP ISSUES
 Routing loops can occur when inconsistent routing tables are not
updated due to slow convergence in a changing network.
 Just before the failure of Network 1, all routers have consistent
knowledge and correct routing tables.
 When Network 1 fails, Router E sends an update to Router A.
 Router A stops routing packets to Network 1, but Routers B, C, and D
continue to do so because they have not yet been informed of the
failure.
 When Router A sends out its update, Routers B and D stop routing to
Network 1.
 However, Router C has not received an update, so Network 1 is still
reachable via Router B.
 Now Router C sends a periodic update to Router D, indicating a path
to Network 1 by way of Router B.
 Router D changes its routing table to reflect this good, but incorrect,
information, and propagates the information to Router A.
 Router A propagates the information to Routers B and E, and so on.
 Any packet destined for Network 1 will now loop from Router C to B
to A to D and back to again to C.
DEFINING A MAXIMUM COUNT
The invalid updates of Network 1 will continue to loop until some other
process stops the looping. This condition, called count to infinity
DEFINING A MAXIMUM COUNT
ELIMINATION LOOPS BY SPLIT HORIZON
Split horizon reduces incorrect routing information and routing overhead
in a distance-vector network by enforcing the rule that routing
information cannot be sent back in the direction from which it was
received.
ROUTE POISONING
 Route poisoning is used to overcome large routing loops and offer
explicit information when a subnet or network is not accessible.
 This is usually accomplished by setting the hop count to one more than
the maximum.
HOLDDOWN TIMERS
A holddown prevents regular update messages from reinstating a route that
is going up and down (called flapping).
ROUTING INFORMATION PROTOCOL
 Characteristics.
 RIP Timers.
 Configuring RIP Routing.
 Verifying the RIP Routing Tables.
 Holding Down RIP Propagations.
RIP CHARACTERISTICS
 Vector Distance Protocol.
 Open standard protocol.
 RIP works well in small networks.
 Default AD (administrative distance) is 120.
 Hop count is (number of routers) used as Metric for path selection.
 Maximum Hop count is 15.
RIP v2RIP v1
Classless RoutingClassful Routing
Support for VLSMNo support for VLSM
Support for discontiguous networksNo support for discontiguous
networks
Use broadcast or multicast to
deliver routing updates.
Use broadcast to deliver routing
updates.
RIP TIMERS
 Route update timer: Sets the interval (typically 30 seconds) between
periodic routing updates, in which the router sends a complete copy of its
routing table out to all neighbors.
 Route invalid timer: Determines the length of time that must elapse
(180 seconds) before a router determines that a route has become
invalid.
 Route flush timer: Sets the time between a route becoming invalid and
its removal from the routing table (240 seconds).
 Holddown timer: routes will enter into the holddown state when an
update packet is received that indicated the route is unreachable.
The default is 180 seconds.
CONFIGURING RIP ROUTING
VERIFYING THE RIP ROUTING TABLES
 Two of the most common commands are the show ip route command
and the show ip protocols command.
 The show ip protocols command shows which routing protocols are
carrying IP traffic on the router.
 Another command use to for troubleshooting, debug ip rip. To cancel
this opertaon, use this command undebug all.
HOLDING DOWN RIP PROPAGATIONS
 You probably don’t want your RIP network advertised everywhere on
your LAN and WAN.
 The easiest way is through the passive-interface command.
 This command prevents RIP update broadcasts from being sent out a
defined interface, but that same interface can still receive RIP updates.
Router#config t
Router(config)#router rip
Router(config-router)#network 192.168.10.0
Router(config-router)#passive-interface s0/0
INTERIOR GATEWAY ROUTING PROTOCOL
 Characteristics.
 IGRP Timers.
 Configuring IGRP routing.
 Verifying IGRP routing table.
IGRP CHARACTERISTICS
 Vector Distance Protocol.
 Cisco-proprietary protocol.
 IGRP can works well in large networks.
 Default AD (administrative distance) is 100.
 Uses an autonomous system number.
 Uses bandwidth and delay of the line as metric.
 Maximum Hop count is 255.
 Classful Routing.
 Don’t support VLSM and discontiguous networks.
IGRP TIMERS
 Update timers These specify how frequently routing-update
messages should be sent. The default is 90 seconds.
 Invalid timers These specify how long a router should wait before
declaring a route invalid if it doesn’t receive a specific update about
it. The default is three times the update period (270 sec).
 Flush timers The default is seven times the routing update period.
If the update timer is 90 seconds by default, then 7 90 = 630
seconds elapse before a route will be flushed from the route table.
 Holddown timers These specify the holddown period. The default
is three times the update timer period plus 10 seconds (280 sec).
CONFIGURING IGRP ROUTING
 The command used to configure IGRP is the same as the one
used to configure RIP routing with one important difference: you
use an autonomous system (AS) number.
Router#config t
Router(config)#router igrp 10
Router(config-router)#net 192.168.10.0
 To Delete routing table built by IGRP, use this command.
Router(config)# no router igrp 10
VERIFYING IGRP ROUTING TABLE
 To verify that IGRP has been configured properly, enter the show ip
route command and look for IGRP routes signified by an "I".
 Additional command
show ip protocols
debug ip igrp events
debug ip igrp transactions
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
Design and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless NetworksDesign and Implementation of Dynamic Routing in Wireless Networks
Design and Implementation of Dynamic Routing in Wireless Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Dynamic Routing RIP
Dynamic Routing RIPDynamic Routing RIP
Dynamic Routing RIP
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Ospf
OspfOspf
Ospf
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
RIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme NetworksRIP Routing Information Protocol Extreme Networks
RIP Routing Information Protocol Extreme Networks
 
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric VanderburgCCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
CCNA Routing and Switching Lessons 08-09 - Routing Protocols - Eric Vanderburg
 
Routing
RoutingRouting
Routing
 
CCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrpCCNA part 6 igrp,ospf,eigrp
CCNA part 6 igrp,ospf,eigrp
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
 

Andere mochten auch

Routing 2016
Routing 2016Routing 2016
Routing 2016APNIC
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configurationyasir1122
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 

Andere mochten auch (15)

Firewall
FirewallFirewall
Firewall
 
Network security
 Network security Network security
Network security
 
Routing 2016
Routing 2016Routing 2016
Routing 2016
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Firewall
FirewallFirewall
Firewall
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 

Ähnlich wie IP ROUTING

Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing nCYBERINTELLIGENTS
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxsazia7
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrpSagarR24
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Dân Chơi
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdfapexjaipur
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hkVivek Singh
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 

Ähnlich wie IP ROUTING (20)

Group 1
Group 1Group 1
Group 1
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011Ccna 2 chapter 3 v4.0 answers 2011
Ccna 2 chapter 3 v4.0 answers 2011
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
Day 10 rip
Day 10 ripDay 10 rip
Day 10 rip
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
 
2008118090324 hk
2008118090324 hk2008118090324 hk
2008118090324 hk
 
computer communications
computer communicationscomputer communications
computer communications
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 

Mehr von anilinvns

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012anilinvns
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OSanilinvns
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANSanilinvns
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOSanilinvns
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANSanilinvns
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)anilinvns
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSanilinvns
 
Disk management server
Disk management serverDisk management server
Disk management serveranilinvns
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basicsanilinvns
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 

Mehr von anilinvns (17)

Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
VIRTUAL LANS
VIRTUAL LANSVIRTUAL LANS
VIRTUAL LANS
 
INTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERSINTRODUCTION TO IOS AND CISCO ROUTERS
INTRODUCTION TO IOS AND CISCO ROUTERS
 
Manage CISCO IOS
Manage CISCO IOSManage CISCO IOS
Manage CISCO IOS
 
Day 5 VIRTUAL LANS
Day 5 VIRTUAL LANSDay 5 VIRTUAL LANS
Day 5 VIRTUAL LANS
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Day 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOSDay 6 - Manage CISCO IOS
Day 6 - Manage CISCO IOS
 
Wds
WdsWds
Wds
 
Disk management server
Disk management serverDisk management server
Disk management server
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

IP ROUTING

  • 1. IP ROUTING By Anil Kumar Vishwakarma MCA,MCTS,CCNA
  • 2. ROUTING BASICS The term routing is used for taking a packet from one device and sending it through the network to another device on a different network. To be able to route packets, a router must know, at a minimum, the following: • Destination address • Neighbor routers from which it can learn about remote networks • Possible routes to all remote networks • The best route to each remote network • How to maintain and verify routing information
  • 4. CONFIGURING STATICIP ROUTING  Static routing has the following benefits:  There is no overhead on the router CPU, which means you could possibly buy a cheaper router than if you were using dynamic routing.  There is no bandwidth usage between routers, which means you could possibly save money on WAN links.  It adds security, because the administrator can choose to allow routing access to certain networks only.  Static routing has the following disadvantages:  The administrator must really understand the internetwork and how each router is connected in order to configure routes correctly.  If a network is added to the internetwork, the administrator has to add a route to it on all routers—by hand.  It’s not feasible in large networks because maintaining it would be a full-time job in itself.
  • 5. STATIC ROUTING  Static Routes built by using IP route command
  • 6. DEFAULT ROUTING  Default routes are used to route packets with destinations that do not match any of the other routes in the routing table.  Routers are typically configured with a default route for Internet- bound traffic, since it is often impractical and unnecessary to maintain routes to all networks in the Internet.  A default route is actually a special static route that uses this format: ip route 0.0.0.0 0.0.0.0 [next-hop-address]
  • 7. VERIFYING STATIC ROUTE CONFIGURATION  It is important to verify that they are present in the routing table and that routing is working as expected.  The command show run is used to view the active configuration in RAM to verify that the static route was entered correctly. Router#sh run  The show ip route command is used to make sure that the static route is present in the routing table. Router#sh ip route
  • 8. TROUBLESHOOTING STATIC ROUTE If any problem in connection between networks follow this steps: 1. verifying static routes (by using sh ip route) to make sure the route found in routing table. 2. If the problem exists, run a traceroute command.
  • 9. DYNAMIC ROUTING OVERVIEW  Routing protocols  Routed protocol  Autonomous systems  Purpose of a routing protocol and autonomous systems  Identifying the classes of routing protocols
  • 10. ROUTING PROTOCOLS  It is the communication used between routers.  It allows one router to share information with other routers regarding the networks .  The information a router gets from another router, using a routing protocol, is used to build and maintain a routing table.  Examples of routing protocols are: RIP, IGRP, EIGRP and OSPF
  • 11. ROUTED PROTOCOL  It is used to direct user traffic.  It provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme.  Examples of routed protocols are: IP and IPX.
  • 12. AUTONOMOUS SYSTEMS  An autonomous system (AS) is a collection of networks under a common administration sharing a common routing strategy.  To the outside world, an AS is viewed as a single entity.  The AS may be run by one or more operators while presenting a consistent view of routing to the external world.
  • 13. PURPOSE OF A ROUTING PROTOCOL AND AUTONOMOUS SYSTEMS  The goal of a routing protocol is to build and maintain the routing table.  Routers use routing protocols to manage information received from other routers .  Autonomous systems (AS) provide the division of the global internetwork into smaller and more manageable networks.  Each AS has its own set of rules and policies and an AS number that will uniquely distinguish it from other autonomous systems throughout the world.
  • 14. THE TYPES OF ROUTING PROTOCOLS Most routing algorithms can be classified into one of two categories: 1. Distance Vector The distance vector routing approach determines the direction (vector) and distance to any link in the internetwork. As an example: RIP and IGRP. 2. Link State The link-state approach, also called shortest path first, recreates the exact topology of the entire internetwork. As an example: OSPF. 3. Hybrid Mixed between distance vector and link state As an example: EIGRP.
  • 15. DISTANCE VECTOR ROUTING  Distance vector routing updates  Distance vector routing loop issues  Defining a maximum count  Elimination routing loops through split horizon  Route poisoning  Preventing routing loops with holddown timers
  • 16. DISTANCE VECTOR ROUTING UPDATES  Routing table updates occur periodically or when the topology in a distance vector protocol network changes.  Distance vector algorithms call for each router to send its entire routing table to each of its adjacent neighbors.  The administrative distance (AD) is used to rate the trustworthiness of routing information received on a router from a neighbor router.  An administrative distance is an integer from 0 to 255, where 0 is the most trusted and 255 means no traffic will be passed via this route.  If a router receives two updates listing the same remote network, the first thing the router checks is the AD.  If one of the advertised routes has a lower AD than the other, then the route with the lowest AD will be placed in the routing table.  If both advertised routes to the same network have the same AD, then routing protocol metrics will be used to find the best path to the remote network.  The routing tables include information about the total path cost as defined by the metrics.
  • 17. DISTANCE VECTOR ROUTING LOOP ISSUES
  • 18. DISTANCE VECTOR ROUTING LOOP ISSUES  Routing loops can occur when inconsistent routing tables are not updated due to slow convergence in a changing network.  Just before the failure of Network 1, all routers have consistent knowledge and correct routing tables.  When Network 1 fails, Router E sends an update to Router A.  Router A stops routing packets to Network 1, but Routers B, C, and D continue to do so because they have not yet been informed of the failure.  When Router A sends out its update, Routers B and D stop routing to Network 1.  However, Router C has not received an update, so Network 1 is still reachable via Router B.  Now Router C sends a periodic update to Router D, indicating a path to Network 1 by way of Router B.  Router D changes its routing table to reflect this good, but incorrect, information, and propagates the information to Router A.  Router A propagates the information to Routers B and E, and so on.  Any packet destined for Network 1 will now loop from Router C to B to A to D and back to again to C.
  • 19. DEFINING A MAXIMUM COUNT The invalid updates of Network 1 will continue to loop until some other process stops the looping. This condition, called count to infinity
  • 21. ELIMINATION LOOPS BY SPLIT HORIZON Split horizon reduces incorrect routing information and routing overhead in a distance-vector network by enforcing the rule that routing information cannot be sent back in the direction from which it was received.
  • 22. ROUTE POISONING  Route poisoning is used to overcome large routing loops and offer explicit information when a subnet or network is not accessible.  This is usually accomplished by setting the hop count to one more than the maximum.
  • 23. HOLDDOWN TIMERS A holddown prevents regular update messages from reinstating a route that is going up and down (called flapping).
  • 24. ROUTING INFORMATION PROTOCOL  Characteristics.  RIP Timers.  Configuring RIP Routing.  Verifying the RIP Routing Tables.  Holding Down RIP Propagations.
  • 25. RIP CHARACTERISTICS  Vector Distance Protocol.  Open standard protocol.  RIP works well in small networks.  Default AD (administrative distance) is 120.  Hop count is (number of routers) used as Metric for path selection.  Maximum Hop count is 15. RIP v2RIP v1 Classless RoutingClassful Routing Support for VLSMNo support for VLSM Support for discontiguous networksNo support for discontiguous networks Use broadcast or multicast to deliver routing updates. Use broadcast to deliver routing updates.
  • 26. RIP TIMERS  Route update timer: Sets the interval (typically 30 seconds) between periodic routing updates, in which the router sends a complete copy of its routing table out to all neighbors.  Route invalid timer: Determines the length of time that must elapse (180 seconds) before a router determines that a route has become invalid.  Route flush timer: Sets the time between a route becoming invalid and its removal from the routing table (240 seconds).  Holddown timer: routes will enter into the holddown state when an update packet is received that indicated the route is unreachable. The default is 180 seconds.
  • 28. VERIFYING THE RIP ROUTING TABLES  Two of the most common commands are the show ip route command and the show ip protocols command.  The show ip protocols command shows which routing protocols are carrying IP traffic on the router.  Another command use to for troubleshooting, debug ip rip. To cancel this opertaon, use this command undebug all.
  • 29. HOLDING DOWN RIP PROPAGATIONS  You probably don’t want your RIP network advertised everywhere on your LAN and WAN.  The easiest way is through the passive-interface command.  This command prevents RIP update broadcasts from being sent out a defined interface, but that same interface can still receive RIP updates. Router#config t Router(config)#router rip Router(config-router)#network 192.168.10.0 Router(config-router)#passive-interface s0/0
  • 30. INTERIOR GATEWAY ROUTING PROTOCOL  Characteristics.  IGRP Timers.  Configuring IGRP routing.  Verifying IGRP routing table.
  • 31. IGRP CHARACTERISTICS  Vector Distance Protocol.  Cisco-proprietary protocol.  IGRP can works well in large networks.  Default AD (administrative distance) is 100.  Uses an autonomous system number.  Uses bandwidth and delay of the line as metric.  Maximum Hop count is 255.  Classful Routing.  Don’t support VLSM and discontiguous networks.
  • 32. IGRP TIMERS  Update timers These specify how frequently routing-update messages should be sent. The default is 90 seconds.  Invalid timers These specify how long a router should wait before declaring a route invalid if it doesn’t receive a specific update about it. The default is three times the update period (270 sec).  Flush timers The default is seven times the routing update period. If the update timer is 90 seconds by default, then 7 90 = 630 seconds elapse before a route will be flushed from the route table.  Holddown timers These specify the holddown period. The default is three times the update timer period plus 10 seconds (280 sec).
  • 33. CONFIGURING IGRP ROUTING  The command used to configure IGRP is the same as the one used to configure RIP routing with one important difference: you use an autonomous system (AS) number. Router#config t Router(config)#router igrp 10 Router(config-router)#net 192.168.10.0  To Delete routing table built by IGRP, use this command. Router(config)# no router igrp 10
  • 34. VERIFYING IGRP ROUTING TABLE  To verify that IGRP has been configured properly, enter the show ip route command and look for IGRP routes signified by an "I".  Additional command show ip protocols debug ip igrp events debug ip igrp transactions