9.1. Routing Protocols
Total Page:16
File Type:pdf, Size:1020Kb
9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the network into subnets. Each autonomous system is identified by an AS number. This number can be locally administered, or registered if the AS is connected to the Internet. Routers are used within an AS to segment (subnet) the network. In addition, they are used to connect multiple AS’s together. Routers use a routing protocol to dynamically discover routes, build routing tables, and make decisions about how to send packets through the internetwork. Routing protocols can be classified based on whether they are routing traffic within or between autonomous systems. Interior Gateway Protocol (IGP) ‐ protocol that routes traffic within the AS. Exterior Gateway Protocol (EGP) ‐ protocol that routes traffic outside of or between AS’s. Border Gateway Protocol (BGP) ‐ enhancement of EGP that routes traffic between AS’s. In this course, you will learn about the following Interior Gateway Protocols (IGP): Routing Information Protocol (RIP) Open Shortest Path First (OSPF) Enhanced Interior Gateway Routing Protocol (EIGRP) © Sergey Gorokhod MCT/MCSE/MCITP/MCTS/MCSA/CCSE/CCSA/CCNA/A+® E‐mail: [email protected] Mob: (+972) 526848757 9.2. Distance Vector Routing Keep in mind the following principles about the distance vector method. Routers send updates only to their neighbor routers. Routers send their entire routing table. Tables are sent at regular intervals (each router is configured to specify its own update interval). Routers modify their tables based on information received from their neighbors. Because routers using the distance vector method send their entire routing table at specified intervals, they are susceptible to a condition known as a routing loop (also called a count‐to‐infinity condition). Like a bridging loop, a routing loop occurs when two routers share different information. The following methods can be used to minimize the effects of a routing loop. Method Characteristics Using the split horizon method (also called best information), routers keep track of where the information about a route came Split horizon from. Routers do not report route information to the routers on that path. In other words, routers do not report information back to the router from which their information originated. Using the split horizon with poison reverse method (also called poison reverse or route poisoning), routers continue to send information about routes back to the next hop router, but advertise the path as unreachable. If the next hop router notices Split horizon that the route is still reachable, it ignores the information. with poison If, however, the path timeout has been reached, the route is reverse immediately set to unreachable (16 hops for RIP). Convergence happens faster with poison reverse than with simple split horizon. However, it results in greater network traffic because the entire table is broadcast each time an update is sent. With the triggered update method (also known as a flash Triggered updates), routers that receive updated (changed) information updates broadcast those changes immediately rather than waiting for the next reporting interval. With this method, routers broadcast their routing tables periodically, punctuated by special broadcasts if conditions have changed. This method reduces the convergence time. With the hold down method, routers will, for a period of time, "hold" an update that reinstates an expired link. The time period typically reflects the time required to attain convergence on the Hold downs network. The hold down timer is reset when the timer runs out or when a network change occurs. The distance vector method has the following advantages: Stable and proven method (distance vector was the original routing algorithm). Easy to implement and administer. Bandwidth requirements negligible for a typical LAN environment. Requires less hardware and processing power than other routing methods. Distance vector has the following disadvantages: Relatively long time to reach convergence (updates sent at specified intervals). Routers must recalculate their routing tables before forwarding changes. Susceptible to routing loops (count‐to‐infinity). Bandwidth requirements can be too great for WAN or complex LAN environments. © Sergey Gorokhod MCT/MCSE/MCITP/MCTS/MCSA/CCSE/CCSA/CCNA/A+® E‐mail: [email protected] Mob: (+972) 526848757 9.3. Link State Routing Keep in mind the following information about the link state method. Routers broadcast Link‐State Protocols (LSP’s) to all routers (this process is known as flooding). Routers send information about only their own links. Link‐state protocols send hello packets to discover new neighbors. LSP’s are sent at regular intervals and when any of the following conditions occur. o There is a new neighbor. o A neighbor has gone down. o The cost to a neighbor has changed. Neighboring routers exchange LSA’s (link‐state advertisements) to construct a topological database. The SPF algorithm is applied to the topological database to create an SPF tree from which a table of routing paths and associated ports is built. Routers use LSP’s to build their tables and calculate the best route. Routers select routes based on the shortest route using an algorithm known as Shortest Path First (SPF). Network administrators have greater flexibility in setting the metrics used to calculate routes. The link state method has the following advantages over the distance vector method. Less convergence time (because updates are forwarded immediately). Not susceptible to routing loops. Less susceptible to erroneous information (because only firsthand information is broadcast). Bandwidth requirements negligible for a typical LAN environment. Although more stable than the distance vector method, the link state method has the following problems: The link state algorithm requires greater CPU and memory capability to calculate the network topology and select the route because the algorithm re‐creates the exact topology of the network for route computation. It generates a high amount of traffic when LSP’s are initially flooded through the network or when the topology changes. However, after the initial configuration occurs, the traffic from the link state method is smaller than that from the distance vector method. It is possible for LSP’s to get delayed or lost, resulting in an inconsistent view of the network. This is particularly a problem for larger networks, if parts of the network come on line at different times, or if the bandwidths between links vary (i.e. LSP’s travel faster through parts of the network than through others). In particular, the last problem is of greatest concern. The following solutions are often implemented to overcome some of the effects of inconsistent LSP information. Slowing the LSP update rate keeps information more consistent. Routers can be grouped into areas. Routers share information within the area, and routers on area borders share information between areas. (Areas logically subdivide an Autonomous System (AS), a collection of areas under common administration.) One router in each area is designated as the authoritative source of routing information (called a designated router). Each area router receives updates from the designated router. LSP’s can be identified with a time stamp, sequence or ID number, or aging timer to ensure proper synchronization. © Sergey Gorokhod MCT/MCSE/MCITP/MCTS/MCSA/CCSE/CCSA/CCNA/A+® E‐mail: [email protected] Mob: (+972) 526848757 9.4. RIP The Routing Information Protocol (RIP) is a simple, effective routing protocol for small‐ to medium‐sized networks. Be aware of the following facts about RIP: RIP is a distance vector routing protocol. RIP uses split horizon with poison reverse to prevent routing loops. RIP shares its entire routing table at each update interval (except for routes that are not being advertised to prevent routing loops). By default, routing updates are sent every 30 seconds. The invalid timer default is 180, the holddown timer default is 180, and the flush timer default is 240. RIP uses the hop count as the routing metric. The hop count is the number of routers between the source network and the destination network. RIP has a maximum of 15 hops from the source to the destination network. An unreachable network (or a network that is no longer available) is indicated by a hop count of 16. There are two versions of RIP: RIP (version 1), and RIP version 2. o RIP (version 1) uses broadcasts to send routing updates. RIPv2 uses multicasts sent to the multicast address 224.0.0.9. o RIP (version 1) uses only classful routing, so it uses full address classes, not subnets. Autosummarization with RIP happens on default class boundaries. RIPv2 supports VLSM, sends subnet masks in the routing update, and supports manual route summarization. RIP can maintain up to six multiple paths to each network, but only if the cost is the same. It supports load balancing over same‐cost paths. The default is support for up to four equal‐cost routes. Note: Because RIP uses the hop count in determining the best route to a remote network, it might end up selecting a less than optimal route. For example, suppose that two routes exist between two networks. One route uses a 56 Kbps link with a single hop, while the other route uses a Gigabit link that has two hops. Because the first route has fewer hops, RIP will select this route as the optimal route. 9.5. RIP Commands The Routing Information Protocol (RIP) is a simple, effective routing protocol for small‐ to medium‐sized networks. By using a routing protocol, routers automatically share route information, reducing the amount of administration required for maintaining routes between networks. To configure any routing protocol, use the following three steps: 1. Enable IP routing if it is not already enabled (use the ip routing command).