Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cisco TAC Entry Training - 10 - Dynamic Routing Protocols

Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

Cisco TAC Entry Training

Dynamic Routing
Protocols

Tariq Bader
CCIE # 35627

Security/VPN team
Cisco TAC
Presentation_ID © 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Agenda

Dynamic Routing
Protocols
Introduction

Classifying Routing
Protocols

Route Lookup
Process
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Dynamic
Routing
Dynamic Routing Protocols Introduction

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Purpose of Dynamic Routing Protocols

1. Discovery of remote networks


2. Maintaining up-to-date routing information
3. Choosing the best path to destination networks
4. Ability to find a new best path if the current path is no
longer available

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
Main Components of Dynamic Routing Protocols

 Data structures - Routing protocols typically use tables or


databases for its operations. This information is kept in
RAM.
 Routing protocol messages - Routing protocols use various
types of messages to discover neighboring routers, exchange
routing information, and other tasks to learn and maintain
accurate information about the network.
 Algorithm - Routing protocols use algorithms for facilitating
routing information for best path determination.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Main Components of Dynamic Routing Protocols

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Dynamic vs Static Routing

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Dynamic Routing Protocol Operation

1. The router sends and receives routing messages on its


interfaces.
2. The router shares routing messages and routing
information with other routers that are using the same
routing protocol.
3. Routers exchange routing information to learn about
remote networks.
4. When a router detects a topology change the routing
protocol can advertise this change to other routers.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Achieving Convergence

 The network is converged when all routers have complete and


accurate information about the entire network.
 Convergence time is the time it takes routers to share
information, calculate best paths, and update their routing tables.
 A network is not completely operable until the network has
converged.
 Convergence properties include the speed of propagation of
routing information and the calculation of optimal paths. The
speed of propagation refers to the amount of time it takes for
routers within the network to forward routing information.
 Generally, older protocols, such as RIP, are slow to converge,
whereas modern protocols, such as EIGRP and OSPF, converge
more quickly.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Dynamic
Routing
Classifying Routing Protocols

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Classifying Routing Protocols

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
IGP and EGP Routing Protocols

 Interior Gateway
Protocols (IGP)
o Used for routing within an
AS
o Include RIP, EIGRP, OSPF,
and IS-IS

 Exterior Gateway
Protocols (EGP)
o Used for routing between
AS
o Official routing protocol
used by the Internet

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Distance Vector Routing Protocols

 Distance vector IPv4


IGPs:
o RIPv1 - First generation
legacy protocol
o RIPv2 - Simple distance
vector routing protocol
o IGRP - First generation
Cisco proprietary
protocol (obsolete)
o EIGRP - Advanced version For R1, 172.16.3.0/24 is one hop
of distance vector routing away (distance). It can be reached
through R2 (vector).

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Distance Vector Routing Protocols
 Share updates between neighbors
 Not aware of the network topology
 Some send periodic updates to broadcast IP 255.255.255.255
even if topology has not changed  RIPv1 & IGRP
 Updates consume bandwidth and network device CPU resources
 RIPv2 and EIGRP use multicast addresses
o RIPv2  224.0.0.9
o EIGRP  224.0.0.10
 EIGRP will only send an update when topology has changed
 RIP uses the Bellman-Ford algorithm as its routing algorithm.
 IGRP and EIGRP use the Diffusing Update Algorithm (DUAL)
routing algorithm developed by Cisco.
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Link-State Routing Protocols

 Link-state IPv4
IGPs:
o OSPF - Popular
standards based
routing protocol
o IS-IS - Popular in
provider networks.

 Link State routing


protocols use
Dijkstra’s Shortest
Path First Algorithm

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Link-State Routing Process

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Distance Vector vs Link-State Routing Protocols

 Distance vector protocols use routers as sign posts along the


path to the final destination.
 A link-state routing protocol is like having a complete map
of the network topology. The sign posts along the way from
source to destination are not necessary, because all link-
state routers are using an identical map of the network. A
link-state router uses the link-state information to create a
topology map and to select the best path to all destination
networks in the topology.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Classful Routing Protocols

 Classful routing protocols do not send subnet mask


information in their routing updates:
o Only RIPv1 and IGRP are classful.
o Created when network addresses were allocated based on classes
(class A, B, or C).
o Cannot provide variable length subnet masks (VLSMs) and classless
inter-domain routing (CIDR).
o Create problems in dis-contigous networks.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Classless Routing Protocols

 Classless routing protocols include subnet mask information


in the routing updates:
o RIPv2, EIGRP, OSPF, and IS_IS
o Support VLSM and CIDR
o IPv6 routing protocols

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Routing Protocol Characteristics

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Routing Protocol Metrics
 A metric is a measurable value that is assigned by the
routing protocol to different routes based on the usefulness
of that route:
o Used to determine the overall “cost” of a path from source to
destination.
o Routing protocols determine the best path based on the route with
the lowest cost.

 This Metric is different from routing protocol to another.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Dynamic
Routing
Route Lookup Process

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Routing Table Entries

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Directly Connected Entries

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Remote Network Entries

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Routing Table Terms

 Routes are discussed in terms of:


o Ultimate route
o Level 1 route
o Level 1 parent route
o Level 2 child routes

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Ultimate Route

 An ultimate route is
a routing table entry
that contains either
a next-hop IP
address or an exit
interface. Directly
connected,
dynamically learned,
and link local routes
are ultimate routes.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Level 1 Route

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
Level 1 Parent Route

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Level 2 Child Route

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Route Lookup Process
1. If the best match is a level 1 ultimate route, then this route is used
to forward the packet.
2. If the best match is a level 1 parent route, proceed to the next step.
3. The router examines child routes (the subnet routes) of the parent
route for a best match.
4. If there is a match with a level 2 child route, that subnet is used to
forward the packet.
5. If there is not a match with any of the level 2 child routes, proceed
to the next step.
6. The router continues searching level 1 supernet routes in the
routing table for a match, including the default route, if there is one.
7. If there is now a lesser match with a level 1 supernet or default
routes, the router uses that route to forward the packet.
8. If there is not a match with any route in the routing table, the
router drops the packet.

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Best Route = Longest Match = Most Specific

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Q&A

Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34

You might also like