Skip to main content

Module 6: Summary

Module 6: Summary

This page summarizes the topics discussed in this module.
The process that a router uses to forward packets toward the destination network is called routing. Decisions are based upon the destination IP address of each packet. When routers use dynamic routing, they learn about remote networks from other routers. When static routing is used, a network administrator configures information about remote networks manually.
Static route operations can be divided into these three parts. First a network administrator uses the ip route command to configure a static route. Then the router installs the route in the routing table. Finally, the route is used to route packets.
Static routes can be used for backup purposes. A static route can be configured on a router that will only be used when the dynamically learned route has failed.
After static routes are configured, verify they are present in the routing table and that routing works as expected. Use the command show running-config to view the active configuration in RAM. The show ip route command is used to make sure that the static route is present in the routing table.
The communication used between routers is referred to as a routing protocol. The goal of a routing protocol is to build and maintain the routing table.
A routed protocol is used to direct user traffic. A routed protocol provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme.
An AS is a collection of networks under the same administration that share a common routing strategy. Autonomous systems divide the global internetwork into smaller and more manageable networks. Each AS has its own set of rules and policies and a number that distinguishes it from all other autonomous systems.
The distance vector routing approach determines the direction, or vector, and distance to any link in an internetwork. The link-state approach recreates the exact topology of an entire internetwork.
Distance vector routing algorithms pass periodic copies of a routing table from router to router. These regular updates between routers communicate topology changes. The distance vector routing algorithm is also known as the Bellman-Ford algorithm.
The second basic algorithm used for routing is the link-state algorithm. The link-state algorithm is also known as the Dijkstra algorithm or as the SPF algorithm. Link-state routing algorithms maintain a complex database of topology information. The distance vector algorithm has nonspecific information about distant networks and no knowledge of distant routers. A link-state routing algorithm maintains full knowledge of distant routers and how they interconnect.
Interior routing protocols are designed for use in a network whose parts are under the control of a single organization. An exterior routing protocol is designed for use between two different networks that are under the control of two different organizations. These are typically used between ISPs or between a company and an ISP.

Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.