Skip to main content

Summary of Module 7

Summary
This page summarizes the topics discussed in this module.


Distance vector algorithms call for each router to send its entire routing table to each of its adjacent neighbors. The routing tables include information about the total path cost as defined by the metrics and the logical address of the first router on the path to each network contained in the table.

RIP uses many techniques to reduce routing loops and counting to infinity. RIP permits a maximum hop count of 15. A destination greater than 15 hops away is tagged as unreachable.

The split horizon rule specifies that it is not useful to send information about a route back in the direction from which it came. In some network configurations, it may be necessary to disable split horizon.

Route poisoning is used to overcome large routing loops and provide information when a network is down. It also keeps a router from receiving incorrect updates.

Holddown timers help prevent counting to infinity but also increase convergence time. The default holddown for RIP is 180 seconds. Triggered updates are also sent if routing information changes. The router sends triggered routing update on its other interfaces rather than waiting on the routing update timer to expire.

RIP v2 enhancements include the ability to carry additional packet routing information, an authentication mechanism to secure table updates, and support for VLSM. By default, routing updates are broadcast every 30 seconds.

RIP is enabled with the router rip command. The network command is then used to tell the router on which interfaces to run RIP.

A supernet route is a route that covers a greater range of subnets with a single entry. The ip classless global configuration command is used to forward packets to the best supernet route when a router receives packets destined for an unknown subnet of a network.

The two most common commands used to verify that RIP is properly configured are the show ip route and show ip protocols commands. The show ip route command shows the routes that are installed in the routing table and the status of each route. The show ip protocols command is used to verify the state of the active routing protocol as well as the installed routes specific to the protocol.

To display RIP routing updates as they are sent and received, use the debug ip rip command.

The passive-interface command prevents routers from sending routing updates through a router interface. This keeps update messages from being sent through a router interface so that other systems on a network will not learn about routes dynamically.

The show ip route command is used to find equal cost routes for load balancing. RIP uses round robin load balancing. Routers take turns to forward packets over equal cost paths. IGRP is a distance vector routing protocol that measures distances to mathematically compare routes. It sends routing updates at 90 second intervals to advertise networks for an AS. IGRP uses a composite metric. This metric is calculated as a function of bandwidth, delay, load, and reliability. IGRP advertises three types of routes. These include interior, system, and exterior. There are many features such as holddowns and split horizons that provide stability. Use the show ip protocols and the show ip route commands to verify that IGRP is properly configured. In addition, the ping and trace commands are used to troubleshoot errors.

Comments

Popular posts from this blog

OSI layers / Peer-to-peer communications / TCP/IP model

OSI layers 2.3.4 This page discusses the seven layers of the OSI model. The OSI reference model is a framework that is used to understand how information travels throughout a network. The OSI reference model explains how packets travel through the various layers to another device on a network, even if the sender and destination have different types of network media. In the OSI reference model, there are seven numbered layers, each of which illustrates a particular network function. - Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network components to allow multiple vendor development and support. • It allows different types of network hardware and software to communicate with each other. • It prevents changes in one layer from affecting other layers. • It divides network communication into smaller parts to make learning it easier to understand. In the foll...

Advantages and disadvantages of link-state routing

Advantages and disadvantages of link-state routing 2.1.5  This page lists the advantages and disadvantages of link-state routing protocols. The following are advantages of link-state routing protocols:  Link-state protocols use cost metrics to choose paths through the network. The cost metric reflects the capacity of the links on those paths. Link-state protocols use triggered updates and LSA floods to immediately report changes in the network topology to all routers in the network. This leads to fast convergence times. Each router has a complete and synchronized picture of the network. Therefore, it is very difficult for routing loops to occur. Routers use the latest information to make the best routing decisions. The link-state database sizes can be minimized with careful network design. This leads to smaller Dijkstra calculations and faster convergence. Every router, at the very least, maps the topology of it...

Ports for services

Ports for services 10.2.2  Services running on hosts must have a port number assigned to them so communication can occur. A remote host attempting to connect to a service expects that service to use specific transport layer protocols and ports. Some ports, which are defined in RFC 1700, are known as the well-known ports. These ports are reserved in both TCP and UDP.  These well-known ports define applications that run above the transport layer protocols. For example, a server that runs FTP will use ports 20 and 21 to forward TCP connections from clients to its FTP application. This allows the server to determine which service a client requests. TCP and UDP use port numbers to determine the correct service to which requests are forwarded. The next page will discuss ports in greater detail.