COMP 20253 Application Development and Emerging Technologies
COMP 20253 Application Development and Emerging Technologies
Compiled by:
Blances M. Sanchez
Polytechnic University of the Philippines
TAGUIG CITY BRANCH
TABLE OF CONTENTS
MODULE 1 – INTRODUCTION TO ROUTING AND PACKET FORWARDING ..........................6
Overview: ................................................................................................................................6
Objectives: ..............................................................................................................................6
LESSON 1: ROUTERS ARE COMPUTERS ............................................................................6
LESSON 2: EVOLUTION OF ROUTERS ................................................................................7
LESSON 3: ROUTER COMPONENTS....................................................................................7
LESSON 4: ROUTER INTERFACES.......................................................................................7
LESSON 5: ROUTERS AND THE NETWORK LAYER............................................................8
LESSON 6: IMPLEMENTING BASIC ADDRESSING SCHEMES............................................8
LESSON 7: BASIC ROUTER CONFIGURATION ....................................................................9
LESSON 8: INTRODUCING THE ROUTING TABLE ............................................................10
LESSON 9: ROUTING TABLE PRINCIPLES ........................................................................11
LESSON 10: PACKET FIELDS AND FRAME FIELDS ..........................................................11
LESSON 11: BEST PATH AND METRIC ..............................................................................11
LESSON 12: SWITCHING FUNCTION .................................................................................12
Assessment/Activities: ...........................................................................................................12
MODULE 2 – STATIC ROUTING ..............................................................................................14
Overview: ..............................................................................................................................14
Objectives: ............................................................................................................................14
LESSON 1: ROLE OF THE ROUTER ...................................................................................14
LESSON 2: INTRODUCING THE TOPOLOGY .....................................................................14
LESSON 3: EXAMINING ROUTER INTERFACES ................................................................15
LESSON 4: CONFIGURING AN ETHERNET INTERFACE ...................................................15
LESSON 5: LOGGING SYNCHRONOUS COMMAND ..........................................................16
LESSON 6: CONFIGURING A SERIAL INTERFACES..........................................................17
LESSON 7: VERIFYING CHANGES TO THE ROUTING TABLE ..........................................17
LESSON 8: STATIC ROUTING .............................................................................................17
Assessment/Activities: ...........................................................................................................21
MODULE 3 – INTRODUCTION TO DYNAMIC ROUTING PROTOCOL ...................................22
Overview: ..............................................................................................................................22
Objectives: ............................................................................................................................22
Objectives:
After successful completion the module, you should be able to:
• Identify a router as a computer with an OS and hardware designed for the routing process.
• Demonstrate the ability to configure devices and apply addresses.
• Describe the structure of a routing table.
• Describe how a router determines a path and switches packets.
Course Materials:
LESSON 1: ROUTERS ARE COMPUTERS
Computers that specialize in sending packets over the data network. They are responsible
for interconnecting networks by selecting the best path for a packet to travel and forwarding
packets to their destination.
Routers have many of the same hardware and software components that are found in other
computers including:
• CPU
• RAM
• ROM
• Operating System
Routers are at the network center
• A router connects multiple networks. This means that it has multiple interfaces that each
belong to a different IP network.
• Each network that a router connects to typically requires a separate interface. These
interfaces are used to connect a combination of both Local Area Networks (LANs) and
Wide Area Networks (WANs).
• Routers generally have 2 connections:
o WAN connection (Connection to ISP)
o LAN connection
o PSTN connection
• Multiprotocol devices providing pure data delivery with minimal access control and QoS.
• Intelligent Network Services, this allowed us to provide security capabilities like integrated
firewall and encryption.
• Integrated voice and data capabilities, allowing routers to provide voice gateway features
for IP telephony.
• Today the router is an integrated platform for providing advanced services in security,
content delivery, and voice.
Router Interfaces
• Router Interface is a physical connector that enables a router to send or receive packets
• Each interface connects to a separate network
• Consist of socket or jack found on the outside of a router
• The main purpose of a router is to connect multiple networks and forward packets destined
either for its own networks or other networks.
• A router is considered a Layer 3 device because its primary forwarding decision is based
on the information in the Layer 3 IP packet, specifically the destination IP address. This
process is known as routing.
• At a minimum, the documentation should include a topology diagram that indicates the
physical connectivity and an addressing table that lists all of the following information:
o Device names.
o Interfaces used in the design.
o IP addresses and subnet masks.
o Default gateway addresses for end devices, such as PCs.
Dynamic Routing
• Dynamic routing protocols are used by routers to share information about the reachability
and status of remote networks. Dynamic routing protocols perform several activities,
including:
o Network discovery.
o Updating and maintaining routing tables.
• Dynamic routing features:
o Automatic Network Discovery.
o Maintaining Routing Tables.
• IP Routing Protocols
o RIP (Routing Information Protocol) .
o IGRP (Interior Gateway Routing Protocol).
o EIGRP (Enhanced Interior Gateway Routing Protocol).
o OSPF (Open Shortest Path First).
o IS-IS (Intermediate System-to-Intermediate System).
o BGP (Border Gateway Protocol)
• Internet Protocol (IP) packet format contains fields that provide information about the
packet and the sending and receiving hosts
• Fields that are importance for CCNA students:
o Destination IP address.
o Source IP address.
o Version & TTL.
o IP header length.
o Precedence & type of service.
o Packet length
• MAC Layer Frame Format
• MAC Frames are also divided into fields. They include:
o Preamble
o Start of frame delimiter
o Destination MAC address
o Source MAC address
o Type/length
o Data and pad
o Frame check sequence
• To solve this dilemma, a router will use Equal Cost Load Balancing. This means the router
sends packets over the multiple exit interfaces listed in the routing table.
• Equal Cost Paths and Unequal Cost Paths: a router can send packets over multiple
networks even when the metric is not the same if it is using a routing protocol that has this
capability.
Path Determination
• Path determination enables a router to evaluate paths to a destination & to establish the
preferred way to handle the packet.
• One of 3 things happen when a router searches a routing table to find a route to destination
▪ Next hop determined.
▪ Exit interface determined.
▪ No route determined.
Switching Function of Router is the process used by a router to switch a packet from an
incoming interface to an outgoing interface on the same router.
• A packet received by a router will do the following:
o Strips off layer 2 headers.
o Examines destination IP address located in Layer 3 header to find best route to
destination.
o Re-encapsulates layer 3 packet into layer 2 frame. Forwards frame out exit interface.
Assessment/Activities:
192.168.0.1
1. Set Up the Topology and Initialize Devices
a. Cable equipment to match the network topology.
b. Initialize and restart the router and switch.
2. Configure Devices and Verify Connectivity
a. Assign static IPv4 information to the PC interfaces.
Objectives:
After successful completion the module, you should be able to:
• Define the general role a router plays in networks.
• Describe the directly connected networks, different router interfaces
• Examine directly connected networks in the routing table and use the CDP protocol
• Describe static routes with exit interfaces
• Describe summary and default route
• Examine how packets get forwarded when using static routes
• Identify how to manage and troubleshoot static routes
Course Materials:
LESSON 1: ROLE OF THE ROUTER
The router is a special-purpose computer that plays a key role in the operation of any data
network. Routers are primarily responsible for interconnecting networks by:
• Determining the best path to send packets.
• Forwarding packets toward their destination.
Topology Lab
• Three 1800 series routers connected via WAN links.
• Each router connected to a LAN represented by a switch and a PC.
• In order to keep the unsolicited output separate from your input, enter line configuration
mode for the consoled port and add the logging synchronous command.
The routing table consists of a list of "known" network addresses these addresses that are
directly connected, configured statically, and learned dynamically.
Observing Routes as They are Added to the Routing Table
• debug ip routing command will let us see any changes that the router performs when
adding or removing routes.
Devices on Directly Connected Networks
• When a router only has its interfaces configured, and the routing table contains the
directly connected networks but no other routes, only devices on those directly
connected networks are reachable.
ip route command
Parameter Description
network-address Destination network address of the remote network to be added to
the routing table
subnet-mask Subnet mask of the remote network to be added to the routing
table. The subnet mask can be modified to a summarize a group
of networks
ip-address Commonly referred to as the next-hop router’s IP address
exit-interface Outgoing interface that is used to forward packets to the
destination network
• There are times when a previously configured static route needs to be modified:
• The destination network no longer exists, and therefore the static route should be
deleted.
• There is a change in the topology, and either the intermediate address or the exit
interface must be changed.
Verifying the Static Route Configuration
• Use the following commands
o Step 1 show running-config.
o Step 2 verify static route has been entered correctly.
o Step 3 show ip route.
o Step 4 verify route was configured in routing table.
o Step 5 issue ping command to verify packets can reach destination and that
Return path is working.
Static Routes with Ethernet Interfaces
• Ethernet interfaces and ARP. If a static route is configured on an Ethernet link
o If the packet is sent to the next-hop router then the destination MAC address
will be the address of the next hop’s Ethernet interface
o This is found by the router consulting the ARP table. If an entry isn’t found, then
an ARP request will be sent out
• With Ethernet networks, there may be many different devices sharing the same multi
access network, including hosts and even multiple routers. Therefore, router does not
know the next-hop IP address and therefore it cannot determine the destination MAC
address for the Ethernet frame.
Default Static Route
• A default static route is a route that will match all packets. Default static routes are used:
o When no other routes in the routing table match the packet's destination IP address.
In other words, when a more specific match does not exist. A common use is when
connecting a company's edge router to the ISP network.
o When a router has only one other router to which it is connected. This condition is
known as a stub router.
o Using command: ip route 0.0.0.0 0.0.0.0 {exit Interface, IP NextHop}
Troubleshooting a Missing Route
• Tools that can be used to isolate routing problems include:
o Ping– tests end to end connectivity
o Traceroute– used to discover all of the hops (routers) along the path between 2
points
o Show IP route– used to display routing table & ascertain forwarding process
o Show ip interface brief- used to show status of router interfaces
o Show cdp neighbors detail– used to gather configuration information about
directly connected neighbors
Assessment/Activities:
192.168.0.1
1. Set Up the Topology and Initialize Devices
a. Cable equipment to match the network topology.
b. Initialize and restart the router and switch.
2. Configure Devices and Verify Connectivity
a. Assign static IPv4 information to the PC interfaces.
b. Configure basic router settings.
c. Verify network connectivity.
d. Configure the router for SSH.
3. Display Router Information
a. Retrieve hardware and software information from the router.
b. Interpret the output from the startup configuration.
c. Interpret the output from the routing table.
d. Verify the status of the interfaces.
4. Configure and Verify Connectivity
Objectives:
After successful completion the module, you should be able to:
• Describe the role of dynamic routing protocols and place these protocols in the context of
modern network design.
• Identify several ways to classify routing protocols.
• Describe how metrics are used by routing protocols and identify the metric types used by
dynamic routing protocols.
• Determine the administrative distance of a route and describe its importance in the routing
process.
• Identify the different elements of the routing table.
Course Materials:
LESSON 1: THE EVOLUTION OF DYNAMIC ROUTING PROTOCOLS
Dynamic routing protocols help the network administrator overcome the time-consuming
and exacting process of configuring and maintaining static routes.
The Role of Dynamic Routing Protocol
• Routing protocols are used to facilitate the exchange of routing information between
routers.
• Dynamic routing protocols allow routers to dynamically share information about remote
networks and automatically add this information to their own routing tables.
• Routing protocols determine the best path to each network which is then added to the
routing table.
• Consuming system resources (CPU, Memory, bandwidth…).
Network discovery and routing table maintenance
• The purpose of a routing protocol includes:
o Discovery of remote networks.
o Maintaining up-to-date routing information.
o Choosing the best path to destination networks.
o Ability to find a new best path if the current path is no longer available.
• Components of a routing protocol:
o Data structures.
o Algorithm.
o Routing protocol messages
Dynamic routing operation
• The router sends and receives routing messages on its interfaces.
• The router shares routing messages and routing information with other routers that are
using the same routing protocol.
• Routers exchange routing information to learn about remote networks.
• When a router detects a topology change the routing protocol can advertise this change
to other routers.
Advantages
▪ A metric is a value used by routing protocols to assign costs to reach remote networks.
▪ The metric is used to determine which path is most preferable when there are multiple
paths to the same remote network.
Metrics and Routing Protocols
The Metric Parameters
▪ Different routing protocols use different metrics. Two different routing protocols
might choose different paths to the same destination due to using different
metrics.
▪ Metrics used in IP routing protocols include: Hop count, Bandwidth, Load,
Delay, Reliability, Cost.
The Metric Field in the Routing Table
▪ The metric for each routing protocol is:
o RIP: Hop count
o IGRP and EIGRP: Bandwidth, Delay, Reliability, and Load
o IS-IS and OSPF: Cost
Load Balancing
▪ But what happens when two or more routes to the same destination have identical metric
values? How will the router decide which path to use for packet forwarding?
▪ In this case, the router does not choose only one route. Instead, the router "load balances"
between these equal cost paths. The packets are forwarded using all equal-cost paths.
Purpose of Administrative Distance
Objectives:
After successful completion the module, you should be able to:
▪ Describe the functions, characteristics, and operation of the RIPv1 protocol.
▪ Configure a device for using RIPv1.
▪ Verify proper RIPv1 operation.
▪ Describe how RIPv1 performs automatic summarization.
▪ Configure, verify, and troubleshoot default routes propagated in a routed network
implementing RIPv1.
▪ Use recommended techniques to solve problems related to RIPv1
Course Materials:
LESSON 1: RIPv1
▪ RIP Characteristics
o A classful, Distance Vector (DV) routing protocol
o Metric = hop count
o Routes with a hop count > 15 are unreachable
o Updates are broadcast every 30 seconds
▪ RIP Message Format
o RIP header – divided into 3 fields
▪ Command field
▪ Version field
▪ Must be zero
o Route Entry - composed of 3 fields
▪ Address family identifier
▪ IP address
▪ Metric
▪ RIP Operation
o RIP uses 2 message types:
▪ Request message
• This is sent out on startup by each RIP enabled interface
• Requests all RIP enabled neighbors to send routing table.
▪ Response message
• Message sent to requesting router containing routing table
▪ IP addresses initially divided into classes
o Class A
o Class B
o Class C
▪ RIP is a classful routing protocol: Does not send subnet masks in routing updates
▪ Administrative Distance
o RIP’s default administrative distance is 120. When compared to other interior
gateway protocols, RIP is the least-preferred routing protocol. IS-IS, OSPF,
IGRP, and EIGRP all have lower default AD values.
▪ Show ip Route
o To verify and troubleshoot routing, Use the following commands:
▪ Show ip route
▪ Show ip protocols
▪ Debug ip rip
▪ show ip protocols command: Displays routing protocol configured on router
▪ Debug ip rip command: Used to display RIP routing updates as they are happening
▪ Passive interface command
o Used to prevent a router from sending updates through an interface.
o Example:
▪ Router(config-router)#passive-interface interface-type
interface-number
▪ Boundary Routers
o RIP automatically summarizes classful networks
o Boundary routers summarize RIP subnets from one major network to another.
▪ Processing RIP Updates
o 2 rules govern RIPv1 updates:
▪ If a routing update and the interface it’s received on belong to the same
major network, then the subnet mask of the interface is applied to the
network in the routing update.
▪ If a routing update and the interface it’s received on belong to a different
network then the classful subnet mask of the network is applied to the
network in the routing update.
▪ Sending RIP Updates
o RIP uses automatic summarization to reduce the size of a routing table.
▪ Advantages of automatic summarization:
o The size of routing updates is reduced
o Single routes are used to represent multiple routes which results in faster lookup
in the routing table.
▪ Disadvantage of Automatic Summarization:
o Does not support discontiguous networks
▪ Discontiguous Topologies do not converge with RIPv1
o A router will only advertise major network addresses out interfaces that do not
belong to the advertised route.
Default Route and RIPv1
▪ Default routes
o Packets that are not defined specifically in a routing table will go to the specified
interface for the default route
o Example: Customer routers use default routes to connect to an ISP router.
o Command used to configure a default route is ip route 0.0.0.0 0.0.0.0
s0/0/1
▪ Propagating the Default Route in RIPv1
o Default-information originate command in router mode
▪ This command is used to specify that the router is to originate default
information, by propagating the static default route in RIP update.
Assessment/Activities:
Objectives:
After successful completion the module, you should be able to:
▪ Compare and contrast classful and classless IP addressing.
▪ Review VLSM and explain the benefits of classless IP addressing.
▪ Describe the role of the Classless Inter-Domain Routing (CIDR) standard in making
efficient use of scarce IPv4 addresses.
Course Materials:
LESSON 1: INTRODUCTION
• Prior to 1981, IP addresses used only the first 8 bits to specify the network portion of the
address
• In 1981, RFC 791 modified the IPv4 32-bit address to allow for three different classes
• IP address space was depleting rapidly
o the Internet Engineering Task Force (IETF) introduced Classless Inter-Domain
Routing (CIDR)
▪ CIDR uses Variable Length Subnet Masking (VLSM) to help conserve
address space.
• VLSM is simply subnetting a subnet
Classful and Classless IP Addressing
Classful IP addressing
• As of January 2007, there are over 433 million hosts on internet
• Initiatives to conserve IPv4 address space include:
o VLSM & CIDR notation (1993, RFC 1519).
o Network Address Translation (1994, RFC 1631).
o Private Addressing (1996, RFC 1918).
• The High Order Bits
o These are the leftmost bits in a 32 bit address
• Classes of IP addresses are identified by the decimal number of the 1st octet
o Class A address begin with a 0 bit
▪ Range of class A addresses = 0.0.0.0 to 127.255.255.255
o Class B address begin with a 1 bit and a 0 bit
▪ Range of class B addresses = 128.0.0.0 to 191.255.255.255
o Class C addresses begin with two 1 bits & a 0 bit
▪ Range of class C addresses = 192.0.0.0 to 223.255.255.255.
LESSON 3: VLSM
• Classful routing
o Only allows for one subnet mask for all networks
• VLSM & classless routing
o This is the process of subnetting a subnet
o More than one subnet mask can be used.
• There is no command to enable or disable the use of the all-ones subnet, it is enabled by
default.
o Router(config)#ip subnet-zero
• The use of the all-ones subnet has always been explicitly allowed and the use of subnet
zero is explicitly allowed since Cisco IOS version 12.0.
• RFC 1878 states, "This practice (of excluding all-zeros and all-ones subnets) is obsolete!
Modern software will be able to utilize all definable networks." Today, the use of subnet
zero and the all-ones subnet is generally accepted and most vendors support their use,
though, on certain networks, particularly the ones using legacy software, the use of subnet
zero and the all-ones subnet can lead to problems.
o Route flapping occurs when a router interface alternates rapidly between the up and down
states.
o Route flapping, and it can cripple a router with excessive updates and recalculations.
o However, the summarization configuration prevents the RTC route flapping from affecting
any other routers.
o The loss of one network does not invalidate the route to the supernet.
o While RTC may be kept busy dealing with its own route flap, RTZ, and all upstream routers,
are unaware of any downstream problem.
o Summarization effectively insulates the other routers from the problem of route flapping.
Assessment/Activities:
172.16.128.0/17
1. Examine the Network Requirements
a. Determine how many host addresses are available and how many subnets are
needed.
b. Determine the largest subnet needed.
c. Determine the second largest subnet needed.
d. Determine the next largest subnet needed.
e. Determine the next largest subnet needed.
f. Determine the next largest subnet needed.
g. Determine the next largest subnet needed.
h. Determine the subnets needed to support the serial links.
2. Design the VLSM Address Scheme
a. Calculate the subnet information.
b. Complete the device interface address table.
3. Cable and Configure the IPv4 Network
a. Cable the network as shown in the topology.
b. Configure basic settings on each router.
c. Configure the interfaces on each router.
4. Save the configuration on all devices.
5. Test Connectivity.
MODULE 6 – RIPv2
Overview:
This module provides an understanding about RIP version 2. Routing Information Protocol (RIP),
version 2, is a non-proprietary distance vector protocol that is easy to implement in a network
infrastructure. When it comes to internal routing protocols, Routing Information Protocol version
2 (RIPv2) is one of the most common routing protocols in use today. In addition, RIPv2 is one of
the easiest protocols to configure.
Objectives:
After successful completion the module, you should be able to:
▪ Encounter and describe the limitations of RIPv1’s limitations.
▪ Apply the basic Routing Information Protocol Version 2 (RIPv2) configuration commands
and evaluate RIPv2 classless routing updates.
▪ Analyze router output to see RIPv2 support for VLSM and CIDR
▪ Identify RIPv2 verification commands and common RIPv2 issues.
▪ Configure, verify, and troubleshoot RIPv2.
Course Materials:
LESSON 1: RIPV1 LIMITATIONS
o This topology is discontiguous and will not converge because 172.30.0.0/16 is divided by
the 209.165.200.0/24.
o R2 router has a static summary route to the 192.168.0.0/16 network. For now, understand
that this summary route will cause problems with RIPv1 because 192.168.0.0/16 is not a
major classful address and includes all of the /24 versions of 192.168.0.0/16.
o Because the subnet mask is not included in the update, RIPv1 and other classful routing
protocols must summarize networks at major network boundaries.
o The Next Hop address is used to identify a better next-hop address - if one exists - than
the address of the sending router.
o If the field is set to all zeros (0.0.0.0), the address of the sending router is the best next-
hop address.
o Remember, the 192.168.0.0/16 route could not be distributed with RIPv1 because the
subnet mask was less than the classful mask.
o Because the mask is not included in RIPv1 updates, there was no way for the RIPv1 router
to determine what that mask should be. Therefore, the update was never sent.
NewYork
interface fastethernet0/0
ip address 192.168.50.129 255.255.255.192
ip rip send version 1
ip rip receive version 1
interface fastethernet0/1
ip address 172.25.150.193 255.255.255.240
ip rip send version 1 2
interface fastethernet0/2
ip address 172.25.150.225 225.255.255.240
router rip
version 2
network 172.25.0.0
network 192.168.50.0
ISP
router rip
redistribute static
network 10.0.0.0
network 192.168.4.0
version 2
no auto-summary
default-information originate
ip route 207.0.0.0 255.0.0.0 null0
ip route 0.0.0.0 0.0.0.0 10.0.0.2
etherenet0
• One of the goals of Classless Inter-Domain Routing (CIDR) as stated by RFC 1519 is "to
provide a mechanism for the aggregation of routing information." This goal includes the
concept of supernetting.
• A supernet is a block of contiguous classful networks that is addressed as a single network.
LESSON 8: AUTHENTICATION
• This practice ensures routers will only accept routing information from other routers that
have been configured with the same password or authentication information.
• Note: Authentication does not encrypt the routing table.
Configuring authentication
• The steps for setting up RIP v2 authentication are as follows:
o Define a key chain with a name
o Define the key or keys on the keychain
o Enable authentication on an interface and specify the key chain to be used
o Specify whether the interface will use clear text or MD5 authentication
o Optionally configure key management
Router(config)#key chain Romeo
Router(config-keychain)#key 1
Router(config-keychain-key)#key-string Juliet
• The password must be the same on both routers (Juliet), but the name of the key (Romeo)
can be different.
• If the command ip rip authentication mode md5 is not added, the interface will use the
default clear text authentication. Although clear text authentication may be necessary to
communicate with some RIP v2 implementations, for security concerns use the more
secure MD5 authentication whenever possible.
• Planning Redistribution
• Select a method for injecting the required edge protocol routes into the core.
Configuring Redistribution into RIP
• Use this command to redistribute routes into RIP:
o Router(config-router)# redistribute protocol [process-id]
[match route-type] [metric metric-value] [route-map map-
tag]
• Default metric is infinity
The redistribute command parameters for RIP
Parameter Description
protocol Source protocol from which routes are being redistributed.
process-id This value is an AS number. For OSPF, this value is an OSPF
process ID.
match route-type (Optional) Command parameter used for redistributing OSPF
routes into another routing protocol. For OSPF, the criterion by
which OSPF routes are redistributed into other routing
domains.
metric metric-value (Optional) Parameter used to specify the RIP seed metric for
the redistributed route. When you are redistributing into RIP,
this value is not specified and no value is specified using the
default-metric router configuration command, then the default
metric is 0, which is interpreted as infinity, and routes will not
be redistributed. The metric for RIP is the hop count.
route-map map-tag (Optional) Identifier of a configured route map to be
interrogated to filter the importation of routes from this source
routing protocol to the current routing protocol.
o There are several ways to verify and troubleshoot RIPv2. Many of the same commands
used for RIPv2 can be used to verify and troubleshoot other routing protocols.
o It is always best to begin with the basics:
o Make sure all of the links (interfaces) are up and operational.
o Check the cabling.
o Check to make sure you have the correct IP address and subnet mask on each
interface.
o Remove any unnecessary configuration commands that are no longer necessary
or have been replaced by other commands.
o The show ip rip database command to check summary address entries in the RIP
database.
o These entries will appear in the database if there are only relevant child or specific
routes being summarized.
o When the last child route for a summary address becomes invalid, the summary address
is also removed from the routing table.
Assessment/Activities:
Objectives:
After successful completion the module, you should be able to:
▪ Describe the various route types found in the routing table structure
▪ Describe the routing table lookup process.
▪ Describe routing behavior in routed networks
Course Materials:
o Routing table entries come from the following sources
o Directly connected networks
o Static routes
o Dynamic routing protocols
o As soon as the no shutdown command is issued the route is added to routing table
o Cisco IP routing table is a hierarchical structure. The reason for this is to speed up
lookup process
o A level 1 route is a route with a subnet mask equal to or less than the classful mask of the
network address. 192.168.1.0/24 is a level 1 network route, because the subnet mask is
equal to the network's classful mask. /24 is the classful mask for class C networks, such
as the 192.168.1.0 network.
o A level 1 route can function as a:
o Default route - A default route is a static route with the address 0.0.0.0/0.
o Supernet route - A supernet route is a network address with a mask less than the
classful mask.
o Network route - A network route is a route that has a subnet mask equal to that of
the classful mask. A network route can also be a parent route. Parent routes will
be discussed in the next section.
Ultimate Route
o The level 1 route 192.168.1.0/24 can be further defined as an ultimate route. An ultimate
route is a route that includes:
o Either a next-hop IP address (another path)
o And/or an exit interface
o Parent and Child Routes
o A parent route is a level 1 route
o A parent route does not contain any next-hop IP address or exit interface
information
o The subnet is the level 2 child route of the parent route.
o Let's examine in more depth how the routers determine the best routes to use when
sending packets and why classful routing protocols do not work with discontiguous
designs. We will consider:
o What happens when a router receives an IP packet, examines the IP
destination address, and looks that address up in the routing table?
o How does the router decide which route in the routing table is the best match?
o What effect does the subnet mask have on the routing table lookup process?
o How does the router decide whether or not to use a supernet or default route
if a better match is not found?
o Examine level 1 routes
o If best match a level 1 ultimate route and is not a parent route this route is used
to forward packet
o If the best match is a level 1 parent route examines level 2 routes
o Router examines level 2 (child) routes
o If there is a match with level 2 child route then that subnet is used to forward
packet
o If no match then
o Determine routing behavior type
o Router determines classful or classless routing behavior
o If classful then packet is dropped
o If classless then router searches level one supernet and default routes
o If there exists a level 1 supernet or default route match then packet is forwarded.
If not packet is dropped
o Finding a match between packet’s destination IP address and the next route in the
routing table
o The figure shows a match between the destination IP of 192.168.1.0 and the
level one IP of 192.168.1.0 / 24 then packet forwarded out s0/0/0
o How a router finds a match with one of the level 2 child routes
o First router examines parent routes for a match
o If a match exists then:
▪ Child routes are examined
▪ Child route chosen is the one with the longest match
o The routing table process will not use the default route, 0.0.0.0/0, or any other
route.
o A common error is to assume that a default route will always be used if the router
does not have a better route. In our example, R2's default route is not examined
nor used, although it is a match. This is often a very surprising result when a
network administrator does not understand the difference between classful and
classless routing behavior.
o The reason why the router will not search beyond the child routes
▪ Originally networks were all classful.
▪ This meant an organization could subnet a major network address and
“enlighten” all the organization’s routers about the subnetting.
▪ Therefore, if the subnet was not in the routing table, the subnet did not exist
and packet was dropped.
Routing Behavior: ip classless
o Commands: Router(config)#ip classless
o Beginning with IOS 11.3, ip classless was configured by default
o Classless routing behavior works for:
o Discontiguous networks.
o CIDR supernets.
Assessment/Activities:
Quiz
1. Which two major areas can be used when discussing the high-level overview of a typical
enterprise network? Choose two
a. Building distribution
b. Building access
c. Enterprise edge
d. Enterprise campus
2. Which of the following is used when choosing a dynamic routing protocol? Choose two.
a. Knowledge level of a specific routing protocol
b. Scalability
c. Type of links supported
d. Cost of equipment
3. Which two factors can influence convergence time for a routing protocol? Choose two.
a. Fine tuning routing protocol timers
b. Type of link between routers
c. Configuring route summarization
d. Size of the routing table
4. Scalability of a network includes which two factors? Choose two.
a. Number of routers
b. Ability to do auto summarization
c. Number of adjacent neighbors
d. Distance between routers
5. Which of the following traffic types is not supported by IPv6?
a. Broadcast
b. Multicast
c. Anycast
d. Unicast
MODULE 8 – EIGRP
Overview:
This module provides an understanding about EIGRP. Enhanced Interior Gateway Routing
Protocol (EIGRP) is an advanced distance-vector routing protocol that is used on a computer
network for automating routing decisions and configuration. Enhanced Interior Gateway Routing
Protocol (EIGRP) is an interior gateway protocol suited for many different topologies and media.
In a well-designed network, EIGRP scales well and provides extremely quick convergence times
with minimal network traffic.
Objectives:
After successful completion the module, you should be able to:
▪ Describe the background and history of Enhanced Interior Gateway Routing Protocol
(EIGRP).
▪ Examine the basic EIGRP configuration commands and identify their purposes.
▪ Calculate the composite metric used by EIGRP.
▪ Describe the concepts and operation of DUAL.
▪ Describe the uses of additional configuration commands in EIGRP.
Course Materials:
LESSON 1: ROOTS OF EIGRP: IGRP
o Does not age out routing entries nor uses periodic updates.
o Maintains a topology table separate from the routing table, which includes the best path
and any loopfree backup paths.
o When a route becomes unavailable, DUAL will use a backup path if one exists in the
topology table.
o Faster convergence due to the absence of holddown timers and a system of coordinated
route calculations.
o EIGRP Header
o Purpose of RTP
o Used by EIGRP to transmit and receive EIGRP packets.
o Characteristics of RTP
o Involves both reliable & unreliable delivery of EIGRP packet
▪ Reliable delivery requires acknowledgment from destination.
▪ Unreliable delivery does not require an acknowledgement from destination.
o Packets can be sent
▪ Unicast.
▪ Multicast: Using address 224.0.0.10
o Hello packets
o Used to discover & form adjacencies with neighbors
o Update packets
o Used to propagate routing information.
o Acknowledgement packets
o Used to acknowledge receipt of update, query & reply packets.
EIGRP
o Purpose of Hello Protocol
o To discover & establish adjacencies with neighbor routers
o Characteristics of hello protocol
o Time interval for sending hello packet
▪ Most networks it is every 5 seconds.
▪ Multipoint non broadcast multi-access networks: Unicast every 60
seconds.
o Holdtime
o This is the maximum time router should wait before declaring a neighbor down
o Default holdtime: 3 times hello interval.
EIGRP bounded updates
o Purpose
o EIGRP’s primary method for preventing routing loops
o Advantage of using DUAL
o Provides for fast convergence time by keeping a list of loop-free backup routes
o Administrative Distance (AD)
o Defined as the trustworthiness of the source route.
o EIGRP default administrative distances
o Summary routes = 5.
o Internal routes = 90.
o Imported routes = 170.
EIGRP authentication
o Authentication
o EIGRP can
▪ Encrypt routing information.
▪ Authenticate routing information.
o Note: Authentication does not encrypt the router's routing table.
Network Topology
o Topology used is the same as previous chapters with the addition of an ISP router.
Autonomous System (AS) & Process IDs
o This is a collection of networks under the control of a single authority (reference RFC
1930).
o AS Numbers are assigned by IANA.
o Entities needing AS numbers
o ISP.
o Internet Backbone prodiers.
o Institutions connecting to other institutions using AS numbers.
o EIGRP autonomous system number actually functions as a process ID.
o Process ID represents an instance of the routing protocol running on a router.
o Command: Router(config)#router eigrp autonomous-system.
o Example:
o Router(config)#router eigrp 10
The router eigrp command
o The global command that enables eigrp is
o Router eigrp autonomous-system
o All routers in the EIGRP routing domain must use the same process ID number
(autonomous-system number).
The network Command
o Functions of the network command
o Enables interfaces to transmit & receive EIGRP updates.
o Includes network or subnet in EIGRP updates.
o Example
o Router(config-router)#network 192.168.10.0
o The network Command with a Wildcard Mask
o This option is used when you want to configure EIGRP to advertise specific
subnets.
o Example
o Router(config-router)#network network-address [wildcard-
mask]
Verifying EIGRP
o EIGRP routers must establish adjacencies with their neighbors before any updates can
be sent or received
o Command used to view neighbor table and verify that EIGRP has established adjacencies
with neighbors is
DUAL Concepts
o The Diffusing Update Algorithm (DUAL) is used to prevent looping:
o Successor.
▪ The best least cost route to a destination found in the routing table.
o Feasible Distance (FD).
▪ The lowest calculated metric along a path to a destination network.
o Feasible Successor (FS).
▪ This is a loop free backup route to same destination as successor route.
DUAL FSM
o Selects a best loop-free path to a destination
o Selects alternate routes by using information in EIGRP tables
• Routing tables.
• Topology tables.
Manual Summarization
o Manual summarization can include supernets
o Reason: EIGRP is a classless routing protocol & include subnet mask in update
o Command used to configure manual summarization
o Router(config-if)# ip summary-address eigrp as-number network-address subnet-
mask
EIGRP Default Routes
o “quad zero” static default route
o Can be used with any currently supported routing protocol/
o Is usually configured on a router that is connected a network outside the EIGRP
domain/
o EIGRP & the “Quad zero” static default route
o Requires the use of the redistribute static command to disseminate default route
in EIGRP updates/
Fine-Tuning EIGRP
o EIGRP bandwidth utilization
o By default, EIGRP uses only up to 50% of interface bandwidth for EIGRP
information.
o The command to change the percentage of bandwidth used by EIGRP is
▪ Router(config-if)#ip bandwidth-percent eigrp as-number
percent
o Step 4: Enter the configuration mode for the key chain using the key chain keychain
(keychain can be different in each side).
o Step 5: Identify a key ID to use and enter configuration mode for that key using the key
key-id command.
o Step 6: Identify the key string (password) for this key using the key-string {key-string}
command. (key-string must be the same on both side of EIGRP routers)
EIGRP redistribution
o Planning Redistribution
Assessment/Activities:
Objectives:
After successful completion the module, you should be able to:
▪ Describe the basic features & concepts of link-state routing protocols.
▪ List the benefits and requirements of link-state routing protocols.
Course Materials:
LESSON 1: LINK-STATE ROUTING
o Dikjstra’s algorithm also known as the Shortest Path First (SPF) algorithm. This
algorithm accumulates costs along each path, from source to destination.
o The shortest path to a destination is not necessarily the path with the least number of hops.
o How routers using Link State Routing Protocols reach convergence
o Each router learns about its own directly connected networks
o Link state routers exchange hello packet to “meet” other directly connected link
state routers.
o Each router builds its own Link State Packet (LSP) which includes information
about neighbors such as neighbor ID, link type, & bandwidth.
o After the LSP is created the router floods it to all neighbors who then store the
information and then immediately forward it until all routers have the same
information.
o Once all the routers have received all the LSPs, the routers then construct a
topological map of the network which is used to determine the best routes to a
destination.
o Routers with link-state routing protocols use a Hello protocol to discover any neighbors on
its links. A neighbor is any other router that is enabled with the same link-state routing
protocol.
o Connected interfaces that are using the same link state routing protocols will exchange
hello packets.
o Once routers learn it has neighbors they form an adjacency
o 2 adjacent neighbors will exchange hello packets.
o These packets will serve as a keep alive function.
o Bandwidth Requirements
o Initial startup of link state routing protocols can consume lots of bandwidth.
Areas in Link-State Routing Protocols
o Modern LSR protocols are designed to minimize the effects on memory, CPU, and
bandwidth. Multiple areas can reduce the size of the link-state databases. It limits the
amount of link-state information flooding in a routing domain and send LSPs only to those
routers that need them.
2 link state routing protocols used for routing IP
o Open Shortest Path First (OSPF).
o Intermediate System-Intermediate System (IS-IS)
MODULE 10 – OSPF
Overview:
This module provides an understanding about OSPF. The OSPF routing algorithm was created
to provide an alternative to RIP, based on Shortest Path First algorithms instead of the Bellman-
Ford algorithm. It uses a tree that describes the network topology to define the shortest path from
each router to each destination address. Unlike RIP protocol that has only 15 hops at most, OSPF
has no limitations in hop count.
Objectives:
After successful completion the module, you should be able to:
▪ Describe the background and basic features of OSPF
▪ Identify and apply the basic OSPF configuration commands
▪ Describe, modify and calculate the metric used by OSPF
▪ Describe the Designated Router/Backup Designated Router (DR/BDR) election process
in multi-access networks
▪ Describe the uses of additional configuration commands in OSPF
Course Materials:
LESSON 1: BACKGROUND OF OSPF
o Began in 1987.
o 1989 OSPFv1 released in RFC 113.
o This version was experimental & never deployed
o 1991 OSPFv2 released in RFC 1247.
o 1998 OSPFv2 updated in RFC 2328.
o 1999 OSPFv3 published in RFC 2740.
Hello Protocol
o OSPF Hello Packet
o Purpose of Hello Packet
▪ Discover OSPF neighbors & establish adjacencies.
▪ Advertise guidelines on which routers must agree to become neighbors.
▪ Used by multi-access networks to elect a designated router(DR) and a
backup designated router(BDR).
OSPF timers
o OSPF routers build & maintain link-state database containing LSA received from other
routers
o Information found in database is utilized upon execution of Dijkstra SPF algorithm.
o SPF algorithm used to create SPF tree.
o SPF tree used to populate routing table.
o No adjacency indicated by
▪ Neighboring router’s Router ID is not displayed.
▪ A state of full is not displayed.
o Consequence of no adjacency
▪ No link state information exchanged.
▪ Inaccurate SPF trees & routing tables.
Reasons of no adjacency
o Two routers may not form an OSPF adjacency if:
o The subnet masks do not match, causing the routers to be on
separate networks.
o OSPF Hello or Dead Timers do not match.
o OSPF Network Types do not match.
o There is a missing or incorrect OSPF network command.
Command Description
Show ip protocols Displays OSPF process ID, router ID, networks router is
advertising & administrative distance
Show ip ospf Displays OSPF process ID, router ID, OSPF area information
& the last time SPF algorithm calculated
Show ip ospf interface Displays hello interval and dead interval
o OSPF uses cost as the metric for determining the best route
o Best route ~ lowest cost
o Cost:
▪ 108 / bandwidth
o Reference bandwidth
▪ Defaults to 100Mbps
▪ Can be modified using auto-cost reference bandwidth command.
o COST of an OSPF route
o Is the accumulated value from one router to the next
o Usually the actual speed of a link is different than the default bandwidth
o This makes it imperative that the bandwidth value reflects link’s actual speed.
o Example:
o R1(config-router)#autocost reference-bandwidth 10000
Modifying OSPF timers
o Reason to modify timers
o Faster detection of network failures
o Manually modifying Hello & Dead intervals
o Router(config-if)#ip ospf hello-interval seconds
o Router(config-if)#ip ospf dead-interval seconds
o Point to be made
o Hello & Dead intervals must be the same between neighbors.
Configuring OSPF authentication
o By default, a router trusts that routing information is coming from a router that should be
sending the information
o To guarantee this trust, routers in a specific area can be configured to authenticate
o each other.
o Each OSPF interface can present an authentication key for use by routers sending OSPF
information to other routers on the segment.
o The authentication key, known as a password, is a shared secret between the routers.
This key is used to generate the authentication data in the OSPF packet header. The
password can be up to eight characters.
o Router(config-if)#ip ospf authentication-key password
o After the password is configured, authentication must be enabled:
o Router(config-router)#area area-number authentication
o Note: With simple authentication, the password is sent as plain text. This means that it
can be easily decoded if a packet sniffer captures an OSPF packet.
OSPF redistribution
o Planning Redistribution
Assessment/Activities:
References/Sources:
• http://bkacad.com/ - CCNA Exploration 4.0 Presentations