Routing Protocols
Routing Protocols
Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm
Methodology: Selects routers with the lowest hop count; updates other routers by broadcasting the
entire routing table to all routers every 30 seconds
Ideal topology: Smaller networks that aren’t very dynamic, have fewer than 15 hops, and are not
subnetted from classful boundaries (see Weaknesses)
Strengths:
Weaknesses:
Limited to a hop count of 15; after a packet travels through 15 routers and still has another router to travel to,
it will be discarded.
Doesn’t support a variable-length subnet mask (VLSM), which means that it sends routing updates based only
on a fixed-length subnet mask (FLSM) or routes that fall on classful boundaries. So RIP V1 will not work with
a network that has been subnetted beyond the normal /8, /16, /24 (255.0.0.0, 255.255.0.0, 255.255.255.0) or
Class A, B, and C network boundaries.
Converges slowly, especially on large networks
Doesn’t have knowledge of the bandwidth of a link
Doesn’t support multiple paths for the same route
Routing updates can require significant bandwidth, as the entire routing table is sent when a link’s status
changes
Liable to to routing loops
Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm
Methodology: Selects routers with the lowest hop count; updates other routers by multicasting the
entire routing table to all routers every 30 seconds
Ideal topology: Smaller networks that aren’t very dynamic, have fewer than 15 hops
Strengths:
Weaknesses:
Limited to a hop count of 15; after a packet travels through 15 routers and still has another router to travel to,
it will be discarded.
Converges slowly, especially on large networks
Doesn’t have knowledge of the bandwidth of a link
Doesn’t support multiple paths for the same route
Routing updates can require significant bandwidth as the entire routing table is sent when a link’s status
changes
Prone to routing loops
Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm
Methodology: Sends hello packets every five seconds to neighbors to see if the neighbor is still
available; updates other routers by notifying them only when routes change
Ideal topology: Any network, small to very large; all routers must be from Cisco. Cannot subnet
network beyond classful boundaries.
Strengths:
Weaknesses:
Definition
Convergence: The process that a routing protocol goes through to alert all routers on the network of
the next available path when the primary path becomes unavailable.
Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)
Methodology: Sends hello packets every five seconds to neighbors (can interoperate with IGRP) to
see if the neighbors are still available; updates other routers by notifying them only when routes
change
Ideal topology: Any network, small to very large; all routers must be Cisco
Strengths:
Weaknesses:
Type of protocol: Link-state, runs the Dijkstra algorithm to calculate the shortest-path first (SPF)
tree
Metric: Calculates the cost to traverse router links to get to the destination, taking the bandwidth of
the links into account
Methodology: Develops adjacencies with its neighbors, periodically sending hello packets to
neighbors, flooding changes to neighbors when a link’s status changes, and sending “paranoia
updates” to neighbors every 30 minutes of all recent link state changes
Strengths:
Weaknesses:
Another type of routing protocol is an exterior routing protocol, or Exterior Gateway Protocol (EGP).
These protocols maintain routing information for networks that are external to your network. An EGP
doesn’t know how to deliver data within your network, just how to deliver data outside your network.
While a variety of IGPs are currently used, about the only EGP in use today is the Border Gateway
Protocol (BGP). This is the routing protocol of the Internet.
From talking with administrators who manage a variety of networks, the consensus is that OSPF is
becoming the most popular interior routing protocol today. I would recommend OSPF or EIGRP for
any new network, based on their popularity, flexibility, and fast convergence. Of course, the choice is
yours based on the requirements of your network
EIGRP -
Switching Protocols:
Wireless LAN :
AP -
Various wireless security protocols were developed to protect home wireless networks. These
wireless security protocols include WEP, WPA, and WPA2, each with their own strengths —
and weaknesses. In addition to preventing uninvited guests from connecting to your wireless
network, wireless security protocols encrypt your private data as it is being transmitted over the
airwaves.
Wireless networks are inherently insecure. In the early days of wireless networking,
manufacturers tried to make it as easy as possible for end users. The out-of-the-box configuration
for most wireless networking equipment provided easy (but insecure) access to a wireless
network.
Although many of these issues have since been addressed, wireless networks are generally not as
secure as wired networks. Wired networks, at their most basic level, send data between two
points, A and B, which are connected by a network cable. Wireless networks, on the other hand,
broadcast data in every direction to every device that happens to be listening, within a limited
range.
Following are descriptions of the WEP, WPA, and WPA2 wireless security protocols:
Wired Equivalent Privacy (WEP): The original encryption protocol developed for
wireless networks. As its name implies, WEP was designed to provide the same level of
security as wired networks. However, WEP has many well-known security flaws, is
difficult to configure, and is easily broken.
Wi-Fi Protected Access (WPA): Introduced as an interim security enhancement over
WEP while the 802.11i wireless security standard was being developed. Most current
WPA implementations use a preshared key (PSK), commonly referred to as WPA
Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for
encryption. WPA Enterprise uses an authentication server to generate keys or certificates.
Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless security
standard, which was finalized in 2004. The most significant enhancement to WPA2 over
WPA is the use of the Advanced Encryption Standard (AES) for encryption. The security
provided by AES is sufficient (and approved) for use by the U.S. government to encrypt
information classified as top secret — it’s probably good enough to protect your secrets
as well!
Other Topics :
Q :- If we want to connect 500 host located in a single office then what we have to do?
Redistributing OSPF processes can be painful, due to the large number of requirements – type, metric,
metric-type, matching external types and internal type routes
CCNA
OSPF
BGP
STP
RSTP
PORT CHANNEL
HSRP
VRRP