0% found this document useful (0 votes)
3 views

Routing Protocols

Uploaded by

Mitesh Parmar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Routing Protocols

Uploaded by

Mitesh Parmar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Routing Protocols:

RIP V1—Routing Information Protocol


Origin: Based on RFC 1058

Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm

Metric: Hop count

Methodology: Selects routers with the lowest hop count; updates other routers by broadcasting the
entire routing table to all routers every 30 seconds

Ideal topology: Smaller networks that aren’t very dynamic, have fewer than 15 hops, and are not
subnetted from classful boundaries (see Weaknesses)

Strengths:

 Easy to configure and use


 Since it has been around so long, it is well known and widely used.

Weaknesses:

 Limited to a hop count of 15; after a packet travels through 15 routers and still has another router to travel to,
it will be discarded.
 Doesn’t support a variable-length subnet mask (VLSM), which means that it sends routing updates based only
on a fixed-length subnet mask (FLSM) or routes that fall on classful boundaries. So RIP V1 will not work with
a network that has been subnetted beyond the normal /8, /16, /24 (255.0.0.0, 255.255.0.0, 255.255.255.0) or
Class A, B, and C network boundaries.
 Converges slowly, especially on large networks
 Doesn’t have knowledge of the bandwidth of a link
 Doesn’t support multiple paths for the same route
 Routing updates can require significant bandwidth, as the entire routing table is sent when a link’s status
changes
 Liable to to routing loops

RIP V2—Routing Information Protocol


Origin: Based on RFC 1388

Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm

Metric: Hop count

Methodology: Selects routers with the lowest hop count; updates other routers by multicasting the
entire routing table to all routers every 30 seconds
Ideal topology: Smaller networks that aren’t very dynamic, have fewer than 15 hops

Strengths:

 Easy to configure and use


 Since it has also been around so long, it is well known and widely used.
 Version 2 adds support for VSLM or Classless Internet Domain Routing (CIDR), MD5 Authentication, and
route summarization.

Weaknesses:

 Limited to a hop count of 15; after a packet travels through 15 routers and still has another router to travel to,
it will be discarded.
 Converges slowly, especially on large networks
 Doesn’t have knowledge of the bandwidth of a link
 Doesn’t support multiple paths for the same route
 Routing updates can require significant bandwidth as the entire routing table is sent when a link’s status
changes
 Prone to routing loops

IGRP—Interior Gateway Routing Protocol


Origin: Based only on Cisco’s implementation, not an Internet RFC

Type of protocol: Distance vector, based on the Bellman-Ford distance vector algorithm

Metric: Delay, bandwidth, reliability, and load

Methodology: Sends hello packets every five seconds to neighbors to see if the neighbor is still
available; updates other routers by notifying them only when routes change

Ideal topology: Any network, small to very large; all routers must be from Cisco. Cannot subnet
network beyond classful boundaries.

Strengths:

 Easy to configure and use


 Uses the delay, bandwidth, reliability, and load of a link as its metric. This makes it very accurate in selecting
the proper route.

Weaknesses:

 Not an Internet standard; all routers must be from Cisco Systems


 Converges slowly; slower than RIP
 Doesn’t support VLSM
 Prone to routing loops

Definition
Convergence: The process that a routing protocol goes through to alert all routers on the network of
the next available path when the primary path becomes unavailable.

EIGRP—Enhanced Interior Gateway Routing Protocol


Origin: Based only on Cisco’s implementation, not an Internet RFC

Type of protocol: Hybrid distance vector

Metric: Delay, bandwidth, reliability, and load, using the Diffusing Update Algorithm (DUAL)

Methodology: Sends hello packets every five seconds to neighbors (can interoperate with IGRP) to
see if the neighbors are still available; updates other routers by notifying them only when routes
change

Ideal topology: Any network, small to very large; all routers must be Cisco

Strengths:

 Uses DUAL to provide very quick convergence and a loop-free network


 Supports IP and IPX
 Requires less CPU than OSPF (see next section)
 Requires little bandwidth for routing updates
 Supports VLSM or CIDR
 Uses the delay, bandwidth, reliability, and load of a link as its metric; this makes it very accurate in selecting
the proper route
 Offers backward compatibility with IGRP

Weaknesses:

 Not an Internet standard; all routers must be from Cisco Systems


OSPF V2—Open Shortest Path First
[Note that version 1 of OSPF was never implemented.]

Origin: Based on RFC 2328

Type of protocol: Link-state, runs the Dijkstra algorithm to calculate the shortest-path first (SPF)
tree
Metric: Calculates the cost to traverse router links to get to the destination, taking the bandwidth of
the links into account

Methodology: Develops adjacencies with its neighbors, periodically sending hello packets to
neighbors, flooding changes to neighbors when a link’s status changes, and sending “paranoia
updates” to neighbors every 30 minutes of all recent link state changes

Ideal topology: Any network, small to very large

Strengths:

 Converges quickly, compared to a distance vector protocol


 Routing update packets are small, as the entire routing table is not sent
 Not prone to routing loops
 Scales very well to large networks
 Recognizes the bandwidth of a link, taking this into account in link selection
 Supports VLSM or CIDR
 Supports a long list of optional features that many of the other protocols do not

Weaknesses:

 More complex to configure and understand than a distance vector protocol


Final word
Just to clarify this comparison, one way routing protocols are classified is according to how they are
used. Interior routing protocols are used within a single domain on your interior network. Also called
an Interior Gateway Protocol (IGP), this is the type of routing protocol you usually think of using for
your internal network. The protocols we looked at in this article are all IGPs. Note that I omitted a few
of the lesser-known interior routing protocols to keep the discussion reasonably short. These include
IS-IS, NLSP, RTMP, and IPX RIP.

Another type of routing protocol is an exterior routing protocol, or Exterior Gateway Protocol (EGP).
These protocols maintain routing information for networks that are external to your network. An EGP
doesn’t know how to deliver data within your network, just how to deliver data outside your network.
While a variety of IGPs are currently used, about the only EGP in use today is the Border Gateway
Protocol (BGP). This is the routing protocol of the Internet.

From talking with administrators who manage a variety of networks, the consensus is that OSPF is
becoming the most popular interior routing protocol today. I would recommend OSPF or EIGRP for
any new network, based on their popularity, flexibility, and fast convergence. Of course, the choice is
yours based on the requirements of your network

Compare OSPF EIGRP


point
standard Open standard of Cisco owned private routing
IETF,supported by most protocol,not been supported by any
vendors. other vendors;is not as mature as
OSPF.
popularity Most popular IGP in the world Only a few networks designed by
EIGRP,and is getting less and less
popular.
algorithm SPF algorithm fast DUAL algorithm could be in SIA
convergence, loop free. status, query could spread out the
whole network.
topology Can build a hierarchy and Can not build a hierarchy network with
scaleable network. this protocol.
Supportive of Support OSPF-TE Does not support TE
new
technology

RIP - How Works and Advantages - Disadvantages

OSPF - same as above

EBGP and IBGP

EIGRP -

Switching Protocols:

STP, RSTP, VTP

Wireless LAN :

WLC - Wireless LAN Controller

AP -

Security :- like WEP, WPA and WAP2

Various wireless security protocols were developed to protect home wireless networks. These
wireless security protocols include WEP, WPA, and WPA2, each with their own strengths —
and weaknesses. In addition to preventing uninvited guests from connecting to your wireless
network, wireless security protocols encrypt your private data as it is being transmitted over the
airwaves.

Wireless networks are inherently insecure. In the early days of wireless networking,
manufacturers tried to make it as easy as possible for end users. The out-of-the-box configuration
for most wireless networking equipment provided easy (but insecure) access to a wireless
network.
Although many of these issues have since been addressed, wireless networks are generally not as
secure as wired networks. Wired networks, at their most basic level, send data between two
points, A and B, which are connected by a network cable. Wireless networks, on the other hand,
broadcast data in every direction to every device that happens to be listening, within a limited
range.

Following are descriptions of the WEP, WPA, and WPA2 wireless security protocols:

 Wired Equivalent Privacy (WEP): The original encryption protocol developed for
wireless networks. As its name implies, WEP was designed to provide the same level of
security as wired networks. However, WEP has many well-known security flaws, is
difficult to configure, and is easily broken.
 Wi-Fi Protected Access (WPA): Introduced as an interim security enhancement over
WEP while the 802.11i wireless security standard was being developed. Most current
WPA implementations use a preshared key (PSK), commonly referred to as WPA
Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for
encryption. WPA Enterprise uses an authentication server to generate keys or certificates.
 Wi-Fi Protected Access version 2 (WPA2): Based on the 802.11i wireless security
standard, which was finalized in 2004. The most significant enhancement to WPA2 over
WPA is the use of the Advanced Encryption Standard (AES) for encryption. The security
provided by AES is sufficient (and approved) for use by the U.S. government to encrypt
information classified as top secret — it’s probably good enough to protect your secrets
as well!

Other Topics :

MPLS and Basic of Networking OSI Model.

Q :- What is cisco three - layered hierarchical model


For this refer : http://www.semsim.com/ccna/ccna-study-guide.asp?ain=57

Q :- If we want to connect 500 host located in a single office then what we have to do?
Redistributing OSPF processes can be painful, due to the large number of requirements – type, metric,
metric-type, matching external types and internal type routes

CCNA
OSPF
BGP
STP
RSTP
PORT CHANNEL
HSRP
VRRP

You might also like