Configuring EIGRP: ROUTE Module 2-1 - Introduction To EIGRP
Describe the key capabilities that distinguish EIGRP from other routing protocols. Identify the four key technologies employed by EIGRP. Calculate the metric for a range of pathways between routers.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
97 views24 pages
Configuring EIGRP: ROUTE Module 2-1 - Introduction To EIGRP
Describe the key capabilities that distinguish EIGRP from other routing protocols. Identify the four key technologies employed by EIGRP. Calculate the metric for a range of pathways between routers.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 24
2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential ROUTE 2 - 1 1
Configuring EIGRP ROUTE Module 2-1 Introduction to EIGRP 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 2 Objectives This module will cover topics which allow students to meet the following objectives: Describe the key capabilities that distinguish EIGRP from other routing protocols Identify the four key technologies employed by EIGRP Describe how EIGRP operates Describe the five components of the metric used by EIGRP Calculate the EIGRP metric for a range of pathways between routers Explain how IGRP routes are integrated into EIGRP routes and vice-versa 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 3 Purpose of this Lesson Coverage of topics new to the EIGRP module of ROUTE. Whats new in this module? EIGRP metric calculations for pathway ranges between routers. 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 4 EIGRP Features There are several key differences with EIGRP from other routing protocols which are explored in this module. 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 5 EIGRP Key Technologies Neighbor discover/recovery Reliable Transport Protocol (RTP) DUAL finite-state machine Protocol-dependent modules (PDMs) 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 6 The Diffusing Update Algorithm (DUAL) How does EIGRP determine which routes are loop-free? B with a cost of 10
Each of As neighbors is reporting reachability to E: C with a cost of 10 D with a cost of 30
These three costs are called the reported distance (RD); the distance each neighbor is reporting to a given destination 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 7 The Diffusing Update Algorithm (DUAL) At A, the total cost to reach E is: The best of these three paths is the path through B, with a cost of 20 20 through B 25 through C 45 through D This is the feasible distance (FD) 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 8 The Diffusing Update Algorithm (DUAL) A uses the FD and the RD to determine which paths are loop-free The best path (FD) is used as a benchmark; all paths with RDs lower than the FD cannot contain loops The algorithm may mark some loop-free paths as loops However, it is guaranteed never to mark a looped path as loop-free 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 9 The Diffusing Update Algorithm (DUAL) At A: The path through B is the best path (FD), at 20 C can reach E with a cost of 10; 10 (RD) is less than 20 (FD), so this path is loop-free. D can reach E with a cost of 30; 30 (RD) is not less than 20 (FD), so EIGRP assumes this path is a loop. 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 10 EIGRP Topology Table 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 11 RTRA#show ip eigrp neighbors IP-EIGRP neighbors for process 1 H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num 2 10.1.1.1 Et0 12 6d16h 20 200 0 233 1 10.1.4.3 Et1 13 2w2d 87 522 0 452 0 10.1.4.2 Et1 10 2w2d 85 510 0 3 Seconds Remaining Before Declaring Neighbor Down How Long Since the Last Time Neighbor Was Discovered How Long It Takes for This Neighbor To Respond To Reliable Packets How Long to Wait Before Retransmitting If No Acknowledgement EIGRP Neighbor Status 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 12 EIGRP IP Routing Table 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 13 Example: EIGRP Tables Router Cs tables: 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 14 EIGRP Packets Hello: Establish neighbor relationships. Update: Send routing updates Query: Ask neighbors about routing information Reply: Respond to query about routing information ACK: Acknowledge a reliable packet 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 15 Initial Route Discovery 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 16 EIGRP Metric Same metric components as IGRP: Bandwidth Delay Reliability Loading MTU EIGRP metric is IGRP metric multiplied by 256 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 17 EIGRP Metric Calculation By default, EIGRP metric: Metric = bandwidth (slowest link) + delay (sum of delays) Delay = sum of the delays in the path, in tens of microseconds, multiplied by 256. Bandwidth = [10 / (minimum bandwidth link along the path, in kilobits per second)] * 256 Formula with default K values (K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0): Metric = [K1 * BW + ((K2 * BW) / (256 load)) + K3 * delay] If K5 not equal to 0: Metric = Metric * [K5 / (reliability + K4)] 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 18 EIGRP Metrics Calculation Example A B C D Least bandwidth 64 kbps Total delay 6,000 A X Y Z D Least bandwidth 256 kbps Total delay 8,000 Delay is the sum of all the delays of the links along the paths: Delay = [delay in tens of microseconds] x 256 BW is the lowest bandwidth of the links along the paths: BW = [10,000,000 / (bandwidth in kbps)] x 256 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 19 EIGRP Metrics Are Backward-Compatible with IGRP 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 20 Summary EIGRP capabilities include fast convergence and support for VLSM, partial updates, and multiple network layer protocols. EIGRP key technologies are: neighbor discovery/recovery, RTP, DUAL finite-state machine, and protocol-dependent modules. EIGRP uses three tables: neighbor table, topology table, and routing table. The routing table contains the best route to each destination, called the successor route. A feasible successor route is a backup route to a destination; it is kept in the topology table. EIGRP uses the same metric components as IGRP: delay, bandwidth, reliability, load, and MTU. By default, EIGRP metric = bandwidth (slowest link) + delay (sum of delays). EIGRP metrics are backward-compatible with IGRP; the EIGRP- equivalent metric is the IGRP metric multiplied by 256. 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 21 Self Check What is a reported distance? What is a feasible distance? EIGRP uses three tables: name the three tables: __________, ____________, _____________. Which of the tables contains the best route or successor route to each destination? EIGRP uses what metrics? __________, _________, _________, __________, ___________ 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 22 Resources http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09 186a008009405c.shtml http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09 186a0080093f07.shtml 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 23 Q and A 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential ROUTE 2 - 1 24