This document provides an overview of IP routing essentials including routing protocols, path selection, static routing, and virtual routing and forwarding. It describes common routing protocols such as RIP, EIGRP, OSPF, IS-IS, and BGP. It discusses the algorithms and mechanisms used for path selection in distance vector protocols, link-state protocols, and BGP. It also covers topics such as administrative distance, metrics, equal-cost multipathing, and different types of static routes.
The document provides information about IP routing, including static and dynamic routing. It discusses:
- The basics of routing including destination addresses, neighbor routers, routes, and maintaining routing information.
- The benefits and disadvantages of static routing, including less overhead but requiring manual configuration.
- Dynamic routing protocols like RIP, IGRP, and OSPF that automatically share routing information.
- Configuring and verifying static routes, as well as troubleshooting connection issues.
- Key aspects of distance vector protocols like RIP and IGRP, including updates, loops, metrics, and timers.
Router used to make communication between different type of network ,for this purpose router use routing protocol and routed protocol. Routed protocol for source and destination address and routing protocol for path selection.
The document discusses distance vector routing protocols and their characteristics. It explains that distance vector protocols advertise routes as vectors containing the distance and direction to a destination. Periodic full table updates are sent to neighbors on a regular basis. Common distance vector protocols include RIP, IGRP and EIGRP. EIGRP differs in that it sends partial updates only when there are topological changes rather than full periodic updates.
Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
Dynamic routing protocols are used to automatically discover remote networks, maintain up-to-date routing information, and choose the best path to destination networks. There are two main types - interior gateway protocols (IGPs) like RIP, OSPF, and EIGRP that are used within an autonomous system, and exterior protocols like BGP that route between autonomous systems. IGPs use metrics like hop count or bandwidth to determine the best path. OSPF is a link-state protocol that floods link information, while EIGRP uses DUAL algorithm and maintains topology tables for fast convergence.
The document discusses routing and routing protocols. It provides explanations of key routing concepts like routing tables, static routing, default routing, dynamic routing, distance vector routing protocols, link state routing protocols, hybrid routing protocols, and how routing loops occur and can be overcome. It also defines specific routing protocols like OSPF, RIP, IGRP, EIGRP, and compares features of these protocols.
RIP is a distance-vector routing protocol that uses hop count as its routing metric. It operates at the OSI application layer and uses port 520. The maximum number of hops in a RIP route is 15. There are three versions of RIP with RIP v2 being classless and supporting authentication. RIP timers include the update, invalid, hold down, and flush timers. OSPF is a link-state routing protocol that uses the SPF/Dijkstra algorithm to calculate the shortest path. It has five message types including hello, database description, link-state request, link-state update, and link-state acknowledgement messages.
A network connects computers and devices through communication channels to allow sharing of resources and communication between users. It consists of computer hardware and software. Networks can be classified by range (LAN, MAN, WAN, PAN), functional relationship (client-server, peer-to-peer), and topology (bus, star, ring). Routing directs network traffic along paths by maintaining routing tables. Major routing protocols include RIP, OSPF, and EIGRP. Access lists filter network traffic by source/destination IP addresses. The college network case study demonstrates configuring OSPF and RIP routing, and uses access lists to restrict access according to constraints.
1. Enable the OSPF routing process with a process ID. This groups related OSPF commands.
2. Configure OSPF areas. Areas organize groups of networks/links in the OSPF domain.
3. Associate networks with their corresponding areas using the network command. This establishes OSPF neighbor relationships between routers on the network.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
This chapter covers IP routing concepts including routing protocols, path selection, static routing, and virtual routing and forwarding. It discusses how different routing protocols advertise and learn routes, the metrics and algorithms routers use to select the best path, and an overview of static and dynamic routing configurations.
Highlighted notes while studying Advanced Computer Networks:
Routing table
Source: Wikipedia
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it.
Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.
The document discusses routing protocols used in internets and autonomous systems. It describes how distance vector routing protocols like RIP work by sharing routing tables between neighbors. It also explains link state routing protocols like OSPF, where each router shares information about connected links and all routers can independently calculate optimal routes. Finally, it outlines path vector routing and BGP, which is used for inter-domain routing between autonomous systems and considers routing policies.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
Static routing is inflexible and cannot adapt to network changes, while dynamic routing automatically adapts to topology changes. Dynamic routing protocols include distance vector protocols like RIP that use hop counts as metrics and link-state protocols like OSPF that use link costs. These protocols exchange routing information to build and maintain routing tables and converge on consistent views of the network topology.
Routing protocols are sets of rules that enable routers to communicate and select the best path between a source and destination. There are two main types - static protocols where paths are manually assigned, and dynamic protocols where routers automatically share topology updates and select optimal routes. Common dynamic interior gateway protocols like RIP, EIGRP, and OSPF use distance vector or link state algorithms to calculate and update routing tables across an autonomous system.
- Routing protocols allow routers to learn the best paths to different networks. Routers use routing tables to store this path information.
- Dynamic routing protocols allow routers to automatically share routing information with each other. This allows the routers to adapt to network changes. RIP is an example of a dynamic distance vector routing protocol.
- With RIP, each router sends its full routing table to neighboring routers every 30 seconds. The routers use the hop count as the routing metric to determine the best path. The maximum hop count allowed is 15.
Routing is the process of selecting the best path to send data from a source to a destination. Routers perform routing by using routing protocols and algorithms to determine the optimal path. Distance vector routing uses hop count as the metric to calculate the best path, while link state routing uses the least cost path based on metrics like bandwidth and delay. Key differences are that distance vector routing shares distance vectors with neighbors periodically, while link state routing shares complete topology information and triggers updates when links change state.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Best web hosting Vancouver 2025 for you businesssteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Ad
More Related Content
Similar to introduction to network and computer security (20)
RIP is a distance-vector routing protocol that uses hop count as its routing metric. It operates at the OSI application layer and uses port 520. The maximum number of hops in a RIP route is 15. There are three versions of RIP with RIP v2 being classless and supporting authentication. RIP timers include the update, invalid, hold down, and flush timers. OSPF is a link-state routing protocol that uses the SPF/Dijkstra algorithm to calculate the shortest path. It has five message types including hello, database description, link-state request, link-state update, and link-state acknowledgement messages.
A network connects computers and devices through communication channels to allow sharing of resources and communication between users. It consists of computer hardware and software. Networks can be classified by range (LAN, MAN, WAN, PAN), functional relationship (client-server, peer-to-peer), and topology (bus, star, ring). Routing directs network traffic along paths by maintaining routing tables. Major routing protocols include RIP, OSPF, and EIGRP. Access lists filter network traffic by source/destination IP addresses. The college network case study demonstrates configuring OSPF and RIP routing, and uses access lists to restrict access according to constraints.
1. Enable the OSPF routing process with a process ID. This groups related OSPF commands.
2. Configure OSPF areas. Areas organize groups of networks/links in the OSPF domain.
3. Associate networks with their corresponding areas using the network command. This establishes OSPF neighbor relationships between routers on the network.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
This chapter covers IP routing concepts including routing protocols, path selection, static routing, and virtual routing and forwarding. It discusses how different routing protocols advertise and learn routes, the metrics and algorithms routers use to select the best path, and an overview of static and dynamic routing configurations.
Highlighted notes while studying Advanced Computer Networks:
Routing table
Source: Wikipedia
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it.
Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.
The document discusses routing protocols used in internets and autonomous systems. It describes how distance vector routing protocols like RIP work by sharing routing tables between neighbors. It also explains link state routing protocols like OSPF, where each router shares information about connected links and all routers can independently calculate optimal routes. Finally, it outlines path vector routing and BGP, which is used for inter-domain routing between autonomous systems and considers routing policies.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
1) Computer networks allow communication and sharing of resources between computer systems and devices through communication channels. There are several types of networks including LANs, WANs, and MANs.
2) For communication between systems, both must agree on a protocol which sets rules for data transmission. The two main protocol stacks are OSI and TCP/IP.
3) The network layer is responsible for delivering packets from source to destination. It uses services from the data link layer and provides services to the transport layer. Common network layer protocols are IP (Internet Protocol) for connectionless service and MPLS for connection-oriented service.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
Dynamic routing protocols allow networks to keep routing tables up to date as the network changes over time. There are two main types of dynamic routing protocols: link-state protocols and vector-distance protocols. Link-state protocols have advantages like ensuring all routers converge on the same routing tables and generating less network traffic compared to vector-distance protocols. Common dynamic routing protocols include RIP, OSPF, IS-IS, and BGP.
Static routing is inflexible and cannot adapt to network changes, while dynamic routing automatically adapts to topology changes. Dynamic routing protocols include distance vector protocols like RIP that use hop counts as metrics and link-state protocols like OSPF that use link costs. These protocols exchange routing information to build and maintain routing tables and converge on consistent views of the network topology.
Routing protocols are sets of rules that enable routers to communicate and select the best path between a source and destination. There are two main types - static protocols where paths are manually assigned, and dynamic protocols where routers automatically share topology updates and select optimal routes. Common dynamic interior gateway protocols like RIP, EIGRP, and OSPF use distance vector or link state algorithms to calculate and update routing tables across an autonomous system.
- Routing protocols allow routers to learn the best paths to different networks. Routers use routing tables to store this path information.
- Dynamic routing protocols allow routers to automatically share routing information with each other. This allows the routers to adapt to network changes. RIP is an example of a dynamic distance vector routing protocol.
- With RIP, each router sends its full routing table to neighboring routers every 30 seconds. The routers use the hop count as the routing metric to determine the best path. The maximum hop count allowed is 15.
Routing is the process of selecting the best path to send data from a source to a destination. Routers perform routing by using routing protocols and algorithms to determine the optimal path. Distance vector routing uses hop count as the metric to calculate the best path, while link state routing uses the least cost path based on metrics like bandwidth and delay. Key differences are that distance vector routing shares distance vectors with neighbors periodically, while link state routing shares complete topology information and triggers updates when links change state.
A PROJECT REPORT
On
CISCO CERTIFIED NETWORK ASSOCIATE
A computer network, or simply a network, is a collection of computer and other hardware components interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network.
Best web hosting Vancouver 2025 for you businesssteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingsteve198109
Vancouver in 2025 is more than scenic views, yoga studios, and oat milk lattes—it’s a thriving hub for eco-conscious entrepreneurs looking to make a real difference. If you’ve ever dreamed of launching a purpose-driven business, now is the time. Whether it’s urban mushroom farming, upcycled furniture sales, or vegan skincare sold online, your green idea deserves a strong digital foundation.
The 2025 Canadian eCommerce landscape is being shaped by trends like sustainability, local innovation, and consumer trust. To stay ahead, eco-startups need reliable hosting that aligns with their values. That’s where 4GoodHosting.com comes in—one of the top-rated Vancouver web hosting providers of 2025. Offering secure, sustainable, and Canadian-based hosting solutions, they help green entrepreneurs build their brand with confidence and conscience.
As eCommerce in Canada embraces localism and environmental responsibility, choosing a hosting provider that shares your vision is essential. 4GoodHosting goes beyond just hosting websites—they champion Canadian businesses, sustainable practices, and meaningful growth.
So go ahead—start that eco-friendly venture. With Vancouver web hosting from 4GoodHosting, your green business and your values are in perfect sync.
Reliable Vancouver Web Hosting with Local Servers & 24/7 Supportsteve198109
Looking for powerful and affordable web hosting in Vancouver? 4GoodHosting offers premium Canadian web hosting solutions designed specifically for individuals, startups, and businesses across British Columbia. With local data centers in Vancouver and Toronto, we ensure blazing-fast website speeds, superior uptime, and enhanced data privacy—all critical for your business success in today’s competitive digital landscape.
Our Vancouver web hosting plans are packed with value—starting as low as $2.95/month—and include secure cPanel management, free domain transfer, one-click WordPress installs, and robust email support with anti-spam protection. Whether you're hosting a personal blog, business website, or eCommerce store, our scalable cloud hosting packages are built to grow with you.
Enjoy enterprise-grade features like daily backups, DDoS protection, free SSL certificates, and unlimited bandwidth on select plans. Plus, our expert Canadian support team is available 24/7 to help you every step of the way.
At 4GoodHosting, we understand the needs of local Vancouver businesses. That’s why we focus on speed, security, and service—all hosted on Canadian soil. Start your online journey today with a reliable hosting partner trusted by thousands across Canada.
Smart Mobile App Pitch Deck丨AI Travel App Presentation Templateyojeari421237
🚀 Smart Mobile App Pitch Deck – "Trip-A" | AI Travel App Presentation Template
This professional, visually engaging pitch deck is designed specifically for developers, startups, and tech students looking to present a smart travel mobile app concept with impact.
Whether you're building an AI-powered travel planner or showcasing a class project, Trip-A gives you the edge to impress investors, professors, or clients. Every slide is cleanly structured, fully editable, and tailored to highlight key aspects of a mobile travel app powered by artificial intelligence and real-time data.
💼 What’s Inside:
- Cover slide with sleek app UI preview
- AI/ML module implementation breakdown
- Key travel market trends analysis
- Competitor comparison slide
- Evaluation challenges & solutions
- Real-time data training model (AI/ML)
- “Live Demo” call-to-action slide
🎨 Why You'll Love It:
- Professional, modern layout with mobile app mockups
- Ideal for pitches, hackathons, university presentations, or MVP launches
- Easily customizable in PowerPoint or Google Slides
- High-resolution visuals and smooth gradients
📦 Format:
- PPTX / Google Slides compatible
- 16:9 widescreen
- Fully editable text, charts, and visuals
APNIC Update, presented at NZNOG 2025 by Terry SweetserAPNIC
Terry Sweetser, Training Delivery Manager (South Asia & Oceania) at APNIC presented an APNIC update at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
Understanding the Tor Network and Exploring the Deep Webnabilajabin35
While the Tor network, Dark Web, and Deep Web can seem mysterious and daunting, they are simply parts of the internet that prioritize privacy and anonymity. Using tools like Ahmia and onionland search, users can explore these hidden spaces responsibly and securely. It’s essential to understand the technology behind these networks, as well as the risks involved, to navigate them safely. Visit https://torgol.com/
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC
Joyce Chen, Senior Advisor, Strategic Engagement at APNIC, presented on 'APNIC Policy Development Process' at the Local APIGA Taiwan 2025 event held in Taipei from 19 to 20 April 2025.
DNS Resolvers and Nameservers (in New Zealand)APNIC
Geoff Huston, Chief Scientist at APNIC, presented on 'DNS Resolvers and Nameservers in New Zealand' at NZNOG 2025 held in Napier, New Zealand from 9 to 11 April 2025.
2. Introduction
Routing
a process accomplished by router
process during which data packets are forwarded from one
machine or device
Selecting the minimum cost, distance, and/or time path from
several alternatives to deliver a message.
Routing encapsulates two tasks:
deciding the paths for data transferred (use protocols-metrics,
bandwidth, delay, reliability and algorithms), and
sending the packets on these paths
3. How routing works
PC2 want to send data to PC3
PC2 forward the packet to router 5 fa0/0 interface
Router5 determine the best path(next hop) by referring its routing
table
Router5 transfer the packet to next hop(router)
The next hop router encapsulate the message , see the destination
address and to determine the best path for forwarding the message
4. Routing Table
A type of data table that acts as a map, often installed on a router,
network computer or other hardware
It is where data about the neighboring routers(next hop) is
stored and used to calculate and decide where to send the
packet.
It contains list of IP addresses and subnet masks which
identifies directly connected and remote routers
Home networks: utilize a very small routing table because
the simply forward all outbound traffic to ISP gateway (10 or
fewer)
Largest routers at the core of the internet backbone
must contain the full Internet routing table (>100000)
5. Routing Table designing challenges
Fixed memory
Issue of working with ARP cache & correctly maintaining list of
available routs for data
Black holes causes ineffective delivery
Structures of Routing table
Destination Subnet mask Interface
128.75.43.0 255.255.255.0 Eth0
128.75.43.0 255.255.255.128 Eth1
192.12.17.5 255.255.255.255 Eth3
default Eth2
6. Static Routing
Routing table is created maintained and updated by Network
Administrator
Does not use routing protocol
Dynamic Routing
Information in routing table is changed dynamically by router itself
using routing protocols
Types of routing
7. Advantage and Disadvantages of Static routing
Advantages
Minimal cpu/memory overhead-do not calculate best path
No bandwidth overhead-updates are not shared between routers
Adds security-granular control on how traffic is routed
Disadvantage
Infrastructure changes must be manually adjusted
No “dynamic” fault tolerance-if a link goes down the admin is
responsible
Impractical in large networks
Configuration syntax
ip route [destination_network] [mask] [next-hop_address or
exit interface] [administrative_distance] [permanent]
8. Default Route
When the router is unable to find a matching address to the
packets destination address in its routing table, it forwards the
packet to its exit interface or next hop address configured
with a default route 0.0.0.0/0.
Syntax
ip route 0.0.0.0 0.0.0.0 [next-hop_address or exit interface]
9. Dynamic Routing
Use routing protocol: software & routing algorithms to determine
best path and construct routing table
Routers dynamically learn destinations and how to get them &
advertize those destinations to other routers (if they use the same
routing protocol)
Advantages
Simpler to configure on large networks
Dynamically choose a different route if a link goes down
Ability to load balance b/n multiple links
Disadvantage
Updates are shared b/n routers, thus consuming bandwidth
Routing protocols put additional load on routers CPU/RAM
10. Types of Dynamic routing
1. DistanceVector Routing Protocols (DVRP)
2. Link State Routing Protocol (LSRP)
DistanceVector Routing Protocol
find the best path to a remote network by judging distance
route with the least number of hops to the network is
determined to be the best route.
They send the entire routing table to directly connected
neighbors.
key characteristics:
Periodic updates of the full routing table are sent to routing neighbors.
Example RIP (every 30 seconds),IGRP(every 90 seconds)
Distance-vector protocols suffer from slow convergence, and are
highly susceptible to loops.
Some form of distance is used to calculate a route’s metric.
The Bellman-Ford algorithm is used to determine the shortest path.
11. Link State Routing Protocol
Called shortest-path-first protocols
each router create three separate tables (utilize more
RAM and CPU)
Neighbor table – contains a list of all neighbors, and the interface
each neighbor is connected. Neighbors are formed by sending Hello
packets.
Topology table – also known as the “link-state” table contains a
map of all links within an area, including each link’s status.
Shortest-Path table – contains the best routes to each particular
destination (also known as the “routing” table”)
All routers within an area have identical topology tables.
Examples are:
Intermediate System-to-Intermediate System (IS-IS) and
Open Shortest Path First (OSPF)
12. The state of a link changes, such as a router interface failing, an
advertisement containing only this link-state change will be sent to
all routers within that area. Each router will adjust its topology table
accordingly, and will calculate a new best route if required.
Because updates are sent only during a link-state change, and contain
only the change (and not the full table), link-state protocols are less
bandwidth intensive than distance-vector protocols
Link-state protocols utilize some form of cost, usually based on
bandwidth, to calculate a route’s metric.
The Dijkstra formula is used to determine the shortest path.
StaticVS Dynamic routing
13. Administrative distances, metric and wild mask
Administrative Distance
the metric used by routers to choose the best path when there are
two or more routes to the same destination from two different
routing protocols
Each routing protocol is prioritized in order of most to least reliable using
an administrative distance value.
A router prefers a static route to a dynamic route because the router
considers a route with a low number to be the shortest
To override theAD of static route, change the defaultAD during
configuration to >120
AnAD is an integer from 0 to 255, where 0 is the most trusted and 255
means no traffic will be passed via this route.
If a router receives two updates listing the same remote network, then the
route with the lowestAD will be placed in the routing table. If theAD is
the same, then routing protocol metrics (such as hop count or bandwidth
of the lines) will be used to find the best path to the remote network
14. Default Administrative Distances
Metric
is a value used by routing protocols to assign costs to reach
remote networks.
Each routing protocol uses its own metric. For example, RIP
uses hop count, EIGRP uses bandwidth and delay, and OSPF
uses bandwidth.
15. Wild Card Mask
A wildcard mask can be thought of as a subnet mask, with ones and
zeros inverted;
for example, a wildcard mask of 0.0.0.255 corresponds to a subnet
mask of 255.255.255.0.
Used in OSPF,ACL to indicate the size of a network or subnet and what
IP addresses should be permitted or denied respectively
To calculate wildcard mask
Simply subtract your mask from 255.255.255.255 to get your wildcard
mask.
Example:
The wildcard mask of /26 is:
255.255.255.255 - 255.255.255.192 = 0.0.0.63
The wildcard mask of /19 is:
255.255.255.255 - 255.255.224.0 = 0.0.31.255
The wildcard mask of /12 is:
255.255.255.255 - 255.240.0.0 = 0.15.255.255
16. Routing Information Protocol (RIP)
distance-vector,interior gateway protocol (IGP) used by routers to
exchange routing information
uses hop count to determine the best path
maximum allowable number of hops are 15 hops
Hop Count = routers and also Firewall that are Routers
router broadcasts (RIP v1) its entire RIP table to its neighboring routers
every 30 seconds
Administrative distance of 120
Suitable for small network
RIPv1
It is a classful protocol .Because it doesn’t send updates with subnet mask
information.
RIP supports up to six equal-cost paths to a single destination and use
them for load-balancing. (default four paths)
Use broadcast
Outdated
17. RIPv2
RIPv2 uses multicasts (only to neighbor routers configure
with RIPv2)
RIPv2 supports triggered updates—when a change occurs, a
RIPv2 router will immediately propagate its routing
information to its connected neighbors.
RIPv2 is a classless protocol. (supports VLSM)
RIPv2 supports authentication.You can restrict what routers
you want to participate in RIPv2.This is accomplished using a
hashed password value
19. RIPTimers
uses four different kinds of timers to regulate its performance
Route update timer: routing updates are updated periodically in every
30 seconds.
Hold-down timer: Routes will enter into the hold-down state when an
update packet is received that indicated the route is unreachable.The
default is 180 seconds.
Route invalid timer: the length of time that must elapse (180 seconds)
before a router determines that a route has become invalid.
Route flush timer: the time between a route becoming invalid and its
removal from the routing table (240 seconds).
20. RIP Configuration
Use no auto-summary command to disable automatic
summarization feature
show ip protocols and show ip route commands are important for
verification and troubleshooting on any routing protocol.
show ip rip database: Lists all the routes known by RIP
debug ip rip or debug ip rip {events}:Displays RIP routing updates
as sent and received in real time
RIPv1
router rip
network Network_Address
RIPv2
router rip
version 2
network Network_Address
21. Interior Gateway Routing Protocol (IGRP)
is a dynamic class routing protocol used by autonomous
system (AS) routers running onTCP/IP hosts
overcomes RIP network limitations and supports
multiple routing metrics, including delay, bandwidth,
load and reliability
updates are broadcast every 90 seconds (by default).
Uses composite metrics
Uses multipath routing
Supports unequal-cost load balancing
the administrative distance of IGRP is 100
22. Enhanced Interior Gateway Routing Protocol (EIGRP)
owned by Cisco and operate only on their devices.
advanced distance vector routing protocol & supports link state/hybrid.
Its’s goals are to provide a loop-free routing environment and rapid
convergence.
A classless routing protocol
use a composite metric (bandwidth and delay).
Bandwidth
The bandwidth metric (1544 Kbps) is a static value used by some routing
protocols such as EIGRP and OSPF to calculate their routing metric.
Kilobits per second (Kbps).
Most serial interfaces use the default bandwidth value of 1544 Kbps or
1,544,000 bps (1.544 Mbps).
Delay
Delay is a measure of the time it takes for a packet to traverse a route.
Based on the type of link, the interface
Expressed in microseconds (millionths of a second).
R1# show interface serial 0/0/0
<output omitted>
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
23. use ReliableTransport Protocol (RTP- capable of transmitting both
multicast and unicast) updates
uses a diffusing update algorithm (DUAL) to avoid loops and send
occasional hello packets to check the status of neighbor routers
Supports discontinuous(alternating) network
Supports all layer 3 protocols (IPv4, IPX, and IPv6)
the administrative distance of EIGRP is 90
It uses neighbor table, topology table and route tables for route
discovery
EIGRP Configuration
AS_No(Autonomous System number) can be any number in the range
from 1 to 65535 both inclusive.
debug eigrp packet: displays transmission and receipt of all EIGRP
packets
router eigrp AS_No
network Network_Address | network Network_Address Wildcard mask
24. Open Shortest Path First (OSPF)
Is a Classless Interior Gateway Routing Protocol that routes IP packets
within a single routing network domain only (area)
A link state routing protocol that do not send frequent periodic updates of
the entire routing table
it sends an update only when a change in the topology occurs
(multicasting)
OSPF performs a full update every 30 seconds.
uses the SPF (Dijkstra's algorithm) to calculate the shortest connection
path. For example, a person in city A wants to travel to city M and is given
two options:
Travel via cities B and C.The route would beABCM.And the distance
(or bandwidth cost in the networking case) forA-B is 10 miles, B-C
is 5 miles and C-M is 10 miles.
Travel via city F.The route would be AFM.And the distance forA-F is
20 miles and F-M is 10 miles.
ABCM with metric of (10+5+10=25) considered as best path than
AFM (20+10=30)
.
25. OSPF uses bandwidth to determine the cost of a link.A link with
higher bandwidth results in a lower cost.The lowest cost route to a
destination is the most desirable path
AD value is 110
has unlimited hop counts
OSPF maintains a two layer hierarchy consisting of:
Backbone area(area 0)
Off backbone area
( area 1 -65, 535)
26. OSPF Configuration
router ospf process-id.
network Network_AddressWildcard_mask area 0
The process ID is chosen by the administrator and can be any
number from 1 to 65535. It is only locally significant and does not
have to match the ID of other OSPF routers.
Name Class Type AD Metric Classful/
less
Algorithm Transport type
RIPv1 Distance Vector IGP 120 Hop count Classful Bellman-Fold UDP/520
RIPv2 Distance Vector IGP 120 Hop count Classless Bellman-Fold UDP/520
IGRP Distance Vector IGP 100 Composite
(BW+DLY)
Classful Dijkstra(SPF) IP Protocol 9
EIGRP Advanced
Distance Vector
IGP 90 (internal)
170(external)
Composite
(BW+DLY)
Classless DUAL EIGRP Protocol 88
OSPF Link State IGP 110 Cost Classless Dijkstra(SPF) OSPF Protocol 89
27. Access Control List(ACL)
ACLs are lists of conditions used to test network traffic that
tries to travel across a router interface. These lists tell the
router what types of packets to accept or deny.
28. `
The router examines each packet and will forward or
discard it based on the conditions specified in theACL.
An ACL used to
filter traffic i.e.permit/deny traffic
Identify traffic i.e.include/exclude traffic
Primary reasons
Limit network traffic and increase network performance.
Provide traffic flow control.ACLs can restrict the delivery of
routing updates.
Provide a basic level of security for network access.
Decide which types of traffic are forwarded or blocked at the
router interfaces.
Like: e-mail traffic to be routed, but block allTelnet traffic.
30. How ACL work?
ACL statements operate in sequential,logical order.
If a condition match is true, the packet is permitted or denied and
the rest of the ACL statements are not checked.
If all theACL statements are unmatched, an implicit deny any
statement is placed at the end of the list by default.
Type of ACL’s
Standard ACLs
VTY ACLs
ExtendedACLs
NamedACLs
31. Standard ACLs
Syntax:
access-list [1-99] [permit | deny] [source address] [wildcard mask] [log]
Example:
Block network 172.18.0.0 from accessing the
172.16.0.0 network
32. Router(config)# access-list 10 deny 172.18.0.0 0.0.255.255
Router(config)# access-list 10 permit any
To apply this access list, we would configure the following on Router A:
Router(config)# int fa4/0
Router(config-if)# ip access-group 10 out
34. Example: block network 172.18.0.0 from accessing anything
on the 172.17.0.0 network, EXCEPT for the HTTP port on the
web server
35. RB(config)# access-list 101 permit tcp 172.18.0.0
0.0.255.255 host 172.17.0.10 eq 80
RB(config)# access-list 101 deny ip 172.18.0.0 0.0.255.255
172.17.0.0 0.0.0.3
RB(config)# access-list 101 permit ip any any
We could have identified the web server in one of two ways:
RB(config)# access-list 101 permit tcp 172.18.0.0
0.0.255.255 host 172.17.0.10 eq 80
RB(config)# access-list 101 permit tcp 172.18.0.0
0.0.255.255 172.17.0.10 0.0.0.0 eq 80
RB(config)# int fa1/0
RB(config-if)# ip access-group 101 in
36. Named ACL
Synatx: ip access-list {standard | extended} name
Apply a Named ACL to an interface in the same manner as applying a Standard or
Extended ACL.
Example:
RB(config)#ip access-list extended web-only
RB(config-ext-nacl)#permit tcp 172.18.0.0 0.0.255.255 host 172.17.0.10 eq
80
RB(config-ext-nacl)#deny ip 172.18.0.0 0.0.255.255 172.17.0.0 0.0.0.3
RB(config-ext-nacl)#permit ip any any
We could have identified the web server in one of two ways:
RB(config-ext-nacl)# permit tcp 172.18.0.0 0.0.255.255 host 172.17.0.10
eq 80
RB(config-ext-nacl)# permit tcp 172.18.0.0 0.0.255.255 172.17.0.10
0.0.0.0 eq 80
RB(config)# int fa1/0
RB(config-if)# ip access-group web-only in
38. Network Addressing Scheme
Problems with IPv4
Shortage of IPv4 addresses
Allocation of the last IPv4 addresses was for the year 2005
Address classes were replaced by usage of CIDR, but this is not sufficient
Short term solution
NAT: Network AddressTranslator
Long term solution
IPv6 = IPng (IP next generation)
Provides an extended address range
• IANA-Internet Assigned Numbers Authority
• RIR-Regional Internet Registry (5)
• ISP and End User Org.
39. NAT: Network AddressTranslator
NAT
Translates between local addresses and public ones
Many private hosts share few global addresses
Public Network
Uses public addresses
Public addresses are
globally unique
Private Network
Uses private address range
(local addresses)
Local addresses may not
be used externally
40. Types Of NAT
Static NAT
Dynamic NAT
Dynamic NAT with Overload or PAT
Static NAT –
Mapping an unregistered IP address to a registered IP
address on a one-to-one basis. Particularly useful when a
device needs to be accessible from outside the network.
the computer with the IP address of 192.168.32.10 will
always translate to 213.18.123.110.
42. NAT Addressing Terms
Inside Local
an address used for a host inside an enterprise.
actual IP address assigned to a host in the private network.
Inside Global
NAT uses an inside global address to represent the inside host as
the packet is sent through the outside network, typically the Internet.
A NAT router changes the source IP address of a packet sent
by an inside host from an inside local address to an inside
global address as the packet goes from the inside to the outside
network.
Outside Global
an address used for a host outside an enterprise, the Internet.
the actual IP address assigned to a host that resides in the outside
network, typically the Internet.
Outside Local
NAT uses an outside local address to represent the outside host
as the packet is sent through the private network.
It is outside private, outside host with a private address
43. Static NAT Configuration
Specify the inside interface:
Router(config)#interface fast eth0/0 (private side interface)
Router(config-if)# ip nat inside
Specify the outside interface:
Router(config)#interface fast ethernet0/1 (Public side interface)
Router(config-if)# ip nat outside
Enter static translation entry :
Router(config)# ip nat inside source static 192.168.0.1
206.245.160.1
To see IP address translations:
Router#show ip nat translation
44. 44
Dynamic NAT
Maps an unregistered IP address to a registered IP
address from a group of registered IP addresses.
the computer with the IP address 192.168.32.10 will
translate to the first available address in the range from
213.18.123.100 to 213.18.123.150.
46. Dynamic NAT Configuration
Specify the inside interface:
Router(config)#interface fast ethernet0/0
Router(config-if)# ip nat inside
Specify the outside interface:
Router(config)#interface serial0/0
Router(config-if)# ip nat outside
Define anAccess List to permit the inside local addresses to be
translated:
Router(config)#access-list 1 permit 10.0.0.0 0.0.0.255
Define a pool of global addresses :
Router(config)# ip nat pool DNAT1 179.2.2.65 179.2.2.90 netmask
255.255.255.224
Enter dynamic translation entry :
Router(config)# ip nat inside source list 1 pool DNAT1
47. Overloading NAT with PAT (NAPT)
Overloading - A form of dynamic NAT that maps multiple unregistered
IP addresses to a single registered IP address by using different ports.
This is known also as PAT (Port Address Translation), single address
NAT or port-level multiplexed NAT.
each computer on the private network is translated to the same IP
address (213.18.123.100), but with a different port number
assignment..
48. PAT Configuration
Set the fast eth 0/0 and se2/0 interface as the inside and outside interface:
R1# configure terminal
R1(config)# interface fastethernet0/0
R1(config-if)# ip nat inside
R1(config-if)# interface serial2/0
R1(config-if)# ip nat outside
allow the 192.168.0.0/24 network to reach any destination.
R1(config)# access-list 100 permit ip 192.168.0.0 0.0.0.255 any
enable NAT overload and bind it to the outside interface previously
selected:
R1(config)# ip nat inside source list 100 interface serial 2/0
overload