Beruflich Dokumente
Kultur Dokumente
Sumber : https://searchnetworking.techtarget.com
RIP ROUTE UPDATING
• IF A ROUTER RECEIVES AN UPDATE ON A ROUTE,
• If it is shorter, it will update its table entry with the length and next-hop address
of the shorter path
• If it is longer, it will wait through a "hold-down" period to see if later updates
reflect the higher value as well. It will only update the table entry if the new,
longer path has been determined to be stable
Sumber : https://www.cisco.com
INTERIOR GATEWAY ROUTING PROTOCOL
(IGRP)
• INTERIOR GATEWAY ROUTING PROTOCOL (IGRP) IS CREATED BY CISCO
• TO RESPONSE THE LIMITATION HOP IN RIP (MAXIMUM HOP COUNT OF 15)
INTO MAXIMUM HOP COUNT OF UP TO 255
• IGRP SENDS A NOTIFICATION OF ANY NEW CHANGES, AND INFORMATION
ABOUT ITS STATUS, TO ITS NEIGHBORS EVERY 90 SECONDS
• IGRP MANAGES A ROUTING TABLE WITH THE MOST OPTIMAL PATH BASED
ON SEVERAL PARAMETERS
Sumber: technopedia.com
IGRP PATH PARAMETERS
• THESE PARAMETERS INCLUDE
• TOPOLOGICAL DELAY TIME
• THE NARROWEST BANDWIDTH SEGMENT OF THE PATH
• CHANNEL OCCUPANCY OF THE PATH
• RELIABILITY OF THE PATH
• TWO ADDITION PIECES OF INFORMATION ARE PASSED WITH PARAMETERS:
HOP COUNT AND MTU (MAXIMUM TRANSMISSION UNIT), THE MAXIMUM
PACKET SIZE CAN BE SENT ALONG ENTIRE PATH WITHOUT FRAGMENTATION
• A CALCULATION IS PROVIDED TO COMBINES THE EFFECT OF THE VARIOUS
METRIC COMPONENTS INTO A SINGLE NUMBER REPRESENTING THE
"GOODNESS" OF THAT PATH
Sumber: cisco.com
ENHANCEDINTERIOR GATEWAY ROUTING
PROTOCOL (EIGRP)
• RIP UTILIZES PERIODIC UPDATES TO RE-CONVERGE, AND
DISCARDS UNUSED ROUTE.
• EIGRP BUILDS A TOPOLOGY TABLE FROM EACH OF ITS
NEIGHBOR'S ADVERTISEMENTS, AND CONVERGES BY
LOOKING FOR A LIKELY LOOP-FREE ROUTE IN THE
TOPOLOGY TABLE, OR NO OTHER ROUTE
• ROUTER TWO SAVES THE INFORMATION IT RECEIVED
FROM BOTH ROUTERS ONE AND THREE
• IT CHOOSES THE PATH THROUGH ONE AS ITS BEST PATH
AND THE PATH THROUGH THREE AS A LOOP-FREE PATH (A
FEASIBLE SUCCESSOR)
• WHEN THE PATH THROUGH ROUTER ONE BECOMES
UNAVAILABLE, ROUTER TWO EXAMINES ITS TOPOLOGY
TABLE AND, FINDING A FEASIBLE SUCCESSOR, BEGINS
USING THE PATH THROUGH THREE IMMEDIATELY
Sumber: cisco.com
ROUTING LOOP
• A ROUTING LOOP IS WHEN A DATA PACKET IS CONTINUALLY ROUTED THROUGH THE SAME ROUTERS OVER AND OVER IN AN
ENDLESS CIRCLE.
• A ROUTING LOOP CAN HAVE A CATASTROPHIC IMPACT ON A NETWORK, AND IN SOME CASES, COMPLETELY DISABLING THE
NETWORK.
• NORMALLY ROUTING LOOP IS A PROBLEM ASSOCIATED WITH DISTANCE VECTOR PROTOCOLS.
• ROUTING LOOP CAN HAPPEN IN LARGE INTERNETWORKS WHEN A SECOND TOPOLOGY CHANGE EMERGES BEFORE THE
NETWORK IS ABLE TO CONVERGE ON THE FIRST CHANGE.
• CONVERGENCE IS THE TERM USED TO DESCRIBE THE CONDITION WHEN ALL ROUTERS IN AN INTERNETWORK HAVE AGREED ON A
COMMON TOPOLOGY.
• LINK STATE PROTOCOLS TEND TO CONVERGE VERY QUICKLY, WHILE DISTANCE VECTOR PROTOCOLS TEND TO CONVERGE SLOWLY.
• METHODS ARE USED TO AVOID ROUTING LOOPS INCLUDE
• Maximum hop count mechanism
• A split horizon is a routing configuration that stops a route from being advertised back in the direction from which it came.
• Route Poisoning. When a router detects that one of its connected routes has failed, the router will poison the route by assigning an
infinite metric to it.
• Hold-down timer prevent bsad routes from being restored and propagated by mistake. When a route is placed in a hold-down state,
routers will neither advertise the route nor accept advertisements about it for a specific interval called the hold-down period.
EIGRP
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP) IS A CISCO
PROPRIETARY
EIGRP IS BASED ON IGRP, HENCE THE CONFIGURATION IS SIMILAR.
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP) IS CONSIDERED AS A
HYBRID ROUTING PROTOCOL BECAUSE EIGRP HAS CHARACTERISTICS OF BOTH
DISTANCE VECTOR AND LINK STATE ROUTING PROTOCOLS.
BOTH EIGRP AND IGRP OFFER LOAD BALANCING ACROSS SIX PATHS (EQUAL OR
UNEQUAL), AND THEY HAVE SIMILAR METRIC STRUCTURES.
EIGRP HAS FASTER CONVERGENCE, AND HAS LESS NETWORK OVERHEAD, SINCE IT
USES INCREMENTAL UPDATES.
ANOTHER IMPORTANT FEATURES OF ENHANCED INTERIOR GATEWAY ROUTING
PROTOCOL (EIGRP) ARE ROUTING LOOP-FREE TOPOLOGY
Sumber: cisco.com
TERMS RELATED TO EIRGP
• DUAL stands for Diffused Update Algorithm, the algorithm used by Enhanced Interior
Gateway Routing Protocol (EIGRP) to calculate the shortest path.
• NEIGHBOR TABLE contains a list of the EIGRP neighbours. Each routed protocol for EIGRP
has its own neighbour table.
• TOPOLOGY TABLE contains a list of all destinations and paths the EIGRP router learned.
There is a separate topology table for each routed protocol.
• SUCCESSOR is the best path to reach a destination within the topology table.
• FEASIBLE SUCCESSOR is the best backup path to reach a destination
• ROUTING TABLE contains all of the successor routes from the topology table. There is a
separate routing table for each routed protocol.
• is the distance (metric) that a neighbouring router is advertising for a specific route.
ADVERTISED DISTANCE
• FEASIBLE DISTANCE is the distance (metric) that your router will use to reach a specific
route.
EIGRP
• TO DISTRIBUTE ROUTING INFORMATION THROUGHOUT A NETWORK, EIGRP USES
NON-PERIODIC INCREMENTAL ROUTING UPDATES (EIGRP ONLY SENDS ROUTING
UPDATES ABOUT PATHS THAT HAVE CHANGED )
• THE BASIC PROBLEM WITH SENDING ONLY ROUTING UPDATES IS THAT ROUTER
MAY NOT KNOW WHEN A PATH THROUGH A NEIGHBORING ROUTER IS NO LONGER
AVAILABLE.
• ROUTER CAN NOT TIME OUT ROUTES, EXPECTING TO RECEIVE A NEW ROUTING
TABLE FROM YOUR NEIGHBORS
• EIGRP RELIES ON NEIGHBOR RELATIONSHIPS TO RELIABLY PROPAGATE ROUTING
TABLE CHANGES THROUGHOUT THE NETWORK
• TWO ROUTERS BECOME NEIGHBORS WHEN THEY SEE EACH OTHER'S HELLO
PACKETS ON A COMMON NETWORK
Sumber: cisco.com
EIGRP NEIGHBOR DISCOVERY AND MAINTENANCE
• EIGRP SENDS HELLO PACKETS EVERY 5 SECONDS ON HIGH BANDWIDTH LINKS AND EVERY
60 SECONDS ON LOW BANDWIDTH MULTIPOINT LINKS.
• 5-SECOND HELLO:
• broadcast media, such as Ethernet, Token Ring, and FDDI
• point-to-point serial links, such as PPP or HDLC leased circuits, Frame Relay point-to-
point subinterfaces, and ATM point-to-point subinterface
• high bandwidth (greater than T1) multipoint circuits, such as ISDN PRI and Frame
Relay
• 60-SECOND HELLO:
• multipoint circuits T1 bandwidth or slower, such as Frame Relay multipoint interfaces,
ATM multipoint interfaces, ATM switched virtual circuits, and ISDN BRIs
• THE RATE AT WHICH EIGRP SENDS HELLO PACKETS IS CALLED THE HELLO INTERVAL, AND
CAN BE ADJUSTED
Sumber: cisco.com
EIGRP TOPOLOGY TABLE
THE TOPOLOGY TABLE CONTAINS THE INFORMATION NEEDED TO BUILD A SET OF
DISTANCES AND VECTORS TO EACH REACHABLE NETWORK, INCLUDING:
• lowest bandwidth on the path to this destination as reported by the upstream
neighbor
• total delay
• path reliability
• path loading
• minimum path maximum transmission unit (MTU)
• feasible distance
• reported distance
• route source (external routes are marked)
Sumber: cisco.com
LINK STATE ROUTING
• LINK STATE ROUTING PROTOCOL MAINTAINS COMPLETE ROAD MAP OF THE NETWORK IN
EACH ROUTER
• EACH ROUTER ORIGINATES INFORMATION ABOUT THE ROUTER, ITS CONNECTED LINKS, AND
THE STATE OF THOSE LINKS.
• THIS INFORMATION IS SENT TO ALL THE ROUTERS IN THE NETWORK AS MULTICAST
MESSAGES.
• AFTER OBTAINING THE COMPLETE PICTURE OF NETWORK TOPOLOGY, EACH ROUTER WILL
INDEPENDENTLY CALCULATE ITS OWN BEST PATHS TO REACH THE DESTINATION NETWORKS.
• LINK-STATE ROUTING ALWAYS TRY TO MAINTAIN FULL NETWORKS TOPOLOGY BY UPDATING
ITSELF WHENEVER A CHANGE HAPPEN IN NETWORK.
• WHENEVER A LINK'S STATE CHANGES, A LINK-STATE ADVERTISEMENT (LSA) IS EXCHANGED
BETWEEN ROUTERS.
• WHEN A ROUTER RECEIVES AN LSA ROUTING UPDATE, THE LINK-STATE ALGORITHM IS USED
TO RECALCULATE THE SHORTEST PATH TO AFFECTED DESTINATIONS.
LINK STATE ROUTING
• LINK-STATE ADVERTISEMENT (LSA) – A LINK-STATE ADVERTISEMENT (LSA) IS A SMALL
PACKET OF ROUTING INFORMATION THAT IS SENT BETWEEN ROUTERS.
• TOPOLOGICAL DATABASE – A TOPOLOGICAL DATABASE IS A COLLECTION OF
INFORMATION GATHERED FROM LSAS.
• LINK STATE ROUTING PROTOCOLS CONVERGE MORE QUICKLY AND THEY ARE LESS
PRONE TO ROUTING LOOPS THAN DISTANCE VECTOR ROUTING PROTOCOLS
(ADVANTAGE)
• LINK STATE ROUTING PROTOCOLS REQUIRE MORE CPU POWER AND MEMORY THAN
DISTANCE VECTOR ROUTING PROTOCOL ALGORITHMS (DISADVANTAGE)
• LINK STATE PROTOCOLS USE A HIERARCHICAL STRUCTURE THAT LIMITS THE DISTANCE
THAT A LINK-STATE ADVERTISEMENT (LSA) NEED TO TRAVEL.
• LINK-STATE ALGORITHMS CAN BE MORE COMPLEX AND EXPENSIVE TO IMPLEMENT
AND SUPPORT.
OPEN SHORTEST PATH FIRST (OSPF) AREA
• OSPF OPERATES WITHIN A SINGLE AUTONOMOUS SYSTEM (AS)
• NETWORKS WITHIN THE SINGLE AS CAN BE DIVIDED INTO A NUMBER OF AREA
• BY DEFAULT, AREA 0 IS CREATED. AREA 0 CAN EITHER FUNCTION ALONE OR
ACT AS THE OSPF BACKBONE FOR A LARGER NUMBER OF AREAS
• EACH OSPF AREA IS NAMED USING A 32-BIT IDENTIFIER WHICH IN MOST
CASES IS WRITTEN IN THE SAME DOTTED-DECIMAL NOTATION AS AN IP4
ADDRESS. FOR EXAMPLE, AREA 0 IS USUALLY WRITTEN AS 0.0.0.0
• THE TOPOLOGY OF AN AREA IS MAINTAINED IN ITS OWN LINK STATE DATABASE
AND IS HIDDEN FROM OTHER AREAS, WHICH REDUCES THE AMOUNT OF
TRAFFIC ROUTING REQUIRED BY OSPF
• THE TOPOLOGY IS THEN SHARED IN A SUMMARIZED FORM BETWEEN AREAS
BY A CONNECTING ROUTER
OSPF ADVANTAGES
• OSPF USES IP MULTICAST TO SEND LINK-STATE UPDATES
• UPDATES ARE ONLY SENT IN CASE ROUTING CHANGES OCCUR INSTEAD OF
PERIODICALLY (BETTER USE OF BANDWIDTH)
• OSPF HAS BETTER CONVERGENCE THAN RIP BECAUSE ROUTING CHANGES
ARE PROPAGATED INSTANTANEOUSLY AND NOT PERIODICALLY
• OSPF ALLOWS FOR THE TRANSFER AND TAGGING OF EXTERNAL ROUTES
INJECTED INTO AN AUTONOMOUS SYSTEM
• THIS KEEPS TRACK OF EXTERNAL ROUTES INJECTED BY EXTERIOR PROTOCOLS
SUCH AS BGP.
OSPF ALGORITHM
• Upon initialization or due to any change in routing information, a
router generates a link-state advertisement (LSA) representing the
collection of all link-states on that router.
• All routers exchange link-states by means of flooding
• Each router that receives a link-state update should store a copy in
its link-state database and then propagate the update to other
routers.
• After the database of each router is completed, the router
calculates a Shortest Path Tree to all destinations.
• The router uses the Djikstra algorithm in order to calculate the
shortest path tree.
• The IP routing table is formed in destinations, the associated cost
and the next hop
• In case no changes in the OSPF network occur, OSPF should be very
quiet
• The algorithm places each router at the root of a tree and
calculates the shortest path to each destination
• Each router will have its own view of the topology even though the
same link-state database.
OSPF COST
• THE COST (ALSO CALLED METRIC) IS AN INDICATION OF THE OVERHEAD
REQUIRED TO SEND PACKETS ACROSS A CERTAIN INTERFACE
• THE COST OF AN INTERFACE IS INVERSELY PROPORTIONAL TO THE
BANDWIDTH OF THAT INTERFACE
• A HIGHER BANDWIDTH INDICATES A LOWER COST
“THERE IS MORE OVERHEAD (HIGHER COST) AND TIME DELAYS
INVOLVED IN CROSSING A 56K SERIAL LINE THAN CROSSING A 10M
ETHERNET LINE”
• BY DEFAULT THE FORMULA USED TO CALCULATE THE COST IS:
COST = 100.000.000/BANDWIDTH (in bps)
OSPF TREE
• TO BUILD THE SHORTEST PATH TREE FOR RTA, RTA MUST BE THE network diagram with the indicated
ROOT OF THE TREE interface costs
• CALCULATE THE SMALLEST COST FOR EACH DESTINATION.
• NOTE THE DIRECTION OF THE ARROWS WHEN CALCULATING THE
COST
• FOR EXAMPLE, THE COST OF RTB'S INTERFACE TO NETWORK
128.213.0.0 IS NOT RELEVANT WHEN CALCULATING THE COST TO
192.213.11.0
• RTA CAN REACH 192.213.11.0 VIA RTB WITH A COST OF 15 (10+5).
• RTA CAN ALSO REACH 222.211.10.0 VIA RTC WITH A COST OF 20
(10+10) OR VIA RTB WITH A COST OF 20 (10+5+5)
• IN CASE EQUAL COST PATHS EXIST TO THE SAME DESTINATION,
CISCO'S IMPLEMENTATION OF OSPF WILL KEEP TRACK OF UP TO SIX
NEXT HOPS TO THE SAME DESTINATION.
• AFTER THE ROUTER BUILDS THE SHORTEST PATH TREE, IT WILL START
BUILDING THE ROUTING TABLE ACCORDINGLY
• DIRECTLY CONNECTED NETWORKS WILL BE REACHED VIA A METRIC
(COST) OF 0 AND OTHER NETWORKS WILL BE REACHED ACCORDING
TO THE COST CALCULATED IN THE TREE.
• OSPF USES FLOODING TO EXCHANGE LINK-STATE UPDATES BETWEEN
ROUTERS.
• POINT-TO-POINT CIRCUITS
• MULTIACCESS CIRCUITS
IS IS ON POINT TO POINT
A point-to-point circuit has exactly two ISS on the circuit
An IS forms a single adjacency to the other IS on the point-to-point circuit
The adjacency type describes what level(s) are supported on that circuit.
If both ISS support level 1 on that circuit and the ISS are configured with at least one
matching address, the adjacency supports level 1.
Level-1 LSPs and SNPs will be sent on that circuit.
If both ISS support level 2 on that circuit, the adjacency supports level 2
Level-2 LSPs and SNPs will be sent on that circuit
The adjacency then can be level 1, level 2, or level 1 and 2
IS IS ON POINT TO POINT
ISSs send point-to-point IIHs on point-to-point circuits
IIHs allow each IS to discover the identity of the neighbor, the configured area address(es),
and the supported levels
When an adjacency is first established, each IS sends a set of CSNPs for each level that is
supported on the circuit.
A CSNP set describes the current contents of the LSPDB at that level.
By comparing the contents of the set of received CSNPs with the contents of the local
LSPDB, each IS can determine where the databases differ and initiate procedures to
exchange the necessary LSPs so that the databases are efficiently and reliably synchronized.
PSNPs are sent to acknowledge the receipt of an updated LSP
IS IS ON MULTIACCESS
Multiaccess circuits support multiple ISs; for example, two or more operating
on the circuit
An IS that supports level 1 on a multiaccess circuit sends level-1 IIHs on the
circuit
An IS that supports level 2 on a multiaccess circuit sends level-2 IIHs on the
circuit
ISs form separate adjacencies for each level with neighbor ISs on the circuit
An IS will form a level-1 adjacency with other ISs that support level 1 on the
circuit and will have a matching area address
It is a misconfiguration to have two ISs with disjoint sets of area addresses
supporting level 1 on the same multiaccess circuit
An IS will form a level-2 adjacency with other ISs that support level 2 on the
circuit.
The devices in the IS-IS network topology perform level 1, level 2, or level 1
and 2 routing along the backbone of the network.
IS-IS OVERVIEW IN LSPDB SYNCHRONIZATION
Proper operation of IS-IS requires a reliable and efficient process to synchronize the LSPDBs
on each IS
In IS-IS this process is called the update process
The update process operates independently at each supported level
LSPs may be locally generated, in which case they always are new LSPs.
LSPs may also be received from a neighbor on a circuit, in which case they may be generated
by some other IS or may be a copy of an LSP generated by the local IS.
Received LSPs may be older, the same age, or newer than the current contents of
the local LSPDB
IS-IS HANDLING NEW LSP
A newer LSP is added to the local LSPDB
If an older copy of the same LSP currently exists in the LSPDB, it is replaced
The newer LSP is marked to be sent on all circuits on which the IS currently has
an adjacency
On point-to-point circuits, the newer LSP will be flooded periodically until the
neighbor acknowledges by sending a PSNP or an LSP that is the same or newer
than the LSP being flooded.
On multiaccess circuits, the IS will flood the newer LSP once.
IS-IS HANDLING NEW LSP
The IS examines the set of CNSPs that are sent periodically by DIS
If the local LSPDB contains one or more LSPs that are newer than what is
described in the CSNP set, those LSPs are reflooded over the multiaccess
circuit.
If the local LSPDB contains one or more LSPs that are older than what is
described in the CSNP set, a PSNP is sent on the multiaccess circuit with
descriptions of the LSPs that require updating.
The DIS for the multiaccess circuit responds by sending the requested LSPs.
IS-IS HANDLING OLDER LSP
An IS may receive an LSP that is older than the copy in the local LSPDB.
An IS may receive an SNP (complete or partial) that describes an LSP that is
older than the copy in the local LSPDB.
In both cases the IS marks the LSP in the local database to be flooded on the
circuit on which the older LSP or SNP that contained the older LSP was received.
At this point, the actions taken are identical to the actions that are described in
the “handling of newer LSPs” section after a new LSP has been added to the
local database.
IS-IS HANDLING THE SAME LSP
On a point-to-point circuit, receipt of such an LSP is ignored.
Periodic transmission of a CSNP set by the DIS for that circuit will serve as
an implicit acknowledgement to the sender that the LSP has been
received.
In a multiaccess circuit, receipt of such an LSP is ignored.
Periodic transmission of a CSNP set by the DIS for that circuit will serve as
an implicit acknowledgement to the sender that the LSP has been
received.
IS-IS CONFIGURATION
The figure below shows how the LSPs are used
to create a network map.
Imagine the network topology as a jigsaw
puzzle.
Each LSP (representing an IS) is considered one
of the jigsaw pieces.
IS-IS SHORTEST PATH CALCULATION
When the contents of the LSPDB change, each IS independently reruns a shortest path
calculation.
The algorithm is based on Dijkstra algorithm for finding the shortest paths along a directed
graph
A two-way connectivity check is performed before considering a link between two ISs as part of
the graph.
This prevents the use of stale information in the LSPDB, for example, when one IS is no longer
operating in the network but did not purge the set of LSPs that it generated before ceasing
operation.
The output of the SPF is a set of tuples (destination, next hop).
IS-IS SHORTEST PATH CALCULATION
The destinations are protocol-specific; for example, they would be prefixes when the supported
protocol is IP, NSAPs offend systems when the supported protocol is CLNP.
Multiple equal-cost paths are supported, in which case multiple next hops would be associated
with the same destination.
Independent SFPs are performed for each level supported by the IS.
In cases in which the same destination is reachable by both level-1 and level-2 paths, the level-
1 path is preferred.
A level-2 IS that indicates that it has one or more level-2 neighbors in other areas may be used
by level-1 devices in the same area as the path of last resort, also called the default route.
The level-2 IS indicates its attachment to other areas by setting an attached bit (ATT) in its level-
1 LSP 0.