Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Name: Siddik Abu Anas

Id: 0121220521546
Subject : Advance Routing Technology
Lecturer : Dr. Shipra

1. EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary routing protocol
used for efficient routing within an autonomous system (AS). It is an advanced distance-vector
routing protocol that calculates the best path for routing based on bandwidth, delay, reliability,
and other metrics. EIGRP supports both IPv4 and IPv6 and uses the Diffusing Update Algorithm
(DUAL) for loop prevention and fast convergence.

IP subnetting:
- Fixed-Length Subnet Mask (FLSM): FLSM is a traditional subnetting technique where all
subnets within a network use the same subnet mask. It divides the IP address space into
equal-sized subnets, making it easier to configure but less flexible in terms of efficient utilization
of IP addresses.
- Variable-Length Subnet Mask (VLSM): VLSM allows subnet masks of different lengths within
the same network, which enables more efficient IP address allocation. With VLSM, you can
divide a network into subnets of varying sizes based on the number of hosts required in each
subnet.

2. Routing is the process of directing network traffic from its source to its destination across
multiple interconnected networks. It involves determining the optimal path for data packets to
travel through a network. The main types of routing are:

- Static Routing: In static routing, network administrators manually configure the routing table on
each router. The routing decisions remain unchanged unless modified explicitly by the
administrator. It is suitable for small networks with a simple and predictable network topology.
- Dynamic Routing: Dynamic routing protocols automate the process of exchanging routing
information between routers and dynamically update the routing tables based on network
changes. Routers communicate with each other to exchange routing updates and determine the
best path for forwarding packets. Dynamic routing is well-suited for large and complex networks
as it adapts to changes in network topology.

3. RIP (Routing Information Protocol) is a distance-vector routing protocol used for routing within
an autonomous system (AS). RIP has two versions: RIP version 1 (RIPv1) and RIP version 2
(RIPv2). The main differences between RIPV1 and RIPV2 are:

- RIPV1:
- Uses classful routing, meaning it does not carry subnet mask information in routing updates.
- Does not support authentication.
- Sends routing updates using broadcast, which can lead to unnecessary network traffic.

- RIPV2:
- Supports classless routing, allowing it to carry subnet mask information in routing updates.
- Supports authentication, which enhances security.
- Can send routing updates using multicast, reducing network traffic.

4. Initial router configuration for a Wide Area Network (WAN) involves setting up the router to
connect to the WAN service provider. This typically includes configuring the following
components:

- CSU (Channel Service Unit): The CSU is a device that connects the router to a digital
communication link provided by the service provider. It ensures proper electrical signaling and
line conditioning for reliable data transmission.

- DSU (Data Service Unit): The DSU is responsible for converting digital data from the router
into a format suitable for transmission over the WAN link. It handles functions such as framing,
clocking, and synchronization.

To configure the router for WAN connectivity, you need to set up the appropriate encapsulation,
serial interface settings, IP addressing, and routing protocols based on the requirements of your
WAN service provider.

5. OSPF (Open Shortest Path First) is a link-state routing protocol used to determine the best
path for routing within an autonomous system (AS). It is widely used in large networks due to its
scalability and fast convergence. OSPF operates by exchanging link-state advertisements
(LSAs) between routers to build a complete topological map of the network.

- Planning: OSPF planning involves designing the network topology, dividing it into OSPF areas
and determining the appropriate area types and inter-area routing.

- Verification: In OSPF, verification involves ensuring the correct configuration of OSPF


parameters, including area assignments, OSPF network types, authentication settings, and
summarization. Verification also includes checking the OSPF neighbor relationships and the
accuracy of the OSPF database.

- Configuration: OSPF configuration involves setting up OSPF on routers within an autonomous


system. This includes enabling OSPF, defining OSPF areas, configuring OSPF interfaces,
setting OSPF network types, and specifying OSPF authentication if required.

- Authentication: OSPF supports authentication mechanisms to secure OSPF routing updates.


Authentication ensures that only trusted routers can exchange OSPF routing information.
Common authentication methods include simple password authentication and cryptographic
authentication using MD5.
6. Dynamic routing refers to the process of automatically exchanging routing information
between routers to determine the best path for forwarding network traffic. It allows routers to
adapt to changes in the network topology, such as link failures or new connections. Some
advantages of dynamic routing are:

- Automatic network updates: Dynamic routing protocols automatically update the routing tables
when changes occur in the network, such as link failures or new routes. This eliminates the
need for manual intervention and reduces administrative overhead.

- Scalability: Dynamic routing protocols are designed to handle large and complex networks. As
the network grows, routers can dynamically exchange routing information to adapt to the
changing topology.

- Faster convergence: Dynamic routing protocols employ various algorithms to quickly converge
and find alternative paths when a link failure occurs. This helps in minimizing network downtime
and improving overall network reliability.

- Load balancing: Dynamic routing protocols support load balancing by distributing network
traffic across multiple paths. This helps in optimizing network utilization and improving
performance.

7. NAT (Network Address Translation) is a process that translates IP addresses between


different networks. It is commonly used to allow multiple devices within a private network to
share a single public IP address. NAT provides the following types:

- Static NAT: Static NAT maps a private IP address to a specific public IP address. It is typically
used when there is a one-to-one correspondence between private and public IP addresses.

- Dynamic NAT: Dynamic NAT maps private IP addresses to a pool of public IP addresses. The
mapping is dynamic, meaning that private IP addresses are assigned public IP addresses from
the pool on a first-come, first-served basis.

- PAT (Port Address Translation): PAT, also known as NAT overload, is a form of dynamic NAT
where multiple private IP addresses are translated to a single public IP address by using
different source ports. PAT allows many devices to share a single public IP address.

- NAT64: NAT64 is used in IPv6 environments to translate IPv6 addresses to IPv4 addresses
and vice versa. It enables communication between IPv6-only and IPv4-only devices.

8. OSPF (Open Shortest Path First) has already been explained in question 5. Here's a
summary of the other aspects mentioned:
- Planning: OSPF planning involves designing the network topology, dividing it into OSPF areas,
determining the area types, and planning inter-area routing.

- Verification: Verification in OSPF includes checking the configuration of OSPF parameters,


verifying OSPF neighbor relationships, and ensuring the accuracy of the OSPF database.

- Configuration: OSPF configuration involves setting up OSPF on routers, enabling OSPF,


defining OSPF areas, configuring OSPF interfaces, specifying OSPF network types, and setting
up OSPF authentication if required.

- Authentication: OSPF supports authentication mechanisms to secure OSPF routing updates.


Authentication methods such as simple password authentication and cryptographic
authentication using MD5 can be used to ensure the integrity and security of OSPF routing
information.

9. Path control refers to the ability to influence the selection of routes and traffic paths in a
network. It allows network administrators to manipulate the flow of traffic in a way that meets
specific requirements or objectives. BGP (Border Gateway Protocol) is a path control protocol
commonly used in large-scale networks, such as the internet. BGP allows network
administrators to control the flow of traffic by manipulating routing policies and determining the
best paths for data to travel between autonomous systems (ASes).

BGP provides advanced path selection mechanisms based on attributes such as path length,
AS path, next hop, and various other metrics. By manipulating these attributes, network
administrators can influence the path selection process and optimize traffic routing according to
specific criteria, such as minimizing latency, maximizing bandwidth, or balancing traffic across
multiple links.

Some common path control techniques used with BGP include route filtering, route
redistribution, route aggregation, and route manipulation through the use of BGP communities.

10. Access lists are a security feature used in routers and firewalls to control the flow of network
traffic based on specific criteria. They allow or deny traffic based on source and destination IP
addresses, protocols, port numbers, and other parameters. There are different types of access
lists:

- Standard Access List: Standard access lists filter traffic based on source IP addresses only.
They are identified by a number (1-99 or 1300-1999 in Cisco routers). For example, you can use
a standard access list to allow or deny traffic from specific source IP addresses.

- Extended Access List: Extended access lists filter traffic based on source and destination IP
addresses, protocols, and port numbers. They provide more granular control over network traffic
than standard access lists. Extended access lists are identified by a number (100-199 or
2000-2699 in Cisco routers).
- Named Access List: Named access lists are similar to extended access lists but are identified
by a user-defined name instead of a number. They provide easier management and readability
compared to numbered access lists.

- Access Class: Access classes are used for filtering traffic on asynchronous serial interfaces.
They are associated with specific access lists and apply the filtering rules to incoming or
outgoing traffic on the interface.

Access lists are configured on routers or firewalls and are applied to specific interfaces or virtual
LANs (VLANs) to control traffic flow in and out of the network. They are an essential tool for
network security and controlling network access based on specific rules and policies.

You might also like