Professional Documents
Culture Documents
Advance Data Communication and Networking: Mohammed A. Saleh Instructor
Advance Data Communication and Networking: Mohammed A. Saleh Instructor
Communication
and Networking
Mohammed A. Saleh
Instructor
3
21/05/17 Network Admin and Security
Routing Basics
To be able to route packets to the
right destination logical addresses
(IP addresses) need to be configured
to all hosts in a an internetwork
Routing refers to taking a packet from one
device and sending it through the network
to another device on a different network
NOTE: If your network has no routers,
then it should be apparent that you
are not routing
5
21/05/17 Network Admin and Security
Simple Routing Example
6
21/05/17 Network Admin and Security
Cont
Which interface Lab_A will use to forward
an IP datagram to a host with an IP
address of 10.10.10.10?
Based on the below output, which interface
will a packet with a destination address
of 10.10.10.14 be forwarded from?
7
21/05/17 Network Admin and Security
The IP Routing Process
What happens when Host_A wants to
communicate with Host_B on a
different network.
8
21/05/17 Network Admin and Security
Cont
1. ICMP send an ECHO request to host B
2. ICMP is then encapsulated in IP to create a
packet
SRC IP
DST IP
Protocol field
3. IP determines whether DST IP is local or remote
4. If remote then it will have to go through a
default gateway
5. For host A to send to the default gateway host A
needs to know the MAC address of E0
6. Host A will check in its ARP cache, if it is not
available, ARP broadcast will be sent
7. ARP unicast will be a response and then the
packet will be sent
9
21/05/17 Network Admin and Security
Cont
Host_A uses to get to Host_B is the
Lab_A E0 interface
Hardware addresses are always local,
and they never pass a routers
interface.
10
21/05/17 Network Admin and Security
Test Your Routing
Understanding
Figure below shows a LAN connected to
RouterA, which is, in turn, connected via
a WAN link to RouterB. RouterB has a LAN
connected with an HTTP server attached.
Host A would like to communicate with the
HTTP server.
11
21/05/17 Network Admin and Security
Cont
A slightly different example. See the
figure below: Host A would like to
communicate with the HTTPS server.
12
21/05/17 Network Admin and Security
Understanding ICMP
What will happen if the LAN interface of
Lab_C goes down?
13
21/05/17 Network Admin and Security
Cont
Another example, Corporate routers
routing table:
Suppose that the corporate router received
an IP packet with a source IP address of
192.168.214.20 and a destination address
of 192.168.22.3, what do you think the
Corp router will do with this packet?
14
21/05/17 Network Admin and Security
Frames and Packets in
Detail
15
21/05/17 Network Admin and Security
Cont
1. In order to begin communicating with the Sales
server, Host 4 sends out an ARP request. How will
the devices exhibited in the topology respond to
this request?
2. Host 4 has received an ARP reply. Host 4 will now
build a packet, then place this packet in the frame.
What information will be placed in the header of the
packet that leaves Host 4 if Host 4 is going to
communicate to the Sales server?
3. At last, the Lab_A router has received the packet
and will send it out Fa0/0 onto the LAN toward the
server. What will the frame have in the header as
the source and destination addresses?
4. Host 4 is displaying two web documents from the
Sales server in two browser windows at the same
time. How did the data find its way to the correct
browser windows?
16
21/05/17 Network Admin and Security
Testing Basic Routing
Host 4 needs Knowledge
to get email. Which address will
be placed in the destination address field of
the frame when it leaves Host 4? And What
will be the source MAC address when the frame
is received at the email server?
17
21/05/17 Network Admin and Security
Configuring IP Routing
18
21/05/17 Network Admin and Security
Configuring IP Routing
How does a router send packets to remote
networks?
Our configured routers only have
information about directly connected
networks in each routing table
whats best for one network isnt
necessarily whats best for another
Types of routing:
Static
Default
Dynamic
19
21/05/17 Network Admin and Security
Static Routing
Occurs when you manually add routes in each routers
routing table
Benefits:
There is no overhead on the router CPU, which means you
could possibly buy a cheaper router than you would use if
you were using dynamic routing.
There is no bandwidth usage between routers, which means
you could possibly save money on WAN links.
It adds security because the administrator can choose to
allow routing access to certain networks only.
Disadvantages:
The administrator must really understand the internetwork
and how each router is connected in order to configure
routes correctly.
If a network is added to the internetwork, the
administrator has to add a route to it on all routersby
hand.
20
21/05/17 Network Admin and Security
Cont
Its not feasible in large networks because
maintaining it would be a full-time job in
itself.
Router configurations:
Example:
21
21/05/17 Network Admin and Security
Corp Router
For the Corp router to be able to route to
all networks, the following routes need to
be configured to its routing table:
192.168.10.0
192.168.20.0
192.168.30.0
192.168.40.0
172.16.10.0
Router configurations:
22
21/05/17 Network Admin and Security
Default Routing
R2 and R3 connected to Corp router are
considered stub routers
A stub indicates that the networks in this design
have only one way out to reach all other networks
It used to send packets with a remote
destination network not in the routing table to
the next-hop router
Only use default routing on stub networks
Those with only one exit path out of the network
To configure a default route, you use wildcards
in both the network address and mask locations
of a static route
Think of a default route as a static route that
uses wildcards instead of network and mask
information
23
21/05/17 Network Admin and Security
Cont
25
21/05/17 Network Admin and Security
Cont
26
21/05/17 Network Admin and Security
Dynamic Routing
What is dynamic routing?
When protocols are used to find networks and
update routing tables on routers
Easier than using static or default
routing but costly in terms of router CPU
processing and bandwidth on the network
links
Two types of routing protocols
IGPs: used to exchange routing information with
routers in the same autonomous system (AS)
An AS is a collection of networks under a
common administrative domain
EGPs: used to communicate between ASes
Example of EGP is Border Gateway Protocol (BGP)
27
21/05/17 Network Admin and Security
Routing Protocol Basics
Administrative Distances
The AD is used to rate the trustworthiness of
routing information received on a router from
a neighbor router
An AD is an integer from 0 to 255
0 is the most trusted and 255 means no traffic
will be passed via this route.
What if both advertised routes to the same
network have the same AD?
Hop count and bandwidth lines (metrics)
What if both advertised routes to the same
network have the same AD and the same metrics?
Load-balancing
28
21/05/17 Network Admin and Security
Cont
Default ADs
30
21/05/17 Network Admin and Security
Cont
Link-state protocols send updates containing
the state of their own links to all other
directly connected routers on the network,
which is then propagated to their neighbors
Example is Open Short Path First (OSPF)
3. Hybrid
Hybrid protocols use aspects of both distance
vector and link statefor example, EIGRP.
32
21/05/17 Network Admin and Security
Distance-Vector RP
Passes complete routing table contents to
neighboring routers
They then combine the received routing table entries
with their own routing tables to complete the routers
routing table
This is know as routing by rumor
Its possible to have a network that has
multiple links to the same remote network
AD checked
Metrics checked of AD is the same
RIP uses only hop count to determine the best
path to a network
If RIP finds more than one link with the same
hop count to the same remote network, it will
automatically perform a round-robin load
balancing
33
21/05/17 Network Admin and Security
Cont
RIP can perform load balancing for up to
six equal-cost links (four by default)
Problem
Two links to a remote network are different
bandwidths but the same hop count
Pinhole congestion
34
21/05/17 Network Admin and Security
Cont
What distance-vector routing does when it
starts up
35
21/05/17 Network Admin and Security
Cont
Converged routing tables
37
21/05/17 Network Admin and Security
Routing Loops
D-V RP keep track of any changes to the
internetwork by broadcasting periodic
routing updates out all active interfaces
This broadcast includes the complete routing
table
Expensive in terms of CPU processing and link
bandwidth
D-V RP have slow convergence
So how do routing loops occur?
Occur due to the fact each router isnt updated
simultaneously
38
21/05/17 Network Admin and Security
Routing Loop Example
44
21/05/17 Network Admin and Security
Cont
R1 router
45
21/05/17 Network Admin and Security
Verifying RIP Routing
Corp router
Tables
46
21/05/17 Network Admin and Security
Cont
R2 router
47
21/05/17 Network Admin and Security
Cont
Remember that each time a router sends out
an update to a neighbor router, it
increments the hop count by one for each
route.
48
21/05/17 Network Admin and Security
Holding Down RIP
You
Propagations
probably dont want your RIP
network
advertised everywhere on your LAN and WAN
The easiest way of stopping unwanted RIP
updates from propagating across the
network is by using the passive interface
command
The command prevents RIP update broadcasts from
being sent out a specified interface, yet that
same interface can still receive RIP updates
49
21/05/17 Network Admin and Security
Should RIP really be
Scenario
used?
You have been hired as a consultant to
install a couple of Cisco routers into a
growing network. They have a couple of old
Unix routers that they want to keep in the
network. These routers do not support any
routing protocol except RIP. I guess this
means you just have to run RIP on the entire
network.
50
21/05/17 Network Admin and Security
RIPv2
Similarities
Same as RIP version 1
Both RIPv1 and RIPv2 are distance-vector
protocols
Means that each router running RIP sends its
complete routing table out all active
interfaces at periodic time intervals
Timers and loop-avoidance schemes are the
same in both RIP versions
Both RIPv1 and RIPv2 are configured using
classful addressing
Both have the same administrative distance
(120).
51
21/05/17 Network Admin and Security
Cont
Differences
RIPv2 more scalable than RIPv1
RIPv2, unlike RIPv1, is a classless routing
protocol
it sends subnet mask information along with the
route updates
RIPv2 can support Variable Length Subnet
Masks (VLSMs) as well as the summarization
of network boundaries
May cause more harm than good at times in our
current network designs
RIPv2 can support discontiguous networking
52
21/05/17 Network Admin and Security
Enabling RIPv2 on the
Internetwork
53
21/05/17 Network Admin and Security
Cont
54
21/05/17 Network Admin and Security
Cont
55
21/05/17 Network Admin and Security
EIGRP
It is a proprietary Cisco protocol that runs on
Cisco routers
It is a classless
It includes the subnet mask in its route updates because
it is considered classless
Enhanced distance-vector protocol that uses the
concept of an autonomous system to describe the
set of contiguous routers that run the same
routing protocol and share routing information
Sometimes referred to as a hybrid routing
protocol
It has characteristics of both distance-vector and link-
state protocols
Sends updates containing information about networks plus
the cost of reaching them from the perspective of the
advertising router
56
21/05/17 Network Admin and Security
Cont
It synchronizes routing tables between neighbors
at startup and then sends specific updates only
when topology changes occur
EIGRP has a maximum hop count of 255
Does this mean EIGRP uses hop count as a metric?
Powerful features of EIGRP are:
Support for IP and IPv6 (and some other useless
routed protocols) via protocol-dependent modules
Considered classless (same as RIPv2 and OSPF)
Support for VLSM/CIDR
Support for summaries and discontiguous networks
Efficient neighbor discovery
Communication via Reliable Transport Protocol
(RTP) Best path selection via Diffusing Update
Algorithm (DUAL)
57
21/05/17 Network Admin and Security
Cont
Protocol Dependant Modules
It provides routing support for multiple
Network layer protocols:
IP, IPX, AppleTalk, and now IPv6
Each EIGRP PDM will maintain a separate
series of tables containing the routing
information that applies to a specific
protocol
there will be IP/EIGRP routing tables and
IPv6/EIGRP routing tables
58
21/05/17 Network Admin and Security
Neighbour Discovery
Before EIGRP routers are willing to
exchange routes with each other, they must
become neighbors
There are three conditions that must be
met for neighborship establishment:
Hellos received
Hello messages to establish neighborship (also called
adjacency)
AS numbers match
EIGRP routers that belong to different autonomous
systems (ASs) dont automatically share routing
information and they dont become neighbors
59
21/05/17 Network Admin and Security
EIGRP Terminologies
Feasible Distance (FD): This is the best
metric among all paths to a remote network.
The route with the lowest FD is the route that you
will find in the routing table because it is
considered the best path
FD = AD + metric to the neighbor reporting the
route
Reported/advertised distance (AD): This is
the metric of a remote network, as reported
by a neighbor
Neighbor Table: Each router keeps state
information about adjacent neighbors.
Newly discovered neighbor address and interface are
learned and recorded
Held in the neighbor table, stored in RAM
60
21/05/17 Network Admin and Security
Cont
Topology table: populated by the protocol-
dependent modules and acted upon by the
Diffusing Update Algorithm (DUAL)
contains all destinations advertised by
neighboring routers
holding each destination address and a list of
neighbors that have advertised the destination
Feasible successor: a path whose advertised
distance is less than the feasible distance
of the current successor
Considered a backup route
EIGRP will keep up to 16 feasible successors in
the topology table
Only the one with the best metric (the successor)
is copied and placed in the routing table
61
21/05/17 Network Admin and Security
Cont
Successor: A successor route is the best
route to a remote network
used by EIGRP to forward traffic to a
destination and is stored in the routing table
It is backed up by a feasible successor route
that is stored in the topology table
By using the successor, and having
feasible successors in the topology table
as backup links, the network can converge
instantly, and updates to any neighbor
make up the only traffic sent from EIGRP.
62
21/05/17 Network Admin and Security
Reliable Transport
Protocol (RTP)
This is a proprietary protocol used by EIGRP
Manages the communication of messages between EIGRP-
speaking routers
Reliability is a key concern of this protocol.
Cisco has designed a mechanism that leverages
multicasts and unicasts to deliver updates quickly
and to track the receipt of the data
When EIGRP sends multicast traffic, it uses
the Class D address 224.0.0.10
For each multicast it sends out, it maintains a list
of the neighbors who have replied
If EIGRP doesnt get a reply from a neighbor, it
will switch to using unicasts to resend the same
data
If it still doesnt get a reply after 16 unicast
attempts, the neighbor is declared dead
63
21/05/17 Network Admin and Security
Cont
How do EIGRP routers keep track of
information?
sequence numbers are assigned to each packet
its possible for them to detect the arrival of
old, redundant, or out-of-sequence information.
It depends upon its ability to synchronize
routing databases at startup time and then
maintain the consistency of databases over
time by communicating only changes
64
21/05/17 Network Admin and Security
Diffusing Update
It is
Algorithm (DUAL)
used to select and maintain the
best
path to each remote network
This algorithm allows for the following:
Backup route determination if one is available
Support of VLSMs
Dynamic route recoveries
Queries for an alternate route if no feasible
successor route can be found
DUAL provides EIGRP with possibly the
fastest route convergence time among all
protocols.
key to EIGRPs speedy convergence
65
21/05/17 Network Admin and Security
Cont
What is the key to EIGRPs speedy
convergence?
EIGRP routers maintain a copy of all of their
neighbors routes
If local topology table does not have good
alternative routes, EIGRP routers very quickly
ask their neighbors for help finding one
How everything fits in:
Hello protocol is to enable the rapid detection
of new or dead neighbors
RTP answers this call by providing a reliable
mechanism for conveying and sequencing update,
query, and query response messages
DUAL is responsible for selecting and
maintaining information about the best paths.
66
21/05/17 Network Admin and Security
Using EIGRP to Support
Features: Large Networks
Multiple ASs on a single router
EIGRP uses AS numbers to identify the collection of
routers that share route information.
Networks with different ASs take time to converge
How would you mitigate the impact of managing
really big networks?
Divide the network into multiple distinct EIGRP
autonomous systems
Each AS is populated by a contiguous series of
routers
Route information can be shared among the different
ASs via redistribution.
Internal EIGRP vs External EIGRP
AD differences
Manual redistribution
67
21/05/17 Network Admin and Security
Cont
VLSM Support and Summarization
It supports the use of Variable Length Subnet
Masks
Since subnet mask is propagated with every
route update, EIGRP also supports the use of
discontiguous subnets
Its one internetwork that has two or more
subnetworks of a classful network connected
together by different classful networks
68
21/05/17 Network Admin and Security
Cont
EIGRP Route-Summarization
69
21/05/17 Network Admin and Security
Cont
Route Discovery and Maintenance
It supports the concept of neighbors that are
discovered via a Hello process and whose states
are monitored
uses the routing-by-rumor mechanism
Uses a series of tables to store important
information about its environment:
1. Neighborship table: records information about
routers with whom neighborship relationships
have been formed.
2. Topology table: stores the route advertisements
received from each neighbor about every route
in the internetwork.
3. Route table: stores the routes that are
currently used to make routing decisions
70
21/05/17 Network Admin and Security
EIGRP Benefits
Faster convergence due to no hold down
timers
Uses less bandwidth on the network due to
no periodic updates
Backup routes (FS) can be installed using
DUAL and the topology table
Can support IP, IPX and Apple Talk
Supports VLSM and CIDR (subnet mask info
included in the protocol)
Capable of unequal cost load balancing
(Equal is on by default)
71
21/05/17 Network Admin and Security
EIGRP Defaults
Routers running EIGRP need to have the
same process ID# to form adjacencies or
neighbor relations
Equal Cost Load Balancing is on by
default. Unequal cost is configurable
Auto Summarization is on by default
72
21/05/17 Network Admin and Security
Configuring EIGRP
Basic Configuration Commands
R1(config)#router eigrp 1
process ID#, Autonomous System Number (AS#)
R1(config-router)#network 172.16.1.0 0.0.0.255
(255.255.255.0)
R1(config-router)#network 192.168.1.4 0.0.0.3
(255.255.255.252)
Wildcard bits (opposite of the subnet mask)
in binary just flip the subnet masks 1s and 0s
R1(config-router)#network 172.16.0.0
If no mask is included a classful mask is assumed
R1(config-router)#no auto-summary
auto-summary is on by default
R1(config-router)#redistribute static
used to advertise default static routes
73
21/05/17 Network Admin and Security
EIGRP Configurations
74
21/05/17 Network Admin and Security
Configuring
Discontiguous Networks
75
21/05/17 Network Admin and Security
Verifying EIGRP
EIGRP troubleshooting commands
76
21/05/17 Network Admin and Security
Open Shortest Path
First (OSPF)
Open standard routing protocol
What if you have you have multiple routers
and not all of them are Cisco?
Options are RIP, RIPv2 and OSPF
Uses the Dijkstra algorithm
First, a shortest path tree is constructed, and
then the routing table is populated with the
resulting best paths
Features:
Consists of areas and autonomous systems
Minimizes routing update traffic
Allows scalability
Supports VLSM/CIDR
Has unlimited hop count
Allows multi-vendor deployment (open standard)
77
21/05/17 Network Admin and Security
OSPF and RIP
Comparisons
78
21/05/17 Network Admin and Security
Cont
OSPF is supposed to be designed in a
hierarchical fashion
Larger internetworks can be separated into
smaller internetworks called areas
Reasons for creating OSPF in a
hierarchical design:
To decrease routing overhead
To speed up convergence
To confine network instability to single areas
of the network
This does not make configuring OSPF
easier, but more elaborate and difficult.
79
21/05/17 Network Admin and Security
OSPF Design Example
87
21/05/17 Network Admin and Security
Wildcard Example
Consider a router with these four subnets
connected to four different interfaces:
192.168.10.64/28
192.168.10.80/28
192.168.10.96/28
192.168.10.8/30
88
21/05/17 Network Admin and Security
OSPF
After identifying the OSPF process
Theres a need to identify the interfaces that you want to
activate OSPF communications on as well as the area in
which each resides
The OSPF Process ID number is irrelevant
It can be the same on every router on the network, or it
can be differentdoesnt matter
Its locally significant and just enables the OSPF routing
on the router
A network and wildcard mask combination of 1.1.1.1
0.0.0.0 would match an interface configured
exactly with 1.1.1.1 only, and nothing else
useful if you want to activate OSPF on a specific
interface in a very clear and simple way
the network and wildcard mask combination of 1.1.0.0
0.0.255.255 would match any interface in the range of
1.1.0.0 to 1.1.255.255
89
21/05/17 Network Admin and Security
OSPF
90
21/05/17 Network Admin and Security
21/05/17 Network Admin and Security