1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 48 pps

10 325 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 421,54 KB

Nội dung

Routed, Routable, and Routing Protocols 439 Logical addressing occurs at the network layer. Recall the analogy that compares net- work addresses to telephone numbers. The first portions of a phone number are the area code and the first three digits. The last four digits of a phone number tell the phone company equipment which specific phone to ring. This is similar to the function of the host portion of an address. The host portion tells the router the specific device to which it should deliver a packet. Without network layer addressing, routing cannot take place. Routers require network addresses to ensure proper delivery of packets. Without some hierarchical addressing structure, packets could not travel across an internetwork. Similarly, without some hierarchical structure to telephone numbers, postal addresses, or transportation systems, there would be no smooth delivery of goods and services. A MAC address can be compared to your name, and a network layer address can be compared to your mailing address (network and host address). For example, if you were to move to another town, your name would remain unchanged, but your mailing address would indicate your new location. Network devices (routers as well as individual computers) have both a MAC address and a protocol (network layer) address. When you move a computer to a different network, the computer maintains the same MAC address, but you must assign it a new network layer address. The Communication Path The function of the network layer is to find the best path through the network. To be truly practical, a network must consistently represent the paths available between routers. As Figure 8-13 shows, each line between the routers has a number that the routers use as a network address. These addresses must convey information that can be used by a routing process. This means that an address must have information about the path of media connections that the routing process uses to pass packets from a source toward a destination. Figure 8-13 Network Media Connections 1 3 4 5 6 7 8 9 10 11 2 1102.book Page 439 Tuesday, May 20, 2003 2:53 PM 440 Chapter 8: Routing Fundamentals and Subnets Using these addresses, the network layer can provide a relay connection that intercon- nects independent networks. The consistency of Layer 3 addresses across the entire internetwork also improves the use of bandwidth by preventing unnecessary broadcasts. Broadcasts invoke unnecessary process overhead and waste capacity on any devices or links that do not need to receive the broadcast. By using consistent end-to-end address- ing to represent the path of media connections, the network layer can find a path to the destination without unnecessarily burdening the devices or links on the internetwork with broadcasts. Routing Tables To aid in the process of path determination, routing protocols build and maintain routing tables, which contain route information, as shown in Figure 8-14. Route infor- mation varies, depending on the routing protocol used. Routing protocols fill routing tables with a variety of information. Figure 8-14 Routing Tables Routers keep track of important information in their routing tables: ■ Protocol type—The type of routing protocol that created the routing table entry. ■ Destination/next-hop associations—Tell a router that a particular destination is either directly connected to the router or that it can be reached via another router called the next hop on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to match it with a routing table entry. 1102.book Page 440 Tuesday, May 20, 2003 2:53 PM Routed, Routable, and Routing Protocols 441 ■ Routing metrics—Different routing protocols use different routing metrics. Routing metrics are used to determine a route’s desirability. For example, RIP uses hop count as its routing metric. IGRP uses bandwidth, load, delay, and reliability to create a composite metric value. This is covered in more depth in CCNA2. ■ Outbound interface—The interface that the data must be sent out to reach the final destination. Routers communicate with one another to maintain their routing tables through the transmission of routing update messages. Depending on the particular routing protocol, routing update messages can be sent periodically or only when there is a change in the network topology. The routing protocol also determines whether just the changed routes or the entire routing table is sent in the routing update. By analyzing the routing updates from the neighboring routers, a router can build and maintain its routing table. Routing Algorithms and Metrics Routing protocols often have one or more of the following design goals: ■ Optimization—Optimization describes the capability of the routing protocol/ algorithm to select the best route, depending on metrics and metric weightings used in the calculation. For example, one algorithm might use hop count and delay for its metric but might weigh delay more heavily in the calculation. ■ Simplicity and low overhead—Ideally efficient routing algorithm functionality is achieved if the routers have minimum CPU and memory overhead. This is impor- tant so that the network can scale to large proportions, such as the Internet. ■ Robustness and stability—A routing algorithm should perform correctly in the face of unusual or unforeseen circumstances, such as hardware failures, high load conditions, and implementation errors. ■ Rapid convergence—Convergence is the process of all routers agreeing on routes. When a network event causes changes in router availability, recalculations are needed to reestablish network connectivity. Routing algorithms that converge slowly can cause data to not be delivered. ■ Flexibility—A routing algorithm should quickly adapt to a variety of network changes. These changes include router availability, changes in bandwidth, queue size, and network delay. ■ Scalability—Some routing protocols are better designed for scalability than others. It is important to keep in mind that if the network is intended to grow (or even if this option is to be left open), a routing protocol such as EIGRP rather than RIP should be used. 1102.book Page 441 Tuesday, May 20, 2003 2:53 PM 442 Chapter 8: Routing Fundamentals and Subnets When a routing algorithm updates a routing table, its primary objective is to determine the best information to include in the table. Routing algorithms use different metrics to determine the best route. Each routing algorithm interprets what is best in its own way. The routing algorithm generates a number, called the metric value, for each path through the network. Sophisticated routing algorithms can base route selection on multiple metrics, combining them in a single composite metric, as shown in Figure 8-15. Typically, the smaller the metric, the better the path. Figure 8-15 Routing Metrics Metrics can be based on a single characteristic of a path or can be calculated based on several characteristics. The metrics that are most commonly used by routing protocols are as follows: ■ Bandwidth—A link’s data capacity. (Normally, a 10-Mbps Ethernet link is pref- erable to a 64-kbps leased line.) ■ Delay—The length of time required to move a packet along each link from source to destination. Delay depends on the bandwidth of intermediate links, port queues at each router, network congestion, and physical distance. ■ Load—The amount of activity on a network resource such as a router or link. ■ Reliability—Usually refers to the error rate of each network link. ■ Hop count—The number of routers that a packet must travel through before reaching its destination. Whenever data goes through a router, this is one hop. A path that has a hop count of 4 indicates that data traveling along that path passes through four routers before reaching its final destination. If there are mul- tiple paths to a destination, the router chooses the path with the fewest hops. B A 56 Kbps 56 Kbps T1 T1 Hop count Ticks Cost Bandwidth Delay Load Reliability 1102.book Page 442 Tuesday, May 20, 2003 2:53 PM Routed, Routable, and Routing Protocols 443 ■ Cost—An arbitrary value, usually based on bandwidth, monetary expense, or another measurement, that is assigned by a network administrator. Interior and Exterior Routing Protocols Routers use routing protocols to exchange routing information. In other words, routing protocols determine how routed protocols are routed. Two families of routing protocols are the Interior Gateway Protocols (IGPs) and the Exterior Gateway Protocols (EGPs), as shown in Figure 8-16. These families are classified based on how they operate with regard to autonomous systems. Figure 8-16 IGPs and EGPs An autonomous system is a network or set of networks that are under the administra- tive control of a single entity, such as the cisco.com domain. An autonomous system consists of routers that present a consistent view of routing to the external world. The Internet Assigned Numbers Authority (IANA) allocates autonomous system numbers to the regional registries. These registries are ARIN (hostmaster@arin.net) for the Americas, the Caribbean, and Africa; RIPE-NCC (ncc@ripe.net) for Europe; and AP-NIC (admin@apnic.net) for the Asia Pacific region. This autonomous system is a 16-bit number. A routing protocol such as BGP requires that you specify this unique, assigned autonomous system number in your configuration. IGPs route data within an autonomous system. Here are some examples of IGPs: ■ RIP and RIP V2 ■ IGRP ■ EIGRP 1102.book Page 443 Tuesday, May 20, 2003 2:53 PM 444 Chapter 8: Routing Fundamentals and Subnets ■ OSPF ■ Intermediate System-to-Intermediate System (IS-IS) protocol EGPs route data between autonomous systems. BGP is the most pervasive example of an EGP. Routing Protocols Routing protocols can be classified in many different ways, such as IGPs or EGPs. Another classification that describes routing protocols is distance-vector or link-state. Whereas IGP and EGP describe the physical relationships of routers, the distance-vector and link-state categories describe how routers interact with each other in terms of routing updates. Distance-Vector Protocols The distance-vector routing approach determines the direction (vector) and distance (hop count) to any link in the internetwork. Distance-vector algorithms periodically (such as every 30 seconds) send all or some portion of their routing table to their adjacent neighbors. Routers running a distance-vector routing protocol send periodic updates even if there are no changes in the network. By receiving a neighbor’s routing table, a router can verify all the known routes and make changes to the local routing table based on updated information received from the neighboring router. This process is called “routing by rumor” because the understanding that a router has of the network is based on the neighbor’s perspective of the network topology. Distance-vector protocols use the Bellman-Ford Algorithm to calculate the best paths. Examples of distance-vector protocols include the following: ■ Routing Information Protocol (RIP)—The most common IGP in the Internet, RIP uses hop count as its routing metric. ■ Interior Gateway Routing Protocol (IGRP)—Cisco developed this IGP to address the issues associated with routing in large, heterogeneous networks. Link-State Protocols Link-state routing protocols were designed to overcome the limitations of distance- vector routing protocols. Link-state routing protocols respond quickly to network changes, send trigger updates only when a network change has occurred, and send periodic updates (called link-state refreshes) at long time intervals, such as every 30 minutes. When a link changes state, the device that detected the change creates a link-state advertisement (LSA) concerning that link (route), and that LSA is propagated to all neighboring devices. Each routing device takes a copy of the LSA, updates its link- state (topological) database, and forwards the LSA to all neighboring devices. This 1102.book Page 444 Tuesday, May 20, 2003 2:53 PM Routed, Routable, and Routing Protocols 445 flooding of the LSA is required to ensure that all routing devices update their data- bases before creating an updated routing table that reflects the new topology, as shown in Figure 8-17. Figure 8-17 Link-State Routing Protocols The link-state database is used to calculate the best paths through the network. Link- state routers find the best paths to destinations by applying the Dijkstra Shortest Path First (SPF) algorithm against the link-state database to build the SPF tree. The best (shortest) paths are then selected from the shortest-path-first tree and are placed in the routing table. Examples of link-state protocols are OSPF and IS-IS, as shown in Figure 8-18. Routing Protocol Characteristics The following sections describe the metrics, network usability, and other significant characteristics of the most commonly used routing protocols. 1102.book Page 445 Tuesday, May 20, 2003 2:53 PM 446 Chapter 8: Routing Fundamentals and Subnets Figure 8-18 Link-State Routing Protocols: OSPF and IS-IS RIP RIP uses hop count to determine the direction and distance to any link in the internet- work, as shown in Figure 8-19. If there are multiple paths to a destination, RIP selects the path with the fewest hops. However, because hop count is the only routing metric RIP uses, it does not necessarily select the fastest path to a destination. RIP-1 uses only classful routing. This means that all devices in the network must use the same subnet mask, because RIP-1 does not include the subnet information with the routing update. RIP-2 provides what is called prefix routing and sends subnet mask information with the route updates. This supports the use of classless routing. With classless routing protocols, different subnets within the same network can have different subnet masks. The use of different subnet masks within the same network is called variable-length subnet masking (VLSM). IGRP IGRP is a distance-vector routing protocol developed by Cisco specifically to address problems associated with routing in large networks that are beyond the scope of pro- tocols such as RIP. IGRP can select the fastest path based on the delay, bandwidth, load, and reliability. By default, IGRP uses bandwidth and delay metrics only and uses a 24-bit metric. IGRP also has a much higher maximum hop-count limit than RIP to allow the network to scale. IGRP uses only classful routing. Distance Vector Link State RIP Distance Vector Using Hop Count IGRP Distance Vector Developed by Cisco Addressing Problems in Large, Heterogeneous Network OSPF Link-State, Hierarchical Successor to RIP Using Least-Cost Routing, Multipath Routing, and Load Balancing Derived from IS-IS chpt_08.fm Page 446 Tuesday, May 27, 2003 9:17 AM Routed, Routable, and Routing Protocols 447 Figure 8-19 RIP Uses Hop Count as Its Metric EIGRP Like IGRP, EIGRP is a proprietary Cisco protocol. EIGRP is an advanced version of IGRP and uses a 32-bit metric. Specifically, EIGRP provides superior operating effi- ciency such as faster convergence and lower overhead bandwidth. It is an advanced distance-vector protocol. EIGRP also uses some of the link-state protocol functions. Hence, the term hybrid is also used to describe EIGRP. OSPF OSPF is a link-state routing protocol. The Internet Engineering Task Force (IETF) developed OSPF in 1988. The most recent version, OSPF Version 2, is described in RFC 2328. OSPF is an IGP, which means that it distributes routing information between routers belonging to the same autonomous system. OSPF was written to address the needs of large, scalable internetworks that RIP could not. IS-IS Intermediate System-to-Intermediate System (IS-IS) is the dynamic link-state routing protocol for the OSI protocol stack. As such, it distributes routing information for routing Connectionless Network Protocol (CLNP) data for the ISO Connectionless 1102.book Page 447 Tuesday, May 20, 2003 2:53 PM 448 Chapter 8: Routing Fundamentals and Subnets Network Service (CLNS) environment. Integrated IS-IS is an implementation of the IS-IS protocol for routing multiple network protocols. Integrated IS-IS tags CLNP routes with information about IP networks and subnets. It provides an alternative to OSPF in the IP world, mixing ISO CLNS and IP routing in one protocol. It can be used purely for IP routing, purely for ISO routing, or for a combination of the two. BGP Border Gateway Protocol (BGP) is an example of an EGP. BGP exchanges routing information between autonomous systems while guaranteeing loop-free path selection. It is the principal route advertising protocol used by major companies and ISPs on the Internet. BGP-4 is the first version of BGP that supports classless interdomain routing (CIDR) and route aggregation. Unlike common IGPs such as RIP, OSPF, and EIGRP, BGP does not use metrics such as hop count or bandwidth or delay. Instead, BGP makes routing decisions based on network policies or rules using various BGP path attributes. IP as a Routed Protocol IP is the most widely used implementation of a hierarchical network addressing scheme. IP is a connectionless, unreliable, best-effort delivery system protocol used on the Inter- net. The term connectionless means that no dedicated circuit connection is required, as there would be for a telephone call. There is no call setup before data is transferred between hosts. The IP protocol takes whichever route is the most efficient based on the routing protocol decision. Unreliable and best-effort do not mean that the system is unreliable and doesn’t work well, but that the IP protocol does not make any effort to see if the packet was delivered. This function is handled by the upper-layer protocols. As information flows down the layers of the OSI model, the data is processed at each layer. At the network layer, the data is encapsulated within packets called datagrams, as shown in Figure 8-20. Lab Activity Small Router Purchase (Cable/DSL Router) The purpose of this lab is to introduce the variety and prices of network components in the market. This lab looks specifically at small routers used by telecommuters when working from home. NOTE CLNP refers to the OSI network layer protocol that does not require a circuit to be established before data is transmitted. 1102.book Page 448 Tuesday, May 20, 2003 2:53 PM . toward a destination. Figure 8 -13 Network Media Connections 1 3 4 5 6 7 8 9 10 11 2 11 02. book Page 439 Tuesday, May 20 , 20 03 2: 53 PM 440 Chapter 8: Routing Fundamentals and Subnets Using these addresses,. fewest hops. B A 56 Kbps 56 Kbps T1 T1 Hop count Ticks Cost Bandwidth Delay Load Reliability 11 02. book Page 4 42 Tuesday, May 20 , 20 03 2: 53 PM Routed, Routable, and Routing Protocols 443 ■ Cost—An. protocol such as EIGRP rather than RIP should be used. 11 02. book Page 4 41 Tuesday, May 20 , 20 03 2: 53 PM 4 42 Chapter 8: Routing Fundamentals and Subnets When a routing algorithm updates a routing

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN