Cisco Systems


 


 

Modules:  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  CS  |  All  |
Module 6: Routing and Routing Protocols
Module Overview  
6.1 Introduction to Static Routing
 
6.1.1 Introducing routing
6.1.2 Static route operation
6.1.3 Configuring static routes
6.1.4 Configuring default route forwarding
6.1.5 Verifying static route configuration
6.1.6 Troubleshooting static route configuration
 
6.2 Dynamic Routing Overview
 
6.2.1 Introduction to routing protocols
6.2.2 Autonomous systems
6.2.3 Purpose of a routing protocol and autonomous systems
6.2.4 Identifying the classes of routing protocols
6.2.5 Distance vector routing protocol features
6.2.6 Link-state routing protocol features
 
6.3 Routing Protocols Overview
 
6.3.1 Path determination
6.3.2 Routing configuration
6.3.3 Routing protocols
6.3.4 Autonomous systems and IGP versus EGP
6.3.5 Distance vector
6.3.6 Link-state
 
Module Summary  
Module Quiz

 

 
Close Window
All contents copyright © 2003 Cisco Systems, Inc. All rights reserved.

 

Overview
 
Routing is nothing more than directions for getting from one network to another. These directions, also known as routes, can be dynamically given to the router by another router, or they can be statically assigned to the router by an administrator.

This module introduces the concept of dynamic routing protocols, describes the classes of dynamic routing protocol, and gives examples of protocols in each class.

A network administrator chooses a dynamic routing protocol based upon many considerations. The size of the network, the bandwidth of available links, the processing power of the network routers, the brands and models of routers on the network, and the protocols already in use on the network are all factors that must be considered in choosing a routing protocol. This module will provide more details about the differences between routing protocols that help network administrators make a choice.

Students completing this module should be able to:

  • Explain the significance of static routing
  • Configure static and default routes
  • Verify and troubleshoot static and default routes
  • Identify the classes of routing protocols
  • Identify distance vector routing protocols
  • Identify link-state routing protocols
  • Describe the basic characteristics of common routing protocols
  • Identify interior gateway protocols
  • Identify exterior gateway protocols
  • Enable Routing Information Protocol (RIP) on a router

 

6.1 Introduction to Static Routing  
  6.1.1 Introducing routing  
  Routing is the process that a router uses to forward packets toward the destination network. A router makes decisions based upon the destination IP address of a packet. All devices along the way use the destination IP address to point the packet in the correct direction so that the packet eventually arrives at its destination. In order to make the correct decisions, routers must learn the direction to remote networks. When routers use dynamic routing, this information is learned from other routers. When static routing is used, a network administrator configures information about remote networks manually.

Because static routes must be configured manually, any network topology changes require the network administrator to add and delete static routes to account for the changes. In a large network this manual maintenance of routing tables could require a tremendous amount of administrative time. On small networks with few possible changes, static routes require very little maintenance. Because of the extra administrative requirements, static routing does not have the scalability of dynamic routing. Even in large networks, static routes that are intended to accomplish a specific purpose are often configured in conjunction with a dynamic routing protocol.

  Web Links

Introduction to Routing

http://www.cisco.com/networkers/ nw99_pres/301.pdf

 

6.1 Introduction to Static Routing  
  6.1.2 Static route operation  
  Static route operations can be divided into these three parts:
  • Network administrator configures the route
  • Router installs the route in the routing table
  • Packets are routed using the static route

Since a static route is manually configured, the administrator must configure the static route on the router using the ip route command. The correct syntax for the ip route command is shown in Figure .

In Figures and , the network administrator of the Hoboken router needs to configure a static route pointing to the 172.16.1.0/24 and 172.16.5.0/24 networks on the other routers. The administrator could enter either of two commands to accomplish this objective. The method in Figure specifies the outgoing interface. The method in Figure specifies the next-hop IP address of the adjacent router. Either of the commands will install a static route in the routing table of Hoboken. The only difference between the two is in the administrative distance assigned to the route by the router as it is placed in the routing table.

The administrative distance is an optional parameter that gives a measure of the reliability of the route. A lower value for the administrative distance indicates the more reliable route. Thus, a route with a lower administrative distance will be installed before an identical route with a higher administrative distance. The default administrative distance when using next-hop address is 1, while the default administrative distance when using the outgoing interface is 0. If an administrative distance other than the default is desired, a value between 0 and 255 is entered after the next-hop or outgoing interface as follows:

waycross(config)#ip route 172.16.3.0 255.255.255.0 172.16.4.1 130

If the router cannot reach the outgoing interface that is being used in the route, the route will not be installed in the routing table. This means if that interface is down, the route will not be placed in the routing table.

Sometimes static routes are used for backup purposes. A static route can be configured on a router that will only be used when the dynamically learned route has failed. To use a static route in this manner, simply set the administrative distance higher than that of the dynamic routing protocol being used.

 

  Lab Activity

e-Lab Activity: Static Route Operation

In this lab, the student will learn how to create a static route.

 

 

  Lab Activity

e-Lab Activity: Static Routes

In this lab, the students will practice using static routes by troubleshooting a network connected in the fashion outlined in the topology map.

 

 

 

6.1 Introduction to Static Routing  
  6.1.3 Configuring static routes  
  This section lists the steps for configuring static routes and gives an example of a simple network for which static routes might be configured.

Use the following steps to configure static routes:

  1. Determine all desired destination networks, their subnet masks, and their gateways. A gateway can be either a local interface or a next hop address that leads to the desired destination.
  2. Enter global configuration mode.
  3. Type the ip route command with a destination address and subnet mask followed by their corresponding gateway from Step one. Including an administrative distance is optional.
  4. Repeat Step three for as many destination networks as were defined in Step one.
  5. Exit global configuration mode.
  6. Save the active configuration to NVRAM by using the copy running-config startup-config command.

The example network is a simple three-router configuration. Hoboken must be configured so that it can reach the 172.16.1.0 network and the 172.16.5.0 network. Both of these networks have a subnet mask of 255.255.255.0.

Packets that have a destination network of 172.16.1.0 need to be routed to Sterling and packets that have a destination address of 172.16.5.0 need to be routed to Waycross. Static routes can be configured to accomplish this task.

Both static routes will first be configured to use a local interface as the gateway to the destination networks. Since the administrative distance was not specified, it will default to 0 when the route is installed in the routing table. Note that an administrative distance of 0 is the same as a directly connected network.

The same two static routes can also be configured using a next-hop address as their gateway. The first route to the 172.16.1.0 network has a gateway of 172.16.2.1. The second route to the 172.16.5.0 network has a gateway of 172.16.4.2. Since the administrative distance was not specified, it defaults to 1.

  Lab Activity

e-Lab Activity: Configuring Static Routes

In this lab, the student will learn to configure some static routes.

 

 

  Web Links

ip route Command

http://www.cisco.com/en/US/products/sw/ iosswrel/ps1835/products_command_reference_ chapter09186a00800ca75a.html#1018067

 

 

6.1 Introduction to Static Routing  
  6.1.4 Configuring default route forwarding  
  Default routes are used to route packets with destinations that do not match any of the other routes in the routing table. Routers are typically configured with a default route for Internet-bound traffic, since it is often impractical and unnecessary to maintain routes to all networks in the Internet. A default route is actually a special static route that uses this format:

ip route 0.0.0.0 0.0.0.0 [next-hop-address | outgoing interface]

The 0.0.0.0 mask, when logically ANDed to the destination IP address of the packet to be routed, will always yield the network 0.0.0.0. If the packet does not match a more specific route in the routing table, it will be routed to the 0.0.0.0 network.

Use the following steps to configure default routes:

  1. Enter global configuration mode.
  2. Type the ip route command with 0.0.0.0 for the destination network address and 0.0.0.0 for the subnet mask. The gateway for the default route can be either the local router interface that connects to the outside networks or the IP address of the next-hop router. In most cases, it is preferred that the IP address of the next hop router is specified.
  3. Exit global configuration mode.
  4. Save the active configuration to NVRAM by using the copy running-config startup-config command.

In the section Configuring Static Routes, static routes were configured on Hoboken to make networks 172.16.1.0 on Sterling and 172.16.5.0 on Waycross accessible. It should now be possible to route packets to both of these networks from Hoboken. However, neither Sterling nor Waycross will know how to return packets to any non-directly connected network. A static route could be configured on Sterling and Waycross for each of the non-directly connected destination networks. This would not be a scalable solution on a larger network.

Sterling connects to all non-directly connected networks via interface Serial 0. Waycross has only one connection to all non-directly connected networks. This is through interface Serial 1. A default route on both Sterling and Waycross will provide routing for all packets that are destined for non-directly connected networks.

  Lab Activity

e-Lab Activity: Configuring Default Route Forwarding

In this lab, the students will configure a default static route.

 

 

  Web Links

ip default-network Command

http://www.cisco.com/en/US/products/sw/ iosswrel/ps1835/products_command_reference_ chapter09186a00800ca75a.html#1017820

 

6.1 Introduction to Static Routing  
  6.1.5 Verifying static route configuration  
  After static routes are configured it is important to verify that they are present in the routing table and that routing is working as expected. The command show running-config is used to view the active configuration in RAM to verify that the static route was entered correctly. The show ip route command is used to make sure that the static route is present in the routing table.

Use the following steps to verify static route configuration:

  • In privileged mode enter the command show running-config to view the active configuration.
  • Verify that the static route has been correctly entered. If the route is not correct, it will be necessary to go back into global configuration mode to remove the incorrect static route and enter the correct one.
  • Enter the command show ip route.
  • Verify that the route that was configured is in the routing table.
  Lab Activity

e-Lab Activity: Verifying Static Route Configuration

In this lab, the students will use show commands to verify the default static route configuration created in the previous lab.

 

6.1 Introduction to Static Routing  
  6.1.6 Troubleshooting static route configuration  
  In the section "Configuring Static Routes", static routes were configured on Hoboken to make networks 172.16.1.0 on Sterling and 172.16.5.0 on Waycross accessible . Using this configuration, nodes on Sterling’s 172.16.1.0 network cannot reach nodes on the 172.16.5.0 network. From privileged EXEC mode on the Sterling router, execute a ping to a node on the 172.16.5.0 network. The ping fails. Now run a traceroute from Sterling to the same address used in the previous ping statement. Note where the traceroute fails. The traceroute indicates that the ICMP packet was returned from Hoboken but not from Waycross. This implies that the trouble exists either on Hoboken or Waycross. Telnet to the Hoboken router. Try again to ping the node on the 172.16.5.0 network connected to the Waycross router. This ping should succeed because Hoboken is directly connected to Waycross.
  Lab Activity

Lab Exercise: Configuring Static Routes

In this lab, the students will configure static routes between routers to allow data transfer between routers without the use of dynamic routing protocols.

 

 

  Lab Activity

e-Lab Activity: Static Routes

In this lab, the students will configure static routes between routers to allow data transfer between routers without the use of dynamic routing protocols.

 

 

  Web Links

Troubleshooting

http://www.cisco.com/en/US/ tech/tk826/tk365/ tech_troubleshooting.html

 

6.2 Dynamic Routing Overview  
  6.2.1 Introduction to routing protocols  
  Routing protocols are different from routed protocols in both function and task.

A routing protocol is the communication used between routers. A routing protocol allows one router to share information with other routers regarding the networks it knows about as well as its proximity to other routers. The information a router gets from another router, using a routing protocol, is used to build and maintain a routing table. 

Examples of routing protocols are:

  • Routing Information Protocol (RIP)
  • Interior Gateway Routing Protocol (IGRP)
  • Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Open Shortest Path First (OSPF)

A routed protocol is used to direct user traffic. A routed protocol provides enough information in its network layer address to allow a packet to be forwarded from one host to another based on the addressing scheme.

Examples of routed protocols are:

  • Internet Protocol (IP)
  • Internetwork Packet Exchange (IPX)
  Web Links

Introduction to Routing

http://www.cisco.com/ networkers/ nw99_pres/301.pdf

 

6.2 Dynamic Routing Overview  
  6.2.2 Autonomous systems  
  An autonomous system (AS) is a collection of networks under a common administration sharing a common routing strategy. To the outside world, an AS is viewed as a single entity. The AS may be run by one or more operators while presenting a consistent view of routing to the external world.

The American Registry of Internet Numbers (ARIN), a service provider, or an administrator assigns an identifying number to each AS. This autonomous system number is a 16 bit number. Routing protocols, such as Cisco’s IGRP, require assignment of a unique, autonomous system number.

  Web Links

Autonomous System

http://searchnetworking.techtarget.com/ sDefinition/ 0,,sid7_gci213662,00.html

 

6.2 Dynamic Routing Overview  
  6.2.3 Purpose of a routing protocol and autonomous systems  
  The goal of a routing protocol is to build and maintain the routing table. This table contains the learned networks and associated ports for those networks. Routers use routing protocols to manage information received from other routers, information learned from the configuration of its own interfaces, along with manually configured routes.

The routing protocol learns all available routes, places the best routes into the routing table, and removes routes when they are no longer valid. The router uses the information in the routing table to forward routed protocol packets.

The routing algorithm is fundamental to dynamic routing. Whenever the topology of a network changes because of growth, reconfiguration, or failure, the network knowledgebase must also change. The network knowledgebase needs to reflect an accurate consistent view of the new topology.

When all routers in an internetwork are operating with the same knowledge, the internetwork is said to have converged. Fast convergence is desirable because it reduces the period of time in which routers would continue to make incorrect routing decisions.

Autonomous systems (AS) provide the division of the global internetwork into smaller and more manageable networks. Each AS has its own set of rules and policies and an AS number that will uniquely distinguish it from other autonomous systems throughout the world.

  Web Links

Introduction to Routing Protocols

http://www.cisco.com/networkers/ nw00/pres/ 2204.pdf

 

6.2 Dynamic Routing Overview  
  6.2.4 Identifying the classes of routing protocols  
  Most routing algorithms can be classified into one of two categories:
  • distance vector
  • link-state

The distance vector routing approach determines the direction (vector) and distance to any link in the internetwork. The link-state approach, also called shortest path first, recreates the exact topology of the entire internetwork.

  Web Links

Routing Algorithms

http://www.broadband-help.com/ guestarticles/ routingalg/ Algorithm.htm

 

6.2 Dynamic Routing Overview  
  6.2.5 Distance vector routing protocol features  
  Distance vector routing algorithms pass periodic copies of a routing table from router to router. These regular updates between routers communicate topology changes. Distance vector based routing algorithms are also known as Bellman-Ford algorithms.

Each router receives a routing table from its directly connected neighbor routers. Router B receives information from Router A. Router B adds a distance vector number (such as a number of hops), which increases the distance vector. Then Router B passes this new routing table to its other neighbor, Router C. This same step-by-step process occurs in all directions between neighbor routers.

The algorithm eventually accumulates network distances so that it can maintain a database of network topology information. However, distance vector algorithms do not allow a router to know the exact topology of an internetwork as each router only sees its neighbor routers.

Each router that uses distance vector routing begins by identifying its own neighbors. The interface that leads to each directly connected network is shown as having a distance of 0. As the distance vector network discovery process proceeds, routers discover the best path to destination networks based on the information they receive from each neighbor. Router A learns about other networks based on the information that it receives from Router B. Each of the other network entries in the routing table has an accumulated distance vector to show how far away that network is in a given direction.

Routing table updates occur when the topology changes. As with the network discovery process, topology change updates proceed step-by-step from router to router. Distance vector algorithms call for each router to send its entire routing table to each of its adjacent neighbors. The routing tables include information about the total path cost as defined by its metric and the logical address of the first router on the path to each network contained in the table.

An analogy of distance vector could be the signs found at a highway intersection. A sign points towards a destination and indicates the distance to the destination. Further down the highway, another sign points toward the destination, but now the distance is shorter. As long as the distance is shorter, the traffic is following the best path.

  Web Links

Routing Protocols - Distance Vector

http://www.firewall.cx/ index.php?c=distance_vector

 

6.2 Dynamic Routing Overview  
  6.2.6 Link-state routing protocol features  
  The second basic algorithm used for routing is the link-state algorithm. Link-state algorithms are also known as Dijkstras algorithm or as SPF (shortest path first) algorithms. Link-state routing algorithms maintain a complex database of topology information. The distance vector algorithm has nonspecific information about distant networks and no knowledge of distant routers. A link-state routing algorithm maintains full knowledge of distant routers and how they interconnect.

Link-state routing uses:

  • Link-state advertisements (LSAs) – A link-state advertisement (LSA) is a small packet of routing information that is sent between routers.
  • Topological database – A topological database is a collection of information gathered from LSAs.
  • SPF algorithm – The shortest path first (SPF) algorithm is a calculation performed on the database resulting in the SPF tree.
  • Routing tables – A list of the known paths and interfaces.

Network discovery processes for link state routing
LSAs are exchanged between routers starting with directly connected networks for which they have direct information. Each router in parallel with the others constructs a topological database consisting of all the exchanged LSAs.

The SPF algorithm computes network reachability. The router constructs this logical topology as a tree, with itself as the root, consisting of all possible paths to each network in the link-state protocol internetwork. It then sorts these paths Shortest Path First (SPF). The router lists the best paths and the interfaces to these destination networks in the routing table. It also maintains other databases of topology elements and status details.

The router that first becomes aware of a link-state topology change forwards the information so that all other routers can use it for updates. This involves sending common routing information to all routers in the internetwork. To achieve convergence, each router keeps track of its neighbor routers, the router name, interface status, and the cost of the link to the neighbor. The router constructs an LSA packet that lists this information along with new neighbors, changes in link costs, and links that are no longer valid. The LSA packet is then sent out so that all other routers receive it.

When the router receives an LSA, the database is updated with the most recent information and computes a map of the internetwork using the accumulated data and calculates the shortest path to other networks using the SPF algorithm. Each time an LSA packet causes a change to the link-state database, SPF recalculates the best paths and updates the routing table.

Link-state concerns:

  • Processor overhead
  • Memory requirements
  • Bandwidth Consumption

Routers running link-state protocols require more memory and perform more processing than distance vector routing protocols. Routers must have sufficient memory to be able to hold all the information from the various databases, the topology tree, and the routing table. Initial link-state packet flooding consumes bandwidth. During the initial discovery process, all routers using link-state routing protocols send LSA packets to all other routers. This action floods the internetwork and temporarily reduces bandwidth available for routed traffic carrying user data. After this initial flooding, link-state routing protocols generally require only minimal bandwidth to send infrequent or event triggered LSA packets reflecting topology changes.

  Web Links

Routing Protocols - Link State

http://www.firewall.cx/i ndex.php?c=link_state

 

6.3 Routing Protocols Overview  
  6.3.1 Path determination  
  A router determines the path of a packet from one data link to another, using two basic functions:
  • A path determination function
  • A switching function

Path determination occurs at the network layer. The path determination function enables a router to evaluate the paths to a destination and to establish the preferred handling of a packet. The router uses the routing table to determine the best path and proceeds to forward the packet using the switching function. -

The switching function is the internal process used by a router to accept a packet on one interface and forward it to a second interface on the same router. A key responsibility of the switching function of the router is to encapsulate packets in the appropriate frame type for the next data link.

Figure illustrates how routers use addressing for these routing and switching functions. The router uses the network portion of the address to make path selections to pass the packet to the next router along the path.

 

6.3 Routing Protocols Overview  
  6.3.2 Routing configuration  
  Enabling an IP routing protocol on a router involves the setting of both global and routing parameters. Global tasks include selecting a routing protocol, such as RIP, IGRP, EIGRP or OSPF. The major task in the routing configuration mode is to indicate IP network numbers. Dynamic routing uses broadcasts and multicasts to communicate with other routers. The routing metric helps routers find the best path to each network or subnet.

The router command starts a routing process.

The network command is required because it enables the routing process to determine which interfaces participate in the sending and receiving of routing updates.

An example of a routing configuration is:

GAD(config)#router rip
GAD(config-router)#network 172.16.0.0

The network numbers are based on the network class addresses, not subnet addresses or individual host addresses. Major network addresses are limited to Class A, B, and C network numbers.

 

  Lab Activity

e-Lab Activity: Routing Configuration

In this lab, the students will configure the routers to start a routing process, then add the networks that will be advertised.

 

 

 

6.3 Routing Protocols Overview  
  6.3.3 Routing protocols  
  At the Internet layer of the TCP/IP suite of protocols, a router can use an IP routing protocol to accomplish routing through the implementation of a specific routing algorithm. Examples of IP routing protocols include:
  • RIP – A distance vector interior routing protocol
  • IGRP – Cisco's distance vector interior routing protocol
  • OSPF – A link-state interior routing protocol
  • EIGRP – Cisco’s advanced distance vector interior routing protocol
  • BGP – A distance vector exterior routing protocol

Routing Information Protocol (RIP) was originally specified in RFC 1058. Its key characteristics include the following:

  • It is a distance vector routing protocol.
  • Hop count is used as the metric for path selection.
  • If the hop count is greater than 15, the packet is discarded.
  • Routing updates are broadcast every 30 seconds, by default.

Interior Gateway Routing Protocol (IGRP) is a proprietary protocol developed by Cisco. Some of the IGRP key design characteristics emphasize the following:

  • It is a distance vector routing protocol.
  • Bandwidth, load, delay and reliability are used to create a composite metric.
  • Routing updates are broadcast every 90 seconds, by default.

Open Shortest Path First (OSPF) is a nonproprietary link-state routing protocol. The key characteristics of OSPF are as follows:

  • It is a link-state routing protocol.
  • Open standard routing protocol described in RFC 2328.
  • Uses the SPF algorithm to calculate the lowest cost to a destination.
  • Routing updates are flooded as topology changes occur.

EIGRP is a Cisco proprietary enhanced distance vector routing protocol. The key characteristics of EIGRP are as follows:

  • It is an enhanced distance vector routing protocol.
  • Uses load balancing.
  • Uses a combination of distance vector and link-state features.
  • Uses Diffused Update Algorithm (DUAL) to calculate the shortest path.
  • Routing updates are broadcast every 90 seconds or as triggered by topology changes.

Border Gateway Protocol (BGP) is an exterior routing protocol. The key characteristics of BGP are as follows:

  • It is a distance vector exterior routing protocol.
  • Used between ISPs or ISPs and clients.
  • Used to route Internet traffic between autonomous systems.
  Interactive Media Activity

Checkbox: Link-State and Distance Vector Routing Protocols

After completing this activity, the student will be able to understand IP routing protocols.

 

  Web Links

Introduction to IP Routing

http://www.cisco.com/en/US/tech/tk365/tech_topology
_and_network_serv_and_protocol_suite_home.html

 

6.3 Routing Protocols Overview  
  6.3.4 Autonomous systems and IGP versus EGP  
  Interior routing protocols are designed for use in a network whose parts are under the control of a single organization. The design criteria for an interior routing protocol require it to find the best path through the network. In other words, the metric and how that metric is used is the most important element in an interior routing protocol.

An exterior routing protocol is designed for use between two different networks that are under the control of two different organizations. These are typically used between ISPs or between a company and an ISP. For example, a company would run BGP, an exterior routing protocol, between one of its routers and a router inside an ISP. IP exterior gateway protocols require the following three sets of information before routing can begin:

  • A list of neighbor routers with which to exchange routing information.
  • A list of networks to advertise as directly reachable.
  • The autonomous system number of the local router.

An exterior routing protocol must isolate autonomous systems. Remember, autonomous systems are managed by different administrations. Networks must have a protocol to communicate between these different systems.

Autonomous systems have an identifying number, which is assigned to it by the American Registry of Internet Numbers (ARIN) or a provider. This autonomous system number is a 16-bit number. Routing protocols such as Cisco’s IGRP and EIGRP require that a unique, autonomous system number be assigned.

  Interactive Media Activity

Checkbox: IGP versus EGP

After completing this activity, the student will be able to understand IGP and EGP.

    

  Web Links

IGP

http://searchsecurity.techtarget.com/ sDefinition/0,,sid14_ gci214018,00.html

 

6.3 Routing Protocols Overview  
  6.3.5 Distance vector  
  Distance vector algorithms (also known as Bellman-Ford algorithms) call for each router to send all or some portion of its routing table only to its neighbors. Distance vector algorithms perform routing decisions based upon information provided by neighboring routers.

Distance vector protocols use fewer system resources but can suffer from slow convergence and may use metrics that do not scale well to larger systems. Distance vector protocols are based on finding the distance (number of hops) and vector (direction) to any link on the internetwork. The algorithms involve passing copies of a complete routing table from router to router on a periodic basis.

This type of routing protocol requires that each router simply inform its neighbors of its routing table. For each network path, the receiving routers pick the neighbor advertising the lowest cost and then adds this entry into their routing table for readvertisement. RIP and IGRP are common distance vector routing protocols.

  Web Links

Distance Vector Routing

http://www.cs.uwa.edu.au/~chris/ cnet/aricstewart/

 

6.3 Routing Protocols Overview  
  6.3.6 Link-state  
  Link-state algorithms (also known as shortest path first algorithms) flood routing information to all routers in the internetwork that creates a map of the entire network. Each router sends packets to all its neighbors. These packets contain descriptions of the network or networks to which the router is linked. The routers assemble all the information into a complete view of the internetwork topology to calculate the shortest path to all known sites on the network. It then generates routing tables showing the best path for any destination on the network. Once converged, link state protocols use small update packets, which contain only changes rather than copies of the entire routing table. Update packets are passed across the network in event-triggered updates, so convergence is fast.

Because they converge more quickly than distance vector protocols, link-state algorithms are less prone to routing loops. Link-state protocols are also less prone to routing errors, but they use more system resources. Link-state protocols, therefore, can be more expensive to implement and support. However, they are generally more scalable than distance vector protocols.

When a network link changes state, a notification called a link-state advertisement (LSA) is flooded throughout the network. All the routers note the change and adjust their routes accordingly. This method is more reliable, easier to debug, and less bandwidth-intensive than distance vector. OSPF and IS-IS are examples of link-state routing protocols.

 

Summary
  An understanding of the following key points should have been achieved:
  • A router will not forward a packet without a route to a destination network.
  • Network administrators manually configure static routes.
  • Default routes are special static routes that provide routers with gateways of last resort.
  • Static and default routes are configured using the ip route command.
  • Static and default route configuration can be verified using the show ip route, ping, and traceroute commands.
  • Verify and troubleshoot static and default routes
  • Routing protocols
  • Autonomous systems
  • Purpose of routing protocols and autonomous systems
  • The classes of routing protocols
  • Distance vector routing protocol features and examples
  • Link-state protocol features and examples
  • Route determination
  • Routing configuration
  • Routing protocols (RIP, IGRP, OSPF, EIGRP, BGP)
  • Autonomous systems and IGP versus EGP
  • Distance vector routing
  • Link-state routing