ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides...

68
ITEC 275 ITEC 275 Computer Networks – Computer Networks – Switching, Routing, and Switching, Routing, and WANs WANs Week 7 Week 7 Robert D’Andrea Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission

Transcript of ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides...

Page 1: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

ITEC 275ITEC 275 Computer Networks – Switching, Computer Networks – Switching,

Routing, and WANsRouting, and WANs

Week 7Week 7Robert D’AndreaRobert D’Andrea

Some slides provide by Priscilla Oppenheimer and used with permission

Page 2: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

AgendaAgenda• Learning Activities

– Domain Name Server (DNS)– Summarization– Root Owner DNS– Routing tables– Spanning Tree Protocol– Rapid Spanning Tree Protocol– Static versus Dynamic Routing– Routing Protocols and Characteristics

Page 3: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

DNS Domain NamesDNS Domain Names

Page 4: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interpreting a DNS domain namesInterpreting a DNS domain namesDNS has a method of noting and interpreting the

fully qualified path to a DNS domain name similar to the way full paths to files or directories are noted or displayed at a command prompt.

For example, a directory tree path helps point to the exact location of a file stored on your computer. For Windows computers, the back slash (\) indicates each new directory that leads to the exact location of a file. For DNS, the equivalent is a period (.) indicating each new domain level used in a name.

Page 5: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interpreting File NamesInterpreting File NamesUNIX uses the concept of relative and absolute file names. If a file name is preceded by a forward slash (e.g. /bin), the name is absolute. If the name is without a leading slash, it is considered relative to your current working directory.

Page 6: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interpreting a DNS domain namesInterpreting a DNS domain namesFor DNS, an example of a domain name with multiple levels is the following, a fully qualified domain name (FQDN):

host-a.example.microsoft.com.

Unlike the file name example, a DNS FQDN, when read from left to right, moves from its most specific information (the DNS name for a computer called "host-a") to its highest or most general piece of information (the trailing period (.) that indicates the root of the DNS name tree). This example shows the four separate DNS domain levels that lead away from the specific host location of "host-a":

Page 7: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interpreting a DNS domain namesInterpreting a DNS domain names1. The "example" domain, which corresponds to a subdomain where the computer name "host-a" is registered for use.

2. The "microsoft" domain, which corresponds to the parent domain that roots the "example" subdomain.

3. The "com" domain, which corresponds to the top-level domain designated for use by business or commercial organizations that roots the "microsoft" domain.

4. The trailing period (.), which is a standard separator character used to qualify the full DNS domain name to the root level of the DNS namespace tree.

Page 8: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Root ServersRoot ServersWhen a computer on the Internet needs to resolve a domain name, it uses resolver software to do the lookup. A resolver breaks the name up into its labels from right to left. The first component is queried using a root server to obtain the responsible authoritative server. Queries for each name are performed until a name server returns the answer of the original query.

Page 9: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interpreting a DNS domain namesInterpreting a DNS domain namesAs of 2013, there are 13 root name servers, with names in the form letter.root-server.net. This does not mean that there are only 13 physical servers; each site uses redundant computer equipment to provide reliable service in when hardware and software fail on occasion.

View:

www.root-servers.org

Page 10: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Route SummarizationRoute Summarization

Page 11: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Classful Boundary SummarizationClassful Boundary Summarization

Page 12: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing TablesRouting Tables

Page 13: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Dual Stack and Tunneling IPv4/IPv6Dual Stack and Tunneling IPv4/IPv6

Page 14: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Stateless Auto-configurationStateless Auto-configuration

Page 15: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Switching and Routing ChoicesSwitching and Routing Choices• Switching

– Layer 2 transparent bridging (switching)– Multilayer switching– Spanning Tree Protocol enhancements– VLAN technologies

• Routing – Static or dynamic– Distance-vector and link-state protocols– Interior and exterior– Etc.

Page 16: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Selection Criteria for Switching and Selection Criteria for Switching and Routing ProtocolsRouting Protocols

• Network traffic characteristics• Bandwidth, memory, and CPU usage• The number of peers supported• The capability to adapt to changes quickly • Support for authentication

Page 17: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Making DecisionsMaking Decisions• Goals must be established• Many options should be explored• The consequences of the decision should be

investigated• Contingency plans should be made• A decision table can be used. Decision tables

are composed of rows and columns. Each row corresponds to a single rule, with the columns defining the conditions and actions of the rules.

Page 18: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Example Decision TableExample Decision Table

Page 19: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Transparent Bridging (Switching) Transparent Bridging (Switching) TasksTasks

• Ethernet switches and bridges use transparent bridging.

• A transparent bridge connects one or more LAN segments so that end systems on different segments can communicate with each other transparently. An end system sends a frame to a destination without knowing whether the destination is local or on the other side of the bridge.

Page 20: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Transparent Bridging (Switching) Transparent Bridging (Switching) TasksTasks

• Forward frames transparently• Learn which port to use for each MAC

address• Flood frames when the destination unicast

address hasn’t been learned yet• Filter frames from going out ports that

don’t include the destination address• Flood broadcasts and multicasts

Page 21: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

DefinitionsDefinitions

• STP is a bridge protocol that uses the STA (Spanning Tree Algorithm) to find redundant links dynamically and create a spanning-tree topology database. Bridges exchange BPDU (Bridge Protocol Data Unit) messages with other bridges to detect loops.

• BPDU STP hello packet that is sent out at configurable intervals to exchange information among bridges in the network.

Page 22: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Transparent BridgingTransparent Bridging

Page 23: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Switching Table on a Bridge or Switching Table on a Bridge or SwitchSwitch

MAC Address Port

1

2

3

08-00-07-06-41-B9

00-00-0C-60-7C-01

00-80-24-07-8C-02

Page 24: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Cisco Spanning Tree Protocol Cisco Spanning Tree Protocol EnhancementsEnhancements

• PortFast is a Cisco feature. It supports the concept of a switch edge port.

• UplinkFast and Backbone Fast. UpLinkFast is a Cisco feature that is configured on access layer switches. Improves the convergence time of STP.

• Unidirectional link detection is a hardware failure detection between switches.

• Loop Guard is a Cisco product. Supports the prevention of loops caused by blocking port erroneously moving to the forwarding state.

Page 25: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Redundant UplinksRedundant Uplinks

Access Layer

Distribution Layer

CoreLayer

Switch A

Switch B Switch C

Primary Uplink

Secondary UplinkX

X

X = blocked by STP

• If a link fails, how long will STP take to recover?• Use UplinkFast to speed convergence

Page 26: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Protocols for Transporting VLAN Protocols for Transporting VLAN InformationInformation

• Inter-Switch Link (ISL)– Tagging protocol– Cisco proprietary

• IEEE 802.1Q– Tagging protocol– IEEE standard

• VLAN Trunk Protocol (VTP)– VLAN management protocol is a switch-to-switch

and switch-to-router configuration.

Page 27: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Protocols for Transporting VLAN Protocols for Transporting VLAN InformationInformation

• VLAN Trunk Protocol (VTP)– The VLAN management protocol exchanges VLAN

configuration changes as they are made to the network. VTP manages additions, deletions, and renaming of VLANs on a campus network without requiring manual intervention at each switch.

Page 28: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Selecting Routing ProtocolsSelecting Routing Protocols• They all have the same general goal:

– To share network reachability information among routers

• They differ in many ways:– Interior versus exterior– Metrics supported hop count or bandwidth.– Dynamic versus static and default– Distance-vector versus link-sate– Classful versus classless– Scalability

Page 29: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Interior Versus Exterior Routing Interior Versus Exterior Routing ProtocolsProtocols

• Interior routing protocols are used within an autonomous system

• Exterior routing protocols are used between autonomous systems

Autonomous system (two definitions that are often used):

“A set of routers that presents a common routing policy to the internetwork”

“A network or set of networks that are under the administrative control of a single entity”

Page 30: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing Protocol MetricsRouting Protocol Metrics• Metric: the determining factor used by a routing

algorithm to decide which route to a network is better than another

• Examples of metrics:– Bandwidth - capacity– Delay - time– Load - amount of network traffic – Reliability - error rate– Hop count - number of routers that a packet must

travel through before reaching the destination network

– Cost - arbitrary value defined by the protocol or administrator

Page 31: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting Algorithms• Static routing

– Calculated beforehand, offline

• Default routing– “If I don’t recognize the destination, just send the packet to

Router X”

• Cisco’s On-Demand Routing– Routing for stub networks– Uses Cisco Discovery Protocol (CDP)

• Dynamic routing protocol– Distance-vector algorithms– Link-state algorithms

Page 32: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsStub network has only one default path to non-local hosts and no outside network knowledge. Non-local stub network traffic uses a single logical path when traveling in and out of the network.A good example would be an individual or group that uses only one router to link to an internet service provider (ISP). The individual or group are considered stub networks by the ISP.

Page 33: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsThe default route is the IP address of the next hop when no other routes are known.

To configure the default route to be 192.168.1.1:config t ip route 0.0.0.0 0.0.0.0 192.168.1.1An interface can be used as an alternative to and IP address. To use serial0/0 for destinations not in the routing table, use:ip route 0.0.0.0 0.0.0.0 serial 0/0

Page 34: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsA default route of a computer that is participating in computer networking is the packet forwarding rule (route) taking effect when no other route can be determined for a given Internet Protocol (IP) destination address. All packets for destinations not established in the routing table are sent via the default route. This route generally points to another router, which treats the packet the same way: If a route matches, the packet is forwarded accordingly, otherwise the packet is forwarded to the default route of that router. The process repeats until a packet is delivered to the destination. Each router traversal counts as one hop in the distance calculation for the transmission path.

Page 35: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsCisco’s On- Demand RoutingThe Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol that, amongst other things, is used to discover other Cisco devices on either broadcast or non-broadcast media. CDP provides administrators with information that includes the IP address, software version, as well as the capabilities of the neighbor device. On-Demand Routing is an enhancement to Cisco Discovery Protocol that advertises the connected IP prefix or prefixes of a stub router via CDP. ODR also supports VLSM (Variable Length Subnet Mask), which means that it can be used in just about any network.

Page 36: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsCisco’s On- Demand Routing

It is important to know that ODR is not a routing protocol. Instead, it is simply an enhancement to CDP that is used to dynamically propagate routing information at Layer 2. The primary reasons ODR is often incorrectly referred to as a routing protocol is because it allows routers to dynamically exchange routing information. The second reason is because ODR is enabled using the router odr global configuration command.

Page 37: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsCisco’s On- Demand Routing

The primary benefits of using ODR is that it is not CPU intensive and it consumes very little bandwidth. 

Page 38: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing AlgorithmsRouting AlgorithmsCisco’s On- Demand Routing

Page 39: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Static Routing ExampleStatic Routing Example

RouterA(config)#ip route 172.16.50.0 255.255.255.0 172.16.20.2

Send packets for subnet 50 to 172.16.20.2 (Router B)

e0 e0e0

s0 s1s0 s0

Router A Router B Router C

Host A Host CHost B

172.16.10.2 172.16.30.2 172.16.50.2

172.16.20.1 172.16.40.1

172.16.10.1 172.16.30.1 172.16.50.1

172.16.20.2 172.16.40.2

Page 40: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Default Routing ExampleDefault Routing Example

RouterA(config)#ip route 0.0.0.0 0.0.0.0 172.16.20.2

If it’s not local, send it to 172.16.20.2 (Router B)

e0 e0e0

s0 s1s0 s0

Router A Router B Router C

Host A Host CHost B

172.16.10.2 172.16.30.2 172.16.50.2

172.16.20.1 172.16.40.1

172.16.10.1172.16.30.1 172.16.50.1

172.16.20.2 172.16.40.2

Page 41: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Distance-Vector RoutingDistance-Vector Routing• Router maintains a routing table that lists

known networks, direction (vector) to each network, and the distance to each network

• Router periodically (every 30 seconds, for example) transmits the routing table via a broadcast packet that reaches all other routers on the local segments

• Routers update their routing table, if necessary, based on received broadcasts

Page 42: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Distance-Vector Routing TablesDistance-Vector Routing Tables

Router A Router B

172.16.0.0 192.168.2.0

Network Distance Send To

172.16.0.0 0 Port 1192.168.2.0 1 Router B

Network Distance Send To

192.168.2.0 0 Port 1 172.16.0.0 1 Router A

Router A’s Routing Table Router B’s Routing Table

Page 43: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Link-State RoutingLink-State Routing• Routers send updates only when there’s a

change• Router that detects change creates a link-state

advertisement (LSA) and sends it to neighbors• Neighbors propagate the change to their

neighbors• Routers update their topological database if

necessary

Page 44: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Distance-Vector Vs. Link-StateDistance-Vector Vs. Link-State• Distance-vector algorithms keep a list of

networks, with next hop and distance (metric) information

• Link-state algorithms keep a database of routers and links between them– Link-state algorithms think of the internetwork as

a graph instead of a list– When changes occur, link-state algorithms apply

Dijkstra’s shortest-path algorithm to find the shortest path between any two nodes

Page 45: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Link-State Routing ProtocolLink-State Routing Protocol

Page 46: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Choosing Between Distance-Vector Choosing Between Distance-Vector and Link-Stateand Link-State

Choose Distance-Vector• Simple, flat topology• Hub-and-spoke topology• Junior network administrators• Convergence time not a big

concern

Choose Link-State• Hierarchical topology• More senior network

administrators• Fast convergence is critical

Page 47: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Choosing between Distance Vector Choosing between Distance Vector and Link State Protocolsand Link State Protocols

Distance-Vector• Routing Information Protocol

(RIP) Version 1 and 2• Interior Gateway Routing

Protocol (IGRP)• Enhanced IGRP• Border Gateway Protocol

(BGP)

Link-State• Open Shortest Path First

(OSPF)• Intermediate System-to-

Intermediate System (IS-IS)

Page 48: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing ProtocolRouting ProtocolView:

http://www.youtube.com/watch?v=CBDdM-imW7o

Page 49: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Dynamic Routing ProtocolsDynamic Routing ProtocolsView:

http://www.youtube.com/watch?v=gXOKjnZR4Tg

Page 50: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing Information Protocol (RIP)Routing Information Protocol (RIP)• First standard routing protocol developed for TCP/IP

environments

– RIP Version 1 is documented in RFC 1058 (1988)

– RIP Version 2 is documented in RFC 2453 (1998)

• Easy to configure and troubleshoot

• Broadcasts its routing table every 30 seconds; 25 routes per packet

• Uses a single routing metric (hop count) to measure the distance to a destination network; max hop count is 15

Page 51: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

RIP V2 FeaturesRIP V2 Features

• Includes the subnet mask with route updates– Supports prefix routing (classless routing, supernetting)

– Supports variable-length subnet masking (VLSM)

• Includes simple authentication to foil crackers sending routing updates

Page 52: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

IGRP Solved Problems with RIPIGRP Solved Problems with RIP• 15-hop limitation in RIP

– IGRP supports 255 hops

• Reliance on just one metric (hop count)

– IGRP uses bandwidth, delay, reliability, load

– (By default just uses bandwidth and delay)

• RIP's 30-second update timer

– IGRP uses 90 seconds

Page 53: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

EIGRPEIGRP• Adjusts to changes in internetwork very

quickly• Incremental updates contain only changes,

not full routing table • Updates are delivered reliably• Router keeps track of neighbors’ routing

tables and uses them as feasible successor• Same metric as IGRP, but more granularity

(32 bits instead of 24 bits)

Page 54: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Open Shortest Path First (OSPF)Open Shortest Path First (OSPF)• Open standard, defined in RFC 2328• Adjusts to changes quickly• Supports very large internetworks• Does not use a lot of bandwidth• Authenticates protocol exchanges to

meet security goals

• Is an IP routing protocol that is completely link state.

Page 55: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

OSPF MetricOSPF Metric

• A single dimensionless value called cost. A network administrator assigns an OSPF cost to each router interface on the path to a network. The lower the cost, the more likely the interface is to be used to forward data traffic.

• On a Cisco router, the cost of an interface defaults to 100,000,000 divided by the bandwidth for the interface. For example, a 100-Mbps Ethernet interface has a cost of 1.

Page 56: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

OSPF Areas Connected via Area Border OSPF Areas Connected via Area Border Routers (ABRs)Routers (ABRs)

Area 1 Area 3Area 2

Area 0 (Backbone)

ABR ABRABR

Page 57: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

IS-ISIS-IS

• Intermediate System-to-Intermediate System.• Link-state routing protocol.• Designed by the ISO for the OSI protocols.• Integrated IS-IS handles IP also.

Page 58: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

IS-ISIS-IS IS-IS is a routing protocol designed to move information efficiently within a computer network, a group of physically connected computers or similar devices. It accomplishes this by determining the best route for datagrams through a packet-switched network. The protocol was defined in ISO/IEC 10589:2002 as an international standard within the Open Systems Interconnections (OSI) reference design

Page 59: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)• Allows routers in different autonomous

systems to exchange routing information– Exterior routing protocol– Used on the Internet among large ISPs and major

companies• Supports route aggregation• Main metric is the length of the list of

autonomous system numbers, but BGP also supports routing based on policies

Page 60: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Border Gateway Protocol (BGP)Border Gateway Protocol (BGP)

Page 61: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Internet Protocol (EGP)Internet Protocol (EGP)During the early days of the Internet, EGP version 3 (EGP3) was used to interconnect Autonomous Systems. Currently, BGP version 4 is the accepted standard for Internet routing and has essentially replaced the more limited EGP3.

Page 62: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Internet Control Message Protocol Internet Control Message Protocol (ICMP)(ICMP)

• ICMP works at the Network layer and is used by IP for many different services. ICMP is a management protocol and messaging service for IP. Its messages are carried as IP datagrams.

Page 63: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Routing Protocols SummaryRouting Protocols SummaryDistant vector:

RIP and IGRPLink-state:

OSPFHybrid:

EIGRP

Page 64: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

SummarySummary• The selection of switching and routing protocols

should be based on an analysis of– Goals– Scalability and performance characteristics of the

protocols• Transparent bridging is used on modern switches

– But other choices involve enhancements to STP and protocols for transporting VLAN information

• There are many types of routing protocols and many choices within each type

Page 65: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Review QuestionsReview Questions• What are some options for enhancing the

Spanning Tree Protocol?• What factors will help you decide whether

distance-vector or link-state routing is best for your design customer?

• What factors will help you select a specific routing protocol?

• Why do static and default routing still play a role in many modern network designs?

Page 66: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

This Week’s OutcomesThis Week’s Outcomes

• Spanning Tree Protocol• Rapid Spanning Tree Protocol• Static versus Dynamic Routing• Routing Protocols and Characteristics

Page 67: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Due this weekDue this week

• 6-1 – Concept questions 5

Page 68: ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.

Q & AQ & A

• Questions, comments, concerns?