logging in or signing up 11 Routing Noormahl Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 4503 Category: News & Reports.. License: All Rights Reserved Like it (0) Dislike it (1) Added: October 07, 2007 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... By: candrasetiawan (30 month(s) ago) Top Saving..... Post Reply Close Saving..... Edit Comment Close By: chris24 (38 month(s) ago) Network 07' is very informative.Can I please download it for personal use towards my computer studies. Saving..... Post Reply Close Saving..... Edit Comment Close By: subhak (41 month(s) ago) pls allow me to download this......... Saving..... Post Reply Close Saving..... Edit Comment Close By: talk2kshitish (47 month(s) ago) plz allow me to dwnload this presentation..... Saving..... Post Reply Close Saving..... Edit Comment Close Premium member Presentation Transcript Networks ’07: Networks ’07 Advanced RoutingDynamic Routing: Dynamic Routing Dynamic routing provides a way to automatically work out the path between two nodes on a network Dynamic routing protocols can be divided into two different forms: Interior Gateway Protocols (IGP) Exterior Gateway Protocols (EGP)Autonomous Systems: Autonomous Systems An autonomous system “is a collection of IP networks and routers under the control of one entity (or sometimes more) that presents a common routing policy to the Internet.” (RFC 1930) Autonomous systems can be assigned an autonomous system number (ASN) by their RIR.Interior Gateway Protocols: Interior Gateway Protocols Control routing within a single autonomous system Examples include RIP, OSPF, iBGP, IGRP, EIGRP, IS-ISExterior Gateway Protocols: Exterior Gateway Protocols Control routing between different autonomous systems Sometimes known as inter-domain routing (as in CIDR) The most common example is (e)BGP. Others are EGP and CSPFRouting Algorithms: Routing Algorithms There are three predominant forms of routing algorithms Distance vector algorithms Link State algorithms Path vector algorithms The first two are largely used for IGPs, the last is used by EGPsDistance Vector Algorithms: Distance Vector Algorithms Use the Bellman-Ford algorithm Learn routing information from their immediate neighbours Choose the lowest (total) cost path between two nodes Must have some metric to measure “cost”Link-State Algorithms: Link-State Algorithms Attempt to create a map of the whole network Update the map every time there’s a link transition Use Dijkstra's algorithm to find the best path through the mapPath Vector Algorithms: Path Vector Algorithms Are a variation of distance vector algorithms The view each autonomous system as a node, with no regard to routing within the AS Reduces the amount of flap caused by internal topology changesCriteria Common to all Protocols: Criteria Common to all Protocols Choose routes based on the smallest matching prefix (this is true in static routing too) Must have some metric to determine the “best” route given two (or more) routes to the same destination Must be able to handle topology changes Can usually redistribute routes from other sourcesRouting Information Protocol: Routing Information Protocol Is a widely implemented UDP broadcast-based distance-vector IGP Uses hop count as a routing metric Prevents loops by limiting the number of hops (usually to 15) Each router broadcasts its routing table every ~ 30 seconds Originally contained no authentication or support for VLSMs (RIPv1)Open Shortest Path First: Open Shortest Path First OSPF is a link-state algorithm A layer four protocol in its own right. Typically uses multicast and/or unicast Defines one or more areas, and creates a map of each area Each area must have a designated router (DR) and a backup designated router (BDR) to maintain the map Areas are linked by area border routers Autonomous systems are linked by ASBRsOSPF Areas: OSPF Areas The backbone area is the core of an OSPF network. It is also known as area zero (0.0.0.0). A stubby area is one that doesn’t receive external routes (but does receive intra-area routes) There are also totally-stubby areas and not-so-stubby areasOSPF Path Preference: OSPF Path Preference OSPF uses path cost as its routing metric. The standard doesn’t link path cost to any particular value, leaving that to the network designer It is typically represented by the speed of a link. This needs scaling on modern networksBorder Gateway Protocol: Border Gateway Protocol TCP-based path vector algorithm Makes use of autonomous system numbers Can be an IGP (one ASN) or an EGP (intra-ASN) Routes are exchanged in a peering sessionBGP Peering Session: BGP Peering Session When a new (TCP) session is established, neighbours exchange routing information bases (RIB) When the TCP connection to a neighbour is closed, routes learned from that neighbour are removed When topology changes, neighbours exchange updates Updates may be damped to reduce route flapBGP Routing Decision: BGP Routing Decision Weight check Local preference check. Local route check. AS path length check. Origin check. Multi Exit Discriminator (MED) check.BGP Communities: BGP Communities Communities can be used to tag routes with extra information There are some standard communities: internet local-as no-export no-advertise Other communities are used defined, and have a user-defined interpretationRoute Maps: Route Maps Used by both BGP and OSPF Route maps can be used to alter incoming or outgoing routes Can set or remove community in BGP Can change weight or local preference Can change the next-hop Can drop route entirelyBlackhole Routes: Blackhole Routes Traffic routed to a black hole disappears Can be a route to 255.255.255.255 to a null interface (hence null routing) Name and convention are implementation specific Best practices dictate that you black hole traffic to your complete IP block on every internal router (why?, how does this not break things?) You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.