Académique Documents
Professionnel Documents
Culture Documents
Josh Lowe
September 2015
Network Technologies)
Connecting Remote Locations with Headquarters VPNs covered in tutorial
Routing and TCP/IP Operations
Implementing RIPng Covered in Lab and Tutorial
Cisco Confidential
Physical
Logical
Breaking the network down into smaller modules, each with its own purpose, helps with
Cisco recommends breaking the network up into two functional areas, the Enterprise
Enterprise Campus
Enterprise Edge
The basic goal of routing protocols is to exchange network layer reachability information
Best practices say to only use one IP routing protocol throughout the enterprise
Sometimes, this is not feasible/possible:
Your organization has acquired another organization which uses a different protocol
Some devices in your network do not support one or more of the protocols in use
Your organization is multi-homed to two or more ISPs
In a multi-homed environment routes are typically exchanged with the ISPs using BGP
10
11
With so many different routing protocols available, how do you know which one to use?
Each protocol has its own advantages and drawbacks
In general, you need to consider the following when choosing a routing protocol:
1.
2.
Multivendor support (does that new Juniper router you purchased support EIGRP?)
3.
Knowledge level (how well do you understand the nuances of multi-area OSPF configuration?)
4.
Type of routing algorithm (link-state vs distance vector vs path vector, which is best for your needs?)
5.
Speed of convergence (how fast does the protocol recover from failures?)
6.
Scalability (how much overhead is introduced by the protocol? Small networks dont need complex
protocols)
12
13
Routers only know what their immediate neighbors tell them; lack details of the full network topology
E.g. You can get to network B through me, and the distance is 100
14
Link-state Protocols:
15
Convergence describes the process of when routers notice changes in the network,
exchange the information about the change, and perform necessary calculations to reevaluate the best routes
A converged network is one where all routers have the same view of the network
topology
16
Convergence time describes how fast network devices can reach a state of convergence
17
You can also influence convergence time by configuring summarization and some
protocol-specific features
18
convergence times
You can summarize routes by squeezing several
19
time
Different protocols support different route
20
Larger networks are at increased risk of routing protocol instability or long convergence
times
Scalability describes the ability of a routing protocol to support further network growth.
21
Cisco Confidential
22
Unicast (one-to-one)
Traffic is exchanged between one sender and one receiver
Source IP addresses are always unicast
23
Broadcast (one-to-all)
Used to send traffic to all devices in a subnet
255.255.255.255 is a local broadcast address, which reaches all devices in the local subnet (not
forwarded by routers)
A directed broadcast allows you to reach all devices in a remote subnet (e.g. 10.1.1.255/24)
IPv6 does not have broadcast addresses
24
25
Anycast
(one-to-closest)
26
Early routing protocols used broadcasts to exchange routing information, which was
27
28
ICMPv6 is much more robust protocol than its IPv4 counterpart as it includes ICMPv6
Router Solicitation (RS) Sent by a device to request that a neighboring router send a router advertisement (RA)
message
Router Advertisement (RA) Sent by routers periodically, or in response to an RS message. Includes link
information needed by hosts to automatically configure their global addresses (e.g. network prefix, default gateway)
Neighbor Solicitation (NS) Replaces an ARP request. Sent to the Solicited Nodes multicast of a destination
device asking it to reply with its MAC address
Neighbor Advertisement (NA) Unicast reply to a NS message, containing the requested MAC address
Redirect Tells a sending device that they should use a different next-hop router to get to the destination (These are
not the droids you are looking for)
29
types:
Point-to-point
Broadcast
NBMA
30
Point-to-point
A network that connects a single pair of routers
A packet sent by one device is received by exactly one recipient on the other end
Typical Layer 2 protocols that run over P2P networks include HDLC and PPP
31
Broadcast
A network that can connect many devices on a single segment (usually via a Layer 2 switch)
Supports broadcast messages, which go to every other device on the segment
An example broadcast Layer 2 protocol is Ethernet
32
Example protocols that run on NBMA networks include Frame Relay and ATM
33
NBMA networks can use a variety of topologies, but most often are hub-and-spoke, or
partial mesh. Full mesh NBMA networks are expensive and dont scale well
Hub-and-spoke NBMA topologies can be especially problematic for routing protocols.
34
Split Horizon
The split horizon rule is designed to prevent routing loops in distance vector protocols
The rule states that an update received on an interface cant be sent back out that same interface
In a hub-and spoke network, this means that if the hub receives an update from a spoke, it cant forward
it back out to the other spokes using the same physical interface!
The solution is to either disable split horizon on the interface, or else modify the network to use multiple
point-to-point subinterfaces (more later)
35
Neighbor Discovery
Most routing protocols multicast Hello packets in order to discover their neighbors automatically
Nonbroadcast networks dont allow broadcasts (or multicasts) so routers are unable to automatically find
each other
Instead, on these network types you must statically configure your neighbors
Additionally, since NBMA is a multi-access network type, OSPF needs to elect a designated router (DR)
By definition, the DR needs to be able to talk directly to all other routers on the segment
The hub is the only device with circuits to all other devices, so it must always be the DR
DR
36
As mentioned previously, you can use subinterfaces to circumvent some of the problems
37
Cisco Confidential
38
39
Description
prefix mask
The IP network and subnet mask for the remote network to be entered into the IP routing table.
address
The IP address of the next hop that can be used to reach the destination network.
interface
The local router outbound interface to be used to reach the destination network.
dhcp
(Optional) Enables a Dynamic Host Configuration Protocol (DHCP) server to assign a static route to a default gateway (option 3).
distance
name next-hop-name
permanent
(Optional) Specifies that the route will not be removed from the routing table even if the interface associated with the route goes
down.
track number
(Optional) Associates a track object with this route. Valid values for the number argument range from 1 to 500.
tag tag
40
R2 is configured with a static route to the R1 LAN and a default static route to the Internet.
R1 is configured with a default static route.
R2(config)# ip route 172.16.1.0 255.255.255.0 S0/0/0
R2(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
41
endpoints together
Through the use of Network Conrol Protocols (NCPs) it can support a variety of Layer 3
42
PPP connections can be optionally authenticated using one of two protocols: PAP or
CHAP
You can enable PPP authentication on an interface using the following command:
ppp authentication { chap | chap pap | pap chap | pap }
PAP authentication requires the remote device to send a name and password (in plain
43
PPP is traditionally used on serial links, however ISPs also like to use it on their
features
Customers tend to use Ethernet in their homes, and PPP is not natively supported on
Ethernet
PPP over Ethernet (PPPoE) allows the sending of PPP frames encapsulated inside
Ethernet frames
44
PPPoE creates a PPP tunnel over an Ethernet connection, allowing PPP frames to be
automatically, and get detailed accounts of their connectivity, while still letting them use
Ethernet networks
45
46
Identifier (DLCI)
To provide IP layer connectivity, a mapping between IP addresses and DLCIs must be
47
Cisco Confidential
48
must fragment the packet (unless the Dont Fragment, DF, bit has been set)
Reassembly of the packet is the responsibility of the destination device
49
50
To avoid fragmentation, the TCP Maximum Segment Size (MSS) defines the largest
amount of data that the receiving device is able to accept in a single TCP segment
The MSS is not negotiated between sender and receiver.
The sending device is required to limit the size of the TCP segment equal to or less than
buffer size and MTU of the outgoing interface minus 40 bytes. Why 40 bytes?
Example:
The default Ethernet MTU is 1500 bytes.
A TCP segment over IPv4 sent out an Ethernet interface will have a TCP MSS of 1460
This is 1500 bytes for the Ethernet MTU, minus 20 bytes for the IPv4 header, and 20 bytes for the TCP
header.
51
The TCP MSS helps avoid fragmentation at the two ends of the TCP connection but it
does not prevent fragmentation due to a smaller MTU on a link along the path
Path MTU Discovery (PMTUD) determines the MTU along a path from the packets
source to destination
A host uses the full MSS determined by the outgoing interface and sets the TCP DF bit
the egress interface, it will drop the packet due to the DF bit being set and send an ICMP
Destination Unreachable message back to the originator of the packet
Size 1492
1500
DF
X
R1
MTU
1500
R2
MTU
1492
R3
MTU
1500
R4
Josh Lowe, 2015
52
IPv6 routers do not fragment a packet unless it is the source of the packet
If an IPv6 router receives a packet larger than the MTU of the outgoing interface, it will
drop the packet and send an ICMPv6 Packet Too Big message back to the source,
including the smaller MTU.
The PMTUD operations for IPv6 are similar to that of PMTUD for IPv4
53
Thank you.