Static IP Routing and Aggregation Exercises

Size: px
Start display at page:

Download "Static IP Routing and Aggregation Exercises"

Transcription

1 Politecnico di Torino Static IP Routing and Aggregation xercises Fulvio Risso August 0, 0

2 Contents I. Methodology 4. Static routing and routes aggregation 5.. Main concepts Routing table irectly connected IP networks Remote IP networks Costs Aggregated routes Mainly specific route efault route ifferent costs routes Routing table definition procedure List and typology of the IP networks efinition of the routing tree etermination of the routing table etermination of the possible routes aggregations II. xercises 0. xercises.. xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n xercise n

3 III. Solutions Solutions Solution of exercise n Solution of exercise n Solution of exercise n Routes with equivalent addressing space Routes with maximal aggregation Solution of exercise n Routes with equivalent addressing space Routes with maximal aggregation Solution of exercise n Routes with equivalent addressing space Routes with maximal aggregation Solution of exercise n Solution of exercise n Addressing done trying to maximize routes aggregation on R Addressing done trying to minimize the number of allocated addresses Solution of exercise n Solution of exercise n Solution of exercise n Solution of exercise n Solution of exercise n Solution of exercise n Solution of exercise n Case Case Case LAN realized with a switching technology

4 Part I. Methodology 4

5 . Static routing and routes aggregation The biggest difficulty of this set of exercises is to be found in the definition of the routing inside an IP network. Suppose that the network has been previously configured at IP level, that is to say that the addressing plane has been defined and that the various entities present in the network (hosts, routers) have been correctly configured at address/netmask level. Remember that the concepts that are pointed out in the exercises do not depend on the implemented topology of routing of the network (static or dynamic) because, with the same typology and the same costs, all algorithms converge to the same result. The difference is to be found in the fact that the static routing has to be configured completely by hand in every router and is not able to evolve autonomously to the topological variations of the network. Thus the concepts presented here are perfectly general and independent of the way the routing is computed. To help solving the presented exercises of this set, in the first part, the main concepts of the definition of the routing tables are summarized, giving a methodology to solve these exercises... Main concepts... Routing table The routing table is a local table belonging to a router whose principle is to list the destinations in the network. In the IP world, the destinations are all the existing networks in the studied topology. For instance, in the topology of next figure, 5 IP networks are present, that are each corresponding to a line in the routing table. Notice that if the number of lines in the routing table depends on the number of IP destinations in the studied topology, it is then the same for all routers belonging to this topology. Obviously, being the destination corresponding to the existing IP networks, all the routers will have the same list of reachable destination, even though the paths realized to reach these destinations will be different. For each destination in the routing table, the following information is usually present: Network typology: indicate how the router has learned this network. Adopting the convention used by Cisco routers, the networks directly connected are indicated by the letter C, the routers known through the static routing are indicated by the letter S, and so on. Network/Netmask: indicate the network address and the associated netmask, that is the address range (the destination ) of this route. Next Hop: address of the interface that will be used to forward packets to the destination. The meaning of this field is different when the IP network is directly connected or not and it will be detailed more farther. Cost: gives, using a numeric value, the distance from the studied router to this network. For instance, a network reachable with cost 4 is farther away than a network reachable with cost. More details about costs will be given in the section..4. You can see an example of routing table on the next figure. 5

6 Routing table Type Network NextHop Cost C / C / S / S / S / R.9 Network /30.30 R Network /30 R3 Network /5 Network /4 Network /4 ven though, at the level of the number if present destinations in the routing table there is no difference between a IP network directly connected to the router and a remote (reachable through other routers) network, there are differences related to how are obtained the networks and how they are indicated in the routing table.... irectly connected IP networks The directly connected IP networks are those reachable with direct IP routing. For example, the networks /5 and /30 for the router R of previous figure are directly connected (and shown in yellow on the figure). Notice that the directly connected networks are not the ones that are physically connected to the studied router (e.g., all the thernet networks linked to the router), but the IP networks reachable with direct routing. Notice also that on a LAN physically connected to the router there may be IP networks not directly reachable. The knowledge of the directly connected networks by a router is automatic ans is determined by the fact that the router has an interface belonging to that IP network. For instance, the router R of the previous figure will automatically insert the networks /5 and /30 in its routing table, without any intervention of the administrator of the apparel and even without dynamic routing. In the case of the directly connected IP networks, the value of next hop in the routing table identifies the address of the interface of the local router that will be used to reach this destination. For example, in the network of the figure the router R will reach reach all destinations /5 through its interface with address 0.0../5: the value of the field next hop will then be Remote IP networks The remote IP networks (that is to say not directly connected) are those reachable with indirect IP routing, that is the packets directed to these destinations must be sent to a router that will forward them to this destination. For example, the networks /4, /4 and /30 for the router R of the previous figure are remote networks (and shown in green in the figure). The remote IP networks are not automatically known by the router. An explicit configuration operation of the router is needed that can be realized by the administrator (who will configure a static route for this destination) or through the configuration of dynamic routing protocol (that will deal with the automatic communication of the list of the remote destinations). Only following one of these two actions, the remote destination will appear in the routing table. For instance, the remote networks are indicated in figure by the letter S in the corresponding entry of the routing table because they are defined using static routing. 6

7 For these networks, the value of next hop in the routing table identifies the address of the interface of the next router that will be used to reach this destination. For example, in the network of the figure the router R will reach all the destinations /4 through the left interface of the router R, that has address /30: the value of the field next hop of this route will then be The choice of identifying as next hop the interface of the next router and not the exiting interface of the current router is due to the fact that the two values would be equivalent only in the case of point-to-point links. Actually, in the figure it is obvious that a packet exiting from the interface.9 of R can not be received by the interface.30 of R. This is not true in the case of networks with broadcast ability: for instance, a router may generate two packets exiting from one of its thernet interfaces, the first one heading to the router R and the second one heading to the router R3, both linked to the same thernet network (and with IP addresses belonging to the same network). if the indication of the exiting interface is not always sufficient to determine the next hop to the destination, the indication of the next interface of entry is not ambiguous. Finlay notice that the address of the next hop must always be reachable through direct routing by the studied IP machine. As long as this is not true, the student is sure to be wrong...4. Costs The cost of a route is mandatory to favor a path (of minor cost) instead of another one (of major cost). Actually, this information is present in the table mainly for debugging, because it is not used by the router, there is not more than one route for each destination with diverse costs (the process of creation of the routing table select only one path to each destination and it is the best path, thus the alternative routes with an higher cost are never shown). The cost of a route depends, unfortunately, strongly on the used operative system. For example, some operative systems, as Windows, assigned costs > 0 to both connected and static routes; others, as Cisco IOS, assume that both static and connected routes have cost 0. In addition, some of them (e.g. Windows) allow only one cost metric (a true number), while others (e.g. Cisco IOS) handle the cost for a couple administrative distance/metric, where the first number gives the goodness of the protocol used to learn that route (for instance, a static route could be considered better that a dynamic one) and the second one is the actual cost, knowing that the administrative distance has precedence over the choice of the best route (that is to say, a route of cost 0/ will always be worse than one of cost / but a route of cost /0 is better than a route of cost /). In actual systems both the cost of connected and static routes is fixed and established beforehand. The first can not be changed even by the administrator even though the second can be changed manually by changing the costs of the various routes. The reason of this imposed beforehand cost in the case of static routes can be found in the impossibility, for the apparel, to know the effective distance from itself to the network and this the cost is imposed beforehand to a default value. In this set of exercise, one will try to get free of real particular device and will adopt the following convention: the cost is a single number (not a couple administrative distance/cost) when not specified otherwise, the connected routes have cost 0 (no possible modification) while static routes have a cost that depends on the effective distance between the studied router, obtained summing the costs of going through each link (and set conventionally to ), and the destination (for instance, the previous picture shows some static routes of cost and others of Actually, for example for the system Cisco IOS, it is possible to change only the administrative distance but not the true cost. In this case, it is possible to define a static route with a cost such as it is chosen only if the dynamic protocol can not find any route to destination, letting the precedence to the dynamic protocol when possible. 7

8 cost ). Anyway, the cost may be changed if the administrator of the network has particular needs. The student should also remember to control the convention used on the real device regarding costs and proceed to the needed adaptations to the theory presented here...5. Aggregated routes The IP routing model foresees that two or more routes can be replaced by an aggregated equivalent route. The basic idea is that if a destination is reached through a given next hop NH and a destination is reached through the same next hop NH, the destinations and can be melted together in an equivalent destination -. The advantage of aggregation is that the number of routes in the routing table decreases, making the forwarding of IP packets to destination by the routers easier. There are two conditions for having the right to melt together two (or more) routes and replace them with an equivalent aggregated route: (Mandatory) the studied routes must share the same next hop; (partially mandatory) the studied routes must be aggregable, that s to say there must exist an address range that includes exactly the original address ranges. Next figure contains an example of aggregation: the six green networks share the same next hop for the router R and thus may potentially be aggregated. Nevertheless it is important that the second condition also is respected : the new addressing space must be equivalent to the original ones. It is now possible to aggregate the due point-to-point networks with an equivalent route to the network /9, while the four /4 networks may be aggregated together in a network /. Later on, we will show that this request can be partially relaxed 8

9 For the aggregation operation, it is no problem if the routes have different costs: the cost is actually never used by the router during the routing, it is used previously to determine the best path among many routes heading to the same destination. That s why it is possible to aggregate together routes with diverse costs giving the route a conventional cost (decided by the operator), with the single condition that in case of multiple routes to the destination they have cost values such as the best path is the one that is chosen. Notice that the aggregation of the network /9 has been made possible by the particular disposition of the IP networks in the studied topology: if the networks had been assigned in increasing order from left to right ( /30 between R and R, /30 between R and R3, /30 between R3 and R4), it would not have been possible to aggregate them. Actually, the remote networks 4.4/30 and 4.8/30 can not be aggregated is a single addressing /9 range the valid ranges are 4.0/9, that does not include the network 4.8/30, and 4.8/9, that does not include the network 4.4/30). In consequence, the way the address are assigned inside the network is of instrumental importance in the allowing (or the preventing) of the aggregation. The fact that the concept of aggregation changes the semantic of the information included in each route is noteworthy. While the original definition of the routes foreseen that each route was assigned to a network, by now each route is associated an address range. In other words, the indication network/netmask present in each route does no longer identify a n IP network but may identify a set of aggregated IP networks, that is to say an address range. In addition, an address that in the original network was not available for an host (for instance because it is the network address or the broadcast address) becomes seemingly usable when one considers the aggregated address ranges (this can be seen for example with the address that is a broadcast address in the original network of the figure but that becomes seemingly an host address in the aggregated route /). Nevertheless, this creates particular problems because it is true that an eventual packet heading to this (presumed) host is forwarded to the destination, but it is also true that this packet will sooner or later be discarded by one of the next routers that, due to their proximity to the destination network, will not be able to aggregate such addresses and will thus be more precise, following the principle saying that the aggregation is decreasing when going from the center to the fringes of the network.. Finlay, one must remember that the aggregation is useless for directly connected networks. In principle, they are made of routes like others and they may be aggregated; in reality, otherwise, they automatically configured by the router because they originate from directly connected IP networks and they can not be canceled in the routing tables. That s why, contrary to the other types of routes (for example static ones), it is not possible to replace directly connected routes by other routes due to the impossibility of cancel them in the routing tables...6. Mainly specific route The IP routing also supports the concept of mainly specific route. Practically, it is possible ti define two routes whose addressing space are partially superimposed and, in case of match on both routes, the most specific one has priority; that is to say the one with biggest prefix length (a route to an addressing space /30 is more specific than a route to a /4 space). The following figure may help to clarify this concept. 9

10 Type Network NextHop Cost S / R Type Network NextHop Cost S / R / /30 R3 Network / Network /4 Network /4 Network /4 The router R in figure in figure has two routes: one for the address range / to R3 and one for the address range /4 to R. Assume that the router R has an IP packet that has to be forwarded to the host 0.0..: this address is included in the address range / so it will be sent to the right. Now assume that R must forward a packet to the host : this host belongs to both the address range of the first route ( /4) and to the one of the second route ( /). As the routes may refer to different paths (actual, the first one is pointing left and the second one right) it is mandatory to have an unequivocal criterion to determine the best route. In the IP world, the rule is that the most specific route wins. In this case, thus, the packet will be forwarded to R. This concept makes possible the aggregation of routes in a far more efficient way compared to what has been shown previously because the aggregation of IP routes may actually use an address range bigger than the simple union of the involved routes. Once again, a figure is useful to make this clearer. In this example it is possible to directly aggregate in a single route all the destination sharing their next hop router (shown in figure), for example, replacing them with a single route to the address range 0

11 /. This addressing space includes the addresses from to and so gathers all the destinations that were previously known inside the single route. This address range includes also the destinations /30 that instead do not belong to the routes whose next hop is : this is not a problem because to these destinations there is a more specific route. It is interesting to notice that the new address range / actually includes other destinations that would not be part of the simple union of the addressing spaces of the single routes, that is to say that the range of addresses from to This is normally not a problem because the destination are not in any way reachable in the network and thus what happens is that the packets heading to these destinations are forwarded in a direction but sooner or later a router in this path will notice that these destinations can not be reached and will discard the packets. Referring to the example of the previous figure, the behaviors of the network receiving three hypothetical packets can be studied: Packet heading to the host 0.0..: the destination address is included in the route / and it is thus correctly forwarded to R. Packet heading to the host : the destination address is included in both the addressing space of the route 0.0.0/ and the one of the route /30. In this case the most specific route is chosen and the packet is thus correctly forwarded by direct routing to the destination Packet heading to the host : the destination is included in the route / and it will thus be forwarded to R. Obviously, this destination does not exist in this network but this is of no importance: the router R may realize this (even though it could also have a route containing the address ) but probably sooner or later a router will realize the non-existence of the host and discard the packet. One of the problems that can appear using the aggregation technique with more extended routes (often indicate as supernet routes) compared with the original addressing space is the creation of loops in the forwarding of packets. Assume for instance that R in figure had a default route to the right, while R had a default route to the left. In this case a packet heading to the host 0... does not belong to any specific route and must thus be forwarding along the default route. At this point, then, R will send the packet to R that will send it back to R and so on as long as its life span has not been exceeded. Generally, the loop problem can emerge when supernets are used: it is the duty of the network administrator to project the routing in a way that prevents that kind of behavior. Finally, remember that the routing table is different for each router. Thus the way the aggregations can be handled depends from router to router on the way the various networks addressing spaces can be aggregated...7. efault route xtending the concept of aggregation, it is possible it is possible to examine how the router R lay also choose other address ranges to aggregate its routes: instead of specifying the address range / it may specify a default route that would be used to handle all the destinations that can be reached through a given next hop. In this case, the routing table of R would become: Type Network Next Hop Cost C / S /

12 The choice of an option instead of another is determined by the context and the preferences of the operator. Generally, with a default route it is possible to aggregate all the routes to a given direction, replacing N routes that converge to the same next hop by a single one. Nevertheless it can be used only once (obviously, it is not possible to have two default routes on the same router). Practicaly, the default route is commonly used when an user network is connected to Internet because it allows to reach all destinations on Internet without having to explicitly name each one of them...8. ifferent costs routes It is possible in a routing table to indicate two alternative routes with different cost, as in this example 3 : Type Network Next Hop Cost S 0...0/ S 0...0/ In this case, the router will select the first route to the network 0...0/4 because its cost is smaller and the second one will be ignored. Nevertheless, in the case in which the first route becomes unavailable (for example the interface to the next hop fails), the first route becomes useless and the second one will be used to have an alternative path to the same destination. This king of configuration is commonly named backup route. The use of such a configuration is however much limited. As seen in the theory, the static backup routes often do not function because the router is not able to notice failures of the non-directly connected networks (in some cases, no of these failures is noticed ; for example, the studied router may not notice that the interface has been shut down.) and this may cause loops for packets. Actually, the custom is to use with much parsimony this function in case of static routing; in case of dynamic routing, this no longer necessary as the routing protocol foresees to recompute the addressing without the need for a backup route. Secondly, with this configuration topology, a additional level of ambiguity in the routes is introduced after the use of the aggregated routes because a packet can match more than one route with diverse costs. In case of ambiguity, the route choice algorithm will select first () the most specific route, then () the one will the smallest cost. This is equivalent to say that the routes with a bigger cost must have the same prefix length as the one with smaller cost else either they will never be selected if they refer to supernets) or they will always be selected (if they are more specific). For instance, with the following routing table: Type Network Next Hop Cost S 0...0/ S 0...0/ the second route will never be selected for the destinations 0...0/4 because the first one is more specific. Vice-versa, with this configuration: Type Network Next Hop Cost S 0...0/ S 0...0/ Notice that this example has nothing to do with the topology used up to now. Actually, alternative routes with different costs have a meaning only when there are alternative paths to a given destination, which is not possible if the topology does not include any mesh.

13 Network: /4 the second route will always be selected for the destinations 0...0/5 because it is more specific for these destinations, independently of the cost. The one case in which the cost is taken into account in the choice of the route is thus when both destination networks are identical but the routes differ by the cost... Routing table definition procedure Having pointed out the basic concepts of routing and of route aggregation, we can now propose a methodology for the definition of the routing table. ven though this methodology only aim is to create the routing table for each router, it can be used also to define an addressing plan that has a better aggregation capacity. Actually, as seen previously, the route aggregation is strongly dependent on how the IP networks have been assigned in the studied topology and thus the administrator will have to assign the addresses, as much as possible, in a way that favors the aggregability during routing. The proposed methodology includes the following steps: etermination of the list of the IP networks present in the studied topology and typology of the networks themselves ( directly connected networks/ remote networks) efinition of the routing tree to each IP network found during previous operation. etermination of the routing table with a route for each destination etermination of possible route aggregations The explanations will use the example in following figure.. R /30.30 R /30.34 R3.. Network: /5 Network: /4 It is important to notice that the computing procedure of the routing table must be repeated for each router; for instance, in the previous network it will have to be done three times (because there are 3 routers). Actually, even if the chosen path by a router to a destination is not completely independent of the path that the other routers will do to reach (in other words, if R reaches the network /4 by sending the packets to R, R can not reach the same destination by sending back the packets to R), the routing tree defines the best paths from one point to all the possible destinations. In consequence, changing the initial point from which the paths are computed (or the router whose routing table is being computed) will change the routing table and thus each router has to compute autonomously its own routing table.... List and typology of the IP networks uring this step it is needed to simply point out which are the IP networks present in the studied topology, distinguishing between the directly connected IP networks (that is to say the ones reachable 3

14 through direct routing by the studied router) and the remote networks (that is to say the ones reachable through indirect routing, which means that the packet is sent to the next router in the direction of the destination). The result of the first step applied to the example is shown in figure.... efinition of the routing tree Given the list of the reachable destinations it is needed to compute the routing tree, that is to say the followed paths by the packets from a given router to all destinations. In the case of a simple topology (as the one in figure) it is possible to use the innate human ability to determine the shortest paths. When confronted to more complex topologies it is possible to use algorithms for the computation of the shortest path, for example the algorithm of ijkstra. The result of this step will be the modeling of the topology in term of an acyclic graph (or a tree), representing the paths to reach all destinations in the network. The result in the case of the example is shown in figure; in this case the result is particularly common due ti the lack of cycles in the original network that prevent the formation of multiple paths to a single destination. 4

15 Notice how import the costs of reaching the various networks are in this result. They are determined bi the cost of going through the links (assumed unitary in the example network and shown with the value in the routing tree). For instance, the network Net5 will be reachable with cost 3 from the router R. Knowing the costs is mandatory in order to favor a path compared to an other one (and choose the best cost one) when multiple paths to the same destination exist. Notice also that the routers are not part of the topology graph: the goal is to determine the best path to each destination and the intermediate routers does not give any additional information in the routing tree. That is why they can be omitted without loss...3. etermination of the routing table Once the routing tree produced, the writing of the routing table is a purely mechanical operation. ach destination (or each IP network) must be written inside the routing table along the requested information (typology of the route, network/netmask, next hop, cost). The one caution to take is related to the difference between connected and remote networks due mainly to the diverse value of the next hop in each case. Thus, for instance, for the network Net (directly connected) the routing table entry will be: Type Network Next Hop Cost C / where the typology of the route is C ( connected ) and the next hop is the interface of the router itself that is used to reach these destinations in direct routing. On the other hand, for the network Net5 (remote) the entry in the routing table will be: Type Network Next Hop Cost S / where the typology of the route is S ( static ) and the next hop is the interface of the next router that is used to reach these destinations in indirect routing. 5

16 The result when applied to the example network is shown in figure. There is also the routing tables of all the routers in the studied topology. ven if, as said previously, the cost is not particularly meaningful in the routing table, it is instrumental in the computation of the best path to reach this destination. Therefore notice that the cost of going through to reach the network Net is equal to zero, the one to reach the network Net3 is equal to and the one to reach the network Net4 is equal to. The cost S of the neighbor of the Net 4 is thus irrelevant for the solution of the exercise and would be used only if they would be other reachable destinations than Net etermination of the possible routes aggregations The last step refers to the determination of route aggregations and is, in a way, subjective. The criterion that surely has to be satisfied is that the aggregable routes share the same next hop and these routes must be related to networks not directly connected (because the directly connected routes can not be canceled from the routing table). The non-objectivity of this operation stands in the number of routes that are aggregated in a given address range and in the used address range. The operator can make different choices depending on if he wants to favor the aggregation capability and thus uses supernets even really big (up to the default route), or if he wants to minimize the possible side effects limiting himself to the replacing if a given number of routes with a new address range that is exactly equivalent (that is to say the union of the original address ranges must be equal to the new address range). The following figure shows both solutions: in the case of the routers R and R two networks /4 are aggregated with the equivalent /3 while in the case of the router R3 two remote networks (belonging to two non exactly aggregable with a new address range address ranges) are replaced by a default route. The resulting routing table is shown in next figure. 6

17 7

18 Part II. xercises 8

19 . xercises.. xercise n efine the routing tree of each node of the network in figure. In addition, write the routing table of each router in the format (destination router - next hop router). A 3 B C xercise n efine the routing tree of each node of the network in figure. In addition, write the routing table of each router in the format (destination router - next hop router). A 3 B C G 4 4 F H 9

20 .3. xercise n 3 Given the network in figure, produce the routing table of R by aggregating the routes in a way such as: the addressing spaces are exactly equivalent to the original ones (or) there are the fewest possible entries in the routing table The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Address range /../7..37/30..4/30 R 5 R.0.54/4+..6/5..33/30 R3..54/5.4. xercise n 4 Given the network in figure, produce the routing table of R by aggregating the routes in a way such as: the addressing spaces are exactly equivalent to the original ones (or) there are the fewest possible entries in the routing table The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Address range /../7..37/30..4/30 R R.0.54/4+..6/5..33/30 3 R3..54/5 0

21 .5. xercise n 5 Given the network in figure, produce the routing table of R by aggregating the routes in a way such as: the addressing spaces are exactly equivalent to the original ones (or) there are the fewest possible entries in the routing table The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Internet Address range / /30 3 R.54/3 3.86/30 R3 3.58/7 4.54/4 R 3.89/30 R4 3.97/ / /8 3.8/9 3.6/5

22 .6. xercise n 6 Given the network of the previous exercise (indicated in figure), produce the routing table of R4 obtained when looking for the fewest possible entries in the routing table. Point out if the number of route is bigger or smaller than the one of routes in the routing table of the router R and explain why. Internet Address range / /30 3 R.54/3 3.86/30 R3 3.58/7 4.54/4 R 3.89/30 R4 3.97/ / /8 3.8/9 3.6/5

23 7 hosts 0 hosts.7. xercise n 7 Given the network in figure, define an addressing plan that: maximizes the aggregation of the routes on R (or) minimize the number of addresses allocated to manage the network. The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Address range /3 R R R3 0 hosts 60 hosts 3

24 5 hosts 4 hosts.8. xercise n 8 Given the network in figure, define an addressing plan that: maximizes the aggregation of the routes on R (either in the case in which the addressing spaces are exactly equivalent to the original ones or in the case in which routes are managed through supernets) (or) minimize the number of addresses allocated to manage the network. The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Address range /4 R R R3 80 hosts 70 hosts 4

25 5 hosts 4 hosts.9. xercise n 9 Basing yourself on the previous exercise and given the network in figure (identical to the previous one except for the costs assigned to the links), define an addressing plan that maximizes the aggregation of the routes on R, either in the case in which the addressing spaces are exactly equivalent to the original ones or in the case in which routes are managed through supernets. The cursive numbers on the network represent the going through cost of the link; assume unitary the costs not explicitly indicated in figure. Address range /4 R R R3 80 hosts 70 hosts 5

26 60 hosts*.0. xercise n 0 Realize an addressing plan for the network in figure that maximizes the route aggregation on the router R. In addition, write the routing table of each router, assuming that the aim is to maximize the route aggregation (supernets are accepted but not default routes). Notice that the networks indicated with an asterisk in figure are foreseen to receive the addition of hosts in the future. 0 hosts* 0 hosts R R Address range: / R3 3 R4 48 hosts 7 hosts 6

27 33 hosts 00 hosts*.. xercise n Realize an addressing plan for the network in figure that maximizes the route aggregation on the router R. In addition, write the routing table of each router, assuming that the aim is to maximize the route aggregation (supernets are accepted but not default routes). Notice that the networks indicated with an asterisk in figure are foreseen to receive the addition of hosts in the future. 50 hosts* 500 hosts 500 hosts Internet Address range: / R R 4 R3 R4 0 hosts 5 hosts 0 hosts 0 hosts 7

28 33 hosts 00 hosts*.. xercise n Given the same topology as in the previous exercise (but with different link costs), realize an addressing plan for the network in figure that maximizes the route aggregation on router R. In addition, write the routing table of each router, assuming that the goal is to maximize the route aggregation (supernets are authorized) Notice that the networks indicated with an asterisk in figure are foreseen to receive the addition of hosts in the future. 50 hosts* 500 hosts 500 hosts Internet Address range: / R R R3 R4 0 hosts 5 hosts 0 hosts 0 hosts 8

29 33 hosts / /4 00 hosts*.3. xercise n 3 Given the topology of the previous exercise and the related routing tables of the apparels, the manager of the network has decided to configure some additional static backup routes in order to be able to react automatically to some failures that may occur. Particularly, the manager wants to warrant the router R the reachability of the LAN connected to R4 (reachable preferably through R3) even if the link R3-R4 fails (in this case, the path should go through R). That is why the manager has modified the routing tables of R and R3 as shown in next figure (the directly connected routes are omitted for clarity): 50 hosts* 500 hosts 500 hosts Internet / / / /30 7.5/30 5./4 7.7/30 R /30 0./3./3 R 4./4 7./ / / /30 7.9/6 6./4 R3 7.33/ / /30 R4 7./5 7.93/ / / / /8 0 hosts 5 hosts 0 hosts 0 hosts R (only static routes) ==================================== S / S / S / S / S / S / R3 (only static routes) ================================== S / S / S / S / etermine if the modifications introduced by the manager are efficient; if not point out its problems and propose a way to improve it. 9

30 .4. xercise n 4 Given the network in figure, the host H generates an IP packet for the host H. The packet is correctly received by R which has to forward it to the destination. Given the different configurations of the router R at the routing table and ARP cache levels indicated in figure, determine the path followed by the packet in all three cases. Finlay indicate if the solution would have been different if the network LAN had been realized using level switches instead of a shared thernet infrastructure. LAN IP: /4 MAC:00:00:00::: IP: /4 MAC:00:00:00::: R IP: /4 IP: /4 R IP: /4 MAC:00:00:00:AA:AA:AA MAC:00:00:00:BB:BB:BB IP: /4 MAC:00:00:00:CC:CC:CC H IP: /4 MAC: 00:00:00::: G: H IP: /4 MAC: 00:00:00::: G: R config (case ) Routing table (R) ================================= Type Network Next Hop Cost S / [... directly connected...] R config (case ) R config (case 3) Routing table (R) ================================= Type Network Next Hop Cost S / [... directly connected...] Routing table (R) ================================= Type Network Next Hop Cost S / [... directly connected...] ARP cache (R) ================================== Type Address MAC S :00:00::: ARP cache (R) ================================== Type Address MAC S :00:00:AA:AA:AA ARP cache (R) ================================== Type Address MAC S :00:00::: 30

31 Part III. Solutions 3

32 3. Solutions 3.. Solution of exercise n The routing trees of th e various nodes is reported in figure. A C B A C B A C B A C B A C B The one ambiguity is linked to the destinations that have more than one way with same cost (for instance the router A has two equivalent ways to the destination ). The schema chows only one of these solutions to be clearer, but both are reported on the following routing tables. To be more precise, in case of equivalent paths, the choice of one or the other (in a purely routing-oriented view) is completely arbitrary. The tables for each router are the following: Node A estination Next-hop B B C C B/C C Node B estination Next-hop A A C 3

33 Node C Node estination Next-hop estination Next-hop A A A B/C B B B C C Node estination A B C Next-hop C C 33

34 3.. Solution of exercise n The solution of this exercise is similar ton the one of previous exercise. The routing trees are reported for a subset of the present routers but all the routing tables are written down. A B C G H F A B C G H F A B C G H F A B C G H F Notice that some router have multiple equivalent paths to a given destination (for example C has two equivalent paths with cost 6 to A), but this does not appear in the routing table because both use the same next hop router (). Node A estination Next-hop B B C B/ B/ F G H Node B estination Next-hop A A C A F A G H 34

35 Node C Node estination Next-hop estination Next-hop A A B/G B B B C C G F F G G G G H H G Node Node F estination Next-hop estination Next-hop A A A B A B C G C G F F G G G H G H /H Node G Node H estination Next-hop estination Next-hop A A G B B G C C G G G F F G/F H H G G 3.3. Solution of exercise n 3 The routing tables of the router R are indicated in the next tables, depending on the criterion chosen to do the aggregations Routes with equivalent addressing space Type estination network Next hop Cost / / /

36 3.3.. Routes with maximal aggregation S / S / Type estination network Next hop Cost / / / S /

37 3.4. Solution of exercise n 4 The routing tables of the router R are indicated in the next tables, depending on the criterion chosen to do the aggregations Routes with equivalent addressing space Type estination network Next hop Cost / / / S / S / S / In this case, it is not possible to do much aggregation because the paths to reach the various networks are different (some go through R and others go through R3) and because of the restriction on the use of an equivalent addressing space Routes with maximal aggregation Type estination network Next hop Cost / / / S / S / In this case, a default route is used in one direction (the one with the biggest number of single routes) to minimize the number of routes. 37

38 3.5. Solution of exercise n 5 The routing tables of the router R are indicated in the next tables, depending on the criterion chosen to do the aggregations Routes with equivalent addressing space Type estination network Next hop Cost / / / S / S / S / S / S / S / Notice that in this case the studied topology is connected to the Internet and thus it is consented to use a default route even in the case of an equivalent addressing space. Actually, one must assume that all the addresses not present in the studied topology are present in the Internet; the default route will thus be a route to these destinations Routes with maximal aggregation Type estination network Next hop Cost / / / S / S / S / S / Notice that, the studied topology being connected to the Internet, the default route is basically used to reach these destinations and can not be used to aggregate the internal networks. 38

39 3.6. Solution of exercise n 6 This exercise is not really different from the previous ones. Notice that the default route is more useful for the router R4 than for the router R because this router reaches several internal destinations with the same next hop used to reach the Internet. In this case, these internal networks will be gathered directly inside the default route without the use of an explicit route. The routing table of R4, created in order to maximize the efficiency of the aggregation, will be smaller than the one of R and will thus be: Type estination network Next hop Cost / / / / S / S / S / Notice that in this case the number of static routes decreases by two units (due to the better aggregation) while the number of routes related to directly connected networks, that can not be aggregated, is incremented (due to the bigger number of directly connected networks). The total sum is thus smaller: the total number of routes in the routing table of R4 is decreased by one unit compared to the one present in the router R. 39

40 / /8 7 hosts 0 hosts 3.7. Solution of exercise n Addressing done trying to maximize routes aggregation on R The first step to solve the exercise is to compute the required addresses to make the addressing plan. As the networks directly connected to R have no influence in the aggregability on this router, they are momentarily left out of the total computation of the necessary addresses for the two defined areas. In the computation of the requested addresses, one can distinguish between the remote networks reachable from R through R (gathered in Area ) and those reachable through R3 (gathered in Area ) because, being reachable in diverse directions, they are obviously not aggregable. One gets then: Area : 7 (+3) + 0 (+3) requested addresses= allocated addresses= 60 addresses Area : 60 (+3) + 0 (+3) requested addresses= allocated addresses= 80 addresses To maximize the aggregation, it is mandatory that the addressing space comprehensively allocated to the networks in Area is disjoint from the addressing space comprehensively allocated to Area. In other words, to maximize routes aggregability it is appropriate to define some addressing spaces to the areas and inside them to recover then the address of the single networks. The addressing spaces of the areas will then be the equivalent address ranges that will be used to define the destinations of the aggregated routes. The following address ranges are thus chosen: Area : /4 Area : /5 The addressing space of the networks directly connected to R can be obtained either inside the address range of Area or inside the address range of Area (neither of them uses the whole address range that it has been allocated). In this exercise, it has been chosen to use part of the unused address range of Area for these networks. The resulting addressing plan is: R 0.6/ / / /30 0.9/7 R 0./5 0.6/ /30./6 R3.65/8 0 hosts / /6 60 hosts Area Area The corresponding routing table of R (without the use of a default route) is: 40

41 / /8 7 hosts 0 hosts Type estination network Next hop Cost / / S / S / Addressing done trying to minimize the number of allocated addresses If the aim is however the minimization of the allocated address, the addressing plan is done in a more traditional way and may be the following: R 0.4/ / / / /7 R 0./5 0.4/ /30 0.9/6 R3 0.5/8 0 hosts / /6 60 hosts Area Area Notice that in this case a /4 addressing space is enough to handle the whole topology, while in the previous case a /3 space was necessary. The corresponding routing table of R (without the use of a default route) is: Type estination network Next hop Cost / / S / S / S /

42 / /7 5 hosts 4 hosts 3.8. Solution of exercise n 8 In this case both solutions, the one trying to maximize the aggregation and the one trying to minimize the allocated addresses, coincide. Actually, the addressing space is so reduced ( /4) that it is in any case mandatory to minimize the allocated addresses to be able to handle the studied topology. Hence, some physical networks (LAN) must be partitioned in more IP networks ti make the management possible. The resulting addressing is shown in figure: R 0.4/ / / /30 0.4/30 0.6/7 R 0./6+ 0.9/ / / / /6+ 0.5/8 0.49/ /7 R3 80 hosts / / / /8 70 hosts To write the table it is possible to use the fact that the destination connected to R3 may be reached with the same cost through the direct link R-R3 or through the path R-R-R3. The second way is chosen because, with equal cost, it decreases the number of static routes present on the routing table. In the case in which the aggregated addressing space is exactly equivalent to the original one, it is necessary to take into account that the network /30 is allocated to no one and thus it can not be part of the aggregation. That is why it is mandatory to write a set of lines in the routing table in a way not to include this space. The resulting routing table will then be: Type estination network Next hop Cost / / S / S / S / S / S / In the case in which the aggregated addressing space may include even destinations not originally part of the studied topology, it is possible to aggregate all remote destinations in the route /4, obtaining an aggregation clearly more efficient than the previous one. The resulting routing table will then be: Type estination network Next hop Cost 4

43 / / S / Notice that, in practice, it will be better to choose the second routing table, all the more because the network /30 is not physically used in the studied topology but it has been assigned to the network manager (the addressing space attributed to the manager is /4) and reasonably thus this network is nowhere else to be found. 43

44 / /7 5 hosts 4 hosts 3.9. Solution of exercise n 9 As the network is identical to the one of the previous exercise, there is no apparent difference at addressing level. Nevertheless, the fact that the networks connected to R and R3 are reached through diverse next hop from R (due to different link costs) makes the situation much more complex because the networks are less aggregable. That is why the possibility to position the contiguous IP addressing spaces in the same area is of instrumental importance for the aggregability. For instance, using the addressing level proposed in the previous solution the networks /6 and /6 will no longer be aggregable in a single route /5 because they would have diverse next hops (one to Area and the other to Area ). A possible new addressing level is indicated in figure: R 0.4/ / / /30 0.4/ /7 R 0./ / / / /30 0.9/6+ 0.5/8 0.49/ /7 R3 80 hosts / / / /8 70 hosts Area Area In this case, the resulting routing tables will respectively be: Addressing space equivalent to the one present in the topology: Type estination network Next hop Cost / / S / S / S / S / S / Maximization of the aggregation: Type estination network Next hop Cost /

45 / S / S /

46 3.0. Solution of exercise n 0 To determine the addressing level, the requested addresses to manage each network are computed first of all considering that the router R will see every remote destination through two next hops: Remote destinations through R (Area ): Network with 0 hosts*: 56 addresses are reserved (for future expansions) Network with 60 hosts*: 56 addresses are reserved (for future expansions) Remote destinations through R4 (Area ): Network with 48 hosts: 56 addresses are reserved Network with 7 hosts: 3 addresses are reserved networks directly connected to R: Network with 0 hosts: 8 addresses are reserved Point-to-point network (R-R): 4 addresses are reserved Point-to-point network (R-R3): 4 addresses are reserved Trying to assign addresses in a way that favor the aggregability on R, one can proceed as follow: Network in Area : addressing space /3, completely used Network in Area : addressing space /3, not completely used ( = 0 are still free) irectly connected networks: = 36 addresses are necessary. They can be obtained from the /3 addressing space free addresses in the Area. Next figure shows the allocation of the addresses in the assigned addressing space /, with reference to the belonging area (seen from R): 46

47 Address range Area Address range Area The resulting addressing level is thus: The routing tables, obtained by maximization of routes aggregation, consequently are: R Type estination network Next hop Cost 47

48 / / / S / R Type estination network Next hop Cost / / / S / S / R3 Type estination network Next hop Cost / / S / R4 Type estination network Next hop Cost / / / S / S /

49 3.. Solution of exercise n To determine the addressing plan, one has to compute the addresses required to handle each network considering that the router R will see each remote destination through two next hops: Remote destinations through R (Area ): Network with 500 hosts: 5 required addresses Network with 500 hosts: 5 required addresses Network with 00 hosts*: 56 required addresses (foreseen expansions) Point-to-point network (R-R4): 4 required addresses Remote destinations through R3 (Area ): Network with 33 hosts: 64 required addresses Network with 0 hosts: 56 required addresses Network with 5 hosts: 8 required addresses Network with 0 hosts: 8 required addresses Network with 0 hosts: 6 required addresses Network with 500 hosts: 5 required addresses Point-to-point network (R3-R4): 4 required addresses Networks directly connected to R: Network with 50 hosts*: 8 required addresses (foreseen expansions) Point-to-point network (R-R): 4 required addresses Point-to-point network (R-R3): 4 required addresses Point-to-point network (R-Internet): 4 required addresses It is obvious from that analysis that the number of requested addresses is enough given the assigned addressing space (84 addresses in Area, 476 in Area and 40 for the directly connected networks). Nevertheless, contrary to the previous exercise, the addressing space is not easy to partition into distinct address ranges for the two areas. The following figure shows the distribution of the addressing spaces allocated inside the assigned address range /, with reference to the areas they belong to (seen from R): Remember that the addresses related to directly connected networks never are aggregable and thus always appear as explicit networks inside the routing table. This nevertheless makes possible, when the supernets are allowed (which is the case here), that these addresses are obtained inside an addressing space unused by the other areas, because they are reachable through a more specific route. 49

50 33 hosts / /4 00 hosts* A possible solution of this exercise is to handle the aggregation using supernets: in this case one can imagine to address all the networks in Area with the address /, using the the more specific route /3 for all the destinations in Area. Obviously this is possible if the addresses assigned in Area are aggregable (that is to say if the addresses /4 and /4 and not, for instance, /4 and /4 that are not aggregable together). The resulting addressing level may thus be: 50 hosts* 500 hosts 500 hosts Internet / / /3 Address range: / /30 7.5/30 7.9/30 5./4 0./3./3 7.7/30 7.8/30 R /30 R 4./4 7./ / / /6 7.30/30 6./4 R3 R4 7./ / / / /9 7./5 7.93/ / / / /8 0 hosts 5 hosts 0 hosts 0 hosts The routing tables, produced by maximizing the route aggregation (remember the use of the default route to reach all destinations on the Internet), are consequently: R Type estination network Next hop Cost 50

51 / / / / S / S / S / S / Be careful about the point-to-point network between R and R4: the best path is through the router R but unfortunately it falls in the addressing space of the more specific route /3 that points in the wrong direction. That is why in this case it is required to address it alone with a more specific route. R Type estination network Next hop Cost / / / / / S / The routing table of R is much more compressed than before because, due to the costs if the links in the studied topology, all destinations not directly connected are reached through the router R. R3 Type estination network Next hop Cost / / / / / S / S / S / S / R4 Type estination network Next hop Cost /

52 / / / S /

53 3.. Solution of exercise n The exercise is clearly similar to the previous one. The difference is to be found in the fact that, by changing the weights of the links, the best paths to reach the various destinations may be different compared to the previous case. Particularly, concerning the LAN connected to R4, there exist two equivalent ways that can be used to best the aggregation from R, as shown in next figure: Unfortunately, this peculiar displacement of the IP networks does not allow a better aggregation compared to the one pointed out in the previous exercise and thus the addressing plan will be identical to the previous one: 53

54 33 hosts / /4 00 hosts* 50 hosts* 500 hosts 500 hosts Internet / / /3 Address range: / /30 7.5/30 7.9/30 5./4 0./3./3 7.7/30 7.8/30 R /30 R 4./4 7./ / /30 7.9/6 7.30/30 6./4 R3 R4 7./ / / / /9 7./5 7.93/ / / / /8 0 hosts 5 hosts 0 hosts 0 hosts In consequence, the routing tables, obtained by maximizing the route aggregation, are the following. Notice that in mean they are bigger that the ones of the previous exercise because there is no longer a link R-R4 with a huge cost that, actually, prevented the emission of packets in that direction which allowed to aggregate a bigger number of destinations in the routes that were going the other ways. R Type estination network Next hop Cost / / / / S / S / S / S / R Type estination network Next hop Cost / / / / / S / S / S /

55 S / R3 Type estination network Next hop Cost / / / / / S / S / S / S / R4 Type estination network Next hop Cost / / / / S / S / S / S /

56 3.3. Solution of exercise n 3 The solution proposed by the network manager raises a lot of problems. efault route with cost 0 on the router R Probably the manager has increased the cost of the default route in order to make it chosen only in last resort when all other routes are not fit. Nevertheless, such a huge cost is absolutely useless because the cost of a route is a choice parameter only in presence of two routes that point to the same destination. When the routes point to different destinations (for example because they refer to diverse addressing spaces), the most specific wins. Routes with an higher cost for the networks 7.0/5 and 7.9/8 The intent of the network manager was probably to define some backup routes for the networks 7.0/5 and 7.9/8 when the aggregated route 6.0/3 is unavailable. Nevertheless, for the same reason pointed out in the previous point, these routes will always be chosen as the path to follow to reach the studied destinations. That is why, if one really wants to create backup routes, the configuration of the router R should be at least modified in a way that allows to define explicit routes for the networks /5 and /8, in a way such that these destinations will not be routed through the aggregated route /3, thus abound these two routes with likewise routes that should be used in case of backup. The routing table of R would become (omitting the direct routes): Type estination network Next hop Cost S / S / S / S / S / S / S / S / Robustness to the failure of R3-R4 The biggest problem of the solution is yet the fact that the backup routes for the networks 7.0/5 and 7.9/8 are not absolutely efficient because R is not absolutely able to react correctly to the failure of the link R3-R4. Actually, even if R3 realizes that there is a failure and that its routing table becomes the one indicated in next figure (all the routes that depend on the next hop become invalid and this all the traffic heading to networks not directly connected would follow the default route that is the only one remaining), no one communicates to R the existence of this failure so the router can not know that it is required to use the route with higher cost to reach these destinations. The result, shown in figure, would be that at reception of a packet destined to an host in one of these two networks the router R would continue to use the route with cost to R3 but R3 would use the default route and send the packet back to R (the used routes are indicated in figure in italic). The packet would enter a loop and stay in it, going back and forth between R and R3, until its lifespan ends (the value of the field TTL in the IP header would become zero). 56

57 33 hosts / /4 00 hosts* 50 hosts* 500 hosts 500 hosts Internet / / / /30 7.5/30 5./4 7.7/30 R /30 0./3./3 R 4./4 7./ / / /30 7.9/6 6./4 R3 7.33/ / /30 R4 7./5 7.93/ / / / /8 0 hosts 5 hosts 0 hosts 0 hosts R (only static routes) =================================== S / S / S / S / S / S / R3 (only static routes) ================================== S / S / S / S / Unfortunately there exists no solution to this problem because it is intrinsic to the use of backup routes with static routing. So it is not possible to propose better solutions to the manager, except to use a dynamic routing protocol inside his network. 57

58 3.4. Solution of exercise n Case The router R detect that the packet must follow the default route and thus must be sent ti the next hop This address is directly reachable through its right interface; besides the associated MAC address (address to which the frame at data-link level must be sent) is already known because it is in the ARP cache. So the router R will send the packet to the router R, however inserting the address 00:00:00::: as destination thernet address. This frame will however be discarded because the MAC address present does not coincide with the one present in the interface. Consequently, the packet generated by H will never reach destination and will be discarded by R Case The router R detect that the packet should follow the default route and thus must be sent to the next hop Nevertheless, this address is not part if the IP networks directly connected to R and thus R has no idea of how to forward the packet to the next hop indicated in the routing table. The fact that the MAC address related to this IP address is present in the ARP cache is no help because the router R will abort the sending of the packet before consulting the ARP cache. This table is actually consulted when it wants to discover the MAC address of a directly reachable host, condition that is not valid for the address Consequently, in this case again the packet generated by H will never reach destination and it will be discarded by R Case 3 The router R detects that the packet should follow the default route and thus must be sent to the next hop This address is directly reachable through its thernet interface with address ; moreover its associated MAC address (address to which the frame at level data-link must be sent) is already known because it is in the ARP cache. So the router R will forward the packet to LAN, inserting the address 00:00:00::: as destination thernet address. This frame will then be received by the router R itself but in the interface , because the present destination MAC address coincide with the one present in the interface. At this point, the packet will be examined by R again that will retake the same decision already applied previously. Consequently, in this case again the packet generated by H will never reach destination but will cycle on the LAN until its lifespan (IP TTL) will end and will finally be discarded by R LAN realized with a switching technology The technology used to realize LAN ( shared or switched ) has no influence in the solution of the exercise. Notice that the next hop address contained in the routing table (that is ) is absolutely unlinked to the effective address of the interface that receive that packet in the LAN (that is ). 58

Layer 3 Routing User s Manual

Layer 3 Routing User s Manual User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

How To Understand Bg

How To Understand Bg Table of Contents BGP Case Studies...1 BGP4 Case Studies Section 1...3 Contents...3 Introduction...3 How Does BGP Work?...3 ebgp and ibgp...3 Enabling BGP Routing...4 Forming BGP Neighbors...4 BGP and

More information

Using the Border Gateway Protocol for Interdomain Routing

Using the Border Gateway Protocol for Interdomain Routing CHAPTER 12 Using the Border Gateway Protocol for Interdomain Routing The Border Gateway Protocol (BGP), defined in RFC 1771, provides loop-free interdomain routing between autonomous systems. (An autonomous

More information

LAB THREE STATIC ROUTING

LAB THREE STATIC ROUTING LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a

More information

Instructor Notes for Lab 3

Instructor Notes for Lab 3 Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in

More information

How Subnets Work in Practice. Fred Marshall Coastal Computers & Networks

How Subnets Work in Practice. Fred Marshall Coastal Computers & Networks How Subnets Work in Practice Fred Marshall Coastal Computers & Networks Background There's lots of literature available on how the bit structure of an address can be split up using the subnet mask. Generally,

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Chapter 4. Distance Vector Routing Protocols

Chapter 4. Distance Vector Routing Protocols Chapter 4 Distance Vector Routing Protocols CCNA2-1 Chapter 4 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information

Router and Routing Basics

Router and Routing Basics Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic

More information

APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0

APNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0 erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Configuring NetFlow Switching

Configuring NetFlow Switching Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter

More information

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches.

WAN Wide Area Networks. Packet Switch Operation. Packet Switches. COMP476 Networked Computer Systems. WANs are made of store and forward switches. Routing WAN Wide Area Networks WANs are made of store and forward switches. To there and back again COMP476 Networked Computer Systems A packet switch with two types of I/O connectors: one type is used

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Routing with OSPF. Introduction

Routing with OSPF. Introduction Routing with OSPF Introduction The capabilities of an internet are largely determined by its routing protocol. An internet's scalability, its ability to quickly route around failures, and the consumption

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very

More information

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to: Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Chapter 10 Link-State Routing Protocols

Chapter 10 Link-State Routing Protocols Chapter 10 Link-State Routing Protocols CCNA2-1 Chapter 10 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks

More information

IP Routing Configuring Static Routes

IP Routing Configuring Static Routes 11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................

More information

APNIC elearning: BGP Attributes

APNIC elearning: BGP Attributes APNIC elearning: BGP Attributes Contact: [email protected] erou04_v1.0 Overview BGP Attributes Well-known and Optional Attributes AS Path AS Loop Detection ibgp and ebgp Next Hop Next Hop Best Practice

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Module 2: Assigning IP Addresses in a Multiple Subnet Network Module 2: Assigning IP Addresses in a Multiple Subnet Network Contents Overview 1 Lesson: Assigning IP Addresses 2 Lesson: Creating a Subnet 19 Lesson: Using IP Routing Tables 29 Lesson: Overcoming Limitations

More information

SUBNETS, CIDR, AND CLASSLESS ADDRESSING

SUBNETS, CIDR, AND CLASSLESS ADDRESSING Announcements SUBNETS, CIDR, AND CLASSLESS ADDRESSING Internet Protocols CSC / ECE 573 Fall, 005 No office hours tomorrow (Wednesday) out of town No class on Thursday Fall break! Midterm exam next Tuesday!

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Configuration of Cisco Routers. Mario Baldi

Configuration of Cisco Routers. Mario Baldi Configuration of Cisco Routers Basics Static Routing Mario Baldi Politecnico di Torino mario.baldi[at]polito.it http://staff.polito.it/mario.baldi ConfRoutEn - 1 M. Baldi: see page 2 Copyright Notice This

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Routing Protocols and Concepts Chapter 2 Conceitos de protocolos de Encaminhamento Cap 2

Routing Protocols and Concepts Chapter 2 Conceitos de protocolos de Encaminhamento Cap 2 Static Routing Routing Protocols and Concepts Chapter 2 1 1 Objectives Define the general role a router plays in networks. Describe the directly connected networks, different router interfaces Examine

More information

Table of Contents. Cisco How Does Load Balancing Work?

Table of Contents. Cisco How Does Load Balancing Work? Table of Contents How Does Load Balancing Work?...1 Document ID: 5212...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Load Balancing...1 Per Destination and

More information

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1 Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4

More information

Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems?

Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems? Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems? Chris Kelly - [email protected] Research Network Operations Center Georgia Tech Office

More information

Teldat Router. ARP Proxy

Teldat Router. ARP Proxy Teldat Router ARP Proxy Doc. DM734-I Rev. 10.00 November, 2002 INDEX Chapter 1 Introduction...1 1. ARP Proxy... 2 Chapter 2 Configuration...4 1. ARP Proxy Configuration... 5 1.1. Enabling ARP Proxy...

More information

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh Distance Vector Routing Protocols Routing Protocols and Concepts Ola Lundh Objectives The characteristics of distance vector routing protocols. The network discovery process of distance vector routing

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Border Gateway Protocol BGP4 (2)

Border Gateway Protocol BGP4 (2) Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning

More information

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013 Transitioning to BGP ISP Workshops Last updated 24 April 2013 1 Scaling the network How to get out of carrying all prefixes in IGP 2 Why use BGP rather than IGP? p IGP has Limitations: n The more routing

More information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System Fast Re-Route in IP/MPLS networks using s IP Operating System Introduction: Today, Internet routers employ several routing protocols to exchange routes. As a router learns its potential routes, it builds

More information

IP Multicasting. Applications with multiple receivers

IP Multicasting. Applications with multiple receivers IP Multicasting Relates to Lab 10. It covers IP multicasting, including multicast addressing, IGMP, and multicast routing. 1 Applications with multiple receivers Many applications transmit the same data

More information

BGP Best Path Selection Algorithm

BGP Best Path Selection Algorithm BGP Best Path Selection Algorithm Document ID: 13753 Contents Introduction Prerequisites Requirements Components Used Conventions Why Routers Ignore Paths How the Best Path Algorithm Works Example: BGP

More information

Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz

Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz Technische Universität Braunschweig Institut für Betriebssysteme und Rechnerverbund Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz Braunschweig, 27 th March 2007 Contents

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization

More information

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006 CSE331: Introduction to Networks and Security Lecture 8 Fall 2006 Announcements Reminders: Project I is due on Monday, Sept. 25th. Homework 1 is due on Friday, Sept. 29th. CSE331 Fall 2004 2 Internet Protocol

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Default gateway redundancy (1) H1 DG: R1 H2 DG: R1 H3 DG: R1 R1 R2 ISP1 ISP2 Internet 3 Default gateway redundancy

More information

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers

More information

Using OSPF in an MPLS VPN Environment

Using OSPF in an MPLS VPN Environment Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest

More information

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local Area Networks. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Problem: the router is a single point of failure H1 H2 H3 VLAN4 H4 VLAN4 Corporate LAN Corporate LAN R1 R2

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007 Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?

More information

Route Discovery Protocols

Route Discovery Protocols Route Discovery Protocols Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Building Routing Tables Routing Information Protocol Version 1 (RIP V1) RIP V2 OSPF

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

Lecture 8. IP Fundamentals

Lecture 8. IP Fundamentals Lecture 8. Internet Network Layer: IP Fundamentals Outline Layer 3 functionalities Internet Protocol (IP) characteristics IP packet (first look) IP addresses Routing tables: how to use ARP Layer 3 functionalities

More information

Fast Reroute Techniques in MPLS Networks. George Swallow [email protected]

Fast Reroute Techniques in MPLS Networks. George Swallow swallow@cisco.com Fast Reroute Techniques in MPLS Networks George Swallow [email protected] Agenda What are your requirements? The solution space U-turns Traffic Engineering for LDP Traffic Engineering Some Observations

More information

TORA : Temporally Ordered Routing Algorithm

TORA : Temporally Ordered Routing Algorithm TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control

More information

ETHEL THE AARDVARK GOES BGP ROUTING

ETHEL THE AARDVARK GOES BGP ROUTING Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,

More information

Sampled NetFlow. Feature Overview. Benefits

Sampled NetFlow. Feature Overview. Benefits Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary

More information

CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding

CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding Http://elmaestrodelared.blogspot.com CCNA Exploration 4.0: (II) Routing Protocols and Concepts Chapter 1: Introduction to Routing and Packet Forwarding 1. If a router cannot find a valid configuration

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

Software Defined Networking & Openflow

Software Defined Networking & Openflow Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction

More information

Software Defined Networking (SDN) - Open Flow

Software Defined Networking (SDN) - Open Flow Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,

More information

04 Internet Protocol (IP)

04 Internet Protocol (IP) SE 4C03 Winter 2007 04 Internet Protocol (IP) William M. Farmer Department of Computing and Software McMaster University 29 January 2007 Internet Protocol (IP) IP provides a connectionless packet delivery

More information

Chapter 3. Enterprise Campus Network Design

Chapter 3. Enterprise Campus Network Design Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This

More information

Understanding Virtual Router and Virtual Systems

Understanding Virtual Router and Virtual Systems Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT

More information

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Modeling and Simulation of Routing Protocols in the Cloud

Modeling and Simulation of Routing Protocols in the Cloud 220 ICT Innovations 2014 Web Proceedings ISSN 1857-7288 Modeling and Simulation of Routing Protocols in the Cloud Dejan Spasov, Igor Jakimovski Faculty of Computer Science and Engineering Skopje, Macedonia

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address

More information

AS/400e. TCP/IP routing and workload balancing

AS/400e. TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted

More information

Introduction to Dynamic Routing Protocols

Introduction to Dynamic Routing Protocols CHAPTER 3 Introduction to Dynamic Routing Protocols Objectives Upon completion of this chapter, you should be able to answer the following questions: Can you describe the role of dynamic routing protocols

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

Lab 10.3.5a Basic Subnetting

Lab 10.3.5a Basic Subnetting Lab 10.3.5a Basic Subnetting Objective How to identify reasons to use a subnet mask How to distinguish between a default subnet mask and a custom subnet mask What given requirements determine the subnet

More information

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING DEMYSTIFYING ROUTING SERVICES IN STWAREDEFINED NETWORKING GAUTAM KHETRAPAL Engineering Project Manager, Aricent SAURABH KUMAR SHARMA Principal Systems Engineer, Technology, Aricent DEMYSTIFYING ROUTING

More information

Advanced BGP Policy. Advanced Topics

Advanced BGP Policy. Advanced Topics Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections

More information

Routing Protocols (RIP, OSPF, BGP)

Routing Protocols (RIP, OSPF, BGP) Chapter 13 Routing Protocols (RIP, OSPF, BGP) INTERIOR AND EXTERIOR ROUTING RIP OSPF BGP 1 The McGraw-Hill Companies, Inc., 2000 1 Introduction Packets may pass through several networks on their way to

More information

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols

Internet Layer. Routing Tables. Routing in the Internet. Routing Protocols Internet Layer Routing Tables estination ddress Next Hop Raw division into three tasks: ata transfer over a global network Route decision at the sub-nodes ontrol of the network or transmission status.7...../8

More information

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP)

Mitigation of Breaking Connections. (a.k.a. OLSRd v1 Multi-Gateway & BRDP) Mitigation of Breaking Connections (a.k.a. OLSRd v1 Multi-Gateway & BRDP) About Me Ferry Huberts Self-Employed Open Source Entrepreneur Lead Committer for OLSRd v1 Committer in several other projects Mainly

More information

Configuring a Load-Balancing Scheme

Configuring a Load-Balancing Scheme Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

6.02 Practice Problems: Routing

6.02 Practice Problems: Routing 1 of 9 6.02 Practice Problems: Routing IMPORTANT: IN ADDITION TO THESE PROBLEMS, PLEASE SOLVE THE PROBLEMS AT THE END OF CHAPTERS 17 AND 18. Problem 1. Consider the following networks: network I (containing

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Redundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino

Redundancy and load balancing at L3 in Local. Fulvio Risso Politecnico di Torino Redundancy and load balancing at L3 in Local Area Networks Fulvio Risso Politecnico di Torino 1 Copyright notice This set of transparencies, hereinafter referred to as slides, is protected by copyright

More information

GregSowell.com. Mikrotik Routing

GregSowell.com. Mikrotik Routing Mikrotik Routing Static Dynamic Routing To Be Discussed RIP Quick Discussion OSPF BGP What is Routing Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/routing In the context of this

More information

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch Network Infrastructure or building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction

Introduction. Internet Address Depletion and CIDR. Introduction. Introduction Introduction Internet Address Depletion and A subnet is a subset of class A, B, or C networks IP addresses are formed of a network and host portions network mask used to separate the information Introduction

More information