Content-Length: 3108891 | pFad | https://www.scribd.com/presentation/716888394/13-Network-Layer
413 Network Layer
13 Network Layer
13 Network Layer
Network Layer
Applications of IGPs
IGPs are used by organizations of all sizes to route
traffic within their networks. They are also used by
Internet service providers (ISPs) to route traffic
within their backbone networks.
Advantages of IGPs
•IGPs are efficient for routing traffic within an
AS.
•IGPs are relatively easy to configure and
manage.
•IGPs are scalable and can be used to route traffic
in large networks.
Disadvantages of IGPs
•IGPs are not designed to route traffic between
ASes.
•IGPs can be susceptible to routing loops and
other problems.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a
distance vector routing protocol with some link-state features. It is a
Cisco-proprietary protocol, but it has been released as an open
standard. It is an enhanced version of IGRP, which is no longer
supported.
EIGRP Features:
•Fast convergence: EIGRP uses the Diffusing Update Algorithm
(DUAL) to quickly converge on a new best path when there is a
topology change.
•Scalability: EIGRP can be used in large networks with thousands of
routers.
•Efficiency: EIGRP only sends incremental updates, which reduces
the amount of network traffic.
•Support for multiprotocol routing: EIGRP can be used to route IPv4
and IPv6 traffic.
EIGRP uses five different types of messages to
communicate with its neighbor routers:
•Hello: Hello messages are used to discover and
maintain neighbor relationships.
•Update: Update messages are used to advertise new
routes or changes to existing routes.
•Query: Query messages are used to request
information about a specific route.
•Reply: Reply messages are used to respond to query
messages.
•Acknowledgement: Acknowledgement messages are
used to confirm the receipt of update or query
messages.
Distance Vector Routing Protocols
Distance vector means that routes are advertised by
providing two characteristics:
Distance: Identifies how far it is to the destination
network and is based on a metric such as the hop
count, cost, bandwidth, delay, and more
Vector: Specifies the direction of the next-hop router
or exit interface to reach the destination
Distance Vector Routing or Bellman Ford
Algorithm is a type of algorithm used by
routing protocols to learn routes on an interconnected
network. Routing protocols that use distance-vector
routing protocols include:
1. Routing Information Protocol RIP.
2. Cisco's Internet Gateway Routing Protocol IGRP.
3. Apple's Routing Table Maintenance
Protocol RTMP.
In distance vector routing when a router is booted it
maintains a routing table advertising vector of distance
and direction. Direction is represented by next hop
address, whereas Distance uses metrics such as hop
count.
When Routers are booted Routers gathers information from
attached networks and maintains following routing tables:
After a fixed period of time routing tables of the neighbouring
tables are shared:
Router A swaps its information with Router B , Router C and
Router D.
Router B swaps its information with Router A and Router C
Router C swaps its information with Router A, Router B and
Router E
Router D swaps its information with Router A
Router E swaps its information with Router C
After a fixed period of time updated routing tables of the
neighbouring tables are shared:
Router A swaps its information with Router B , Router C and
Router D.
Router B swaps its information with Router A and Router C
Router C swaps its information with Router A, Router B and
Router E
Router D swaps its information with Router A
Router E swaps its information with Router C
Link-State Routing Protocols
Router configured with a link-state routing
protocol can create a complete view or topology of the
network.
This is done by gathering information from all of the
other routers.
Link-state update is only sent when there is a change in
the topology
Link-state protocols work best in situations where:
The network design is hierarchical, usually
occurring in large networks.
Fast convergence of the network is crucial.
The administrators have good knowledge of the
implemented link-state routing protocol
Fetched URL: https://www.scribd.com/presentation/716888394/13-Network-Layer
Alternative Proxies: