ii Routing Protocols and Concepts, CCNA Exploration Labs and Study Guide. Routing Protocols and Use the Lab PDF for more details. 46 Routing Protocols. 1. Chapter 1: Routing. Concepts. Routing and Switching Essentials v Explain how a router builds a routing table using a dynamic routing protocol. structure and messaging. ⇨give an high-level overview of IP routing protocols . a key concept for The Internet each AS selects its own routing protocol to.
|Language:||English, Spanish, French|
|ePub File Size:||19.65 MB|
|PDF File Size:||18.82 MB|
|Distribution:||Free* [*Sign up for free]|
Cisco Systems, Inc. All rights reserved. Cisco Confidential. Presentation_ID. 1. Chapter 4: Routing. Concepts. Routing Protocols. Routing Protocols and tvnovellas.info Created by Deonte R. Carroll on Sep 19, AM. Last modified by Deonte R. Carroll on Sep 19, AM. ii Routing Protocols and Concepts, CCNA Exploration Companion Guide Using a Networker's Journal” PDF booklet providing important insight into the value.
Jump to navigation Jump to search A routing protocol specifies how routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network. Routers perform the "traffic directing" functions on the Internet; data packets are forwarded through the networks of the internet from router to router until they reach their destination computer. Routing algorithms determine the specific choice of route. Each router has a prior knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. This way, routers gain knowledge of the topology of the network.
It is very likely that the packet will be encapsulated in a different type of Layer 2 frame than the one in which it was received. For example, the packet might be received by the router on a FastEthernet interface, encapsulated in an Ethernet frame, and forwarded out a serial interface en- capsulated in a PPP frame.
Remember, as a packet travels from the source device to the final destination device, the Layer 3 IP addresses do not change. However, the Layer 2 data link addresses change at every hop as the packet is decapsulated and re-encapsulated in a new frame by each router. Path Determination and Switching Function Details Can you describe the exact details of what happens to a packet at Layer 2 and Layer 3 as it travels from source to destination?
If not, study the animation and follow along with the discussion until you can describe the process on your own. Step 1: PC1 knows the network it belongs to by doing an AND operation on its own IP address and subnet mask, which results in its network address. If the result is the same as its own network, PC1 knows that the destination IP address is on its own network and it does not need to forward the packet to the default gateway, the router.
If the AND operation results in a different network ad- dress, PC1 knows that the destination IP address is not on its own network and that it must forward this packet to the default gateway, the router. If an AND operation with the destination IP address of the packet and the subnet mask of PC1 results in a different network address than what PC1 has determined to be its own network address, this address does not necessarily reflect the actual remote network address.
PC1 only knows that if the destination IP address is on its own network, the masks will be the same and the network addresses would be the same. The mask of the remote network might be a different mask. If the destination IP address results in a different network address, PC1 will not know the actual remote network address - it only knows that it is not on its own network. What if this entry does not exist in the ARP table? Step 2: Router R1 receives the Ethernet frame 1. R1 will therefore copy the frame into its buffer.
R1 sees that the Ethernet Type field is 0x, which means that the Ethernet frame contains an IP packet in the data portion of the frame. R1 decapsulates the Ethernet frame. In this example, the routing table has a route for the The destination IP address of the packet is R1 looks up the next-hop IP address of R2 sends back an ARP reply. R1 then updates its ARP cache with an entry for Step 3: Packet arrives at router R2 Click Play to view the animation.
R2 sees that the Ethernet Type field is 0x, which means that the Ethernet frame contains an IP packet in the data portion of the frame. R2 decapsulates the Ethernet frame. Because the exit interface is not an Ethernet net- work, R2 does not have to resolve the next-hop-IP address with a destination MAC address.
In this case, the Layer 2 encapsulation is PPP; therefore, the data link destination address is set to a broadcast. Remem- ber, there are no MAC addresses on serial interfaces. Step 4: The packet arrives at R3 1. R3 receives and copies the data link PPP frame into its buffer.
R3 decapsulates the data link PPP frame. R3 searches the routing table for the destination IP address of the packet. This means that the packet can be sent directly to the destination device and does not need to be sent to another router.
Because the exit interface is a directly connected Ethernet network, R3 needs to resolve the desti- nation IP address of the packet with a destination MAC address. R3 updates its ARP cache with an entry for Step 5: PC2 will therefore copy the rest of the frame into its buffer. PC2 sees that the Ethernet Type field is 0x, which means that the Ethernet frame contains an IP packet in the data portion of the frame.
Summary We have just examined the encapsulation and decapsulation process of a packet as it is forwarded from router to router, from the originating source device the final destination device.
We have also been introduced to the routing table lookup process, which will be discussed more thoroughly in a later chapter. We have seen that routers are not involved only in Layer 3 routing decisions, but that they also participate in Layer 2 processes, including encapsulation, and on Ethernet networks, ARP.
Routers also participate in Layer 1, which is used to transmit and receive the data bits over the physical medium. Routing tables contain both directly connected networks and remote networks. It is because routers contain addresses for remote networks in their routing tables that routers know where to send packets destined other networks, including the Internet. In the following chapters will learn how the routers build and maintain these routing tables - either by the use of manually entered static routes or through the use of dynamic routing protocols.
If you are comfortable with these skills, you can substi- tute Lab 1. Remember, however, that Tracer Activity Packet Tracer is not a substitute for a hands-on lab experience with real equipment. Use the Lab PDF for more details. If you need a review of these skills, you can substitute Lab 1.
Remember, however, that Tracer Activity for this chapter Packet Tracer is not a substitute for a hands-on lab experience with real equipment. A summary of the instructions is provided within the activity.
Given an address space and network Lab Activity for this chapter requirements, you are expected to design and implement an addressing scheme in a two-router topology. The main purpose of a router is to connect multiple networks and forward packets from one net- work to the next. This means that a router typically has multiple interfaces.
Each interface is a member or host on a different IP network. The router has a routing table, which is a list of networks known by the router. The routing table includes network addresses for its own interfaces, which are the directly connected networks, as well as network addresses for remote networks. A remote network is a network that can only be reached by forwarding the packet to another router. Remote networks are added to the routing table in two ways: Static routes do not have as much overhead as dynamic routing protocols; however, static routes can require more maintenance if the topology is constantly changing or is unstable.
Dynamic routing protocols automatically adjust to changes without any intervention from the net- work administrator. Dynamic routing protocols require more CPU processing and also use a cer- tain amount of link capacity for routing updates and messages.
In many cases, a routing table will contain both static and dynamic routes. Routers make their primary forwarding decision at Layer 3, the Network layer. However, router in- terfaces participate in Layers 1, 2, and 3. Layer 3 IP packets are encapsulated into a Layer 2 data link frame and encoded into bits at Layer 1. Router interfaces participate in Layer 2 processes as- sociated with their encapsulation. In the next chapter, we will examine the configuration of static routes and introduce the IP rout- ing table.
The Packet Tracer Skills Integration Challenge Activity for this chapter integrates all the knowl- edge and skills you acquired in previous courses and the first chapter of this course. In this activ- Refer to Packet ity, you build a network from the ground up. Starting with an addressing space and network Tracer Activity requirements, you must implement a network design that satisfies the specifications. On one LAN add a client host, and on the other end add a web server.
On each LAN include a switch be- tween the computer and the router. Assume that each router has a route to each of the LANs, simi- lar to that in 1. What happens when the host requests a web page from the web server? Look at all of the processes and protocols involved starting with the user entering a URL such as www. This includes protocols learned in Exploration 1 as well as information learned in this chapter. Introduction to Routing and Packet Forwarding 33 See if you can determine each of the processes that happen starting with the client needing to re- solve www.
What are all of the protocols and processes involved starting with the DNS request to getting the first packet with http information from the web server. Is the first packet the web server receives from the client the request for the web page? How do they update their MAC address tables and how do they determine how to forward the frame? Chapter Quiz Take the chapter quiz to test your knowledge. Routers are the devices responsible for the transfer of packets from one net- work to the next.
As we learned in the previous chapter, routers learn about remote networks either dynamically using routing protocols or manually using static routes. In many cases routers use a combination of both dynamic routing protocols and static routes. This chapter focuses on static routing. Static routes are very common and do not require the same amount of processing and overhead as we will see with dynamic routing protocols.
In this chapter, we will follow a sample topology as we configure static routes and learn trou- bleshooting techniques. In the process, we will examine several key IOS commands and the results they display.
We will also introduce the routing table using both directly connected networks and static routes. As you work through the Packet Tracer activities associated with these commands, take the time to experiment with the commands and examine the results.
Reading the routing tables will soon be- come second nature. Routers are primarily responsible for interconnecting networks by: The router is the junction or intersection that connects multiple IP networks.
The routers primary forwarding decision is based on Layer 3 information, the destination IP address. The routing table will ultimately determine the exit inter- face to forward the packet and the router will encapsulate that packet in the appropriated data link frame for that outgoing interface.
The topology consists of three routers, labeled R1, R2, and R3. Each router in this example is a Cisco A Cisco router has the following interfaces: In addition, Packet Tracer activities are available throughout the discussion of static routing so that you can practice skills as they are presented.
Lab 2. As you can see in the figure, Cisco routers support many different connector types. Serial Connectors Click 1 in the figure. Memorizing these connection types is not important. Just know that a router has a DB port that can support five different cabling stan- dards. Because five different cable types are supported with this port, the port is sometimes called a five-in-one serial port.
The other end of the serial cable is fitted with a connector that is appropri- ate to one of the five possible standards. The documentation for the device to which you want to connect should indicate the standard for that device. Click 2 and 3 in the figure. Newer routers support the smart serial interface that allows for more data to be forwarded across fewer cable pins.
The serial end of the smart serial cable is a pin connector. It is much smaller than the DB connector used to connect to a five-in-one serial port. These transition cables sup- port the same five serial standards and are available in either DTE or DCE configurations. In a production setting, the cable type is determined for you by the WAN service you are using.
Ethernet Connectors Click 4 in the figure. Chapter 2: At each end of an RJ cable, you should be able to see eight colored strips, or pins. An Ethernet cable uses pins 1, 2, 3, and 6 for transmitting and receiving data. Two types of cables can be used with Ethernet LAN interfaces: Wireless connectivity is discussed in another course.
Refer to Packet Use the Packet Tracer Activity to build the topology that you will use for the rest of this chapter. Tracer Activity for this chapter You will add all the necessary devices and connect them with the correct cabling.
Ini- tially, the routing table is empty if no interfaces have been configured. As you can see in the routing table for R1, no interfaces have been configured with an IP address and subnet mask. Static routes and dynamic routes will not be added to the routing table until the appropriate local interfaces, also known as the exit interfaces, have been configured on the router.
This proce- dure will be examined more closely in later chapters. Interfaces and their Status The status of each interface can be examined by using several commands.
The show interfaces command shows the status and gives a detailed description for all interfaces on the router. As you can see, the output from the command can be rather lengthy.
For example: Administra- tively down means that the interface is currently in the shutdown mode, or turned off. Line proto- col is down means, in this case, that the interface is not receiving a carrier signal from a switch or the hub.
This condition may also be due to the fact that the interface is in shutdown mode.
The reason for this is because we have not yet configured IP addresses on any of the interfaces. The show ip interface brief command can be used to see a portion of the interface informa- tion in a condensed format. Click show running-config in the figure. The show running-config command displays the current configuration file that the router is using.
Configuration commands are temporarily stored in the running configuration file and imple- mented immediately by the router. Use the show ip interface brief command to quickly verify that interfaces are up and up administratively up and line protocol is up. By default, all router interfaces are shutdown, or turned off.
To enable this interface, use the no shutdown command, which changes the interface from administratively down to up. Static Routing 39 changed state to up Both of these messages are important. The first changed state to up message indicates that, physi- cally, the connection is good.
If you do not get this first message, be sure that the interface is prop- erly connected to a switch or a hub. Although enabled with no shutdown, an Ethernet interface will not be active, or up, unless it is receiving a carrier signal from another device switch, hub, PC, or another router. The second changed state to up message indicates that the Data Link layer is operational.
However, WAN interfaces in a lab environment require clocking on one side of the link as discussed in Lab 1. The IOS often sends unsolicited messages similar to the changed state to up messages just dis- cussed.
As you can see in the figure, sometimes these messages will occur when you are in the middle of typing a command, such as configuring a description for the interface.
The IOS message does not affect the command, but it can cause you to lose your place when typing. Click Logging Synchronous in the figure. In order to keep the unsolicited output separate from your input, enter line configuration mode for the consoled port and add the logging synchronous command, as shown.
You will see that mes- sages returned by IOS no longer interfere with your typing. Reading the Routing Table Now look at routing table shown in the figure.
The interface was configured with the Examine the following line of output from the table: C In other words, R1 has an interface that belongs to this network. The meaning of C is defined in the list of codes at the top of the routing table.
The Having a single route represent an entire network of host IP addresses makes the routing table smaller, with fewer routes, which results in faster routing table lookups. The routing table could contain all individual host IP addresses for the A phone book is a good analogy for a routing table structure.
A phone book is a list of names and phone numbers, sorted in alphabetical order by last name. When looking for a number, we can as- sume that the fewer names there are in the book, the faster it will be to find a particular name. The phone book only contains one listing for each phone number.
For example, the Stanford fam- ily might be listed as: Stanford, Harold, Evergreen Terrace, This is the single entry for everyone who lives at this address and has the same phone number. The phone book could contain a listing for every individual, but this would increase the size of the phone book.
For example, there could be a separate listing for Harold Stanford, Margaret Stanford, Brad Stanford, Leslie Stanford, and Maggie Stanford - all with the same address and phone num- ber. If this were done for every family, the phone book would be larger and take longer to search. Routing tables work the same way: The fewer the entries in the routing table, the faster the lookup process.
To keep routing tables smaller, network addresses with subnet masks are listed instead of individual host IP addresses. The topic of host routes is discussed in another course.
The no shutdown command changed the interface from administratively down to up. Notice that the IP address is now displayed. Click show ip interface brief in the figure. The show ip interface brief command also shows verifies this same information. The show running-config command shows the current configuration of this interface. When the interface is disabled, the running-config command displays shutdown; however, when the inter- face is enabled, no shutdown is not displayed.
Each interface must belong to a separate subnet. The IOS will return the following error message if you attempt to configure the second interface with the same IP subnet as the first interface: For example, PC1 would be configured with a host IP address belonging to the This means that these interfaces have a Layer 2 MAC address, as shown in the figure. The show interfaces command displays the MAC address for the Ethernet interfaces.
If a router has a packet destined for a device on a directly connected Eth- ernet network, it checks the ARP table for an entry with that destination IP address in order to map it to the MAC address. The Ethernet frame, with the en- capsulated packet, is then sent via that Ethernet interface. Follow the additional Tracer Activity for this chapter instructions provided in the activity to examine the ARP process in simulation mode.
This interface is on the This will be discussed in more detail in a later course. In this course, we will be using dedicated, serial point-to-point connections between two routers. The serial interface will be in the up state only after the other end of the serial link has also been properly configured.
As you can see, the link is still down. The link is down because we have not yet configured and en- abled the other end of the serial link. However, because both interfaces are members of the same network, they both must have IP addresses that belong to the However, the line protocol is still down. This is because the interface is not receiving a clock signal. There is still one more command that we need to enter, the clock rate command, on the router with the DCE cable. The clock rate command will set the clock signal for the link.
Configuring the clock signal will be discussed in the next section. Serial interfaces require a clock signal to control the timing of the communications. By default, Cisco routers are DTE devices.
Roll over the cables and devices in the figure to see what they are. Configuring Serial Links in a Lab Environment For serial links that are directly interconnected, as in a lab environment, one side of a connection must be considered a DCE and provide a clocking signal. To configure a router to be the DCE device: Connect the DCE end of the cable to the serial interface. Configure the clock signal on the serial interface using the clock rate command.
The serial cables used in the lab are typically one of two types. If a cable is connected between the two routers, you can use the show controllers command to determine which end of the cable is attached to that interface. The available clock rates, in bits per second, are , , , , , , , , , , , , , , , and Some bit rates might not be available on certain serial interfaces. Verifying the Serial Interface Configuration As you can see from the figure, we can determine that the line protocol is now up and verify this on both ends of the serial link by using the show interfaces and show ip interface brief com- mands.
Remember, the serial interface will be up only if both ends of the link are configured cor- rectly. In our lab environment, we have configured the clock rate on the end with the DCE cable. R1 ping If we issue the show ip route command on R1, we will see the directly connected route for the R1 show running-config Note: Although the clock rate command is two words, the IOS spells clockrate as a single word in the running configuration and startup configuration files.
A routing table is a data structure used to store routing information acquired from different sources. The main purpose of a routing table is to provide the router with paths to different destination networks.
R1 and R2 only have routes for directly connected networks. Observing Routes as They are Added to the Routing Table We will now take a closer look at how directly connected routes are added to, and deleted from, the routing table. In contrast to show commands, debug commands can be used to monitor router operations in real time. The debug ip routing command will let us see any changes that the router performs when adding or removing routes.
We will configure the interfaces on the R2 router and examine this process. First, we will enable debugging with the debug ip routing command so that we can see the di- rectly connected networks as they are added to the routing table. Because the FastEthernet interface connects to the The routing table now shows the route for the directly connected network The debug ip routing command displays routing table processes for any route, whether that route is a directly connected network, a static route, or a dynamic route.
Click Disable Debug in the figure. Disable debug ip routing by using either the undebug ip routing command or the undebug all command. This change will overwrite the previous entry.
There are ways to configure a single interface with multiple IP addresses, as long as each address is on a different subnet. This topic will be discussed in a later course. To remove a directly connected network from a router, use these two commands: The shutdown command is used to disable interfaces. The IP address, however, will still be in the configuration file, running-config.
After the shutdown command is used, you can remove the IP address and subnet mask from the in- terface. The order in which you perform these two commands does not matter.
Click Debug 2 in the figure. R2 config-if no ip address Disable debugging: R2 undebug all All possible debugging has been turned off Click Routing Table 2 in the figure. To verify that the route was removed from the routing table, we use the command show ip route. Notice that the route to Reconfiguring the interface to continue with the chapter.
To reconfigure the interface, simply enter the commands again: Debug commands, especially the debug all command, should be used sparingly. These commands can disrupt router operations. Debug commands are useful when configuring or troubleshooting a network; however, they can make intensive use of CPU and memory resources.
Debug commands should be used with caution on production net- works because they can affect the performance of the device. You will also use debug ip Tracer Activity for this chapter routing to observe the routing table processes.
The figure shows the rest of the configurations for routers R2 and R3. Click show ip route in the figure. By reviewing the routing tables in the figure, we can verify that all directly connected networks are installed for routing.
Regardless of what routing scheme you ultimately config- ure - static, dynamic, or a combination of both - verify your initial network configurations with the show ip interface brief command and the show ip route command before proceeding with more complex configurations. When a router only has its interfaces configured, and the routing table contains the directly connected networks but no other routes, only devices on those directly connected networks are reachable.
Because these routers only know about their directly connected networks, the routers can only communicate with those devices on their own directly connected LANs and serial networks. For example, PC1 in the topology has been configured with the IP address PC1 has also been configured with the default gateway IP address Because R1 only knows about directly connected networks, it can forward packets from PC1 to devices on the R2 only knows about its three directly connected networks.
Try to predict what will happen if we ping one of the FastEthernet interfaces on one of the other routers. Click ping in the figure. Notice that the pings failed, as indicated by the series of five periods. It failed because R2 does not have a route in its routing table that matches either Static Routing 47 the network address as indicated by the prefix of the route.
Play the first animation in the figure. If you convert these addresses to binary and compare them, as shown in the animation, you will see that the first 24 bits of this route do not match because the 23rd bit does not match. Therefore, this route is rejected. Therefore, this route is also rejected, and the process moves on to the next route in the routing table.
As shown, 10 of the first 24 bits do not match. Because there are no more routes in the routing table, the pings are discarded. Click Pings are sent to R3 on the figure and play the animation. This time the ping succeeds! It is successful because R2 has a route in its routing table that matches The first two routes, But the last route, R2 is now done making the forwarding decisions for this packet; the decisions made by other routers regarding this packet are not its concern.
A Closer Look. Tracer Activity for this chapter 2. CDP is an information-gathering tool used by network administrators to get information about directly connected Cisco devices. CDP is a proprietary tool that enables you to access a summary of proto- col and address information about Cisco devices that are directly connected. By default, each Cisco device sends periodic messages, which are known as CDP advertisements, to directly con- nected Cisco devices.
Most network devices, by definition, do not work in isolation. A Cisco device frequently has other Cisco devices as neighbors on the network. Information gathered from other devices can assist you in making network design decisions, troubleshooting, and making changes to equipment. CDP can be used as a network discovery tool, helping you to build a logical topology of a network when such documentation is missing or lacking in detail.
Familiarity with the general concept of neighbors is important for understanding CDP as well as for future discussions about dynamic routing protocols. Layer 3 Neighbors At this point in our topology configuration, we only have directly connected neighbors. At Layer 3, routing protocols consider neighbors to be devices that share the same network address space. For example, R1 and R2 are neighbors. Both are members of the R2 and R3 are also neighbors because they both share the But R1 and R3 are not neighbors because they do not share any network address space.
If we connected R1 and R3 with a cable and configured each with an IP address from the same network, then they would be neighbors. Therefore, CDP neighbors are Cisco devices that are directly con- nected physically and share the same data link. Assuming that all routers and switches in the figure are Cisco devices running CDP, what neigh- bors would R1 have? Can you determine the CDP neighbors for each device? Click the Topology button in the figure.
In our chapter topology, we can see the following CDP neighbor relationships: Notice the difference between Layer 2 and Layer 3 neighbors. The switches are not neighbors to the routers at Layer 3, because the switches are operating at Layer 2 only. However, the switches are Layer 2 neighbors to their directly connected routers. CDP Operation Examine the output from the show cdp neighbors and show cdp neighbors detail commands in the figure. Notice that R3 has gathered some detailed information about R2 and the switch con- nected to the Fast Ethernet interface on R3.
CDP automatically discovers neighbor- ing Cisco devices running CDP, regardless of which protocol or suites are running.
Tracer Activity for this chapter Practice enabling and disabling CDP - globally and on a per-interface basis. Investigate the power of using CDP to discover the topology of a network.
For each CDP neighbor, the following information is displayed: The show cdp neighbors detail command also reveals the IP address of a neighboring device. This command is very helpful when two Cisco routers cannot route across their shared data link.
The show cdp neighbors detail command will help determine if one of the CDP neighbors has an IP configuration error. For network discovery situations, knowing the IP address of the CDP neighbor is often all the in- formation needed to telnet into that device. In this fashion, you can telnet around a network and build a logical topology. In the next Packet Tracer Activity, you will do just that. Yes, it could be. You may already have seen CDP packets in your packet capturing labs from a previous course.
Click Disabling CDP in the figure. Router config-if no cdp enable Refer to Packet CDP show commands can be used to discover information about unknown devices in a network. Tracer Activity for this chapter CDP show commands display information about directly connected Cisco devices, including an IP address that can be used to reach the device.
You can then telnet to the device and repeat the process until the entire network is mapped. Dynamic routing protocols are intro- duced in the next chapter. Static routes Static routes are commonly used when routing from a network to a stub network. A stub network is a network accessed by a single route. For an example, see the figure. Here we see that any net- work attached to R1 would only have one way to reach other destinations, whether to networks at- tached to R2 or to destinations beyond R2.
Therefore, network McQuillan then at Bolt, Beranek and Newman as a mechanism that would calculate routes more quickly when network conditions changed, and thus lead to more stable routing. Cisco literature refers to enhanced interior gateway routing protocol EIGRP as a "hybrid" protocol,[ citation needed ] despite the fact it distributes routing tables instead of topology maps.
However, it does synchronize routing tables at start up as OSPF does, and sends specific updates only when topology changes occur. In , Radia Perlman proposed using link-state routing for layer 2 frame forwarding with devices called routing bridges or Rbridges. Where a connection can have varying quality, the quality of a connection can be used to select better connections. This is used in some routing protocols that use radio frequency transmission.
Distributing maps[ edit ] This description covers only the simplest configuration; i. The hierarchical case is somewhat more complex; see the various protocol specifications. As previously mentioned, the first main stage in the link-state algorithm is to give a map of the network to every node. This is done with several subsidiary steps. Determining the neighbours of each node[ edit ] First, each node needs to determine what other ports it is connected to, over fully working links; it does this using a reachability protocol which it runs periodically and separately with each of its directly connected neighbours.
Distributing the information for the map[ edit ] Next, each node periodically and in case of connectivity changes sends a short message, the link-state advertisement , which: Identifies the node which is producing it.
Identifies all the other nodes either routers or networks to which it is directly connected.
Includes a 'sequence number', which increases every time the source node makes up a new version of the message. This message is sent to all the nodes on a network. As a necessary precursor, each node in the network remembers, for every one of its neighbors, the sequence number of the last link-state message which it received from that node. When a link-state advertisement is received at a node, the node looks up the sequence number it has stored for the source of that link-state message: if this message is newer i.
This procedure rapidly gets a copy of the latest version of each node's link-state advertisement to every node in the network. Networks running link state algorithms can also be segmented into hierarchies which limit the scope of route changes. These features mean that link state algorithms scale better to larger networks. In the lab environment clock rates must be configured for DCE.
The type of cable used depends on what devices are being connected. Examples include: Customer routers use default routes to connect to an ISP router. RIPv1 do not send subnet masks in their routing updates.
Level 1 Network Routes o Best match is also known as the longest match o The best match is the one that has the most number of left most bits matching between the destination IP address and the route in the routing table.
R1 can create a link from R2 to R5. R1 learns that R2 is connected to OSPF area is a group of routers that share link state information o Example: Router with the highest OSPF interface priority. Router with the second highest OSPF interface priority. HELLO 2: Related Papers.