Andrian Lutfi
Welcome To My Blog
Thursday, August 5, 2010
Network Routing Protocols - IGRP, EIGRP, OSPF, ISIS, BGP
Overview
The purpose of routing protocols is to learn of available routes that exist on the enterprise network, build routing tables and make routing decisions. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. There are two primary routing protocol types although many different routing protocols defined with those two types. Link state and distance vector protocols comprise the primary types. Distance vector protocols advertise their routing table to all directly connected neighbors at regular frequent intervals using a lot of bandwidth and are slow to converge. When a route becomes unavailable, all router tables must be updated with that new information. The problem is with each router having to advertise that new information to its neighbors, it takes a long time for all routers to have a current accurate view of the network. Distance vector protocols use fixed length subnet masks which aren't scalable. Link state protocols advertise routing updates only when they occur which uses bandwidth more effectively. Routers don't advertise the routing table which makes convergence faster. The routing protocol will flood the network with link state advertisements to all neighbor routers per area in an attempt to converge the network with new route information. The incremental change is all that is advertised to all routers as a multicast LSA update. They use variable length subnet masks, which are scalable and use addressing more efficiently.
Interior Gateway Routing Protocol (IGRP)
Interior Gateway Routing Protocol is a distance vector routing protocol developed by Cisco systems for routing multiple protocols across small and medium sized Cisco networks. It is proprietary which requires that you use Cisco routers. This contrasts with IP RIP and IPX RIP, which are designed for multi-vendor networks. IGRP will route IP, IPX, Decnet and AppleTalk which makes it very versatile for clients running many different protocols. It is somewhat more scalable than RIP since it supports a hop count of 100, only advertises every 90 seconds and uses a composite of five different metrics to select a best path destination. Note that since IGRP advertises less frequently, it uses less bandwidth than RIP but converges much slower since it is 90 seconds before IGRP routers are aware of network topology changes. IGRP does recognize assignment of different autonomous systems and automatically summarizes at network class boundaries. As well there is the option to load balance traffic across equal or unequal metric cost paths.
Characteristics
· Distance Vector
· Routes IP, IPX, Decnet, Appletalk
· Routing Table Advertisements Every 90 Seconds
· Metric: Bandwidth, Delay, Reliability, Load, MTU Size
· Hop Count: 100
· Fixed Length Subnet Masks
· Summarization on Network Class Address
· Load Balancing Across 6 Equal or Unequal Cost Paths ( IOS 11.0 )
· Metric Calculation = destination path minimum BW * Delay (usec)
· Split Horizon
· Timers: Invalid Timer (270 sec), Flush Timer (630 sec), Holddown Timer (280 sec)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Enhanced Interior Gateway Routing Protocol is a hybrid routing protocol developed by Cisco systems for routing many protocols across an enterprise Cisco network. It has characteristics of both distance vector routing protocols and link state routing protocols. It is proprietary which requires that you use Cisco routers. EIGRP will route the same protocols that IGRP routes (IP, IPX, Decnet and Appletalk) and use the same composite metrics as IGRP to select a best path destination. As well there is the option to load balance traffic across equal or unequal metric cost paths. Summarization is automatic at a network class address however it can be configured to summarize at subnet boundaries as well. Redistribution between IGRP and EIGRP is automatic as well. There is support for a hop count of 255 and variable length subnet masks.
Convergence
Convergence with EIGRP is faster since it uses an algorithm called dual update algorithm or DUAL, which is run when a router detects that a particular route is unavailable. The router queries its neighbors looking for a feasible successor. That is defined as a neighbor with a least cost route to a particular destination that doesn't cause any routing loops. EIGRP will update its routing table with the new route and the associated metric. Route changes are advertised only to affected routers when changes occur. That utilizes bandwidth more efficiently than distance vector routing protocols.
Autonomous Systems
EIGRP does recognize assignment of different autonomous systems which are processes running under the same administrative routing domain. Assigning different autonomous system numbers isn't for defining a backbone such as with OSPF. With IGRP and EIGRP it is used to change route redistribution, filtering and summarization points.
Characteristics
· Advanced Distance Vector
· Routes IP, IPX, Decnet, Appletalk
· Routing Advertisements: Partial When Route Changes Occur
· Metrics: Bandwidth, Delay, Reliability, Load, MTU Size
· Hop Count: 255
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 6 Equal or Unequal Cost Paths (IOS 11.0)
· Timers: Active Time (180 sec)
· Metric Calculation = destination path minimum BW * Delay (msec) * 256
· Split Horizon
· LSA Multicast Address: 224.0.0.10
Open Shortest Path First (OSPF)
Open Shortest Path First is a true link state protocol developed as an open standard for routing IP across large multi-vendor networks. A link state protocol will send link state advertisements to all connected neighbors of the same area to communicate route information. Each OSPF enabled router, when started, will send hello packets to all directly connected OSPF routers. The hello packets contain information such as router timers, router ID and subnet mask. If the routers agree on the information they become OSPF neighbors. Once routers become neighbors they establish adjacencies by exchanging link state databases. Routers on point-to-point and point-to-multipoint links (as specified with the OSPF interface type setting) automatically establish adjacencies. Routers with OSPF interfaces configured as broadcast (Ethernet) and NBMA (Frame Relay) will use a designated router that establishes those adjacencies.
Areas
OSPF uses a hierarchy with assigned areas that connect to a core backbone of routers. Each area is defined by one or more routers that have established adjacencies. OSPF has defined backbone area 0, stub areas, not-so-stubby areas and totally stubby areas. Area 0 is built with a group of routers connected at a designated office or by WAN links across several offices. It is preferable to have all area 0 routers connected with a full mesh using an Ethernet segment at a core office. This provides for high performance and prevents partitioning of the area should a router connection fail. Area 0 is a transit area for all traffic from attached areas. Any inter-area traffic must route through area 0 first. Stub areas use a default route to forward traffic destined for an external network such as EIGRP since the area border router doesn't send or receive any external routes. Inter-area and intra-area routing is as usual. Totally stubby areas are a Cisco specification that uses a default route for inter-area and external destinations. The ABR doesn't send or receive external or inter-area LSA's. The not-so-stubby area ABR will advertise external routes with type 7 LSA. External routes aren't received at that area type. Inter-area and intra-area routing is as usual. OSPF defines internal routers, backbone routers, area border routers (ABR) and autonomous system boundary routers (ASBR). Internal routers are specific to one area. Area border routers have interfaces that are assigned to more than one area such as area 0 and area 10. An autonomous system boundary router has interfaces assigned to OSPF and a different routing protocol such as EIGRP or BGP. A virtual link is utilized when an area doesn't have a direct connection to area 0. A virtual link is established between an area border router for an area that isn't connected to area 0, and an area border router for an area that is connected to area 0. Area design involves considering geographical location of offices and traffic flows across the enterprise. It is important to be able to summarize addresses for many offices per area and minimize broadcast traffic.
Convergence
Fast convergence is accomplished with the SPF (Dijkstra) algorithm which determines a shortest path from source to destination. The routing table is built from running SPF which determines all routes from neighbor routers. Since each OSPF router has a copy of the topology database and routing table for its particular area, any route changes are detected faster than with distance vector protocols and alternate routes are determined.
Designated Router
Broadcast networks such as Ethernet and Non-Broadcast Multi Access networks such as Frame Relay have a designated router (DR) and a backup designated router (BDR) that are elected. Designated routers establish adjacencies with all routers on that network segment. This is to reduce broadcasts from all routers sending regular hello packets to its neighbors. The DR sends multicast packets to all routers that it has established adjacencies with. If the DR fails, it is the BDR that sends multicasts to specific routers. Each router is assigned a router ID, which is the highest assigned IP address on a working interface. OSPF uses the router ID (RID) for all routing processes.
Characteristics
· Link State
· Routes IP
· Routing Advertisements: Partial When Route Changes Occur
· Metric: Composite Cost of each router to Destination (100,000,000/interface speed)
· Hop Count: None (Limited by Network)
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 4 Equal Cost Paths
· Router Types: Internal, Backbone, ABR, ASBR
· Area Types: Backbone, Stubby, Not-So-Stubby, Totally Stubby
· LSA Types: Intra-area (1,2) Inter-area (3,4), External (5,7)
· Timers: Hello Interval and Dead Interval (different for network types)
· LSA Multicast Address: 224.0.0.5 and 224.0.0.6 (DR/BDR) Don't Filter!
· Interface Types: Point to Point, Broadcast, Non-Broadcast, Point to Multipoint, Loopback
Integrated IS-IS
Integrated Intermediate System - Intermediate System routing protocol is a link state protocol similar to OSPF that is used with large enterprise and ISP customers. An intermediate system is a router and IS-IS is the routing protocol that routes packets between intermediate systems. IS-IS utilizes a link state database and runs the SPF Dijkstra algorithm to select shortest paths routes. Neighbor routers on point to point and point to multipoint links establish adjacencies by sending hello packets and exchanging link state databases. IS-IS routers on broadcast and NBMA networks select a designated router that establishes adjacencies with all neighbor routers on that network. The designated router and each neighbor router will establish an adjacency with all neighbor routers by multicasting link state advertisements to the network itself. That is different from OSPF, which establishes adjacencies between the DR and each neighbor router only. IS-IS uses a hierarchical area structure with level 1 and level 2 router types. Level 1 routers are similar to OSPF intra-area routers, which have no direct connections outside of its area. Level 2 routers comprise the backbone area which connects different areas similar to OSPF area 0. With IS-IS a router can be an L1/L2 router which is like an OSPF area border router (ABR) which has connections with its area and the backbone area. The difference with IS-IS is that the links between routers comprise the area borders and not the router. Each IS-IS router must have an assigned address that is unique for that routing domain. An address format is used which is comprised of an area ID and a system ID. The area ID is the assigned area number and the system ID is a MAC address from one of the router interfaces. There is support for variable length subnet masks, which is standard with all link state protocols. Note that IS-IS assigns the routing process to an interface instead of a network.
Characteristics
· Link State
· Routes IP, CLNS
· Routing Advertisements: Partial When Routing Changes Occur
· Metric: Variable Cost (default cost 10 assigned to each interface)
· Hop Count: None (limited by network)
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 6 Equal Cost Paths
· Timers: Hello Interval, Hello Multiplier
· Area Types: Hierarchical Topology similar to OSPF
· Router Types: Level 1 and Level 2
· LSP Types: Internal L1 and L2, External L2
· Designated Router Election, No BDR
Border Gateway Protocol (BGP)
Border Gateway Protocol is an exterior gateway protocol, which is different from the interior gateway protocols discussed so far. The distinction is important since the term autonomous system is used somewhat differently with protocols such as EIGRP than it is with BGP. Exterior gateway protocols such as BGP route between autonomous systems, which are assigned a particular AS number. AS numbers can be assigned to an office with one or several BGP routers. The BGP routing table is comprised of destination IP addresses, an associated AS-Path to reach that destination and a next hop router address. The AS-Path is a collection of AS numbers that represent each office involved with routing packets. Contrast that with EIGRP, which uses autonomous systems as well. The difference is their autonomous systems refer to a logical grouping of routers within the same administrative system. An EIGRP network can configure many autonomous systems. They are all managed by the company for defining route summarization, redistribution and filtering. BGP is utilized a lot by Internet Service Providers (ISP) and large enterprise companies that have dual homed internet connections with single or dual routers homed to the same or different Internet Service Providers. BGP will route packets across an ISP network, which is a separate routing domain that is managed by them. The ISP has its own assigned AS number, which is assigned by InterNIC. New customers can either request an AS assignment for their office from the ISP or InterNIC. A unique AS number assignment is required for customers when they connect using BGP. There are 10 defined attributes that have a particular order or sequence, which BGP utilizes as metrics to determine the best path to a destination. Companies with only one circuit connection to an ISP will implement a default route at their router, which forwards any packets that are destined for an external network. BGP routers will redistribute routing information (peering) with all IGP routers on the network (EIGRP, RIP, OSPF etc) which involve exchange of full routing tables. Once that is finished, incremental updates are sent with topology changes. Each BGP router can be configured to filter routing broadcasts with route maps instead of sending/receiving the entire internet routing table.
BGP Routing Table Components
· Destination IP Address / Subnet Mask
· AS-Path
· Next Hop IP Address
Cisco Routing Protocol - Basic Stuff
CCNA Routing
Layer-3 devices are generically called routers. Routers basically have two functions:
1. To find a layer-3 path to a destination network
2. To move packets from one interface to another to get a packet to its destination
In order to accomplish the first function, a router will need to:
- Learn about routers it is connected to in order to learn the networks that they know about
- Find locations of destination network numbers
- Choose a best path to each destination
- Maintain the most up-to-date routing information about how to reach destination networks
Types of Routes
A router can learn a route via one of two methods: static and dynamic. A static route is a route that is manually configured on the router. Dynamic routes are routes that a router learns by running a routing protocol. Routing protocols will learn about routes from other neighboring routers running the same routing protocol.
Administrative Distance
Administrative distance ranks the IP routing protocols, assigning a value, or weight, to each protocol. Distances can range from 0 to 255. A smaller distance is more believable by a router, with the best distance being 0 and the worst, 255.
Static Route Configuration
Router(config)# ip route destination_network_# [subnet_mask] IP_address_of_next_hop_neighbor
[administrative_distance]
or
Router(config)# ip route destination_network_# [subnet_mask] interface_to_exit [administrative_distance]
Default Route Configuration
A default route is a special type of static route.Where a static route specifies a path a router should use to reach a specific destination, a default route specifies a path the router should use if it doesn't know how to reach the destination.
Router(config)# ip route 0.0.0.0 0.0.0.0 IP_address_of_next_hop_neighbor [administrative distance]
Or
Router(config)# ip route 0.0.0.0 0.0.0.0 interface_to_exit [administrative_distance]
Dynamic Routing Protocols
Dynamic routing protocols learn about destination networks from neighboring routers. Dynamic routing protocols fall under one of three categories: distance vector, link state, and hybrid. Because of the differences between the various routing protocol types, each has advantages and disadvantages.
Distance Vector Protocols
Distance vector protocols are the simplest. Distance vector routing protocols use the distance and direction (vector) to find paths to destinations. Most distance vector protocols use the Bellman-Ford algorithm for finding paths to networking destinations. Some examples of IP routing protocols that are distance vector are RIPv1 and IGRP. Distance vector protocols periodically use local broadcasts with a destination IP address of 255.255.255.255 to share routing information.
Processing Updates
When a distance vector protocol receives a routing update, it performs these steps:
1. Increment the metrics of the incoming routes in the advertisement (for IP
RIP, add 1 to the hop count).
2. Compare the network numbers in the routing update from the neighbor
to what the router has in its routing table.
3. If the neighbor's information is better, place it in the routing table and remove the old entry.
4. If the neighbor's information is worse, ignore it.
5. If the neighbor's information is exactly the same as the entry already in the table, reset the timer for the entry in the routing table (in other words, the router already learned about this route from the same neighbor).
6. If the neighbor's information is a different path to a known destination network, but with the same metric as the existing network in the routing table, the router will add it to the routing table along with the old one. This assumes you have not exceeded the maximum number of equal-cost paths for this destination network number.
The six steps are generally referred to as the Bellman-Ford algorithm.
Link State Protocols
Link state protocols use an algorithm called the Shortest Path First (SPF) algorithm, invented by Dijkstra, to find the best path to a destination. Examples of link state protocols include IP's OSPF. Whereas distance vector protocols use local broadcasts to disseminate routing information, link state protocols use multicasts. A distance protocol will send out its routing table religiously on its periodic interval whether there are changes or not. Link state protocols are smarter. They multicast what is called a Link State Advertisement (LSA), which is a piece of routing information that contains who originated the advertisement and what the network number is. LSAs are typically generated only when there are changes in the network. link state routers send out only incremental updates. Advantage that link state protocols have over distance vector protocols is that they support route classless routing [VLSM].
Hybrid Protocols
A hybrid protocol takes the advantages of both distance vector and link state protocols and merges them into a new protocol. Typically, hybrid protocols are based on a distance vector protocol but contain many of the features and advantages of link state protocols. Examples of hybrid protocols include RIPv2, EIGRP.
Problems with Distance Vector Protocols
Problem: Convergence
The term convergence, in routing terms, refers to the time it takes for all of the routers to understand the current topology of the network. Link state protocols tend to converge very quickly, while distance vector protocols tent to converge slowly.
Solution: Triggered Updates
You actually have two solutions that you can use in order to speed convergence: change the periodic timer interval and/or use triggered updates.
Problem: Routing Loops
A routing loop is a layer-3 loop in the network. Basically, it is a disagreement about how to reach a destination network. Packet Loops in the Network.
Solution: Maximum Hop Count: IP RIP set a hop count limit of 15, by default, and IGRP allows a hop count of 100.
Solution: Split Horizon
Split horizon is used with small routing loops. Split horizon states that if a neighboring router sends a route to a router, the receiving router will not propagate this route back to the advertising router on the same interface.
Solution: Route Poisoning
Whereas split horizon is used to solve small routing loop problems, distance vector protocols use two mechanisms to deal with large routing loop problems: route poisoning and hold down timers. Route poisoning is a derivative of split horizon. When a router detects that one of its connected routes has failed; the router will poison the route by assigning an infinite metric to it. In IP RIP, the route is assigned a hop count of 16 (15 is the maximum), thus making it an unreachable network.
When a router advertises a poised route to its neighbors, its neighbors break the rule of split horizon and send back to the originator the same poisoned route, called a poison reverse. This ensures that everyone received the original update of the poisoned route.
Hold-Down Timers
In order to give the routers enough time to propagate the poisoned route and to ensure that no routing loops occur while propagation is occurring; the routers implement a hold-down mechanism. During this period, the routers will freeze the poisoned route in their routing tables for the period of the hold-down timer, which is typically three times the interval of the routing broadcast update. 180 Sec's
RIP (Routing Information Protocol)
IP RIP (Routing Information Protocol) comes in two different versions: 1 and 2. Version 1 is a distance vector protocol. Version 2 is a hybrid protocol. RIPv1 uses local broadcasts to share routing information. These updates are periodic in nature, occurring, by default, every 30 seconds, with a hold-down period of 180 seconds. Both versions of RIP use hop count as a metric, which is not always the best metric to use. RIPv1 is a classful protocol. Another interesting feature is that RIP supports up to six equal-cost paths to a single destination. The default is actually four paths, but this can be increased up to a maximum of six.
RIPv2
One major enhancement to RIPv2 pertains to how it deals with routing updates. Instead of using broadcasts, RIPv2 uses multicasts. And to speed up convergence, RIPv2 supports triggered updates-when a change occurs, a RIPv2 router will immediately propagate its routing information to its connected neighbors. A second major enhancement that RIPv2 has is that it is a classless protocol. RIPv2 supports variable-length subnet masking (VLSM), which allows you to use more than one subnet mask for a given class network number.
Configuring IP RIP
Router(config)# router rip
Router(config-router)# network IP_network_#
Specifying RIP Version 1 and 2
Router(config)# router rip
Router(config-router)# version 1|2
Troubleshooting IP RIP
show ip protocols
show ip route
debug ip rip
debug ip rip
IGRP (Interior Gateway Routing Protocol)
The Interior Gateway Routing Protocol (IGRP) is a Cisco-proprietary routing protocol for IP. Like IP RIPv1, it is a distance vector protocol. However, it scales better than RIP because of these advantages:
- It uses a sophisticated metric based on bandwidth and delay.
- It uses triggered updates to speed-up convergence.
- It supports unequal-cost load balancing to a single destination. IGRP uses a composite metric, which includes bandwidth, delay, reliability, load, and MTU, when choosing paths to a destination. By default, the algorithm uses only bandwidth and delay
Configuring IP IGRP
Router(config)# router igrp autonomous_system_#
Router(config-router)# network IP_network_#
Unlike RIP, IGRP understands the concept of an autonomous system and requires you to configure the autonomous system number in the routing process. For routers to share routing information, they must be in the same AS.
Load Balancing
With RIP, you don't need to configure anything to enable equal-cost load balancing; and RIP doesn't support unequal-cost load balancing. IGRP supports both equal- and unequal-cost paths for load balancing to a single destination. Equal-cost paths are enabled by default, where IGRP supports up to six equal-cost paths (four by default) to a single destination in the IP routing table. IGRP, however, also supports unequal-cost paths, but this feature is disabled by default.
The variance feature allows you to include equal- and unequal-cost IGRP routes in the routing table.
Router(config-router)# variance multiplier
Troubleshooting IP IGRP
show ip protocols
show ip route
debug ip igrp events
debug ip igrp transactions
OSPF(Open Shortest Path First)
The Open Shortest Path First (OSPF) protocol is a link state protocol that handles routing for IP traffic. Because it is based on an open standard, OSPF is very popular in many corporate networks today and has many advantages, including these:
- It will run on most routers, since it is based on an open standard.
- It uses the SPF algorithm, developed by Dijkstra, to provide a loop-free topology.
- It provides fast convergence with triggered, incremental updates via Link State Advertisements (LSAs).
- It is a classless protocol and allows for a hierarchical design with VLSM and route summarization.
Given its advantages, OSPF does have its share of disadvantages:
- OSPF maintains three types of tables. So it requires more memory to hold the adjacency (list of OSPF neighbors), topology (a link state database containing all of the routers and their routes), and routing tables.
- It requires extra CPU processing to run the SPF algorithm, which is especially true when you first turn on your routers and they are initially building the adjacency and topology tables.
- For large networks, it requires careful design to break up the network into an appropriate hierarchical design by separating routers into different areas.
- It is complex to configure and more difficult to troubleshoot.
Hierarchical Design: Areas
Areas are used to provide hierarchical routing. Basically, areas are used to control when and how much routing information is shared across your network. In flat network designs, such as IP RIP, if a change occurs on one router, perhaps a flapping route problem, it affects every router in the entire network. With a correctly designed hierarchical network, these changes can be contained within a single area. OSPF implements a two-layer hierarchy: the backbone (area 0) and areas off of the backbone. Through a correct IP addressing design, you should be able to summarize routing information between areas. By performing this summarization, the routers have a smaller topology database (they know only about links in their own area and the summarized routes) and their routing tables are smaller (they know only about their own area's routes and the summarized routes).
Metric Structure
Unlike RIP, which uses hop count as a metric, OSPF uses cost. Cost is actually the inverse of the bandwidth of a link: the faster the speed of the connection, the lower the cost. The most preferred path is the one with the lowest cost. By using cost as a metric, OSPF will choose more intelligent paths than RIP. OSPF supports load balancing of up to six equal-cost paths to a single destination. The default measurement that Cisco uses in calculating the cost metric is: cost = 10 ^8/(interface bandwidth).
Router Identities
Each router in an OSPF network needs a unique ID. The ID is used to provide a unique identity to the OSPF router. This is included in any OSPF messages the router generates. The router ID is chosen according to one of the two following criteria:
- The highest IP address on its loop back interfaces (this is a logical interface on a router)
- The highest IP address on its active interfaces
It is highly recommended that you use a loop back interface because it is always up and thus the router can obtain a router ID.
Finding Neighbors
OSPF learns about its neighbors and builds its adjacency and topology tables by sharing LSAs. There are different types of LSAs. When learning about the neighbors that a router is connected to, as well as keeping tabs on known neighbors, OSPF routers will generate hello LSAs every 10 seconds. When a neighbor is discovered and an adjacency is formed with the neighbor, a router expects to see hello messages from the neighbor. If a neighbor is not seen within the dead interval time, which defaults to 40 seconds, the neighbor is declared dead. When this occurs, the router will advertise this information, via an LSA message, to other neighboring OSPF routers. In order for two routers to become neighbors, the following must match on each router:
- The area number and its type
- The hello and dead interval timers
Let's assume that you turned on all your routers simultaneously on a segment. In this case, the OSPF routers will go through three states called the exchange process:
1. Down state the new router has not exchanged any OSPF information with any other router.
2. Init state A destination router has received a new router's hello and adds it to its neighbor list (assuming that certain values match). Note that communication is only unidirectional at this point.
3. Two-Way state the new router receives a unidirectional reply to its initial hello packet and adds the destination router to its neighbor database. Once the routers have entered a two-way state, they are considered neighbors. At this point, an election process takes place to elect the designated router (DR) and the backup designated router (BDR).
Designated and Backup Designated Routers
An OSPF router will not form adjacencies to just any router. Instead, a client/server design is implemented in OSPF. For each network multi-access segment, there is a DR and a BDR as well as other routers. When an OSPF router comes up, it forms adjacencies with the DR and the BDR on each multi-access segment that it is connected to. Any exchange of routing information is between these DR/BDR routers and the other OSPF neighbors on a segment (and vice versa). An OSPF router talks to a DR using the IP multicast address of 224.0.0.6. The DR and the BDR talk to all routers using the 224.0.0.5 multicast IP address.
The OSPF router with the highest priority becomes the DR for the segment. If there is a tie, the router with the highest router ID will become the DR. By default, all routers have a priority of 1 (priorities can range 0-255). If the DR fails, the BDR is promoted to DR and another router is elected as the BDR. OSPF uses incremental updates. This means that whenever changes take place, only the change is shared with the DR, which will then share this information with other routers on the segment. OSPF routers share information about their connected routes with the DR, which includes the link-state type, the ID of the advertising router, the cost of the advertised link, and the sequence number of the link.
Configuring OSPF
Router(config)# router ospf process_ID
Router(config-router)# network IP_address wildcard_mask area area_#
Note that process ID do not need to match between different routers and that they have nothing to do with autonomous system numbers.
A wildcard mask is 32 bits in length. A 0 in a bit position means there must be a match, and a 1 in a bit position means the router doesn't care. Actually, a wildcard mask is an inverted subnet mask, with the 1's and 0's switched.
Class A: 0.255.255.255.255
Class B: 0.0.255.255
Class C: 0.0.0.255
Loopback Interfaces
A loopback interface is a logical, virtual interface on a router. By default, the router doesn't have any loopback interfaces, but they can easily be created. Here are some reasons you might want to create a loopback interface:
- To assign a router ID to an OSPF router
- To use for testing purposes, since this interface is always up
To create a loopback interface, use the following command:
Router(config)# interface loopback port_#
Router(config-if)# ip address IP_address subnet_mask
Troubleshooting OSPF
• show ip protocols
• show ip route
• show ip ospf interface
• show ip ospf neighbor
• debug ip ospf adj
• debug ip ospf events
• debug ip ospf packet
EIGRP (Enhanced Interior Gateway Routing Protocol)
The Enhanced Interior Gateway Routing Protocol (EIGRP) is a Cisco-proprietary routing protocol for IP. It's actually based on IGRP, with many enhancements built into it. These characteristics include:
- Fast convergence
- Loop-free topology
- VLSM and route summarization
- Multicast and incremental updates
- Routes for multiple routed protocols (Supports IP, IPX, APPLE TALK)
Characteristics of EIGRP
Both offer load balancing across six paths (equal or unequal).
- They have similar metric structures.
- EIGRP has faster convergence (triggered updates and saving a neighbor's
routing table locally).
- EIGRP has less network overhead, since it uses incremental updates.
EIGRP and IGRP use the same metric structure. Both can use bandwidth, delay, reliability, and MTU when computing a best metric path to a destination. By default, only bandwidth and delay are used in the metric computation. One interesting point about these protocols is that if you have some routers in your network running IGRP and others running EIGRP, and both sets have the same autonomous system number, routing information will automatically be shared between the two.
EIGRP uses the Diffusing Update Algorithm (DUAL) to update the routing table. This algorithm can enable very fast convergence by storing a neighbor's routing information in a local topology table. If a primary route in the routing table fails, DUAL can take a backup route from the topology table and place this into the routing table without necessarily having to talk to other EIGRP neighboring routers to find an alternative path to the destination.
Interaction with Other EIGRP Routers
EIGRP uses hello packets to discover and maintain neighbor relationships, much as OSPF does. EIGRP generates hello packets every 5 seconds on LAN, point-to-point, and multipoint connections with speeds of at least T1/E1 speeds. Otherwise, hellos are generated every 60 seconds. The dead interval period is three times the hello interval. EIGRP uses the multicast address of 224.0.0.10 for the destination in the hello packets.
For EIGRP routers to become neighbors, the following information must match:
- The AS number
- The K-values (these enable/disable the different metric components)
When two routers determine whether they will become neighbors, they go through the following process:
1. The first router generates a Hello with configuration information.
2. If the configuration information matches, the second router responds with an Update message with topology information.
3. The first router responds with an ACK message, acknowledging the receipt of the second's ACK.
4. The first router sends its topology to the second router via an Update message.
5. The second router responds back with an ACK.
At this point, the two routers have converged.
Here are the message types for which an EIGRP router expects an ACK back:
- Update Contains a routing update
- Query Asks a neighboring router to validate routing information
- Reply Responds to a query message
If an EIGRP router doesn't receive an ACK from these three packet types, the router will try a total of 16 times to resend the information. After this, the router declares the neighbor dead. When a router sends a hello packet, no corresponding ACK is expected.
Configuring EIGRP
Setting up EIGRP is almost as simple as configuring IGRP:
Router(config)# router eigrp autonomous_system_#
Router(config-router)# network IP_network_#
You must specify the AS number when configure EIGRP. Even though EIGRP is classless, you must
configure it as a classful protocol when specifying your network numbers with the network command.
Troubleshooting EIGRP
- show ip protocols
- show ip route
- show ip eigrp neighbors
- show ip eigrp topology
- show ip eigrp traffic
- debug ip eigrp
Enjoy Music by Knowing How to Convert iTunes to MP3 and Windows Media Player
In today's society, music is available in various formats, three of the most common of which are those used in iTunes, Windows Media Player and MP3 players. Music files that are playable in iTunes are downloaded in the proprietary Apple format called AAC, which is usually not playable in other digital music players. This type of format is compatible only with iTunes music players like iPods and iTunes players that are found in computers. For a chance to enjoy sweet sounding music from the iTunes store and iPods, it is good to know how to convert iTunes to MP3 and Windows Media Player.
The Steps to Convert iTunes to MP3
For this easy task, you need to have a blank CD to go with the latest iTunes version. In case you do not have an iTunes player on your computer, you have to install one first before you can actually proceed with this specific task. After successfully installing the player, try to run the program by opening it up.
Once you are inside the program, make a playlist including all the music files you wish to convert later. You must be aware of the limitations of the CD you are using, the standard of which is close to 700MB. A standard CD can actually hold approximately 200 to 300 songs each depending on the quality and capacity of the product you have purchased. To do this, select the File button and then click the New Playlist option once.
Go to the music library and choose the files that you wish to convert. Push the right-click button on every song that you wish to convert. Add each one of them by clicking the Add to Playlist option that will appear once you activate the right-click button on every song. Change the name of the playlist in order to identify it easily later on.
Proceed to the playlist that you have made and labeled. Be sure that all the box right beside the song titles are checked so as not to miss out anything. At the bottom of the page, you can find the Burn Disc button. Click it once and then wait for the menu to pop out. Select MP3 CD and click the Burn tab. After burning the CD, open the files on the Windows Explorer and the copy them right into the hard drive of your computer.
The Steps to Convert iTunes to Windows Media Player
For this one, you have to open the iTunes program first. Right at the iTunes menu, select Edit button and then choose the Preferences option. Select the Import Settings button and wait for the Import Using option to appear in the drop-down menu. Choose either the WAV Encoder or the MP3 Encoder before clicking the OK button.
Once you are back at the main iTunes screen, choose a song that you wish to convert and then click the Advanced option somewhere on top of the iTunes menu. Wait for the drop-down menu and click Create MP3 Version. After doing this, drag the converted file into the desktop and then drop it after. Right-click the file and then choose the Open With button and then look for the Windows Media Player option. Click it once and enjoy listening nice music from your Windows Media Player.
Please click these links if you want to know more about convert iTunes to MP3 or convert iTunes to Windows Media Player in general.
http://www.tech-faq.com/convert-itunes-to-mp3.html
http://www.systemdisc.com/how-to-convert-itunes-to-windows-media-player
All Time Best RPGs
Playing RPGs on ones computer could certainly be seen as a guilty pleasure by some. And why not? Taking into account the fact that even the shortest RPGs take round 30 (and some take well over 100) hours to fully complete many people have probably frittered away more than a couple hours on this ultimate geek hobby.
Chrono Trigger
RPGs were a massive source of income for the Super Nintendo, though not too many could match the wonder and charm of Chrono Trigger. From the elective side stories featuring the likes of Robo, Lucca and Frog, to the unprecedented quantity of alternate conclusions, Chrono Trigger was certainly one role playing game that would merit months of playtime, with every storyline becoming slightly different.
The Legend of Zelda: Ocarina of Time
With no less than 4 3D console incarnations of The Legend of Zelda, it is shocking that the original is still thought of as the greatest by so many. Nintendo managed to do a brilliant job of keeping the spirit and grandeur of the series alive whilst creating a fascinating new gameplay engine. The concept of the young-old world was second only to Link to the Past's light-dark dichotomy, and the Ocarina has developed into a staple of the series second scarcely to the Triforce. There is one thing that is lacking, however -- the classic overworld theme, a theme that was not redone until Majora's Mask.
World of Warcraft
Whether you are a lover or a hater of the game, World of Warcraft has certainly become a cultural event in ways that its predecessors like Dark Age of Camelot and EverQuest could merely dream of being. With WOWs user base freshly exceeding the 11 million player mark, there is no indication that this RPG will be going away anytime soon. Plot wise, WOW picks up 10 years after the battle described in Warcraft III, and opens up the whole world of Azeroth for players to travel round as they wish. Then in 2007, with the release of the Burning Crusade expansion pack, players were able to travel through the Dark Portal directly into the impoverished world of Outland. And with the Wrath of the Lich King, the second expansion pack, set to release in the next week, the terribly harsh land of Northrend will at long last be open too, bringing the total quantity of game content for RPG players to experience to inconceivable proportions.
Final Fantasy VII
This game is, was and in all probability will be the most notable RPG in the history of gaming. It proved that role playing games don't need to be tales of lore set in medieval times, nor do they need to read like the bedtime stories of children. Final Fantasy VII featured mature subjects within a modern industrial background and both fit the role playing game genre seamlessly. With an innovative story, a number of stylised characters and an enjoyable and intuitive battle system, the game redefined the RPG and helped bring the genre to the multitudes.
AMD Vs Intel Processors
The battle continues...
Things are about to get very messy in the ongoing battle for processing chip dominance between AMD and Intel. For years, Intel has held the high ground, beating off attack after attack from AMD and holding its own in a marketplace that changes chips every half hour. Intel has always been the big name, the big player and the 'go to guys' for everything Core i3, i5 and i7 orientated.
But all of that could be about to change, if AMD's talks with giant corporation Apple are successful. Intel has been the sole provider of microprocessors for the iconic Apple Notebook and its desktop PCs since 2006, when Apple parted company with PowerPC. AMDs representatives have recently been spotted leaving meetings with members of Apple's top people - and according to hearsay it's been smiles all round.
The meetings have led to Apple starting to take a long, hard look at AMD processors in their research labs as a precursor to the chips being incorporated into some of Apple's up and coming projects. Rumour is that Apple is particularly interested in AMD's workstation and notebook CPUs.
So why is Apple talking to the enemy (as far as Intel are concerned)? It may have a lot to do with the problems that Apple has encountered with Intel processors. Not only were there accusations that the Intel chips slowed the page refresh time for the notebook, but the Intel chipset designs have hindered Apple's plans to continue their partnership with Nvidia to develop a standardised chipset for use with Intel processors across the full range of Apple products. A shortage of the new Core family of chips also delayed the release of the latest version of the MacBook series, which didn't help matters. The result of this has been that Apple has been forced to use the less capable Intel integrated graphics chip inside the new MacBook Pro instead of the more capable Nvidia product.
AMD - up and coming and a potential threat to Intel's dominance
The deal with Apple could undermine Intel's dominance of the marketplace. As a result of Apple's discussions with AMD, more manufacturers are now taking a second look not only at what AMD offers already, but also their plans for future research and development. Admittedly, it could all be a case of corporate manoeuvring on Apple's part to see what Intel step up with as an alternative. But no matter what the reasons, the real winners down the line will be the consumer. Competition, particularly in the technology world, leads to leaps forward in development. New ideas and concepts are the product of debate and competition as each tries to out manoeuvre the other. AMD may lack the performance and efficiency of the Intel processor, but their acquisition of ATI gives them the edge over their rivals when it comes to GPU technology.
Because Apple is focusing on improving its graphics package (name one graphic designer who doesn't use a MacBook), the smart money is on a merger between Apple and AMD, allowing Apple to push forward with the Nvidia plan. But rest assured - Intel isn't just going to sit back and let it happen without a fight. It could all come down to numbers - which is going to profit Apple most; stick with their current partnership or change to a new one with AMD? The most likely probability is that Apple, recently announced as financially bigger than the monolithic Microsoft and therefore a major influence in the direction of the microprocessing marketplace, will most likely end up working with both AMD and Intel. As the old saying goes, those who are at the forefront of microprocessing and graphics capability are living in interesting times...
A Simple Computer Short-Cut
Using a computer is not a very difficult task to get the hang of. Everyone from very young schoolchildren to the elderly have the capability of learning how to use a computer, but much like the old adage that a guitar is the easiest instrument to learn and the hardest to master, so the computer is easy to learn and hard to master. Even though using a computer can be an easy thing to pick up there are shortcuts that can help everyone in terms of making their computing experience a faster and more enjoyable one. While most computers and programs simply require excessive usage to get a hang of them, similarly to playing a sport, a little bit of research will go a long way in taking you from being an amateur computer user to a pro computer user.
One simple step you can take that will improve the speed at which you can use your computer is to learn some of the control key commands. I live by these commands and have found that they make using a computer and much simpler experience, but I've also found that very few people really seem to know how to do any of them and I lament the fact that they are making their computer using experience more difficult. A good first control command to learn is a combination of the control button and pressing the letter C. This command will allow you to instantly copy text from a web page, a text document, or wherever there's writing the need to copy. All you need to do is highlight a passage of text using your mouse and press the control button and the letter C. If you want to cut the text than you will replace the letter C with the letter X, and when you want to paste the text into a new document all you need to do is press the control button and the letter V. I find this to be much simpler than right clicking on my mouse button and selecting cut and paste functions from the drop down list.
There are many more control functions that you can learn and you should be able to find a comprehensive list of them online, but I highly suggest that you learn at least a few of them. I can assure you that control functions will make your computing experience much faster and much more enjoyable.
Top 10 Computer Troubleshooting Tips
Normally Computers are built to be professional, reliable machines. There was the time when computers got collapse, and resulted in data loss and system shakiness. Your computer may hang; send error messages, or worse, no longer work at all. For computer users, troubleshooting problems can stop their work. If you know how to fix a computer, you can save hundreds or even thousands of dollars in repair jobs, professional fees, and even going so far as to buy a new one.
The most common top 10 computer troubleshooting and their tips to fix that problem are as follows.
1) The computer is unable to start up If the computer does not turn on when you press the power button, the following suggestions may help you to determine why the computer will not start up: Check the computer is plugged into an AC outlet properly. Plug another electrical device into the outlet to be sure that the outlet is providing adequate power.
2) The computer screen is blank.If the screen is blank, the computer may not be set to display the image on the computer screen. First, check if the monitor plugged in to a power outlet and is connected to the computer securely and make sure the monitor power button is on. If the power light is not on, it means that the outlet is not delivering power to the monitor.
3) Trouble with video card. If the power light of the computer and monitor is on and nothing comes up on the screen when you start your computer then there must be something wrong with video card. You should take your computer to a repair shop or change its video card with the new one.
4) Software is functioning abnormally. If the software is unresponsive or responds abnormally, follow these tips. Restart your computer and run a virus scan. For this purpose you should have reliable antivirus software installed on the computer to fix this issue.
5) Windows do not boot properly. If windows do not boot properly then you should have reinstall windows with the windows recoverable CD.
6) The computer is on but not responding. If the computer is turned on but not responding to software or keyboard commands, then it must be freeze or halted. Press and hold the power button for at least 5 seconds, it will be turn off. Now restart your computer.
7) An external device is not working If an external device does not function as expected, turn it on according to Manufacturers instruction; be sure that all device connections are secure and receiving electrical power and compatible with the operating system. The correct drivers are installed and updated.
8) Slow working computer. You can improve your computer working performance by cleaning hard disk of unwanted files, run the disk defragmented utility, get rid of unneeded icons on your desktop, install a firewall, install antivirus and Anti spyware tools, schedule regular registry scans.
9) Slow working internet. To increase your browser performance, you must frequently clear cookies and internet temporary files.
10) Internet network problem. If your computer can not get connected to internet then check IP address, check network cables are connected properly, make sure that servers or gateways firewall application is not blocking http requests from your PC.
Here you will learn about Computer Tips please visit here http://computertipsplus.com
Subscribe to:
Posts (Atom)