Professional Documents
Culture Documents
1 Flooding of link-state
information
Link-State Theory
The first thing that happens is that each node, router, on the network
announces its own piece of link-state information to other all other
routers on the network: who their neighboring routers are and the cost of
the link between them.
Example: Hi, Im RouterA, and I can reach RouterB via a T1 link and I
can reach RouterC via an Ethernet link.
Each router sends these announcements to all of the routers in the
network.
1 Flooding of link-state
information
3 SPF Algorithm
2 Building a
Topological
Database
Each router collects all of this link-state information from other routers
and puts it into a topological database.
1 Flooding of link-state
information
5 Routing Table
3 SPF Algorithm
2 Building a
Topological
Database
4 SPF Tree
This algorithm creates an SPF tree, with the router making itself the
root of the tree and the other routers and links to those routers, the
various branches.
Note: Just a reminder that the link-state algorithm and graph it
creates is mathematically based and although we are mentioning
routers and their links, it has nothing to do with IP addresses or
other network information.
5. Routing Table
I bet you can create this tree given the link-state information!
=
A
C
2
cherries
+
A
=
C
2
D
C
2
D
C
2
D
donuts
B
A
2
D
C
2
D
eggs
E
2
D
Now lets attach the two graphs and we have all the nodes, their
links between them and their and leafs!
B
=
E
C
2
2
D
Topology
Using the topological information we listed, RouterA has now built
a complete topology of the network.
The next step is for the link-state algorithm to find the best path
to each node and leaf network.
bananas
apples
cherries
C
2
D
donuts
eggs
bananas
apples
cherries
C
2
D
donuts
eggs
bananas
apples
cherries
C
2
D
donuts
eggs
bananas
i1
apples
i0
i = interface
i2
cherries
i3
2
D
donuts
eggs
1 Flooding of link-state
information
5 Routing Table
3 SPF Algorithm
2 Building a
Topological
Database
4 SPF Tree
First of all small Hello messages are exchanged between routers to find
out who their neighbors are. This is known as forming adjacencies.
Once a link-state router knows who their adjacent neighbors are, the
actual information exchanged between the routers are known as LSAs
(Link State Advertisements) to build and maintain their link state
databases. (Topological database).
There are different types of LSAs for different types of information and
different situations all of which is discussed in CCNP Advanced
Routing.
Once the routing tables are built and the network is converged, routers
do not exchange routing tables periodically.
Instead, routers using link-state routing protocols exchange periodic
Hello messages between immediate neighbors, to make sure they are
still there and the link between them is still up.
*
**
Just a few notes on this table:
* When a link-state router boots up it will most likely need to exchange
complete database information with neighboring routers in order to
synchronize their databases. (CCNP Advanced Routing)
** Distance vector routing protocols can also use triggered updates.
Interconnections :
Bridges and
Routers by Radia
Perlman
Cisco IP Routing:
Packet Forwarding &
Intra-domain Routing
Protocols by Alex
Zinin
Routing TCP/IP
Volume I by Jeff
Doyle
OSPF, Anatomy of
an Internet
Routing Protocol
by John Moy
(creator of OSPF)
Topics (Continued)
Part II. Routing Theory and Dynamic Routing Operations (continued)
Hybrid Routing Protocols
Concepts
EIGRP (not IS-IS)
Path Switching
Example: Host X to Host Y (with three routers in between)
LAN-to-LAN Routing
LAN-to-WAN Routing
Topics (Continued)
Part III. Routing Theory and Dynamic Routing Operations (continued)
Hybrid Routing Protocols
Concepts
EIGRP (not IS-IS)
Path Switching
Example: Host X to Host Y (with three routers in between)
LAN-to-LAN Routing
LAN-to-WAN Routing
Path Switching
192.168.1.0/24
.1
e0
192.168.1.10/24
RTA
192.168.2.0/24
.1
.2
s0
s0
RTB
192.168.3.0/24
.1
.2
s1
s0
RTC
192.168.4.0/24
.1
e0
192.168.4.10/24
Lets go through all of the stages these routers use to route and switch
this packet.
See if you can identify these two functions at each router.
Note: Data link addresses have been abbreviated.
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
00-10
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
RTB
0A-10
192.168.3.0/24
.1
.2
s0
s0
RTC
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
0B-31
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
192.168.3.0/24
.1
.2
s0
s0
RTB
00-20
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
3
RTA ARP Cache
IP Address
MAC Address
192.168.2.2
0B-31
RTC
RTA to RTB
1. RTA looks up the IP destination address in its routing table.
192.168.4.0/24 has next-hop-ip address of 192.168.2.2 and an exitinterface of e1.
Since the exit interface is on an Ethernet network, RTA must resolve the
next-hop-ip address with a destination MAC address.
2. RTA looks up the next-hop-ip address of 192.168.2.2 in its ARP cache.
If the entry was not in the ARP cache, the RTA would need to send an
ARP request out e1. RTB would send back an ARP reply, so RTA can
update its ARP cache with an entry for 192.168.2.2.
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
0B-31
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
192.168.3.0/24
.1
.2
s0
s0
RTB
00-20
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
3
RTA ARP Cache
IP Address
MAC Address
192.168.2.2
0B-31
RTC
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
RTB
192.168.3.0/24
.1
.2
s0
s0
FFFF
RTC
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
1
2
Network
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
192.168.4.0/24
RTB to RTC
1. RTB looks up the IP destination address in its routing table.
192.168.4.0/24 has next-hop-ip address of 192.168.3.2 and an exitinterface of s0 (serial 0).
Since the exit interface not on an Ethernet network, RTA does not need
to resolve the next-hop-ip address with a destination MAC address.
Remember, serial interfaces do not have MAC addresses.
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
RTB
192.168.3.0/24
.1
.2
s0
s0
FFFF
RTC
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
1
2
Network
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
192.168.4.0/24
RTB to RTC
2. Data link destination address and frame encapsulation .
When the interface is a point-to-point serial connection, the Routing Table
process does not even look at the next-hop IP address.
Remember, a serial link is like a pipe - only one way in and only one way
out.
RTA now encapsulates the IP packet into the proper data link frame, using
the proper serial encapsulation (HDLC, PPP, etc.).
The data link destination address is set to a broadcast, since there is only
one other end of the pipe and the frame is now forwarded out serial 0.
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
0B-20
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
192.168.3.0/24
.1
.2
s0
s0
RTB
0C-22
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
3
RTC ARP Cache
IP Address
MAC Address
192.168.4.10
0B-20
RTC
Network
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
192.168.4.0/24
RTC to Host Y
1. RTC looks up the IP destination address in its routing table.
192.168.4.0/24 is a directly connected network with an exit-interface of e0.
RTC realizes that this destination ip address is on the same network as one
of its interfaces and it can sent the packet directly to the destination and not
another router.
Since the exit interface is on an directly connected Ethernet network, RTC
must resolve the destination ip address with a destination MAC address.
2. RTC looks up the destination ip address of 192.168.4.10 in its ARP cache.
If the entry was not in the ARP cache, the RTC would need to send an ARP
request out e0. Host Y would send back an ARP reply, so RTC can update its
ARP cache with an entry for 192.168.4.10.
192.168.1.0/24
.1
e0
192.168.1.10/24
00-10
0A-10
Data link destination address
0B-20
RTA
192.168.2.0/24
.1
.2
e1
e0
00-20
0B-31
192.168.3.0/24
.1
.2
s0
s0
RTB
0C-22
IP Destination Address
192.168.4.0/24
Y
.1
e0
192.168.4.10/24
0C-22
0B-20
IP Source Address Other IP fields and data
192.168.4.10 192.168.1.10
3
RTC ARP Cache
IP Address
MAC Address
192.168.4.10
0B-20
RTC
Network
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
192.168.4.0/24
Routers enable LAN-to-WAN packet flow by keeping the end-to-end source and
destination addresses constant while encapsulating the packet in data link
frames, as appropriate, for the next hop along the path.
NOTE:
Topics (Continued)
Part II. Routing Theory and Dynamic Routing Operations (continued)
Hybrid Routing Protocols
Concepts
EIGRP (not IS-IS)
Path Switching
Example: Host X to Host Y (with three routers in between)
LAN-to-LAN Routing
LAN-to-WAN Routing
Topics (Continued)
Part II. Routing Theory and Dynamic Routing Operations (continued)
Hybrid Routing Protocols
Concepts
EIGRP (not IS-IS)
Path Switching
Example: Host X to Host Y (with three routers in between)
LAN-to-LAN Routing
LAN-to-WAN Routing
Summary
Cabrillo College