1 - en - ROUTE - v7 - Ch01 PDF
1 - en - ROUTE - v7 - Ch01 PDF
1 - en - ROUTE - v7 - Ch01 PDF
Chapter 1:
Basic Network and
Routing Concepts
Cisco Public
Chapter 1 Topics
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Differentiating
Routing
Protocols
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Protocol characteristics:
Type of routing algorithm
Speed of convergence
Scalability
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Link-state protocols:
Use the Shortest Path First (SPF) to create an abstract of the topology
of the entire network or a area.
All link-state routers have an identical map of the topology.
OPF and IS-IS are examples.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
Convergence
Process of when routers notice a change in the network,
exchange information and recalculate the best routes.
Converged network: All routers have the same view on the
network topology.
Convergence time can be influenced:
Fine-tuning routing protocols timers (increases traffic, overhead, CPU
utilization in routers).
Route summarization (less networks to update).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
10
Route Summarization
Group several subnets into one aggregate entry that
describes all of them.
Reduce overhead and improve stability and scalability by
reducing amount of routing information exchanged.
Distance vector protocols support summarization in any
interface, but link states support it only at area boundaries.
IP addressing must be hierarchically assigned in contiguous
blocks across the network.
What is the
summarized
network?
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
11
Number of routes
Number of adjacent neighbors
Number of routers in the network
Network design
Frequency changes
Available resources (CPU and memory)
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
12
Understanding
Network Technologies
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
13
Multicast:
Traffic sent to a multicast address is sent to multiple destinations at
the same time.
An interface my belong to any number of multicast groups
IPv4: 224.0.0.0 239.255.255.255
IPv6: FF00::/8
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
14
Broadcast:
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
15
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
16
Cisco Public
17
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
18
Broadcast network:
Connects many routers
All are reachable through one single address
Example: Ethernet
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
19
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
20
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
21
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
22
Cisco Public
23
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
24
Connecting
Remote Locations
with Headquarters
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
25
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
26
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
27
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
28
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
29
hostname R1
!
Cisco Public
30
Authentication is optional.
PPP can use PAP and CHAP.
PAP is very basic two-way process with no encryption.
CHAP involve a three-way exchange of a shared secret.
You can configure either PAP, or CHAP or both:
Router(config-if)# ppp authentication {chap | chap pap | pap chap |
pap} [if-needed] [list-name | default] [callin]
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
31
hostname R2
encapsulation ppp
encapsulation ppp
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
32
hostname R2
encapsulation ppp
encapsulation ppp
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
33
PPPoE 1/2
ISPs value PPP because of the authentication, accounting
and link management features.
Ethernet links does not support PPP, thats why PPPoE
was created.
PPPoE creates a PPP tunnel over the Ethernet connection.
The modem convers the Ethernet frames to PPP frames by
stripping the Ethernet headers.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
34
PPPoE 2/2
Configuration:
Create a dialer interface (which is virtual).
Configure the dialer interface encapsulation PPP and IP address by
DHCP
Enable PPPoE in the ethernet interface that faces the client.
Link the dialer interface to the ethernet
Set the MTU to 1492
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
35
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
36
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
37
MPLS-based VPN
MPLS is used to build tunnels through the service provider core
network.
Traffic forwarding through the MPLS backbone is based o labels
assigned by the SP.
Layer 3 MPLS:
SP participates in customer routing.
Customer routes are redistributed into MP-BGP
On the other end, are redistributed back from MP-BGP to the routing
protocol used.
Routing protocols on the local and remote sites, may be different
Layer 2 MPLS:
Interconnects PE and CE at layer 2 using a pseudowire
Two types:
Virtual Private Wire Service (VPWS): Emulates a point-to-ponit L2 connection
Virtual Private LAN Service (VPLS): emulates Ethernet multiaccess network.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
38
Tunneling VPNs
GRE
Tunneling protocol developed by Cisco
Enables encapsulation of L3 protocols inside point-to-point, tunnelover-IP network.
Traffic is not encrypted.
IPsec
Framework that uses a set of cryptographic protocols to secure L3
traffic .
Works with any application that uses IP as a transport protocol.
DMVPN
Used to scale IPsec hub-to-spoke and spoke-to-spoke designs in
large networks.
Supports routing protocols, and multicast.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
39
Hybrid VPNs
MPLS-based VPNs and tunnel VPNs are not mutually
exclusive.
Is possible to combine them and encrypt (or tunnel) the data
across the service provider network. (Tunnel over a tunnel).
Examples:
Layer 3 MPLS VPN over GRE
Layer 3 MPLS over DMVPN (over IPsec).
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
40
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
41
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
42
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
43
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
44
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
45
Multipoint GRE
mGRE enables a single GRE interface to support multiple GRE
tunnels and simplifies the complexity of the configuration.
Only one tunnel interface needs to be configured on a router to
support multiple remote GRE peers.
Devices using mGRE require NHRP to build dynamic GRE
tunnels.
mGRE also support unicast, multicast and broadcast.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
46
NHRP
NHRP is used by routers to determine the IP address of the
next hop in IP tunneling networks.
When a spoke initially connects to a DMVPN network, it
registers its inner (tunnel) and outer (physical interface)
address with the hub router.
This registration enables the mGRE interface on the hub
router to build a dynamic GRE tunnel back to the registering
spoke.
NHRP creates a mapping for a tunnel IP address to the
physical interface IP address for each spoke at the hub.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
47
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
48
IPsec
Is a framework of open standards that define how to provide
secure communications.
Provides four security services:
Confidentiality (encryption): The sender can encrypt the packets
before transmitting them across a network.
Data Integrity: The receiver can verify that the data was not altered
or changed during the transmission. Checksum is used.
Authentication: Ensures the communication is made with the desired
partner. Devices and users are authenticated, by using Internet Key
Exchange (IKE). IKE uses username/password, OTP, biometrics,
PSK and digital certificates.
Antireplay protection: Verifies each packet is unique and not
duplicated, by comparing the sequence number of the received
packet. Late and duplicate packets are dropped.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
49
Routing and
TCP/IP
Operations
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
50
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
51
TCP MSS just works at the two ends of the TCP connection.
To avoid fragmentation due to smaller MTU on a link along the
path, PMTUD is used.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
52
Cisco Public
53
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
54
Cisco Public
55
TCP Starvation
TCP have mechanism for reliability, flow control and congestion
avoidance, whereas UDP doesnt have these features.
When TCP and UDP flows are mixed during a period of
congestion, TCP cooperate by backing off on bandwidth.
However, UDP doesnt even notice the congestion and keep
using the available bandwidth given up by TCP.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
56
Latency
Latency is the amount of time for a message to go from ne point
to another.
Can be caused by several factors: propagation delay,
serialization, data protocols, routing, switching, queuing, and
buffering.
TCP requires a established virtual connection and bidirectional
communication ACKs, windows size, congestion control and so
on, which has a effect on latency.
UDP does not include reliability, and is used for streaming media
that requires minimum delay.
UDP has very low latency, better than most TCP connections.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
57
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
58
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
59
Implementing RIPng
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
60
RIP overview
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
61
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
62
Cisco Public
63
Configuring RIPng
RIPng is already preconfigured in R1.
There is a static default route pointing to internet in R1.
R1 will be configured to share this default route with R2
using RIPng.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
64
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
65
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
66
If you forgot to create the RIP process name, the router will
automatically create one.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
67
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
68
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
69
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
70
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
71
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
72
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
73
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
74
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
75
Summary
The role of static routes and dynamic routing protocols in enterprise networks.
The differences between IGP and EGP routing protocols.
The three types of routing protocols: distance vector, link-state and path vector.
The importance of convergence time and how route summarization reduced convergence time and improves scalability.
The four traffic types: unicast, multicast, anycast, and broadcast.
The differences between point-to-point, broadcast, and NBMA networks.
How point-to-point subinterfaces are used to overcome the limitations of NBMA
networks.
How VPNs are used to provide security of a public Internet.
Common types of VPNs: MPLS-based VPNs, GRE+IPsec, and DMVPN.
How a customer establishes connectivity with a service provider using a routing protocol and a layer 3 MPLS VPN.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
76
How static GRE tunnels can establish virtual point-to-point links and support dynamic
routing protocols.
Using DMVPN to provide fully meshed VPN connectivity with a simple hub-and spoke
configuration.
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
77
Chapter 1
2007 2010, Cisco Systems, Inc. All rights reserved.
Cisco Public
78