ch7:路由与路由器.ppt_第1页
ch7:路由与路由器.ppt_第2页
ch7:路由与路由器.ppt_第3页
ch7:路由与路由器.ppt_第4页
ch7:路由与路由器.ppt_第5页
已阅读5页,还剩41页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Routing and Routers,Software Institute, Nanjing University,Routing and Routers,Router Basics Router Startup procedure Routing Router configuration,Router Basics,Internal Components,RAM,Temporary storage for router configuration files RAM content is lost on power down or restart Stores. Routing table

2、s ARP cache Fast switching cache Packet buffering Packet hold queues,NVRAM,Non-volatile RAM Stores backup/startup configuration files Content is not lost when router is powered down or restarted.,Flash,EEPROM (Electronically Erasable Programmable Read-Only Memory) Holds the Cisco IOS (Internet Opera

3、ting System) Allows updating of software without replacing the Flash chip Multiple versions of IOS can be stored Retained on power down,ROM,Contains POST (Power On Self Test) A bootstrap program (loads the Cisco IOS) And operating system software Backup, trimmed down version of the IOS Upgrades requ

4、ire installing new chip set,Interfaces,Network connections through which packets enter and exit the router Attached to the motherboard or as separate modules.,Router Startup Procedure,Startup procedure: 1. Perform a power-up self test(POST):During this self test, the router executes diagnostics from

5、 ROM on all hardware modules. 2. Verify the basic operation of the CPU, memory, and network interface ports. 3. Software initialization.,Step 1 - The generic bootstrap loader, in ROM, executes on the CPU card. Step 2 - The operating system (Cisco IOS) can be found in one of several places. The locat

6、ion is disclosed in the boot field of the configuration register. Step 3 - The operating system image is loaded. Step 4 - The configuration file saved in NVRAM is loaded into main memory and executed one line at a time. Step 5 - If no valid configuration file exists in NVRAM, the operating system ex

7、ecutes a question-driven initial configuration routine referred to as the system configuration dialog, also called the setup mode.,Software Startup Procedure,Setup is not intended as the mode for entering complex protocol features in the router. You should use setup to bring up a minimal configurati

8、on, then use various configuration-mode commands, rather than setup, for most router configuration tasks,Router Startup Procedure,Routing,A router generally relays a packet from one data link to another, using two basic functions, a path determination function and a switching function.,The router us

9、es the network portion of the address to make path selections to pass the packet to the next router The switching function allows a router to accept a packet on one interface and forward it through a second interface. The path determination function enables the router to select the most appropriate

10、interface for forwarding a packet. The node portion of the address is used by the the router directly connected to the destination network to deliver the packet to the correct host.,Static and Dynamic Route,When a network is accessible by only one path, a static route to the network can be sufficien

11、t. This type of partition is called a stub network. Configuring static routing to a stub network avoids the overhead of dynamic routing.,Whereas dynamic routing tends to reveal everything known about an internetwork, for security reasons, you may want to hide parts of an internetwork.,Static and Dyn

12、amic Route,A static route allows manual configuration of the routing table. Manually-entered administrative distance values for static routes are usually low numbers (1 is the default).,Administrative Distance,The administrative distance is a rating of the trustworthiness of a routing information so

13、urce, expressed as a numeric value from 0 to 255. The higher the number, the lower the trustworthiness rating.,Default routes keep routing tables shorter. When an entry for a destination network does not exist in a routing table, the packet is sent to the default network.,Default Route,Define Defaul

14、t Route(I),Define a default route using dynamic routing protocols Router(config)# ip default-network network-number,Define a default route as a static route: Router(config)# ip route 0.0.0.0 0.0.0.0 next-hop-ip-address| exit-interface After configure a default route, use show ip route will display:

15、(172.16.1.2 is the default next-hop address) Gateway of last resort is 172.16.1.2 to network 0.0.0.0,Define Default Route(II),Dynamic routing protocols can also redirect traffic (or loadshare) between different paths in a network .,Dynamic Routing,Dynamic routing relies on a routing protocol to shar

16、e knowledge among routers. The success of dynamic routing depends on two basic router functions: maintenance of a routing table distribution of knowledge, in the form of routing updates, to other routers,Time to Convergence,Classification of Routing Protocols,Distance-vector algorithms do not allow

17、a router to know the exact topology of an internetwork Distance-vector-based routing algorithms (also known as Bellman-Ford algorithms) pass periodic copies of a routing table from router to router.,Distance-Vector Protocol,Routing loops can occur if a networks slow convergence on a new configuratio

18、n causes inconsistent routing entries,The invalid updates of Network 1 will continue to loop until some other process stops the looping. This condition, called count to infinity, loops packets continuously around the network in spite of the fundamental fact that the destination network, Network 1, i

19、s down. While the routers are counting to infinity, the invalid information allows a routing loop to exist.,To avoid this problem, distance-vector protocols define infinity as a specific maximum number. This number refers to a routing metric (e.g. a simple hop count).,Another possible source for a r

20、outing loop occurs when incorrect information that has been sent back to a router contradicts the correct information that it sent.,Split-horizon attempts to avoid this situation. Split-horizon thus reduces incorrect routing information and reduces routing overhead,Solution: Route Poisoning,When Net

21、work 5 goes down, Router E initiates route poisoning by making a table entry for Network 5 as 16, or unreachable. When Router C receives a route poisoning from Router E, it sends an update, called a poison reverse, back to Router E. This makes sure all routes on the segment have received the poisone

22、d route information.,You can avoid a count to infinity problem by using hold-down timers. These prevent a router from using a alternative route that may have failed,Prevent Sending Route update,To prevent an interface from sending out any route update information,use the command: Router(config-route

23、r)#Passive-interface f0/0 It is valid only when using distance-vector routing protocols, because link-state routing protocols do not get the topology information directly from the routing table of its neighbors,Link-state based routing algorithms also known as SPF (shortest path first) algorithms, m

24、aintain a complex database of topology information. Link-state routing uses: link-state advertisements(LSAs) a topological database the SPF algorithm, and the resulting SPF tree a routing table of paths and ports to each network . RFC 1583 contains a description of OSPF link-state concepts and opera

25、tions.,Link-state Protocol,Routers exchange LSAs with each other. Each router begins with directly connected networks Each router in parallel with the others constructs a topological database consisting of all the LSAs from the internetwork. The SPF algorithm computes network reachability. The route

26、r constructs this logical topology as a tree, with itself as root, consisting of all possible paths to each network in the link-state protocol internetwork. It then sorts these paths shortest path first (SPF).,4. The router lists its best paths, and the ports to these destination networks, in the ro

27、uting table. It also maintains other databases of topology elements and status details.,There are two link-state concerns: Processing and memory requirementsRunning link-state routing protocols in most situations requires that routers use more memory and perform more processing than distance-vector

28、routing protocols.,Bandwidth requirementsAnother cause for concern involves the bandwidth that must be consumed for initial link-state packet flooding. During the initial discovery process, all routers using link-state routing protocols send LSA packets to all other routers. This action floods the i

29、nternetwork as routers make their en masse demand for bandwidth, and temporarily reduce the bandwidth available for routed traffic that carries user data.,The most complex and important aspect of link-state routing is making sure that all routers get all necessary LSA packets. Routers with different

30、 sets of LSAs calculate routes based on different topological data. Then, networks become unreachable as a result of a disagreement among routers about a link.,An emerging third type of routing protocol combines aspects of both distance-vector and link-state routing. This third type is called balanc

31、ed-hybrid routing. Balanced-hybrid routing protocols use distance vectors with more accurate metrics to determine the best paths to destination networks. However, they differ from most distance-vector protocols by using topology changes to trigger routing database updates.,Examples of hybrid protoco

32、ls are: OSIs IS-IS (Intermediate System-to-Intermediate System) Ciscos EIGRP (Enhanced Interior Gateway Routing Protocol ).,Examples of IP routing protocols include: RIP - a distance-vector routing protocol IGRP - Ciscos distance-vector routing protocol OSPF - a link-state routing protocol EIGRP - a balanced hybrid routing proto

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论