Free Essay

Routing Protocol

In:

Submitted By overatedae86
Words 8531
Pages 35
EIGRP and OSPF Comparison

For

Client Sponsor

Prepared By
Scott Hogg

Project Number
02

Date
March 14, 2002
|Distribution List |
|Name |Title/Duties |Company |
|John Vogt-Nilsen |Manager – Network Operations | |
|Sammy Hutton |Principal Systems Analyst | |
|Scott Hogg |Principal Consultant |Lucent |
|Phil Colon |Managing Consultant |Lucent |

|Revision History |
|Version |Date |Author |Comments |
|1.0 |03/14/2002 |Scott Hogg |Initial Draft |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |

TABLE OF CONTENTS

Paragraph & Description Page

1.0 Executive Summary 1

2.0 Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2

3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5

4.0 Protocol Decision Criteria 5

5.0 OSPF 8

6.0 EIGRP 18

7.0 Analysis 21

8.0 Recommendation 22

9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24

Executive Summary

The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities.

At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running corporate wide will be needed. This would be an evaluation of suitability of Enhanced Interior Gateway Routing Protocol (EIGRP) or Open Shortest Path First (OSPF).

In order for the routers to effectively and efficiently distribute data to the users in the field, the routers must be programmed with the topology of the network. In other words, the routers must contain a “map” of the other routers in the network and what TCP/IP devices are connected to them.

There are a number of methods to program the routers with this information and to change the program as the network changes. The choice of method, or routing protocol is a critical factor in the success of the network over time. Factors that differentiate one routing protocol from another include the speed that it adapts to topology changes (convergence), the ability to choose the best route among multiple routes (route calculation), and the amount of network traffic that the routing protocol creates.

Based on this evaluation of the suitability of a routing protocol for ’s routed TCP/IP network the EIGRP routing protocol should be used in the Alcatel routers are upgraded to Cisco routers. However, if the Alcatel routers are retained for service within the Site 2 campus then has no alternative but to run OSPF throughout the organization.

Introduction

Cisco has dominated the router industry for many reasons. One of the most common reasons is Cisco’s support for a multitude of protocols as well as features in their IOS to enhance a router’s ability to control traffic and improve performance, and in some cases, save money. It makes sense for a company that utilizes Cisco routers in their network, to take advantage of the features and functionality that has helped Cisco become the leader in terms of market share.

1 Industry Standard protocols vs. Proprietary protocols:

A case can be made for both standard as well as proprietary protocols.

STANDARDS PRO: A standards based protocol will theoretically allow routers of different manufacturers to inter-operate.

STANDARDS CON: Standards based protocols require industry approval for changes. Historically changes, as well as improvements or advancements, are rare. Changes to the OSPF RFC have not occurred since 1986.

PROPRIETARY PRO: Owner can advance the protocol to new levels without the agreement of a consortium of companies resulting in a protocol with the latest in technological advancements.

PROPRIETARY CON: Protocol is not supported by other vendors requiring the implementation of a second protocol. Use of a proprietary protocol is only an issue internally when using multiple vendors for routers, requiring a gateway router to re-distribute routes. This is generally not an issue with external networks, since exterior gate protocols like BGP are used when connecting outside.

Proprietary protocol standards compliance is an issue because the network is currently comprised of both Cisco and Alcatel routers. The Alcatel routers support RIP v1 and v2, OSPF, and BGP-4 only. They don’t support Cisco’s proprietary EIGRP.

In making a determination as to which routing protocol (stay with RIP v1/v2, OSPF, or EIGRP) should be used, has to look at technical as well as the administrative benefits to be derived from each. It is obvious that RIP v1 needs to be eliminated and that decision has already been made, so a matrix of features and benefits between OSPF and EIGRP needs to be developed.

Technical Background

1 Types Of Routing Protocols

1 Static Routing

The simplest form of routing is static routes. The routing information is preprogrammed by the network administrator. When changes to the network occur, the route information must be manually changed throughout the network.

There are a number of advantages to using static routes. Static routing is very resource efficient, as it routing uses no additional network bandwidth, doesn't use any router CPU cycles trying to calculate routes, and requires far less memory. It is also the most secure form of routing protocol.

However, there are a number of disadvantages to static routing that eliminate it as a viable alternative on the network. First and foremost, in the rapidly changing topology of a wireless network, it is impractical for a network administrator to manually program the routing changes as they occur. Secondly, in the case of a network failure, static routing is usually not capable of choosing alternate paths.

2 Distance Vector Protocols

Distance vector protocols such as Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Internetwork Packet Exchange (IPX) RIP, IPX Service Advertisement Protocol (SAP), and Routing Table Maintenance Protocol (RTMP), broadcast their complete routing table periodically, regardless of whether the routing table has changed. This periodic advertisement varies from every 10 seconds for RTMP to every 90 seconds for IGRP. When the network is stable, distance vector protocols behave well but waste of bandwidth because of the periodic sending of routing table updates, even when no change has occurred. When a failure occurs in the network, distance vector protocols do not add excessive load to the network, but they take a long time to reconverge to an alternate path or to flush a bad path from the network.

Distance Vector Routing protocols are dynamic. Routers that use distance vector routing share information, or a routing map, with other routers on the network. As changes to the network occur, the router with the change propagates the new routing information across the entire network.

In routing based on distance-vector algorithms, routers periodically pass copies of their entire routing table to routers that are their immediate neighbors. Each recipient of this information adds a distance vector (it’s own distance value) to the routing table before it forwards it on to its neighbors. This process continues in an omni directional manner among connected routers. Eventually each router on the network learns about all the others and is able to develop a cumulative network “map.” Each router then knows how to reach any other router, and any other network connected to the router.

Distance vector routing provides a tremendous advantage over static routing. Routers are able to discover the state of the network, and to propagate changes as they occur. The most common, and most ubiquitous of distance vector routing protocols is the Routing Information Protocol, or RIP.

However, there are also some disadvantages to distance vector routing that preclude its use on the network: • Because distance vector routing protocols periodically transmit the entire routing table to all immediate neighbors, they can add significant traffic. This is particularly problematic on a wireless network with limited bandwidth.

• Distance vector protocols are notoriously slow to converge, or adapt to network topology changes. After a change to the network, and before all the routers have converged, there is the probability of routing errors and lost data.

• Distance vector routing protocols base their routing decisions on distance, or the number of “hops” from one network to another. It does not take into consideration the speed or bandwidth of a network path. Therefore, routers may route traffic through paths that are suboptimum.

3 Link-State Protocols

Link-state routing protocols, such as Open Shortest Path First (OSPF), Intermediate System-to-Intermediate System (IS-IS), and NetWare Link Services Protocol (NLSP), were designed to address the limitations of distance vector routing protocols (slow convergence and unnecessary bandwidth usage). Link-state protocols are more complex than distance vector protocols, and running them adds to the router's overhead. The additional overhead (in the form of memory utilization and bandwidth consumption when link-state protocols first start up) constrains the number of neighbors that a router can support and the number of neighbors that can be in an area. When the network is stable, link-state protocols minimize bandwidth usage by sending updates only when a change occurs. A hello mechanism ascertains reachability of neighbors. When a failure occurs in the network, link-state protocols flood Link-State Advertisements (LSAs) throughout an area. LSAs cause every router within the failed area to recalculate routes. The fact that LSAs need to be flooded throughout the area in failure mode and the fact that all routers recalculate routing tables constrain the number of neighbors that can be in an area.

Link state routing protocols, like distance vector protocols, are dynamic. They propagate route information across networks. However, they have a number of advantages over distance vector protocols.

One of the major advantages of link-state routing is that they calculate the best route for data based on cost rather than distance. The algorithms used to determine cost vary from protocol to protocol, but it is generally based on a link’s bandwidth. Thus, the router that the data packet takes to get to its destination is optimized.

Additionally, link state protocols do not transmit their entire topology database across the network on a periodic basis. Once the network has converged, protocol traffic is limited to changes in specific links (link state advertisement packets) and keep-alive or “hello” packets.
Finally, convergence times for link state protocols are generally much shorter than for distance vector protocols. A network based on link-state routing will recognize and adapt to failures and changes much more quickly.

There are a few disadvantages to link state routing protocols that must be considered. They are generally much more complex than either static routes or distance-vector routing. This translates into higher implementation costs, higher CPU utilization, and greater memory requirements.

4 Advanced Distance Vector Protocol

Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector protocol that has some of the properties of link-state protocols. Enhanced IGRP addresses the limitations of conventional distance vector routing protocols (slow convergence and high bandwidth consumption in a steady state network). When the network is stable, Enhanced IGRP sends updates only when a change in the network occurs. Like link-state protocols, Enhanced IGRP uses a hello mechanism to determine the reachability of neighbors. When a failure occurs in the network, Enhanced IGRP looks for feasible successors by sending messages to its neighbors. The search for feasible successors can be aggressive in terms of the traffic it generates (updates, queries and replies) to achieve convergence. This behavior constrains the number of neighbors that are possible.

5 Path Vector Protocols

There is really only one Path Vector routing protocol and it is Border Gateway Protocol version 4 (BGP-4). This is the primary routing protocol used on the Internet to share routing updates between Autonomous Systems (AS). An Autonomous System is a network under a single administrative and technical control. ASs are typically defined by the boundaries of a single company or organizational entity. BGP-4 is typically used between Internet Service Providers (ISPs) and between companies and the multiple ISPs they use for upstream Internet connectivity. BGP-4 routers operate in either External BGP (EBGP) or Internal BGP (IBGP) configurations depending on whether the connectivity is between ASs or within ASs respectively. Since currently default routes toward their Internet points of presence there is little reason for to use this protocol. Regardless, BGP-4 would not be used within the corporate network and only in the future would it be used in a limited capacity at the Internet edges of the intranet.

Protocol Decision Criteria

In order to conduct a proper evaluation ’s requirements for a routing protocol should be documented.

Simplicity of configuration is a significant requirement for ’s selection of a routing protocol. It must be easy to configure and easy to maintain. ’s IT resources are currently stretched thinly and complexity of a routing protocol is a primary consideration. Currently within the Cisco portions of the network OSPF is being used but only with all routers being in a single Area 0. This was done for simplicity and to reduce the complexity of configuring Area Border Routers (ABRs). However, the entire advantage of OSPF’s hierarchy is not being taken advantage of.

is using RFC1918 addresses internally such that Site 1 Arizona and
Western regions of the company uses the 172.16.0.0/12 while Site 2 and other parts of the company use 10.0.0.0/8. The 192.168.0.0/16 is being used for the internal side of the Internet portals. When considering a TCP/IP routing protocol the IP addressing plays a significant role in the decision and engineering process. Therefore, it is a requirement that use a routing protocol that supports Variable Length Subnet Masking (VLSM). The RIP version 1 that is being used in Site 2 in a classful routing protocol that does not support VLSM and it has already been determined that RIP needs to be phased out.

The Site 1 Arizona and the Western regions of the company use Cisco routers while the Site 2 and Eastern regions of the company use Alcatel OmniSwitch switch/routers. Therefore, only the Cisco portions of the network can use EIGRP because of its proprietary nature. This issue has already been mentioned previously in this document.

There are some networks within the enterprise network that use IPX for some applications. The IPX protocol is used only in Site 2 and a few other locations. The use of IPX is being deprecated and will be eliminated soon. The questions in exactly when this will be complete. It should be mentioned that to accomplish this IPX routing within the current network IPX for RIP is being used. The EIGRP protocol has the ability to support not only IP, but IPX and AppleTalk with a single routing protocol. This provides added functionality combined with simplicity.

Below is a list of criteria that should be considered by during the routing protocol selection process.

ADMINISTRATIVE CRITERIA COST-There is a cost associated with any implementation. The cost in this instance is the labor needed to implement the protocol.

EASE OF IMPLEMENTATION-The ease of implementation is important because it is also tied into the cost of the manpower and skills required to implement.

SPEED OF IMPLEMENTATION-The importance of speed is to get to a point of stability in the network as soon as possible.

TECHNOLOGICAL CRITERIA SECURITY- Controlling access to network resources is a primary concern. Some routing protocols provide techniques that can be used as part of a security strategy.

With some routing protocols, you can insert a filter on the routes being advertised so that certain routes are not advertised in some parts of the network.

Some routing protocols can authenticate routers that run the same protocol. Authentication mechanisms are protocol specific and generally weak. In spite of this, it is worthwhile to take advantage of the techniques that exist. Authentication can increase network stability by preventing unauthorized routers or hosts from participating in the routing protocol, whether those devices are attempting to participate accidentally or deliberately.

CONVERGENCE- When network topology changes, network traffic must reroute quickly. The phrase "convergence time" describes the time it takes a router to start using a new route after a topology changes.

Routers must do three things after a topology changes:

Detect the change

Select a new route

Propagate the changed route information

ROUTE SELECTION- Routing protocols compare route metrics to select the best route from a group of possible routes. Route metrics are computed by assigning a characteristic or set of characteristics to each physical network. The metric for the route is an aggregation of the characteristics of each physical network in the route.

SCALABILITY- The ability to extend your internetwork is determined, in part, by the scaling characteristics of the routing protocols used and the quality of the network design.

Network scalability is limited by two factors: operational issues and technical issues. Typically, operational issues are more significant than technical issues. Operational scaling concerns encourage the use of large areas or protocols that do not require hierarchical structures. When hierarchical protocols are required, technical scaling concerns promote the use of small areas.

ROUTE SUMMARIZATION-. With summarization, routers can reduce some sets of routes to a single advertisement, reducing both the load on the router and the perceived complexity of the network. The importance of route summarization increases with network size.

MEMORY- Routing protocols use memory to store routing tables and topology information. Route summarization cuts memory consumption for all routing protocols. Keeping areas small reduces the memory consumption for hierarchical routing protocols.

CPU REQUIREMENTS- CPU usage is protocol dependent. Some protocols use CPU cycles to compare new routes to existing routes. Other protocols use CPU cycles to regenerate routing tables after a topology change. In most cases, the latter technique will use more CPU cycles than the former. For link-state protocols, keeping areas small and using summarization reduces CPU requirements by reducing the effect of a topology change and by decreasing the number of routes that must be recomputed after a topology change.

BANDWIDTH REQUIREMENTS- Bandwidth usage is also protocol dependent. Three key issues determine the amount of bandwidth a routing protocol consumes:

When routing information is sent---Periodic updates are sent at regular intervals. Flash updates are sent only when a change occurs.

What routing information is sent---Complete updates contain all routing information. Partial updates contain only changed information.

Where routing information is sent---Flooded updates are sent to all routers. Bounded updates are sent only to routers that are affected by a change.

Note: These three issues also affect CPU usage.

OSPF

OSPF is an Interior Gateway Protocol (IGP) developed for use in Internet Protocol (IP)-based internetworks. As an IGP, OSPF distributes routing information between routers belonging to a single autonomous system (AS). An AS is a group of routers exchanging routing information via a common routing protocol. The OSPF protocol is based on shortest-path-first, or link-state, technology.

Two design activities are critically important to a successful OSPF implementation:

7. Definition of area boundaries

8. Address assignment

Ensuring that these activities are properly planned and executed will make all the difference in an OSPF implementation. Each is addressed in more detail with the discussions that follow. These discussions are divided into six sections:

9. OSPF Network Topology

10. OSPF Addressing and Route Summarization

11. OSPF Route Selection

12. OSPF Convergence

13. OSPF Network Scalability

14. OSPF Security

OSPF Network Topology

OSPF works best in a hierarchical routing environment. The first and most important decision when designing an OSPF network is to determine which routers and links are to be included in the backbone and which are to be included in each area.

There are several important guidelines to consider when designing an OSPF topology:

15. The number of routers in an area---OSPF uses a CPU-intensive algorithm. The number of calculations that must be performed given n link-state packets is proportional to n log n. As a result, the larger and more unstable the area, the greater the likelihood for performance problems associated with routing protocol recalculation. Generally, an area should have no more than 50 routers. Areas with unstable links should be smaller.

16. The number of neighbors for any one router---OSPF floods all link-state changes to all routers in an area. Routers with many neighbors have the most work to do when link-state changes occur. In general, any one router should have no more than 60 neighbors.

17. The number of areas supported by any one router---A router must run the link-state algorithm for each link-state change that occurs for every area in which the router resides. Every area border router is in at least two areas (the backbone and one area). In general, to maximize stability, one router should not be in more than three areas.

18. Designated router selection---In general, the designated router and backup designated router on a local-area network (LAN) have the most OSPF work to do. It is a good idea to select routers that are not already heavily loaded with CPU-intensive activities to be the designated router and backup designated router. In addition, it is generally not a good idea to select the same router to be designated router on many LANs simultaneously.

Backbone Considerations

Stability and redundancy are the most important criteria for the backbone. Keeping the size of the backbone reasonable increases stability. This is caused by the fact that every router in the backbone needs to re-compute its routes after every link-state change. Keeping the backbone small reduces the likelihood of a change and reduces the amount of CPU cycles required to re-compute routes. As a general rule, each area (including the backbone) should contain no more than 50 routers. If link quality is high and the number of routes is small, the number of routers can be increased.

Redundancy is important in the backbone to prevent partition when a link fails. Good backbones are designed so that no single link failure can cause a partition.

OSPF backbones must be contiguous. All routers in the backbone should be directly connected to other backbone routers. OSPF includes the concept of virtual links. A virtual link creates a path between two area border routers (an area border router is a router connects an area to the backbone) that are not directly connected. A virtual link can be used to heal a partitioned backbone. However, it is not a good idea to design an OSPF network to require the use of virtual links. The stability of a virtual link is determined by the stability of the underlying area. This dependency can make troubleshooting more difficult. In addition, virtual links cannot run across stub areas. See the section "Backbone-to-Area Route Advertisement," later in this chapter for a detailed discussion of stub areas.

Avoid placing hosts (such as workstations, file servers or other shared resources) in the backbone area. Keeping hosts out of the backbone area simplifies internetwork expansion and creates a more stable environment.

Area Considerations

Individual areas must be contiguous. In this context, a contiguous area is one in which a continuous path can be traced from any router in an area to any other router in the same area. This does not mean that all routers must share a common network media. It is not possible to use virtual links to connect a partitioned area. Ideally, areas should be richly connected internally to prevent partitioning.

The two most critical aspects of area design follow:

19. Determining how the area is addressed

20. Determining how the area is connected to the backbone

Areas should have a contiguous set of network and/or subnet addresses. Without a contiguous address space, it is not possible to implement route summarization. The routers that connect an area to the backbone are called area border routers. Areas can have a single area border router or they can have multiple area border routers. In general, it is desirable to have more than one area border router per area to minimize the chance of the area becoming disconnected from the backbone.

When creating large-scale OSPF internetworks, the definition of areas and assignment of resources within areas must be done with a pragmatic view of your internetwork. The following are general rules that will help ensure that your internetwork remains flexible and provides the kind of performance needed to deliver reliable resource access.

21. Consider physical proximity when defining areas---If a particular location is densely connected, create an area specifically for nodes at that location.

22. Reduce the maximum size of areas if links are unstable---If your internetwork includes unstable links, consider implementing smaller areas to reduce the effects of route flapping. Whenever a route is lost or comes online, each affected area must converge on a new topology. The Dykstra algorithm will run on all the affected routers. By segmenting your internetwork into smaller areas, you can isolate unstable links and deliver more reliable overall service.

OSPF Addressing and Route Summarization

Address assignment and route summarization are inextricably linked when designing OSPF internetworks. To create a scalable OSPF internetwork, you should implement route summarization. To create an environment capable of supporting route summarization, you must implement an effective hierarchical addressing scheme. The addressing structure that you implement can have a profound impact on the performance and scalability of your OSPF internetwork. The following sections discuss OSPF route summarization and three addressing options:

23. Separate network numbers for each area

24. Network Information Center (NIC)-authorized address areas created using bit-wise subnetting and VLSM

25. Private addressing, with a "demilitarized zone" (DMZ) buffer to the official Internet world

Note: You should keep your addressing scheme as simple as possible, but be wary of oversimplifying your address assignment scheme. Although simplicity in addressing saves time later when operating and troubleshooting your network, taking short cuts can have certain severe consequences. In building a scalable addressing environment, use a structured approach. If necessary, use bit-wise subnetting---but make sure that route summarization can be accomplished at the area border routers.

OSPF Route Summarization

Route summarization is extremely desirable for a reliable and scalable OSPF internetwork. The effectiveness of route summarization, and your OSPF implementation in general, hinges on the addressing scheme that you adopt. Summarization in an OSPF internetwork occurs between each area and the backbone area. Summarization must be configured manually in OSPF.

When planning your OSPF internetwork, consider the following issues:

• Be sure that your network addressing scheme is configured so that the range of subnets assigned within an area is contiguous.

• Create an address space that will permit you to split areas easily as your network grows. If possible, assign subnets according to simple octet boundaries. If you cannot assign addresses in an easy-to-remember and easy-to-divide manner, be sure to have a thoroughly defined addressing structure. If you know how your entire address space is assigned (or will be assigned), you can plan for changes more effectively.

• Plan ahead for the addition of new routers to your OSPF environment. Be sure that new routers are inserted appropriately as area, backbone, or border routers. Because the addition of new routers creates a new topology, inserting new routers can cause unexpected routing changes (and possibly performance changes) when your OSPF topology is recomputed.

Separate Address Structures for Each Area

One of the simplest ways to allocate addresses in OSPF is to assign a separate network number for each area. With this scheme, you create a backbone and multiple areas, and assign a separate IP network number to each area.

The following are some clear benefits of assigning separate address structures to each area:

26. Address assignment is relatively easy to remember.

27. Configuration of routers is relatively easy and mistakes are less likely.

28. Network operations are streamlined because each area has a simple, unique network number.

Bit-Wise Subnetting and VLSM

Bit-wise subnetting and variable-length subnetwork masks (VLSMs) can be used in combination to save address space. Consider a hypothetical network where a Class B address is subdivided using an area mask and distributed among 16 areas.

Route Summarization Techniques

Route summarization is particularly important in an OSPF environment because it increases the stability of the network. If route summarization is being used, routes within an area that change do not need to be changed in the backbone or in other areas.

Route summarization addresses two important questions of route information distribution:

29. What information does the backbone need to know about each area? The answer to this question focuses attention on area-to-backbone routing information.

30. What information does each area need to know about the backbone and other areas? The answer to this question focuses attention on backbone-to-area routing information.

Area-to-Backbone Route Advertisement

There are several key considerations when setting up your OSPF areas for proper summarization:

31. OSPF route summarization occurs in the area border routers.

32. OSPF supports VLSM, so it is possible to summarize on any bit boundary in a network or subnet address.

33. OSPF requires manual summarization. As you design the areas, you need to determine summarization at each area border router.

Backbone-to-Area Route Advertisement

There are four potential types of routing information in an area:

34. Default. If an explicit route cannot be found for a given IP network or subnetwork, the router will forward the packet to the destination specified in the default route.

35. Intra-area routes. Explicit network or subnet routes must be carried for all networks or subnets inside an area.

36. Inter-area routes. Areas may carry explicit network or subnet routes for networks or subnets that are in this AS but not in this area.

37. External routes. When different AS’s exchange routing information, the routes they exchange are referred to as external routes.

In general, it is desirable to restrict routing information in any area to the minimal set that the area needs.

There are three types of areas, and they are defined in accordance with the routing information that is used in them:

38. Non-stub areas---Non-stub areas carry a default route, static routes, intra-area routes, inter-area routes and external routes. An area must be a non-stub area when it contains a router that uses both OSPF and any other protocol, such as the Routing Information Protocol (RIP). Such a router is known as an autonomous system border router (ASBR). An area must also be a non-stub area when a virtual link is configured across the area. Non-stub areas are the most resource-intensive type of area.

39. Stub areas---Stub areas carry a default route, intra-area routes and inter-area routes, but they do not carry external routes. Stub areas are recommended for areas that have only one area border router and they are often useful in areas with multiple area border routers. See "Controlling Inter-area Traffic," later in this chapter for a detailed discussion of the design trade-offs in areas with multiple area border routers. There are two restrictions on the use of stub areas: virtual links cannot be configured across them, and they cannot contain an ASBR.

40. Stub areas without summaries---Software releases 9.1(11), 9.21(2), and 10.0(1) and later support stub areas without summaries, allowing you to create areas that carry only a default route and intra-area routes. Stub areas without summaries do not carry inter-area routes or external routes. This type of area is recommended for simple configurations where a single router connects an area to the backbone.

OSPF Route Selection

When designing an OSPF internetwork for efficient route selection, consider three important topics:

41. Tuning OSPF Metrics

42. Controlling Inter-area Traffic

43. Load Balancing in OSPF Internetworks

Tuning OSPF Metrics

The default value for OSPF metrics is based on bandwidth. The following characteristics show how OSPF metrics are generated:

44. Each link is given a metric value based on its bandwidth. The metric for a specific link is the inverse of the bandwidth for that link. Link metrics are normalized to give Fast Ethernet a metric of 1. The metric for a route is the sum of the metrics for all the links in the route.

Note: In some cases, your network might implement a media type that is faster than the fastest default media configurable for OSPF (Fast Ethernet). An example of a faster media is ATM. By default, a faster media will be assigned a cost equal to the cost of an Fast Ethernet link---a link-state metric cost of 1. Given an environment with both Fast Ethernet and a faster media type, you must manually configure link costs to configure the faster link with a lower metric. Configure any Fast Ethernet link with a cost greater than 1, and the faster link with a cost less than the assigned Fast Ethernet link cost. Use the “ip ospf cost” interface configuration command to modify link-state cost.

45. When route summarization is enabled, OSPF uses the metric of the best route in the summary.

46. There are two forms of external metrics: type 1 and type 2. Using an external type 1 metric results in routes adding the internal OSPF metric to the external route metric. External type 2 metrics do not add the internal metric to external routes. The external type 1 metric is generally preferred. If you have more than one external connection, either metric can affect how multiple paths are used.

Controlling Inter-area Traffic

When an area has only a single area border router, all traffic that does not belong in the area will be sent to the area border router.

In areas that have multiple area border routers, two choices are available for traffic that needs to leave the area:

47. Use the area border router closest to the originator of the traffic. (Traffic leaves the area as soon as possible.)

48. Use the area border router closest to the destination of the traffic. (Traffic leaves the area as late as possible.)

If the area border routers inject only the default route, the traffic goes to the area border router that is closest to the source of the traffic. Generally, this behavior is desirable because the backbone typically has higher bandwidth lines available. However, if you want the traffic to use the area border router that is nearest the destination (so that traffic leaves the area as late as possible), the area border routers should inject summaries into the area instead of just injecting the default route.
Most network designers prefer to avoid asymmetric routing (that is, using a different path for packets that are going from A to B than for those packets that are going from B to A.) It is important to understand how routing occurs between areas to avoid asymmetric routing.

Load Balancing in OSPF Internetworks

Internetwork topologies are typically designed to provide redundant routes in order to prevent a partitioned network. Redundancy is also useful to provide additional bandwidth for high traffic areas. If equal-cost paths between nodes exist, Cisco routers automatically load balance in an OSPF environment.

OSPF Convergence

One of the most attractive features about OSPF is the ability to quickly adapt to topology changes.

There are two components to routing convergence:

49. Detection of topology changes---OSPF uses two mechanisms to detect topology changes. Interface status changes (such as carrier failure on a serial link) is the first mechanism. The second mechanism is failure of OSPF to receive a hello packet from its neighbor within a timing window called a dead timer. Once this timer expires, the router assumes the neighbor is down. The dead timer is configured using the ip ospf dead-interval interface configuration command. The default value of the dead timer is four times the value of the Hello interval. That results in a dead timer default of 40 seconds for broadcast networks and 2 minutes for nonbroadcast networks.

50. Recalculation of routes---Once a failure has been detected, the router that detected the failure sends a link-state packet with the change information to all routers in the area. All the routers recalculate all of their routes using the Dykstra (or SPF) algorithm. The time required to run the algorithm depends on a combination of the size of the area and the number of routes in the database.

OSPF Network Scalability

Your ability to scale an OSPF internetwork depends on your overall network structure and addressing scheme. As outlined in the preceding discussions concerning network topology and route summarization, adopting a hierarchical addressing environment and a structured address assignment will be the most important factors in determining the scalability of your internetwork.

Network scalability is affected by operational and technical considerations:

51. Operationally, OSPF networks should be designed so that areas do not need to be split to accommodate growth. Address space should be reserved to permit the addition of new areas.

52. Technically, scaling is determined by the utilization of three resources: memory, CPU, and bandwidth.

Memory

An OSPF router stores all of the link states for all of the areas that it is in. In addition, it can store summaries and externals. Careful use of summarization and stub areas can reduce memory use substantially.

CPU

An OSPF router uses CPU cycles whenever a link-state change occurs. Keeping areas small and using summarization dramatically reduces CPU use and creates a more stable environment for OSPF.

Bandwidth

OSPF sends partial updates when a link-state change occurs. The updates are flooded to all routers in the area. In a quiet network, OSPF is a quiet protocol. In a network with substantial topology changes, OSPF minimizes the amount of bandwidth used.

OSPF Security

Two kinds of security are applicable to routing protocols:

53. Controlling the routers that participate in an OSPF network

OSPF contains an optional authentication field. All routers within an area must agree on the value of the authentication field. Because OSPF is a standard protocol available on many platforms, including some hosts, using the authentication field prevents the inadvertent startup of OSPF in an uncontrolled platform on your network and reduces the potential for instability.

54. Controlling the routing information that routers exchange

All routers must have the same data within an OSPF area. As a result, it is not possible to use route filters in an OSPF network to provide security.

EIGRP

The Enhanced Interior Gateway Routing Protocol (Enhanced IGRP) is a routing protocol developed by Cisco Systems and introduced with Software Release 9.21 and Cisco Internetworking Operating System (Cisco IOS) Software Release 10.0. Enhanced IGRP combines the advantages of distance vector protocols, such as IGRP, with the advantages of link-state protocols, such as Open Shortest Path First (OSPF). Enhanced IGRP uses the Diffusing Update Algorithm (DUAL) to achieve convergence quickly.

Enhanced IGRP includes support for IP, Novell NetWare, and AppleTalk. The discussion on Enhanced IGRP covers the following topics:

55. Enhanced IGRP Network Topology

56. Enhanced IGRP Addressing

57. Enhanced IGRP Route Summarization

58. Enhanced IGRP Route Selection

59. Enhanced IGRP Convergence

60. Enhanced IGRP Network Scalability

61. Enhanced IGRP Security

Enhanced IGRP Network Topology

Enhanced IGRP uses a nonhierarchical (or flat) topology by default. Enhanced IGRP automatically summarizes subnet routes of directly connected networks at a network number boundary. This automatic summarization is sufficient for most IP networks. See the section "Enhanced IGRP Route Summarization" later in this chapter for more detail.

Enhanced IGRP Addressing

The first step in designing an Enhanced IGRP network is to decide on how to address the network. In many cases, a company is assigned a single NIC address (such as a Class B network address) to be allocated in a corporate internetwork. Bit-wise subnetting and variable-length subnetwork masks (VLSM’s) can be used in combination to save address space. Enhanced IGRP for IP supports the use of VLSM’s.

Enhanced IGRP Route Summarization

With Enhanced IGRP, subnet routes of directly connected networks are automatically summarized at network number boundaries. In addition, a network administrator can configure route summarization at any interface with any bit boundary, allowing ranges of networks to be summarized arbitrarily.

Enhanced IGRP Route Selection

Routing protocols compare route metrics to select the best route from a group of possible routes. The following factors are important to understand when designing an Enhanced IGRP internetwork.

Enhanced IGRP uses the same vector of metrics as IGRP. Separate metric values are assigned for bandwidth, delay, reliability and load. By default, Enhanced IGRP computes the metric for a route by using the minimum bandwidth of each hop in the path and adding a media-specific delay for each hop. The metrics used by Enhanced IGRP are as follows:

62. Bandwidth-Bandwidth is deduced from the interface type. Bandwidth can be modified with the bandwidth command.

63. Delay-Each media type has a propagation delay associated with it. Modifying delay is very useful to optimize routing in network with satellite links. Delay can be modified with the delay command.

64. Reliability-Reliability is dynamically computed as a rolling weighted average over five seconds.

65. Load-Load is dynamically computed as a rolling weighted average over five seconds.

When Enhanced IGRP summarizes a group of routes, it uses the metric of the best route in the summary as the metric for the summary.

Enhanced IGRP Convergence

Enhanced IGRP implements a new convergence algorithm known as DUAL (Diffusing Update Algorithm). DUAL uses two techniques that allow Enhanced IGRP to converge very quickly. First, each Enhanced IGRP router stores its neighbors routing tables. This allows the router to use a new route to a destination instantly if another feasible route is known. If no feasible route is known based upon the routing information previously learned from its neighbors, a router running Enhanced IGRP becomes active for that destination and sends a query to each of its neighbors asking for an alternate route to the destination. These queries propagate until an alternate route is found. Routers that are not affected by a topology change remain passive and do not need to be involved in the query and response.

A router using Enhanced IGRP receives full routing tables from its neighbors when it first communicates with the neighbors. Thereafter, only changes to the routing tables are sent and only to routers that are affected by the change. A successor is a neighboring router that is currently being used for packet forwarding, provides the least cost route to the destination, and is not part of a routing loop. Information in the routing table is based on feasible successors. Feasible successor routes can be used in case the existing route fails. Feasible successors provide the next least-cost path without introducing routing loops.

The routing table keeps a list of the computed costs of reaching networks. The topology table keeps a list of all routes advertised by neighbors. For each network, the router keeps the real cost of getting to that network and also keeps the advertised cost from its neighbor. In the event of a failure, convergence is instant if a feasible successor can be found. A neighbor is a feasible successor if it meets the feasibility condition set by DUAL. DUAL finds feasible successors by the performing the following computations:

Enhanced IGRP Network Scalability

Network scalability is limited by two factors: operational issues and technical issues. Operationally, Enhanced IGRP provides easy configuration and growth. Technically, Enhanced IGRP uses resources at less than a linear rate with the growth of a network.

Memory

A router running Enhanced IGRP stores all routes advertised by neighbors so that it can adapt quickly to alternate routes. The more neighbors a router has, the more memory a router uses. Enhanced IGRP automatic route aggregation bounds the routing table growth naturally. Additional bounding is possible with manual route aggregation.

CPU

Enhanced IGRP uses the DUAL algorithm to provide fast convergence. DUAL re-computes only routes, which are affected by a topology change. DUAL is not computationally complex, so it does not require a lot of CPU.

Bandwidth

Enhanced IGRP uses partial updates. Partial updates are generated only when a change occurs; only the changed information is sent, and this changed information is sent only to the routers affected. Because of this, Enhanced IGRP is very efficient in its usage of bandwidth. Some additional bandwidth is used by Enhanced IGRP's HELLO protocol to maintain adjacencies between neighboring routers.

Enhanced IGRP Security

Enhanced IGRP is available only on Cisco routers. This prevents accidental or malicious routing disruption caused by hosts in a network.

In addition, route filters can be set up on any interface to prevent learning or propagating routing information inappropriately.

Analysis

Now that the requirements as well as the technical merits and downfalls of the routing protocols have been defined an analysis needs to be conducted of this information.

The Open Shortest Path First Protocol is an “open standard.” This means that it can be implemented on any platform, from any vendor or manufacturer. This is an advantage over Enhanced Interior Gateway Protocol, which is a proprietary standard from Cisco. However, this is the only clear advantage of OSPF over EIGRP.
As previously stated, OSPF is designed primarily for hierarchical networks with a clearly defined backbone area. This is clearly not the case in the network. In addition, when compared to EIGRP, OSPF uses more bandwidth to propagate its topology requires more router CPU time and memory. OSPF is also more difficult, and therefore more costly, to implement that EIGRP.

Enhanced Interior Gateway Protocol is a proprietary routing protocol developed by Cisco and used exclusively in their routing products. Although it is often lumped in with OSPF as a link state protocol, it is actually a hybrid; containing the best elements of both link state and distance vector protocols.

EIGRP, as stated previously, has several advantages over OSPF when used in the network. A brief summarization of these advantages include:

• Improved router memory and CPU utilization when compared to OSPF • Intelligent bandwidth control – EIGRP takes into consideration the available bandwidth when determining the rate at which it will transmit updates. Interfaces can also be configured to use a certain (maximum) percentage of the bandwidth, so that even during routing topology computations, a defined portion of the link capacity remains available for data traffic. • EIGRP does not require a hierarchical network design to operate efficiently. It will automatically summarize routes where applicable. • Unlike OSPF, which only takes bandwidth into consideration when calculating the cost of a route, EIGRP can be configured to use bandwidth, delay, reliability, and load when calculating optimum routes. This has proven to be a valuable consideration in a wireless environment. • EIGRP has greater control on timing issues, such as hold times and hello intervals, than does OSPF. This allows greater flexibility with wireless connections, where these intervals must be fine-tuned to a particular device or bandwidth. • EIGRP is less complex and has less cost (manpower and time) involved in configuration and administration. • Although EIGRP is proprietary, it can communicate and redistribute routing information with other routing protocols, such as OSPF. This is accomplished through router redistribution or using an exterior routing protocol such as BGP.

Given all of this data and analysis a table is used to consolidate the issues and synthesize

|Issue |EIGRP |OSPF |
|Ease of Implementation |Easy, but remember “no auto-summary” |Complicated |
|Support of IPX and AppleTalk |Yes |No |
|Standards-based |Cisco Proprietary |IETF Open Standard |
|Hierarchical Design |No – summary statements on interfaces |Yes – hierarchy is part of the design |
|VLSM Support |Yes |Yes |
|Protocol Type |Enhanced Distance Vector |Link State |
|Routing Metrics |Combination of bandwidth, delay, |Link 10^8/Interface_Bandwidth |
| |reliability and load | |
|CPU Requirements |Lower CPU and memory requirements |Higher CPU and memory requirements |
|Maturity |Since 1986 |Since 1986 |
|Stability |Excellent |Excellent |

The cells that are highlighted in green are attributes that are advantageous given ’s requirements.

Recommendation

Lucent Technologies Worldwide Services feels confident in strongly recommending a migration to Enhanced IGRP if an all Cisco network is deployed. OSPF only supports IP where as EIGRP supports IP, IPX, and Apple Talk. The routers can be set up to support OSPF for IP and EIGRP for IPX, but it is not clear what advantage there would be to that configuration. Based on the following criteria:

66. Protocols used at (IP, IPX, but no AppleTalk)
67. The time and effort it takes to implement
68. Requirement for VLSM support
69. Time to maintain and support
70. Cisco versus Alcatel equipment

Lucent believes that EIGRP can be implemented much quicker than OSPF as well as provide the functionality that will provide the stabilization is looking for. After implementing EIGRP, and still has a desire to use OSPF, it can be accomplished in a time frame that will be much more manageable because the environment will be more stable.

At this time, EIGRP is the clear choice for the network. It is faster and easier to implement, it is more configurable, and performs better in a wireless environment.

References

1 URLs

Designing Large Scale IP Networks: http://www.cisco.com/univercd/cc/td/doc/cisintwk/idg4/nd2003.htm 1 OSPF

http://www.cisco.com/cgi-bin/Support/PSP/psp_view.pl?p=Internetworking:OSPF

http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ospf.htm

http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/np1_c/1cprt1/1cospf.htm

Networkers 2000: http://www.cisco.com/networkers/nw00/pres/#2204 Troubleshooting OSPF: http://www.cisco.com/networkers/nw00/pres/#2206 2 EIGRP

http://www.cisco.com/cgi-bin/Support/PSP/psp_view.pl?p=Internetworking:EIGRP

http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/en_igrp.htm

http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/np1_c/1cprt1/1ceigrp.htm

Networkers 2000: http://www.cisco.com/networkers/nw00/pres/#2208 http://www.cisco.com/networkers/nw00/pres/#2207

2 Books

Routing TCP/IP Volume I (CCIE Professional Development), by Jeff Doyle, Cisco Press, ISBN: 1578700418

1 OSPF

OSPF Network Design Solutions, by Tom Thomas, Cisco Press, ISBN: 1578700469

OSPF Anatomy of an Internet Routing Protocol, by John T Moy, Addison Wesley, ISBN: 0201634724

2 EIGRP

EIGRP Network Design Solutions: The Definitive Resource for EIGRP Design, Deployment, and Operation by Ivan Pepelnjak, Cisco Press, ISBN: 1578701651

EIGRP for IP: Basic Operation and Configuration by Alvaro Retana, et al, Addison Wesley, ISBN: 0201657732

Similar Documents

Free Essay

Routing Protocol Comparison

...EIGRP and OSPF Comparison For Client Sponsor Prepared By Scott Hogg Project Number 02 Date March 14, 2002 |Distribution List | |Name |Title/Duties |Company | |John Vogt-Nilsen |Manager – Network Operations | | |Sammy Hutton |Principal Systems Analyst | | |Scott Hogg |Principal Consultant |Lucent | |Phil Colon |Managing Consultant |Lucent | |Revision History | |Version |Date |Author |Comments | |1.0 |03/14/2002 |Scott Hogg |Initial Draft | | | | | | |...

Words: 8531 - Pages: 35

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...2013 Implementation and Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous...

Words: 4335 - Pages: 18

Free Essay

A Report to Critically Compare a Number of Routing Protocols; Including Rip V2, Eigrp & Ospf

...Routing & Router Configuration A Report to Critically Compare a Number of Routing Protocols; Including RIP v2, EIGRP & OSPF Paul McDermott CCNA 2 Table of Contents 1.0 Abstract 3 2.0 Introduction 4 3.0 Protocol overview 5 3.1 RIP v2 Overview 5 3.2 EIGRP Overview 6 3.3 OSPF Overview 6 4.0 Protocol Comparison 10 4.1 Topology Overview 10 4.2 Protocol Types 10 4.3 Administration Distance 10 4.4 Protocol Tables 11 4.5 Algorithm 11 4.6 Metric 12 4.7 Periodic Updates 12 4.8 Hierarchical / Scalable 12 4.9 Load Balance 13 4.10 Comparison Table 14 5.0 Conclusion 15 6.0 References 16 Abstract The following report is a critical comparison of three routing protocols; RIPv2, EIGRP and OSPF, detailing the protocol features, as well as their similarities and differences. The report takes an in-depth look at the technical elements and algorithms used in these protocols, such as Bellman Ford, DUAL, and the Dijkstra Algorithm; and how these algorithms are used to calculate the routing metric. The report also discusses the fact that EIGRP is the most desirable protocol to use on Cisco based routers, while OSPF can be used across different router manufacturers. While looking at the technical considerations that are needed in choosing a routing protocol for a desired network the report will also look into the CPU/memory requirements, and how difficult the protocol is to install and maintain...

Words: 4222 - Pages: 17

Free Essay

A Delay-Based Optimum Routing Protocol Scheme for Collision Avoidance Applications in Vanets

...Optimum Routing Protocol Scheme for Collision Avoidance Applications in VANETs Gayathri Narayanan1,a, Neethu Sathianadhan2,b and Sruthi Sanjiv Gangadharan3,c 1,2,3 Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus Kollam – Kerala, India agayathrin@am.amrita.edu, bneethu91ammu@gmail.com, csruti.sanjiv_g@ymail.com Keywords: Broadcast, Multi-hop, VANETs, Delay, Routing Protocols, AODV, Cluster-based routing, OSPF. Abstract — Broadcast transmissions are currently finding extensive applications in vehicular ad-hoc networks, albeit primarily in the research phase. Given the importance of knowing the updated network details of each node in the network, and also considering the fact that the delay in transmission of messages is a crucial factor in collision avoidance, it is imperative to implement a broadcast network which will ensure minimum delay in transmission of messages between the nodes. In this paper, we primarily implement a multi-hop broadcast vehicular network for collision avoidance. We consider the mobility and traffic density of vehicles and simulate the end-to-end delay in message transmission for a sparse and dense network scenario. In order to ensure high reliability and get the optimum delay, we extend the scenario to include three different routing protocols – AODV, Cluster-based routing and OSPF – and perform a comparison based on the end-to-end transmission delay to determine the optimum routing algorithm...

Words: 4169 - Pages: 17

Free Essay

Impact of Mac Layer on the Performance of Odmrp, Fisheye, Aodv and Dsr, Routing Protocols in Mobile Ad Hoc Networks

...Impact of MAC Layer on the Performance of ODMRP, Fisheye, AODV and DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular...

Words: 2917 - Pages: 12

Free Essay

Homewk

...submit it to the Week 6 iLab Dropbox by the due date. Have fun while learning. Your Name: Sheryl Livingstone NETW410 August 14, 2013 Lab 6: Routing Protocol Selection Lab Report 1. Complete this table on routing protocols. However, many rows are needed for the routing protocol names. (10 points) Interior | Exterior | Distance Vector | Link State | Path Vector | Standard | Proprietary | Standard | Proprietary | Standard | RIP | EIGRP | OSPF | BGP | | 2. Should the individual buildings be connected to the Administration Building at Layer 2 or Layer 3? (10 points) The individual building should be connected to the Administration building at layer 3 because each building has their own subnets in the new IP scheme. 3. If the individual buildings should be connected to the Administration Building at Layer 3, which routing protocol or protocols should be used? (10 points) When selecting a routing protocol, one important criterion is how quickly the protocol adapts to changes in the network and resource allocation. EIGRP is a distance vector protocol and would be a good routing protocol to use because the network devices are Cisco based. EIGRP is fast, consumes little resources, supports VLSM, and scales well. EIGRP only works with Cisco Systems or you will immediately be faced with multiple routing protocols in your network. 4. Apply the concept of Cisco Enterprise Architecture to the new network design. Which of the six major functional areas apply...

Words: 549 - Pages: 3

Free Essay

Intro to Ospf V Eigrp

...and OSPF (Link-State) Routing Protocol Comparison Prepared By Part 01 Literature Review Date April 15 2016 * Executive Summary For routers to be able to effectively and efficiently distribute data across a network they need to be programmed with the network topology. One method in which the network is "mapped" can be done by using routing protocols. The two main types of routing protocol are Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol (EIGRP). * * Project plan The study will be compromised of setting up two different network topologies and implementing the different routing protocols on each so that we can observe and record the positive and negative aspects of each protocol. * Literature review http://packetlife.net/blog/2008/oct/2/distance-vector-versus-link-state/ “There are two major classes of routing protocol: distance vector and link-state. It's easy to remember which protocols belong to either class, but comprehending the differences between the two classes takes a bit more effort.” EIGRP (Distance Vector) and OSPF (Link-State) Routing Protocol Comparison * Summary EIGRP and OSPF are routing protocols used to advertise routes in a network. EIGRP was a cisco proprietary protocol, and OSPF is an open standard industry protocol, which means it can be implemented with non-Cisco devices. Protocols are set of rules and regulations, routing protocols are used with routers...

Words: 644 - Pages: 3

Premium Essay

Eigrp vs Ospf

...distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out. OSPF is a standards-based routing protocol; however...

Words: 365 - Pages: 2

Premium Essay

Eigrp vs Ospf

...distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.   It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out. OSPF is a standards-based routing protocol; however...

Words: 361 - Pages: 2

Premium Essay

Nt2640

...distance-vector routing protocol, with optimizations to minimize both the unstable route incurred after topology changes, as well as the use of bandwidth and processing power in the router. Routers supporting EIGRP will automatically redistribute route information to IGRP neighbors by converting the 32 bit EIGRP metric to the 24 bit IGRP metric. Most of the routing optimizations are based on the Diffusing Update Algorithm (DUAL) work from SRI, which guarantees loop-free operation and provides a mechanism for fast convergence. IGRP is created by Cisco. OSPF - Open Shortest Path First (OSPF) is a link-state routing protocol for IP networks.   It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is the most widely used interior gateway protocol (IGP) in large enterprise networks. OSPF is a trusted Cisco course-plotting method that creates managing big systems achievable. OSPF represents "Open Least Route 1st. inch this smallest journey would be the one particular with the cheapest. OSPF uses a metric to look for the volume of over head it'd price tag to be able to post info spanning a presented interface. This course-plotting criterion makes use of this specific metric to choose the most efficient journey in between resource and getaway. Determining your metric, or maybe price tag, yourself can be executed simply using a basic working out. OSPF is a standards-based routing protocol; however...

Words: 361 - Pages: 2

Premium Essay

Case Study 1

...software to monitor the network. The firm has two locations, one in New York and one in Chicago, specializing in corporate advertising. A MPLS WAN link exists between the sites. Each office has approximately 250 workstations. The company expects only 4 percent network traffic growth in the next two years. Computers at each office are connected to 10/100 hubs. A router in New York provides connectivity to the Chicago office and to the Internet via a local ISP. The current routing protocol is RIP. The MPLS link is a T1 line and utilization usually hovers around 80 percent. The Ethernet segments currently run at an average 50 percent utilization; occasionally, network utilization will burst to 65 percent utilization. Users complain of slow response time through the day. The firm uses MS Office suite including MS SharePoint for word processing and exchanging documents. E-mail and HTTP are highly used as well. The firm also uses database servers for marketing information. IP is the only protocol routed on the network. The firm recently upgraded its workstations and is now equipped with 10/100/1000 network interface cards. Mr. Hagen would like a proposal to upgrade the network to Gigabit Ethernet. He would also like a solution to integrate voice and data on the WAN link between New York and Chicago. Mr. Hagen mentioned that a previous network audit uncovered security issues from access...

Words: 718 - Pages: 3

Free Essay

Dude

...on acquiring and deploying the hardware and software required to support the company’s short term and long range goals. Key Responsibilities and Accountabilities • Establishes network design and strategies by evaluating network performance issues including availability, utilization, throughput, goodput, and latency. • Planning and executing the selection, installation, configuration, and testing of equipment. • Define network policies and procedures, establishing connections and firewalls. • Establishes network specifications by conferring with users; analyzing workflow, access, information, and security requirements. • Designing router and switch administration, including interface configuration, routing and switching protocols • Depending on workload and if time permits, will assist with Service Desk duties along with Service Desk Analysts...

Words: 562 - Pages: 3

Free Essay

Advance Networking

...would want to know relative to what is IN the document. The Index or Table of Contents would follow so that they know where to find more information. ] Table of Contents IT305-1503A-01 Network Upgrade Project Plan Executive Summary 1 Table of Contents 2 Section 1: Implementing IPv6 4 Section 2: Network Infrastructure Design 5 Section 3: Linux Networking 6 Section 4: Analyzing Network Traffic 7 Section 5: Network Security 9 References 12 Section 1: Implementing IPv6 Honeywell International It has been decided that as our presence grows on the global market we have decided that we need to stay better connected with all our subsidiaries and partners. Currently we all connect using IPv4 which as and addressing protocol that has roughly 4billion different combination. But seeing as we currently have approximately seven billion people on this planet let’s say just 1 billion of these people are in the industrialized world. Now for each of these one billion individuals they each have a cell phone that connects to the internet. That’s 1 billion IPv4 addresses used. But let’s not forget that each of these people needs a computer at home for whatever people use computers for now a days, that adds up to an additional 1 billion IPv4 addresses. Let’s face it; currently we recycle IP addresses because we just don’t have enough addresses for every individual. It may seem like everything is operating just fine but it’s actually not. Information is moving much too...

Words: 3045 - Pages: 13

Free Essay

Networking

...Dallas CPA Society IT305 Advanced Networking Network Implementation Plan Nathaniel Conanan 05/22/2016 Table of Contents * Section 1: Implementing IPv6 * Section 2: Networking Infrastructure Design * Section 3: Linux Networking * Section 4: Analyzing Network Traffic * Section 5: Network Security Section 1: Implementing IPv6 The Dallas CPA Society, Texas Society of Certified Public Accountants (Dallas Chapter) is a not-for-profit professional association serving approximately 6,000 CPA members in the Dallas and surrounding 13 counties. It is the second largest chapter of the Texas Society, Certified Public Accountants (TSCPA), the statewide professional association with over 27,000 members and 20 chapters around the state. A Board of Directors, elected from among the membership, is charged with the responsibility of governing the Chapter. The purposes of the Chapter are to elevate the standard of proficiency, integrity and character of the profession; to cultivate professional cooperation and social interaction among members; and promote cooperation within the TSCPA and other CPA organizations for the advancement of the profession of public accountancy. In fulfilling these purposes, the Chapter heavily relies on its volunteers (members), who serve on committees. The Chapter’s activities and committees are organized in the following categories: Community Affairs, Continuing Professional Education, Management and Quality...

Words: 1868 - Pages: 8

Free Essay

Unit 5 Ass.1

...They’re both distance vector protocols. EIGRP is enhanced edition of Interior Gateway Routing Protocol. Though it adopts distance vector algorithm, it has some features of link state protocol. EIGRP has improved a lot compared to IGRP; it relies on the Diffused Update Algorithm (DUAL) to calculate the shortest path a destination within a network. It is totally loop-free, and has very fast convergence speed among all the routing protocols. EIGRP is an enhanced distance vector protocol, relying on the Diffused Update Algorithm (DUAL) to calculate the shortest path to a destination within a network. The strengths of EIGRP are Fast convergence EIGRP is an advance distance vector protocol, one of its core strengths is its fast network convergence capabilities, unlike other routing protocols EIGRP keeps feasible successor routes right into the routing table, and this allows millisecond convergence should the successor route fail. Flexible in summarization Unlike OSPF, EIGRP allows you to summarize anywhere, in bigger environments where routers are advertising hundreds of networks, route summarization can greatly enhance router's and network operational capabilities, its less taxing on CPU/memory and cheaper to run / maintain. Unequal cost load- balancing EIGRP allows unequal cost load balancing, which means you can use 2 different cost links to load balance traffic, no other protocol can do this. It is VLSM friendly unlike other distance vector protocols, and EIGRP supports VLSM and...

Words: 379 - Pages: 2