ch. 6– routing theory – part 2 ccna semester 2 originally by rick graziani, instructor modified...

76
Ch. 6– Routing Theory – Part 2 Ch. 6– Routing Theory – Part 2 CCNA Semester 2 CCNA Semester 2 Originally by Rick Graziani, Instructor Modified by Prof. Yousif

Upload: roland-lloyd

Post on 03-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Ch. 6– Routing Theory – Part 2Ch. 6– Routing Theory – Part 2

CCNA Semester 2CCNA Semester 2Originally by Rick Graziani, Instructor

Modified by Prof. Yousif

Routing Theory andCh. 6 Routing - Part II

The success of dynamic routing depends on two basic router functions:

1. maintenance of a routing table

2. timely distribution of knowledge, in the form of routing updates, to other routers

Dynamic routing relies on a routing protocol to share knowledge among routers.

A routing protocol defines the set of rules used by a router when it communicates with neighboring routers. For example, a routing protocol describes:

how to send updates what knowledge is contained in these updates when to send this knowledge how to locate recipients of the updates

When a routing algorithm updates a routing table, its primary objective is to determine the best information to include in the table.

Each routing algorithm interprets what is best in its own way. The algorithm generates a number, called the metric value, for each path through the network.

Typically, the smaller the metric number, the better the path.

These metrics will be discussed later or in CCNP Advanced Routing, with their appropriate Routing Protocols:

RIP – hop count IGRP – bandwidth, delay, reliability, load EIGRP – bandwidth, delay, reliability, load OSPF – bandwidth BGP – attribute values and shortest path

Most routing algorithms can be classified as one of two basic algorithms:

distance vector link state.

The distance-vector routing approach determines the direction (vector) and the cost or metric (distance) to any link in the internetwork.

RIP, IPX RIP and IGRP (CCNA) AppleTalk, RTMP and others (non-CCNA)

The link-state (also called shortest path first) approach re-creates the exact topology of the entire internetwork (or at least the portion in which the router is situated).

OSPF IS-IS

The balanced hybrid approach combines aspects of the link-state and distance-vector algorithms.

These are really distance-vector routing protocols which apply some of the advantages of a link-state routing protocols, and also known as advanced-distance-vector routing protocols.

EIGRP

When all routers in an internetwork are operating with the same knowledge, the internetwork is said to have converged.

Fast convergence is a desirable network feature because it reduces the period of time in which routers would continue to make incorrect/wasteful routing decisions.

Topics – (Continued)Part II. Routing Theory and Dynamic Routing Operations Dynamic Routing Operations

– Routing Metrics – Classes of Routing Protocols– Convergence

Distance Vector Routing Protocols – Distance Vector Concepts– Distance Vector Network Discovery– Simple Split Horizon (Introduction)– Distance Vector Network Discovery with Split Horizon– Network Discovery FAQs– Triggered Updates– Routing Loops– Count to Infinity– Defining a Maximum– Split Horizon– Split Horizon with Poison Reverse– Holddown Timers– TTL – IP’s Time-To-Live Field

Distance Vector Concepts The mathematical basis of the distance-vector routing protocols

is the Bellman-Ford algorithm. Pure distance-vector routing protocols suffer from long

convergence times and possible temporary routing loops (more in a few moments).

There are remedies to some situations that may cause these problems which we will examine in a moment.

Network Discovery and Routing Table Maintenance Distance-vector-based routing algorithms pass periodic copies of a

routing table between adjacent routers, from router to router. (RIP every 30 seconds, IPX RIP every 60 seconds, IGRP every 90 seconds).

These regular updates between routers help routers discover each other’s networks and communicate topology changes.

Routers only learn about other networks from adjacent routers, their directly connected neighbors.

Router D learned about Router A’s network 172.16.0.0/16 from Router C, who learned it from Router B, who learned it from Router A.

This is why distance-vector routing protocols are also known as routing by rumor.

172.16.0.0/16

Distance-vector routing protocols do not allow routers to know the topology of the network, as they only know how far a network is (distance: hops) and which way to forward the packet (vector: exit interface). (Link-state routing protocols allow routers to see the exact network topology – later.)– Distances (hops) are cumulative from one router

to the next

How do routers learn about other networks and determine the best routes to these networks?

We will now look at the concepts of how this happens. In Chapter 7 Routing Protocols, we will look at how RIP does

this and view it happening!

Initial Routing Tables The first routes entered in the routing table are directly connected

networks, assigning a metric or cost of “0” (hop count for RIP).– See previous slides on IP Routing Table and Directly Connected

Networks.– 00:28:56: RT: add 192.168.2.0/24 via 0.0.0.0, connected metric [0/0]– 00:28:56: RT: interface Ethernet0 added to routing table

Remember, these interfaces must be “up” and “up” The next step is for routers to share their complete routing tables with

any and all directly connected neighboring routers. Distance-vector routing protocols do not maintain formal relationships

with neighboring routers, I.e. they do not know who their neighboring routers are.

So how do they know who to send their routing tables to? Distance-vector routing protocols use a broadcast or multicast address to send out routing updates, although you can specify a unicast address. (later)

Distance-Vector Network Discovery

RTA RTB RTCNetwork W Network X Network Y Network Z

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->

Sending Routing Tables to Neighbors (Later, we will see another example with real IP addresses.) In their routing updates to the neighboring router(s), distance-vector

routing protocols include the following information for each network in their routing table:

– Network address – This would normally be an ip network address.

– The metric or cost (with RIP this is the number of hops, but can be other metrics for other distance-vector routing protocols).

• Since we are using hops in this example, RIP increments the hop count by one in its routing table before sending out the routing update.

– Next-hop address – This would normally be the ip address of the interface from which the routing update was sent.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTC

Sent via broadcast or multicast (later)

Routers Update their Routing Tables A router will enter this update into its routing table if:

– It is a new route, a network which is not currently in its routing table.– It is an existing route, a network which is currently in its routing

table, but this update has a better (smaller) metric (fewer hops).– Note: If the update contains a route to an existing route, with the

same metric (hops), but via a different interface, the router may or may not add it to its routing table depending upon whether or not the routing protocol is providing load balancing (later). RIP does provide this.

A router will not enter this update into its routing table if:– It is an existing route with a worse metric.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTB

Routers Update their Routing Tables (continued)RTA: Ignores the route to X because it has an existing, better route with a cost=0. Accepts the route to Y because it didn’t exist in the routing table.RTB (from RTA): Accepts the route to W because it didn’t exist in the routing table. Ignores the route to X because it has an existing, better route with a cost=0.RTB (from RTC): Ignores the route to Y because it has an existing, better route with a cost=0. Accepts the route to Z because it didn’t exist in the routing table.RTC: Accepts the route to X because it didn’t exist in the routing table. Ignores the route to Y because it has an existing, better route with a cost=0.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTB

New Routing Tables

Next Round of Routing Updates We have still not reached convergence, because all of the routers do not

have complete and accurate network information. Which router does have complete information? Which ones do not? In the next round, routers must forward their new routing tables in the form

of routing updates, to their directly connected neighbors. Remember, with the distance-vector routing protocol RIP, the router

increments the number of hops in its own routing table by one, before sending out the routing update. - “If it is one hop for me to get there, and you are getting there via me, then it is two hops for you.”

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTAY 2 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTBW 2 RTBZ 2 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTCX 2 RTC

Routers Update their Routing Tables - againRTA: (Advertised Cost Compared to current local cost) Ignores the route to X because it has an existing, better route with a cost=0. Ignores the route to Y because it already has that route, with the same cost. Ignores the route to W because it has an existing, better route with a cost=0.

– “I am not going to send you the packet, so you can send it back to me, …”– Later, we will see that split-horizon prohibits this route from being sent.

Accepts the route to Z because it didn’t exist in the routing table.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTAY 2 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTBW 2 RTBZ 2 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTCX 2 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTBZ 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTBW 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTB

ExistingRoutingTables

NewRoutingTables

Routers Update their Routing Tables – again (continued)RTB: Ignores all routes from both RTA and RTC, because it already has those

routes, with the same costs. No new information.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTAY 2 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTBW 2 RTBZ 2 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTCX 2 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTBZ 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTBW 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTB

ExistingRoutingTables

NewRoutingTables

Routers Update their Routing Tables - againRTC: Ignores the route to X because it already has that route, with the same cost. Ignores the route to Y because it has an existing, better route with a cost=0. Accepts the route to W because it didn’t exist in the routing table. Ignores the route to Z because it has an existing, better route with a cost=0.

– “I am not going to send you the packet, so you can send it back to me, …”

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing UpdateNet. Hops Next-hop-addW 1 RTAX 1 RTAY 2 RTA

Routing UpdateNet. Hops Next-hop-addX 1 RTBY 1 RTBW 2 RTBZ 2 RTB

Routing UpdateNet. Hops Next-hop-addY 1 RTCZ 1 RTCX 2 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTBZ 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTBW 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTB

ExistingRoutingTables

NewRoutingTables

Convergence! All of the routers now have a consistent and accurate view of the

network. Later, we will see how RIP handles this operation.

Distance-Vector Network DiscoveryRTA RTB RTC

Network W Network X Network Y Network Z

Routing Table (Distance) (Vector)Net. Hops Exit-int.W 0 <--X 0 -->Y 1 RTBZ 2 RTB

Routing Table (Distance) (Vector)Net. Hops Exit-int.X 0 <--Y 0 -->W 1 RTAZ 1 RTC

Routing Table (Distance) (Vector)Net. Hops Exit-int.Y 0 <--Z 0 -->X 1 RTBW 2 RTB

RoutingTables

Split Horizon Rule Before we continue looking at routing tables and network discovery,

using real ip addresses, let’s take a look at the split horizon rule. “The effect of split horizon is that a router will send out different routing

messages on different interfaces. In effect a router never sends out information on an interface that it learned from that interface.” (Lewis, Cisco TCP/IP Routing)

As we will see later in this presentation, split horizon helps prevent routing loops. (Discussed in much more detail soon.)

For now, we will see that split horizon means that the router does not send out all of the information in the routing table to its neighbors.

Note: Usually, split horizon is enabled and can be disabled.

Note: The on-line curriculum has incorrect information regarding split horizon.

Network Discovery with Split Horizon First of all, notice we are using real ip addresses. In the routing updates, next-hop ip addresses for the networks are sent to

the neighboring router specifying the address it can use to forward packets to.

The split horizon rule also affects common networks between two routers.

To the router, a directly connected network is known via its own interface, so it does not include that network in routing updates sent out that same interface.

In other words, the router does not send information about a directly connected network out the interface of that directly connected network.

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e0

Initial routing tables

Network Discovery with Split Horizon - First Round of Updates “The effect of split horizon is that a router will send out different routing

messages on different interfaces. In effect a router never sends out information on an interface that it learned from that interface.” (Lewis)

RTA’s routing update sent out serial 0 to RTB Includes the network 10.1.1.0/24 which RTB can reach via 10.1.1.1. Split horizon: Does not include the 10.1.2.0/24 network because that

network was learned via serial 0 (interface serial 0, ip address 10.1.1.1 …) – a common network between RTA and RTB.

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2X

X

Network Discovery with Split Horizon - First Round of UpdatesRTB’s routing update sent out serial 0 to RTA Includes the network 10.1.3.0/24 which RTA can reach via 10.1.2.2. Split horizon: Does not include the 10.1.2.0/24 network. Split horizon

blocks the 10.1.2.0/24 update from being sent to RTA with a hop count of “1.” (Note: To keep the diagrams less cluttered, omission of the proper red/blue arrow means split horizon is in affect, same as the “X.”)

RTB’s routing update sent out serial 1 to RTC Includes the network 10.1.2.0/24 which RTC can reach via 10.1.3.1. Split horizon: Does not include the 10.1.3.0/24 network.

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2X

X

Network Discovery with Split Horizon - First Round of Updates Same with updates from RTC and RTD.

Your Turn: Write out the new routing tables for each router after this round. Also, find any mistakes I might have made

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2X

X

Answer – Do your routing tables look like these?

Now – What do the next round of routing updates look like? Show the routes which are sent (propagated) and those that are not sent because of split horizon.

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2X

X

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.2

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.1

Answer – Do your routing updates look like these? Again, omission of the red/blue arrow means split horizon is in affect. For example, RTB is not sending the route 10.1.1.0/24 to RTA to tell RTA

it can get to 10.1.1./24 in 2 hops via RTB. - This would make sense! Split horizon - router never sends out information on an interface that it

learned from that interface

Now – What do the routing tables look like?

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.2

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.110.1.1.0/24 2 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.210.1.3.0/24 2 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2

XX

XX

Answer – Do your routing tables look like these? Convergence? Note: Newest routing table entries are at the bottom of the routing tables in these

diagrams.

Now – What do the next round of routing updates look like and the routing tables? (We’ll finish this up )

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.2

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.110.1.1.0/24 2 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.210.1.3.0/24 2 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2

XX

XX

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.210.1.1.0/24 2 10.1.3.1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.1

Answer – Do your routing tables look like these?

Convergence? – YES!

Network Discovery with Split HorizonRTA RTB RTC10.1.1.0/24 10.1.2.0/24 10.1.3.0/24 RTD10.1.4.0/24 10.1.5.0/24

s0 s0 s0e0 e0s1 s1 s0

.1 .1 .1.1 .1.2 .2 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.210.1.1.0/24 2 10.1.3.1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1------------------------10.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.110.1.4.0/24 3 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.3.110.1.1.0/24 2 10.1.3.1------------------------10.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.210.1.5.0/24 3 10.1.2.2

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.110.1.1.0/24 3 10.1.4.1------------------------10.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Update Next-hopNet. Hops Address10.1.4.0/24 1 10.1.4.210.1.3.0/24 2 10.1.4.210.1.2.0/24 3 10.1.4.2------------------------10.1.5.0/24 1 10.1.4.2

XX

XX

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.210.1.4.0/24 2 10.1.2.210.1.5.0/24 3 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 s110.1.1.0/24 1 10.1.2.110.1.4.0/24 1 10.1.3.210.1.5.0/24 2 10.1.3.2

Routing Table Net. Hops Ex-Int10.1.3.0/24 0 s010.1.4.0/24 0 s110.1.2.0/24 1 10.1.3.110.1.5.0/24 1 10.1.4.210.1.1.0/24 2 10.1.3.1

Routing Table Net. Hops Ex-Int10.1.4.0/24 0 s010.1.5.0/24 0 e010.1.3.0/24 1 10.1.4.110.1.2.0/24 2 10.1.4.110.1.1.0/24 3 10.1.4.1

X

X

Good Job!

FAQs – Network Discovery

Q: How often does initial network discovery happen?

A: Only when the network first comes up.

Q: Do routers share routing table information after network discovery?

A: Yes, distance-vector routing protocols share their entire routing tables periodically (with or without split horizon enabled). Distance vector routing protocols on Cisco routers by default use split horizon with poison reverse (discussed in the next section). Depending upon the distance-vector routing protocol, the frequency of the updates will happen for RIP every 30 seconds, IPX RIP every 60 seconds, and IGRP every 90 seconds.

Q: What happens when there is a change in the topology, link goes down, new network is added, new router, is added, etc.?

A: Let’s take a look.

Triggered Updates Routers do not have to wait for the periodic update to hear

about changes in the network topology. Improvements to the distance-vector algorithm is typically made

in distance-vector routing protocols, like RIP, to include triggered updates.

Even with triggered updates, large distance vector networks can suffer from long convergence times in some situations.

Triggered updates: (continued) Triggered updates are sent whenever a router sees a topology

change or a change in routing information (from another router). The router does not have to wait for the period timer, but can

send them immediately. Triggered updates do not need to include the entire routing table

but only the modified route(s).

Triggered updates: (continued) Triggered updates must still be sent to adjacent routers, from

router to router, like other routing updates. Most distance-vector routing protocols limit the frequency of

triggered updates so that a flapping link does not put an unnecessary load on the network. (RIP: random 1 to 5 seconds)

Typically, triggered updates can be “triggered” by:– Interface transition to the up or down state– A route has entered or exited an unreachable (down) state (later)– A new route is installed in the routing table

Routing Loops Distance vector routing protocols are simple in their implementaton and

configuration, but this comes at a price. Pure distance vector routing protocols suffer from possible routing

loops. Routing loops can cause major network problems, from packets getting

lost (blackholed) in your network, to bringing down your entire network. Several remedies to have been added to distance-vector algorithms to

help prevent routing loops including:– Split horizon– Hold-down timers– Defining a maximum metric

Routing Loops (continued) What can cause routing loops? Routing loops can occur when there are:

– Incorrect or inconsistent routing updates due to slow convergence after a topology change. (Example coming up next.)

– Incorrect or incomplete routing information (see presentation on Discard Routes)

– Static routes incorrectly configured with an intermediate address which does not become resolved in the routing table. (see presentation on Static Routes – Additional Information)

Routing Loop Example Assume for the remainder of this example that Router C’s

preferred path to network 1 is by way of Router B. Router C’s routing table has a distance of 3 to network 1 via

Router B.

Network 1 Fails Router E sends an update to Router A. Router A stops routing packets to network 1. But Routers B, C, and D continue to do so because they have

not yet been informed about the failure. Router A sends out its update. Routers B and D stop routing to network1, (via Router A). However, Router C is still not updated. To router C, network 1 is still reachable via router B.

Router C sends a periodic update to Router D Router C sends a periodic update to Router D indicating a path to

network 1 (by way) of via Router B. (4 hops).

Router D’s Routing Table information for Network 1 Current path to Network 1 = Unreachable (down) Information from Router C: Network 1 : 4 hops by way of Router C Normally, RouterD ignores this routing information because it usually

has a better route, 2 hops, via Router A, but this route is now down. Router D changes its routing table to reflect this (good) better, but

incorrect information, Network 1 by way of Router C (4 hops) Router D propagates the information to Router A.

Routers A changes its routing table Router A adds new route to its routing table, get to Network 1 by way of

Router D (5 hops). Propagates the information to Routers B and E.

Router B (and Router E) change their routing tables Router B now believes it can get to Network 1 by way of Router A (6

hops). Wow! I was about to tell Router C that Network 1 was down via Router

B, but now I have new information! Propagates the incorrect information to Router C.

Router C changes its routing table Router C still believes it can get to Network 1 by way of Router B (7

hops). Of course now it believes it is 7 hops instead of 3. Propagates the newer but still incorrect information to Router D.

Here we go again! Data packets destined for Network 1 get caught in a routing loop, from

Routers A to D to C to B to A to D etc. As routing updates continue between the routers, the hop count gets

greater – to infinity? (Not quite – we will see in a moment.)

Counting to Infinity The routing loop we just saw creates another problem, known as

“Counting to Infinity.” This condition, called count to infinity, loops packets continuously

around the network in spite of the fundamental fact that the destination network, Network 1, is down.

While the routers are counting to infinity, the invalid information allows a routing loop to exist.

Without countermeasures to stop the process, the distance vector (metric) of hop count increments each time the packet passes through another router. - These packets loop through the network because of wrong information in the routing tables.

Solution to Counting to Infinity: Defining a Maximum metric Distance vector routing protocols remedy the problem by limiting the

maximum number of hops for any route in the routing table. When the distance vector routing protocol has a route with a metric that

is more than its maximum-value, it is denoted as “infinity” and the route is considered “unreachable.”

For RIP the maximum-value is 15 (hops), infinity is 16 (hops). For IGRP the maximum-value 100 (hops), infinity is 101 (hops).

– IGRP uses bandwidth, delay, reliability and load for its metric in determining best path.

– IGRP does not use hop count as this metric. Hop count is only used by IGRP to stop the counting to infinity behavior. (more later)

Solution to Counting to Infinity: Defining a Maximum metric Remember that distance vector routing protocols like RIP, increment

the metric (hop count) before sending the routing update to their adjacent routers.

– After incrementing the hop count, if the metric (hops) is less than 15, routing updates to other adjacent routes will receive a valid route for this network from this router.

– After incrementing the hop count, if the metric (hop count) is equal to 15, this router will be able to route packets to this network, 15 hops away, but routing updates to other adjacent routers will have the incremented hop count of 16 (infinity). - This means other routers cannot reach this network via this router.

– After incrementing the hop count, if the metric (hop count) is equal to 16,“infinity”, this router will not be able to route packets to this network. Routing updates to other adjacent routers will also have the hop count of 16 (infinity), which means they cannot reach this network via this router.

There is another situation where the router itself will modify the hop count to infinity – split horizon with poison reverse. – Coming up next!

FAQs – Defining a maximum-value

Q: Why does RIP use a hop count as the route metric, and why is its maximum value limited to 15?

A: When RIP was designed and implemented, dynamic routing protocols were not widely used. Instead, networks relied mostly on static routing. RIP, even with its hop-count-metric – which seems very poor to us today – was quite a big improvement. Counting intermediate routes is the simplest method to measure the quality of routes. Setting the infinity value for the metric is always a problem of choosing between wider networks and faster convergence when the protocol starts counting. When RIP was invented, it seemed unlikely to have a network with the maximum diameter of more than 15 routers, so 16 was chosen as the infinity value. (Zinin, Cisco IP Routing)

Split Horizon Rule - Reminder “The effect of split horizon is that a router will send out different routing

messages on different interfaces. In effect a router never sends out information on an interface that it learned from that interface.” (Lewis, Cisco TCP/IP Routing)

Earlier we saw that split horizon meant that the router does not send out all of the information in the routing table to its neighbors.– If a router learned about a network from an adjacent router, it does

not include that network in its routing updates to that neighbor. (See previous slides, Network Discovery and Split Horizon.)

As we will now see split horizon also helps prevent routing loops.

Split Horizon Rule – Avoiding Routing Loops Routers RTA and RTB have their initial routing tables and are ready to

exchange routing information via a distance-vector routing protocol like RIP.

Split Horizon disabled If split horizon were disabled the routing updates would include all of

the networks in their routing tables including their directly connected networks and any networks learned from any interface.

RTA RTB10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e0

Simple Split Horizon

Initial routing tables

Split Horizon Disabled After the initial exchange of updates everything in the routing

tables look fine. Because split horizon disabled, the 10.1.2.0/24 network is sent

by both routers, but neither router includes the other’s route to 10.1.2.0/24 (1 hop) in the routing table, because it has a current route with a better metric of 0.

Initial routing tables

New routing tables

10.1.2.0/24 network is included because split horizon has been disabled

RTA RTB10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.2.210.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Split Horizon Disabled After the next exchange of updates everything in the routing tables look fine

and the routing tables are converged. Because split horizon disabled, the besides the 10.1.2.0/24 network, the

networks learned from the other router in the previous update is also sent by both routers.

However, neither router includes those networks, because it has a current route with a better metric of 0.

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.2.210.1.3.0/24 1 10.1.2.210.1.1.0/24 2 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Previous routing tables

Networks in red were included because split horizon has been disabled

New routing tables

Split Horizon Disabled – 10.1.3.0/24 down Note: Routing tables are not sent at the exactly same time. We will learn about

this in Ch. 7 Routing Protocols, that this is done on purpose to avoid collisions on broadcast networks like Ethernet.

Here, the 10.1.3.0/24 network fails, and before RTB sends out its routing update, RTB receives a routing update from RTA.

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 2 10.1.2.110.1.1.0/24 1 10.1.2.1

X

Previous routing tables

Networks in red were included because split horizon has been disabled

New routing tables

Split Horizon Disabled – 10.1.3.0/24 down RTB notices that it has a route to 10.1.3.0/24 via RTA. Even though it is 2 hops

it is certainly better than its current situation of “unreachable” so it accepts this better, but incorrect information from RTA.

RTB now forwards all packets destined for 10.1.3.0/24 to RTA at 10.1.2.1. RTA receives these packets and forwards them to RTB at 10.1.2.2. RTB forwards them back to RTA at 10.1.2.1. And so on! The packets get blackholed in this routing loop.

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 1 10.1.1.110.1.3.0/24 2 10.1.1.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 2 10.1.2.110.1.1.0/24 1 10.1.2.1

X

Previous routing tables

Networks in red were included because split horizon has been disabled

New routing tables

Split Horizon Disabled – 10.1.3.0/24 down Meanwhile, its RTB’s turn to send its routing update. RTB increments the hop count to 10.1.3.0/24 to 3 hops and sends it to

RTA. When RTA sends out its next routing table it will increment the hop

count to 10.1.3.0/24 to 4 hops and sends it to RTB. And on and on, until “infinity” which in RIP is 16 hops.

Previous routing tables

Networks in red were included because split horizon has been disabled

New routing tables

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 3 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 2 10.1.2.110.1.1.0/24 1 10.1.2.1

XRouting Table

Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 2 10.1.2.110.1.1.0/24 1 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.2.0/24 1 10.1.2.210.1.3.0/24 3 10.1.2.210.1.1.0/24 2 10.1.2.2

Split Horizon Disabled Once both routers have 16 hops for 10.1.3.0/24, they will both mark this

network as unreachable and discontinue forwarding, drop, packets to this network.

This temporary routing loop can be easily avoided by enabling split horizon on the serial 0 interfaces.

Split horizon rule states that router never sends out information on an interface that it learned from that interface

Let’s see!

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2 XRouting Table

Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 16 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 16 10.1.2.110.1.1.0/24 1 10.1.2.1

Split Horizon Enabled

RTA RTB10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.2

Previous routing tables

New routing tables

Split Horizon Enabled As you can see, with split horizon enabled, RTA does not send RTB (out

s0) information about 10.1.3.0/24 because it learned it from RTB (same s0), and RTB does not send RTA (out s0) information about 10.1.1.0/24 to RTA because it learned it from RTA (same s0). (This also includes the common network between them.

RTA RTB10.1.1.0/24

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s0

10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e0

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.2

Previous routing tables

New routing tables

Split Horizon Enabled – 10.1.3.0/24 down RTB notices 10.1.3.0/24 is down and puts this route into hold-down

state in its routing table. (hold-down coming next) RTB immediately sends out a triggered update for only this route (if there

were others in the routing table) with a metric of infinity, 16. RTA receives the triggered update and puts the route for 10.1.3.0/24 into

hold-down state.

Previous routing tables

New routing tables

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 (down) e010.1.1.0/24 1 10.1.2.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 (down) 10.1.2.2

X

Routing Update Next-hopNet. Hops Address10.1.3.0/24 16 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 (down) e010.1.1.0/24 1 10.1.2.1

Split Horizon Enabled – 10.1.3.0/24 down Notice that RTA never sends RTB a routing update for 10.1.3.0/24,

because split horizon is enabled on these interfaces.

Previous routing tables

New routing tables

RTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 (down) e010.1.1.0/24 1 10.1.2.1

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 (down) 10.1.2.2

X

Routing Update Next-hopNet. Hops Address10.1.3.0/24 16 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 (down) e010.1.1.0/24 1 10.1.2.1

Split Horizon with Poison Reverse Many vendor implementations of distance vector routing protocols like

Cisco’s RIP and IGRP apply a special kind of split horizon, called split horizon with poison reverse.

“Split horizon with poison reverse means that, instead of not advertising routes to the source, routes are advertised back to the source with a metric of 16, which will make the source router ignore the route. It is perceived that explicitly telling a router to ignore a route is better than not telling it about the route in the first place.” (Lewis, Cisco TCP/IP Routing)

One drawback is that routing update packet sizes will be increased when using Poison Reverse, since they now include these routes.

Split Horizon with Poison ReverseRTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 16 10.1.2.110.1.3.0/24 16 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.210.1.2.0/24 16 10.1.2.210.1.1.0/24 16 10.1.2.2

“Poisoned” routes in red. Routing tables remain the same.

Split Horizon Enabled by DefaultSplit horizon with poison reverse is enabled by default for all interfaces

except: Physical interfaces or multipoint sub-interfaces using Frame Relay or

SMDS encapsulation (CCNA Semester 4 and CCNP Remote Access)

To disable split horizon on an interface: Router(config-if)# no ip split-horizonTo enable split horizon on an interface: Router(config-if)# ip split-horizon

Split Horizon EnabledRTA RTB10.1.1.0/24 10.1.2.0/24 10.1.3.0/24

s0 s0e0 e0

.1 .1.1 .2

Routing Table Net. Hops Ex-Int10.1.1.0/24 0 e010.1.2.0/24 0 s010.1.3.0/24 1 10.1.2.2

Routing Table Net. Hops Ex-Int10.1.2.0/24 0 s010.1.3.0/24 0 e010.1.1.0/24 1 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.1.0/24 1 10.1.1.110.1.2.0/24 16 10.1.2.110.1.3.0/24 16 10.1.2.1

Routing Update Next-hopNet. Hops Address10.1.3.0/24 1 10.1.2.210.1.2.0/24 16 10.1.2.210.1.1.0/24 16 10.1.2.2

“Poisoned” routes in red.

Holddown timers The main function of holddown timers is to prevent the

distance vector routing protocol from establishing routing loops during periods of network transition (topology changes).

“The rule: Once a route is marked unreachable, it must stay in this state for a period of time assumed sufficient for all routers to receive new information about the unreachable network. In essence, we instruct the routers to let the rumors calm down and then to pick up the truth.” (Zinin, Cisco IP Routing)

The amount of time a router remains in “this state” is determined by the holddown timer.

Cisco on-line curriculum information You can avoid the count-to-infinity problem by using hold-down

timers. When a router receives an update from a neighbor indicating

that a previously accessible network is now inaccessible, the router marks the route as inaccessible and starts a hold-down timer.

Cisco on-line curriculum information (continued)

Same Route from same neighbor: Network is back up (Correct News) If at any time before the hold-down timer expires an update is

received from the same neighbor indicating that the network is again accessible, the router marks the network as accessible and removes the hold-down timer.

Cisco on-line curriculum information (continued)

Better Route from different neighbor (Correct News) If at any time before the hold-down timer expires an update

arrives from a different neighboring router with a better metric than originally recorded for the network, the router marks the network as accessible and removes the hold-down timer.

Cisco on-line curriculum information (continued)

Poorer Route from a different neighbor. (Incorrect News) If at any time before the hold-down timer expires an update

arrives from a different neighboring router with a poorer metric than originally recorded for the network the update is ignored and the hold-down timer continues.

Ignoring an update with a poorer metric when a hold-down is in effect allows more time for the knowledge of a disruptive change to propagate through the entire network.

Additional Information on Holddown TimersFlapping routes Holddown timers not only help prevent routing loops during transient

periods but also help network stability by dampening unstable, flapping routes (routes which continuously go up and down).

Holddown Time As we will see with both RIP and IGRP, the amount of time the router

remains in the holddown state can be modified (with caution!), even set to 0.

We will look at this later in the presentations on RIP and IGRP.

Additional Information on Holddown TimersPacket forwarding Even though routing tables remain constant and routers do not accept

potentially bad updates, an interesting question is whether or not routers should continue use the existing routes that are in holddown state for forwarding packets?

“In practice, routes in the holddown state are used for packet forwarding.

In the worst case, packets are forwarded toward the router that was previously connected to the destination network, which drops them.

In the best case, they are forwarded along a potentially suboptimal but valid path.” (Zinin, Cisco IP Routing)

Let’s look at a related item in IP, the TTL field.

IP Header 0 15 16 31

4-bit Version

4-bit Header Length

8-bit Type Of Service (TOS)

16-bit Total Length (in bytes)

16-bit Identification

3-bit Flags

13-bit Fragment Offset

8 bit Time To Live

TTL

8-bit Protocol

16-bit Header Checksum

32-bit Source IP Address

32-bit Destination IP Address

Options (if any)

Data

IP’s TTL – Time To Live field

When a packet is first generated a value is entered into the TTL field.

Originally, the TTL field was the number of seconds, but this was difficult to implement and rarely supported.

Now, the TTL is now set to a specific value which is then decremented by each router.

IP Header 0 15 16 31

4-bit Version

4-bit Header Length

8-bit Type Of Service (TOS)

16-bit Total Length (in bytes)

16-bit Identification

3-bit Flags

13-bit Fragment Offset

8 bit Time To Live

TTL

8-bit Protocol

16-bit Header Checksum

32-bit Source IP Address

32-bit Destination IP Address

Options (if any)

Data

IP’s TTL – Time To Live field

If the router decrements the TTL field to 0, it will then drop the packet (unless the packet is destined specifically for the router, I.e. ping, telnet, etc.).

Common operating system TTL values are:– UNIX: 255– Linux: 64 or 255 depending upon vendor and version– Microsoft Windows 95: 32 – Other Microsoft Windows operating systems: 128

IP Header 0 15 16 31

4-bit Version

4-bit Header Length

8-bit Type Of Service (TOS)

16-bit Total Length (in bytes)

16-bit Identification

3-bit Flags

13-bit Fragment Offset

8 bit Time To Live

TTL

8-bit Protocol

16-bit Header Checksum

32-bit Source IP Address

32-bit Destination IP Address

Options (if any)

Data

IP’s TTL – Time To Live field

Decrement by 1, if 0 drop the packet.

http://www.switch.ch/docs/ttl_default.htmlTTL Overview - Disclaimer:The following list is a best effort overview of some widely used TCP/IP stacks. The

information was provided by vendors and many helpful system administrators. We would like to thank all these contributors for their precious help ! SWITCH cannot, however, take any responsibility that the provided information is correct. Furthermore, SWITCH cannot be made liable for any damage that may arise by the use of this information.

+--------------------+-------+---------+---------+| OS Version |"safe" | tcp_ttl | udp_ttl |+--------------------+-------+---------+---------+ AIX n 60 30 DEC Pathworks V5 n 30 30 FreeBSD 2.1R y 64 64 HP/UX 9.0x n 30 30 HP/UX 10.01 y 64 64 Irix 5.3 y 60 60 Irix 6.x y 60 60 Linux y 64 64 MacOS/MacTCP 2.0.x y 60 60 OS/2 TCP/IP 3.0 y 64 64 OSF/1 V3.2A n 60 30 Solaris 2.x y 255 255 SunOS 4.1.3/4.1.4 y 60 60 Ultrix V4.1/V4.2A n 60 30 VMS/Multinet y 64 64 VMS/TCPware y 60 64 VMS/Wollongong 1.1.1.1 n 128 30 VMS/UCX (latest rel.) y 128 128 MS WfW n 32 32 MS Windows 95 n 32 32 MS Windows NT 3.51 n 32 32 MS Windows NT 4.0 y 128 128

Assigned Numbers (RFC 1700, J. Reynolds, J. Postel, October 1994):

IP TIME TO LIVE PARAMETER

The current recommended default time to live (TTL) for the Internet Protocol (IP) is 64.

Safe: TCP and UDP initial TTL values should be set to a "safe" value of at least 60 today.

The idea behind the TTL field is that IP packets can not travel around the Internet forever, from router to router.

Eventually, the packet’s TTL which reach 0 and be dropped by the router, even if there is a routing loop somewhere in the network.

IP Header 0 15 16 31

4-bit Version

4-bit Header Length

8-bit Type Of Service (TOS)

16-bit Total Length (in bytes)

16-bit Identification

3-bit Flags

13-bit Fragment Offset

8 bit Time To Live

TTL

8-bit Protocol

16-bit Header Checksum

32-bit Source IP Address

32-bit Destination IP Address

Options (if any)

Data

IP’s TTL – Time To Live field

Decrement by 1, if 0 drop the packet.