Introduction to Routing Protocols - Tech CCNA

Tech CCNA

Today E - Learning , is a best idea to study , therefore this website is best for network and network security concepts.

Breaking

Post Top Ad

Responsive Ads Here

Saturday, 3 June 2017

Introduction to Routing Protocols

Introduction to Routing Protocols | Tech CCNA

Introduction to Routing Protocols


Before you start

Objectives : Learn what is routing protocol and types of routing protocols.
Prerequisites: You have to know what a router is , how to subnet an IPv4 address
Tags : Routing Protocols, Router, Switch, link-state, distance vector, protocol .

Definition

Routing Protocols are set of rules which is used to share the information of routes which are present in the routing table of routers. Basically a router transit and receive our data packets on behalf of route. So , basically we have two different method to share routes , i.e Static and Dynamic . For automatic sharing of routes we use routing protocols.

Routing Basic

Once you create an internetwork by connecting your WANs and LANs to a router, you'll need to configure logical network addresses, like IP addresses, to all hosts on that internet- work for them to communicate successfully throughout it.
The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don't really care about hosts- they only care about networks and the best path to each one of them. The logical network address of the destination host is key to get packets through a routed network. It's the hard- ware address of the host that's used to deliver the packet from a router and ensure it arrives at the correct destination host.
Routing is irrelevant if your network has no routers because their job is to route traffic to all the networks in your internetwork, but this is rarely the case! So here's an important list of the minimum factors a router must know to be able to affectively route packets:

Classification of Routing Protocols

Routing protocols can utilize distinctive techniques to share data between switches. The main strategy that we will discuss is the Distance Vector Method. With this strategy each switch shares its whole routing table with its prompt neighbors. Routing data is shared by switches at intermittent interims. Before the routing convention begins to work, every switch would have just the straightforwardly associated arranges in its routing table. At the principal interim of sharing, switches really trade data about their specifically associated systems. Switches gets data and contrasts it and the data in its own particular routing table. In the event that it doesn't have data about got systems, it will add them to its routing table. In the event that the routing convention is utilizing the bounce consider the metric, it will likewise send that data with the courses. All straightforwardly associated systems have the jump tally estimation of 0. At the point when the switch gets the course from another switch, it will augment the bounce check by 1 to show the quantity of switches that must be crossed keeping in mind the end goal to achieve the goal organize. All switches on the system share data from their routing table with the neighbors on customary interims. With each refresh there are more courses in each routing table. Switches will get courses from different switches and keep on sharing that data with different switches on the system. At the end of the day, courses gained from neighboring switches are added to the routing table, and after that mutual with other neighbor switches. The routing tables will keep on populating until all courses are found out by all switches in the system. At the point when all courses are found out by all switches we say that the system met. At the point when this happens, all switches have a predictable perspective of the system. Keep in mind that with the distance vector technique each switch shares its whole routing table with its neighbors at each refresh interval.

http://techccna.com
Another technique for sharing data between switches is the Link State Method. With this strategy switches just offer data about their straightforwardly associated systems. It utilizes uncommon messages called Link State Advertisements (LSA) and Link State Packets (LSP) to share data. At the point when a switch gets a commercials from another switch, it records the data in its own particular routing table, and afterward advances that same data to different switches inside the system. In that way a similar data from one switch is perused by all switches on the system. The way toward sending LSAs and LSPs is called flooding, on the grounds that a solitary parcel is sent all through the whole system. Switches utilize those commercials to fabricate a topology of the system inside its own particular routing table. By utilizing this technique every switch will find out about each other system over some time. After the union happens, ads will just contain changes rather than all straightforwardly associated systems. Furthermore, that is the place the principle distinction between the distance vector and the link state technique is. With the link state technique switches just offer data about their own courses with their neighbors, and these updates are passed along between switches. Once the union is achieved, switches just offer data about changes, not every known system at each refresh.
The last strategy used to share data is a cross breed technique. This techniques joins the distance vector and link state strategies. Actually, this is a distance vector strategy which has propelled components, for example, sharing just routing changes after the meeting. It shares its full routing table at startup.
When all is said in done the distance vector strategy is more straightforward. In view of that it requires less preparing time. Notwithstanding, they do utilize more transmission capacity so they are suggested for little systems. The link state technique utilizes less system movement and it focalizes speedier. As a result of that Link state strategies are more suited for bigger systems or for sharing courses over WAN links.

No comments:

Post a Comment

Pages