0% found this document useful (0 votes)
8 views22 pages

Networking

Uploaded by

donkespinoza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views22 pages

Networking

Uploaded by

donkespinoza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Understand the configuration

of EIGRF, tuning, and


troubleshooting.
Group 2
WHAT IS EIGRF(Enhanced Interior Gateway Routing Protocol) ?
• Enhancement to IGRP or Interior Gateway Routing Protocol.
• Can scale to include multiple Topologies and can provide extremely quick
convergence times with minimal network traffic.
• EIGRP is used on a router to share routes with other routers within the same
autonomous system. Unlike other well known routing protocols, such as RIP, EIGRP
only sends incremental updates, reducing the workload on the router and the
amount of data that needs to be transmitted
• Is an advanced distance-vector routing protocol that is used on a computer network
for automating routing decisions and configuration.
• The protocol was designed by Cisco Systems as a proprietary protocol, available
only on Cisco routers. In 2013, Cisco permitted other vendors to freely implement a
limited version of EIGRP with some of its associated features such as High
Availability (HA), while withholding other EIGRP features such as EIGRP stub,
needed for DMVPN and large-scale campus deployment.
MORE ABOUT EIGRP
 Includes both features of link-state and distance
vector, but is still based on key distance vector
routing protocol.
 Includes features that can’t be found in other
distance vector protocols like RIP and IGRP.
 Version 15.0(1)M allowed both IPv4 and IPv6 under
single configuration mode.
FEATURES
Diffusing Update Algorithm
 Resides as the center of the routing protocol. IT guarantees loop-free and backup
paths throughout the routing domain stored for quick adaption.
Establishing Neighbor Adjacencies
 EIRGP establisher relationships with directly connected routers that are also enabled
for EIGRP. ENA tracks the status of these neighbors.
Reliable Transport Protocol
 Unique to EIGRP. It provides delivery of EIGRP packets to neighbors.
Partial and Bounded Updates
 Refers to its updates. EIGRP doesn’t send periodic updates.
Equal and Unequal Cost Loading Balancing
 Allow administration to better distribute traffic flow in their networks.
EIGRP has four basic components:
1. Neighbor Discovery/Recovery
 Is the process that routers use to dynamically learn of other routers on their
directly attached networks. Routers must also discover when their neighbors
become unreachable or inoperative. This process is achieved with low overhead
by periodically sending small hello packets. As long as hello packets are received,
a router can determine that a neighbor is alive and functioning. Once this is
determined, the neighboring routers can exchange routing information.
2. Reliable Transport Protocol
 Is responsible for guaranteed, ordered delivery of EIGRP packets to all neighbors.
It supports intermixed transmission of multicast or unicast packets. Some EIGRP
packets must be transmitted reliably and others need not. For efficiency, reliability
is provided only when necessary.
3. DUAL Finite State Machine
 Embodies the decision process for all route computations. It tracks all
routes advertised by all neighbors. The distance information, known as a
metric, is used by DUAL to select efficient loop free paths. DUAL selects
routes to be inserted into a routing table based on feasible successors. A
successor is a neighboring router used for packet forwarding that has a
least cost path to a destination that is guaranteed not to be part of a
routing loop.
4. Protocol Dependent Modules
 Are responsible for network layer, protocol-specific requirements. For
example, the IP-EIGRP module is responsible for sending and receiving
EIGRP packets that are encapsulated in IP. IP-EIGRP is responsible for
parsing EIGRP packets and informing DUAL of the new information.
EIGRP tables to manage routing information:
Neighbor Table
 The neighbor table entry also includes information required by the reliable transport
mechanism. Sequence numbers are employed to match acknowledgments with data
packets. The last sequence number received from the neighbor is recorded so out of
order packets can be detected. A transmission list is used to queue packets for possible
retransmission on a per neighbor basis. Round trip timers are kept in the neighbor data
structure to estimate an optimal retransmission interval.
Topology Table
 Is populated by the protocol dependent modules and acted upon by the DUAL finite
state machine. It contains all destinations advertised by neighboring routers. Associated
with each entry is the destination address and a list of neighbors that have advertised
the destination. For each neighbor, the advertised metric is recorded. This is the metric
that the neighbor stores in its routing table. If the neighbor is advertising this destination,
it must be using the route to forward packets. This is an important rule that distance
vector protocols must follow.
Feasible Successors
 A destination entry is moved from the topology table to the routing table when there is a feasible
successor. All minimum cost paths to the destination form a set. From this set, the neighbors that
have an advertised metric less than the current routing table metric are considered feasible
successors. Feasible successors are viewed by a router as neighbors that are downstream with
respect to the destination. These neighbors and the associated metrics are placed in the forwarding
table.
Route States
 A route is considered in the Passive state when a router is not performing a route recomputation.
The route is in Active state when a router is undergoing a route recomputation. If there are always
feasible successors, that route never has to go into Active state and avoids a route
recomputation.When there are no feasible successors, a route goes into Active state and a route
recomputation occurs. A route recomputation commences with a router sending a query packet to all
neighbors. Neighboring routers can either reply if they have feasible successors for the destination
or optionally return a query indicating that they are performing a route recomputation. While in Active
state, a router cannot change the next-hop neighbor it is using to forward packets. Once all replies
are received for a given query, the destination can transition to Passive state and a new successor
can be selected.
Five different packets in EIGRP:
Hello
 Before establishing adjacency, this method is used to find a neighbor. EIGRP Hellos are multicast
messages with a 0 acknowledgment number. Before sharing EIGRP updates, EIGRP routers must
establish neighbor associations.
Update
 Used to transmit the converged routes used by a certain router. When a new route is identified or
while convergence is complete (the route becomes passive), EIGRP Updates are transmitted as
multicasts; when syncing topology tables with neighbors during EIGRP startup, they are sent as
unicasts.
Query
 When DUAL is re-computing a route in which the router does not have a viable successor, it will
ask additional EIGRP neighbors for a possible successor. EIGRP Queries are reliably sent as
multicasts. Query Packets are delivered when a successor route fails and there is no viable
successor in the EIGRP topology database, as the name implies. The Router that has lost the
route sends a query message to their neighbor to see if the route is still present in their topology
table.
Reply
 In response to Query packets, EIGRP Reply packets are issued. To
reliably respond to a Query packet, Reply packets are utilized. The
originator of the Query receives reply packets in a Unicast format. An
OPCode of 4 is allocated to EIGRP Reply packets.
Acknowledge
 An EIGRP Acknowledgment (ACK) packet is nothing more than an empty
EIGRP Hello packet. EIGRP uses acknowledgment packets to ensure that
EIGRP packets are delivered reliably. ACKs are always transmitted to a
Unicast address, not the EIGRP Multicast group address, which is the
source address of the sender of the reliable packet.
Benefits of EIGRP
 Enhanced Interior Gateway Routing Protocol converges at fast rapid times for the
changes in the network topology.
 It uses links more effectively through (ECMP) Equal-Cost Multi-Path and unequal-
cost load sharing.
 It performs a much easier transition with a multi-address family.
 It supports both IPV4 and IPV6 networks.
 It provides encryption for security, and users can utilize it with iBGP for WAN
routing.
 It reduces network traffic by making use of ‘need-based’ updates
 Enhanced Interior Gateway Routing Protocol(EIGRP) is an advanced distance-
vector routing protocol used on a computer network to help automate routing
decisions and configuration.
Advantages of EIGRP
 EIGRP with protocol-dependent modules can route several different
layer protocols.
 The designers intended to create EIGRP configuration to be easy to
configure.
 With EIGRP Autonomous number and network command, EIGRP can
be enabled.
 It will converge in 200 milliseconds.
 It is the protocol that performs unequal cost load balancing.
 If the destination has more than one link, it will identify the variance
between the links.
 One of the more advanced features of EIGRP is Manual route
summarization. It improves stability and reduces the routing table
Disadvantages of EIGRP
 EIGRP routing protocol can be accessible with the CISCO
network devices.
 It is a distance vector routing protocol that relies on neighbors’
routes.
 It does not support future applications as it is not extensible.
WHAT IS TUNING?
 tuning is the process of adjusting and optimizing network
settings and configurations to enhance performance, improve
reliability, and ensure efficient utilization of network resources. It
involves analyzing network traffic patterns, identifying
bottlenecks, and making targeted adjustments to enhance
overall network efficiency.
 tuning is crucial for ensuring optimal network performance,
especially in environments with high traffic volumes, demanding
applications, or critical infrastructure. It involves a systematic
approach to identify and address issues that hinder network
efficiency.
KEY STEPS IN TUNING.
1. Bandwidth
 Adjust the bandwidth value for each interface using the bandwidth
value command to reflect the actual link
capacity.
2. Delay
 Configure the delay value for each interface using the delay value
command to reflect the actual delay on the link.
3. Reliability
 User thee Reliability value command to adjust the reliability value for
each interface, which impacts the EIGRP metric calculation.
4. Load
 Configure the load value for each interface using the load on the link.
BENEFITS OF TUNING
Faster Speed: Tuning helps optimize your network's bandwidth usage, leading to faster
download and upload speeds. It's like clearing traffic jams on your network highway,
allowing data to flow more freely.
Reduced Latency: This means less lag or delay when you're playing online games, video
conferencing, or streaming. Imagine your network like a race track; tuning reduces the time
it takes for data to reach its destination, making your online activities feel more responsive.
Improved Reliability: Tuning helps prevent network disruptions and errors, ensuring a
stable and reliable connection. It's like making sure your network is well-maintained,
preventing unexpected breakdowns.
Enhanced Security: Tuning can strengthen your network's security by identifying and
addressing vulnerabilities. It's like adding extra locks to your network door, making it harder
for hackers to gain access.
Better Resource Utilization: Tuning helps optimize the use of your network resources,
ensuring that they are not wasted. It's like making sure you're using all the space in your
backpack efficiently.
Advantages and Disadvantages of Tuning
ADVANTAGES
 Improved Performance: Tuning can significantly enhance your network's performance,
leading to a better overall user experience.
 Cost Savings: By optimizing resource utilization and reducing network disruptions, tuning
can help save money on bandwidth costs and maintenance
 Increased Security: Tuning can strengthen your network's security, protecting your data
and devices from unauthorized access.
DISADVANTAGES
 Complexity: Tuning can be a complex process that requires technical expertise and
knowledge. [15]
 Time-Consuming: Tuning can take time and effort, especially if you're dealing with a
large and complex network.
 Potential for Errors: If not done correctly, tuning can actually worsen your network's
performance or create new problems.
KEY FEATURE OF TUNING
 Bandwidth Management: This involves controlling how much bandwidth is
allocated to different applications and users. It's like having a traffic light system for
your network, ensuring that data flows smoothly and efficiently.
 Quality of Service (QoS): This prioritizes certain types of traffic, such as video
conferencing or online gaming, over others, ensuring that they receive the
bandwidth they need. It's like having an express lane for important data.
 Network Monitoring: This involves keeping track of your network's performance
using tools that collect and analyze data. It's like having a dashboard that shows
you how your network is performing.
 Packet Shaping: This involves adjusting the size and timing of data packets to
optimize network performance. It's like making sure that your luggage is packed
efficiently for your network journey.
 Security Configuration: This involves setting up firewalls, intrusion detection
systems, and other security measures to protect your network from threats. It's like
having a security guard for your network.
WHAT IS TROUBLESHOOTING?

Troubleshooting is an essential skill for anyone who works with
computers and the internet. It's the process of identifying and
fixing problems with your network, whether it's a home network,
a small office network, or a large enterprise network.
 Troubleshooting is a repetitive, rigorous, and effective process
that involves regular analysis and testing of individual network
components to ensure smooth operations.
 Troubleshooting is a way to maintain your computer network,
ensuring optimal performance, and addressing issues that may
disrupt connectivity.
Benefits of troubleshooting
 Efficient Problem Solving: Troubleshooting provides a structured framework to identify and
address problems promptly and effectively. By employing logical and systematic methods,
individuals can efficiently resolve issues, minimize downtime, and optimize system
performance.
 Cost Savings: Effective troubleshooting can lead to significant cost savings. By swiftly
identifying and resolving technical problems, organizations can avoid the need for expensive
repairs or the purchase of new systems or software. Additionally, by preventing prolonged
system downtimes, troubleshooting ensures that employees can continuously carry out their
tasks, maximizing productivity.
 Enhanced User Experience: Troubleshooting plays a crucial role in enhancing the user
experience by swiftly resolving technical glitches and minimizing disruptions. This leads to
increased user satisfaction, improved productivity, and overall customer loyalty.
 Knowledge Enhancement: Troubleshooting allows users to understand their devices better
and gain technical knowledge. This promotes self-learning and improves technical skills.
 Preventive Measures: By identifying and fixing the root cause of a problem, troubleshooting
can prevent future issues and enhance device longevity.
Advantages and Disadvantage of Troubleshooting
Advantages of Troubleshooting
 Increased Efficiency: Troubleshooting helps streamline problem-solving, saving time and resources.
 Reduced Downtime: By quickly identifying and resolving issues, troubleshooting minimizes downtime
and ensures continuous operation.
 Improved System Stability: Troubleshooting promotes the overall stability and reliability of systems by
addressing potential issues before they escalate.
 Enhanced Communication: Troubleshooting often involves collaboration and communication, leading
to better understanding and problem-solving within teams.
Disadvantages of Troubleshooting
 Time-Consuming: Troubleshooting can be time-consuming, especially for complex problems.
 Requires Expertise: Effective troubleshooting often requires specific knowledge and skills related to the
system or device in question.
 Potential for Error: Human error can occur during the troubleshooting process, leading to incorrect
diagnoses or solutions.
 Limited Resources: Troubleshooting may be hindered by limited access to resources, such as
documentation, tools, or expertise.
Common cause of troubleshooting problems
 High bandwidth usage: Higher bandwidth helps transfer data between devices over the
internet faster. Downloading large files, shared folders, and video content creates
congestion in the network due to high bandwidth usage. This leads to network slowdown
issues.
 Faulty hardware: One of the most common network performance issues is the
malfunctioning of routers, switches, cables, and more. All devices on the network must be
configured correctly and tested regularly to ensure the smooth functioning of the network.
 High CPU utilization: CPU usage increases drastically when a larger number of network
packets are received and sent throughout the network. A huge amount of traffic also
overloads the network and requires high CPU utilization to execute the requests.
 Poor physical connectivity: It’s crucial to test all cables, since defective cables can
generate errors as they’re linked directly to the interface of the network equipment. Cable
damage can also lead to packet loss and the reduction of the amount of data flowing.

You might also like