Skip to main content

CCNA Recap: Routing Protocols (Distance Vector + Link State)

Distance Vector  & Link State
Interior and Exterior Gateway Protocols

——— Distance Vector ——————
           how far        which way
* good for small
* little configuration
- RIPv2 [IGP]
        - hop count, max 15
     




- EIGRP [IGP]
- neighbor adjacencies
- runs multiple protocols
- (Cisco proprietary
- ietf standard
* summary route distance 5
* internal distance 90
* external 170
        - bandwidth
                - lowest
        - Delay
            - adds those together through all the links it has to traverse
    - bandwidth + delay = feasible distance
    - unicast+multicast - 224.0.0.10
    - only those who need it

I only know what someone else told me.

hello - unreliable, multi
update -reliable uni/multi
ack - un uni
query -reliable uni/multi
reply - reliable un

— Link State ——————
AD = Administrative Distance.
 Are you up or are you down.
- up = get there
- down = no
Not hops but bandwidth cost
* scalable
* consider the speed

[These are also Interior Gateway Protocols]
* OSPF (AD = 110)
        * Enterprise
* IS-IS (AD - 115)
* provider networks
    * FP
    * OTV
        * = cisco proprietary

When adjacencies happen, a router will advertise its entire database, and each router has to have it’s own copy and they have to synchronize.

Not really advertising routes, enabling procol on those interfaces and allow the HELLOs out of them.

Shortest Path First algorithm

You’re not trying to reach the prefix

——LS———
Phase 1: Reliable flooding
 - each node knows the cost to neighbors
- each node knows the entire network topology

Phase 2: Route Calculation
- Dijkstra’s algorithm

========== =========== =========
AS - autonomous system (RFC 1930)
* independent entity, under your control

Unique AS # given by IANA
* who manage IP blocks and root servers

- BGP
    - Most popular!
    - De Facto standard!
    - Routes between one AS to another AS

ISPs have different AS numbers.
Routers know where the different numbers are (BGP, border gateway protocol)

Comments

Popular posts from this blog

What Do You Need? [AKA; List of Offered Services / My Next Role] (2020)

I am a trusted outsourced remote consultant for your company.   I enjoy having the flexibility to take on temporary projects from time to time! I start at part-time, temp work for now. If we like each other, we can renegotiate. If anything sounds weird, out there, or unusual - Feel free to e-mail me .  3 Services Offered Writing :      You want to pay me to write more of *waves hand* this blog? I am game .     I write B2C e-mails going out to over 280 people weekly. [ Example Job Description ]        Auditing :        Something doesn't work on your page. I can find it, or you can lose business. [ Here ] [ Example Job Description ]   Technical: Still as-needed, always remote, contract, or temporary. IT Operations Tech [ Example Job Description ]     Hardware and SaaS support.     Cisco routing and switching (Networking). CCNA, A+, Sec+, Azure certified WORKING ON: Junos Networking Cloud Technician     Azure [ See tag ]  Support [Web: Example Job Description ] [Text : Example

Portfolio of UX/Product Feedback [Vol. 1]

Have You Looked at Your Webpage From the Customer's View Lately? You have probably been linked here from a form or my resume. If you have any questions about what I'm looking for in a role, click here .   This post is not to shame, but to point out errors and hopefully make my talent for finding and documenting such mistakes clear to someone hiring. Contents: Instances where I offer constructive feedback on someone's website, logo, or app. Actions that were taken by the developers or artists.  I'm glad you want your webpages to be the best they can be with my help; If you need your sites audited, e-mail me . Latest Update -  November 20th, 2020.   Vol. 2 is here .

Wireless Diagnostics on Mac OS; Packet Sniffing on a WLAN

There's a post sitting in my drafts about Wireshark and how to sniff packets out of the air that was going to be about sniffing for authentication packets for Wi-Fi hotspots that aren't broadcasting SSID (Which you shouldn't do apparently! It's still not safe). I was watching this video to find a little more information about how to properly use Monitoring mode on my Macbook to sniff for WLAN packets on the network. So when he said "Just open up Wireless Diagnostics and sniff your network (check your width and channel)." It was shocking to me.