24
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential BSCI 2 - 1 1 Configuring EIGRP BSCI Module 2-1 – Introduction to EIGRP

BSCI Module 2-Lesson 1-Edited

  • Upload
    kbtong

  • View
    28

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 1

Configuring EIGRP

BSCI Module 2-1 – Introduction to EIGRP

Page 2: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 2

Objectives This module will cover topics which allow students to

meet the following objectives:Describe the key capabilities that distinguish EIGRP from other routing protocols

Identify the four key technologies employed by EIGRP

Describe how EIGRP operates

Describe the five components of the metric used by EIGRP

Calculate the EIGRP metric for a range of pathways between routers

Explain how IGRP routes are integrated into EIGRP routes and vice-versa

Page 3: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 3

Purpose of this Lesson

Coverage of topics new to the “EIGRP” module of BSCI.

What’s new in this module?EIGRP metric calculations for pathway ranges between routers.

Page 4: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 4

EIGRP Features

There are several key differences with EIGRP from other routing protocols which are explored in this module.

Page 5: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 5

EIGRP Key Technologies

Neighbor discover/recovery

Reliable Transport Protocol (RTP)

DUAL finite-state machine

Protocol-dependent modules (PDMs)

Page 6: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 6

The Diffusing Update Algorithm (DUAL)

How does EIGRP determine which routes are loop-free?

B with a cost of 10

Each of A’s neighbors is reporting reachability to E:

C with a cost of 10D with a cost of 30

These three costs are called the reported distance (RD); the distance each neighbor is reporting to a given destination

Page 7: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 7

The Diffusing Update Algorithm (DUAL)

At A, the total cost to reach E is:

The best of these three paths is the path through B, with a cost of 20

20 through B

25 through C

45 through D

This is the feasible distance (FD)

Page 8: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 8

The Diffusing Update Algorithm (DUAL)

A uses the FD and the RD to determine which paths are loop-free

The best path (FD) is used as a benchmark; all paths with RDs lower than the FD cannot contain loops

The algorithm may mark some loop-free paths as loops

However, it is guaranteed never to mark a looped path as loop-free

Page 9: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 9

The Diffusing Update Algorithm (DUAL)

At A:

The path through B is the best path (FD), at 20

C can reach E with a cost of 10; 10 (RD) is less than 20 (FD), so this path is loop-free.

D can reach E with a cost of 30; 30 (RD) is not less than 20 (FD), so EIGRP assumes this path is a loop.

Page 10: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 10

EIGRP Topology Table

Page 11: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 11

RTRA#show ip eigrp neighborsIP-EIGRP neighbors for process 1H Address Interface Hold Uptime SRTT RTO Q Seq (sec) (ms) Cnt Num2 10.1.1.1 Et0 12 6d16h 20 200 0 2331 10.1.4.3 Et1 13 2w2d 87 522 0 4520 10.1.4.2 Et1 10 2w2d 85 510 0 3

Seconds Remaining Before Declaring Neighbor Down

How Long Since the Last Time Neighbor Was Discovered

How Long It Takes for This Neighbor To Respond To Reliable Packets

How Long to Wait Before Retransmitting If No Acknowledgement

EIGRP Neighbor Status

Page 12: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 12

EIGRP IP Routing Table

Page 13: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 13

Example: EIGRP TablesRouter C’s tables:

Page 14: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 14

EIGRP Packets

Hello: Establish neighbor relationships.

Update: Send routing updates

Query: Ask neighbors about routing information

Reply: Respond to query about routing information

ACK: Acknowledge a reliable packet

Page 15: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 15

Initial Route Discovery

Page 16: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 16

EIGRP Metric Same metric components as IGRP:

Bandwidth

Delay

Reliability

Loading

MTU

EIGRP metric is IGRP metric multiplied by 256

Page 17: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 17

EIGRP Metric Calculation By default, EIGRP metric:

Metric = bandwidth (slowest link) + delay (sum of delays)

Delay = sum of the delays in the path, in tens of microseconds, multiplied by 256.

Bandwidth = [10 / (minimum bandwidth link along the path, in kilobits per second)] * 256

Formula with default K values (K1 = 1, K2 = 0, K3 = 1, K4 = 0, K5 = 0):

Metric = [K1 * BW + ((K2 * BW) / (256 – load)) + K3 * delay]

If K5 not equal to 0:Metric = Metric * [K5 / (reliability + K4)]

Page 18: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 18

EIGRP Metrics Calculation Example

A B C D Least bandwidth 64 kbps Total delay 6,000

A X Y Z D Least bandwidth 256 kbps Total delay 8,000 Delay is the sum of all the delays of the links along the paths:

Delay = [delay in tens of microseconds] x 256

BW is the lowest bandwidth of the links along the paths:BW = [10,000,000 / (bandwidth in kbps)] x 256

Page 19: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 19

EIGRP Metrics Are Backward-Compatible with IGRP

Page 20: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 20

Summary EIGRP capabilities include fast convergence and support for VLSM, partial

updates, and multiple network layer protocols.

EIGRP key technologies are: neighbor discovery/recovery, RTP, DUAL finite-state machine, and protocol-dependent modules.

EIGRP uses three tables: neighbor table, topology table, and routing table. The routing table contains the best route to each destination, called the successor route. A feasible successor route is a backup route to a destination; it is kept in the topology table.

EIGRP uses the same metric components as IGRP: delay, bandwidth, reliability, load, and MTU.

By default, EIGRP metric = bandwidth (slowest link) + delay (sum of delays). 

EIGRP metrics are backward-compatible with IGRP; the EIGRP-equivalent metric is the IGRP metric multiplied by 256.

Page 21: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 21

Self Check

What is a reported distance?

What is a feasible distance?

EIGRP uses three tables: name the three tables: __________, ____________, _____________. Which of the tables contains the best route or successor route to each destination?

EIGRP uses what metrics? __________, _________, _________, __________, ___________

Page 22: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 22

Resources

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a008009405c.shtml

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080093f07.shtml

Page 23: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 23

Q and A

Page 24: BSCI Module 2-Lesson 1-Edited

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialBSCI 2 - 1 24