Cisco CCNA CCNP CCIE all you need to study cyber security

nguyenhuulamtung 1 views 28 slides Sep 01, 2025
Slide 1
Slide 1 of 28
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28

About This Presentation

ALL you need to study CCNA


Slide Content

© 2002, Cisco Systems, Inc. All rights reserved.

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-2© 2002, Cisco Systems, Inc. All rights reserved. 2
Distance Vector Routing

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-3
Objectives
Upon completing this lesson, you will be
able to:
•Describe the features offered by distance vector
routing protocols and give examples of each
•Describe the issues associated with distance
vector routing and identify solutions to those
issues

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-4
•Routers pass periodic copies of routing table to neighbor
routers and accumulate distance vectors.
Distance Vector Routing Protocols

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-5
•Routers discover the best path to
destinations from each neighbor.
Sources of Information and
Discovering Routes

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-6
Selecting the
Best Route with Metrics

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-7
•Updates proceed step-by-step
from router to router.
Maintaining Routing Information

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-8
•Each node maintains the distance from itself to each possible destination network.
Inconsistent Routing Entries

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-9
•Slow convergence produces inconsistent routing.
Inconsistent Routing Entries (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-10
•Router C concludes that the best path to network
10.4.0.0 is through router B.
Inconsistent Routing Entries (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-11
•Router A updates its table to reflect the new but
erroneous hop count.
Inconsistent Routing Entries (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-12
•Hop count for network 10.4.0.0 counts to infinity.
Count to Infinity

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-13
•Define a limit on the number of hops to prevent infinite loops.
Defining a Maximum

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-14
•Packets for network 10.4.0.0 bounce (loop) between
routers B and C.
Routing Loops

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-15
•It is never useful to send information about a route back in the direction from which the
original information came.
Split Horizon

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-16
•Routers advertise the distance of routes that have gone down to infinity.
Route Poisoning

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-17
•Poison reverse overrides split horizon.
Poison Reverse

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-18
•The router keeps an entry for the network’s possible down
state, allowing time for other routers to recompute for this
topology change.
Holddown Timers

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-19
•The router sends updates when a change in its routing table occurs.
Triggered Updates

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-20
Distance Vector Operation

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-21
Distance Vector Operation (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-22
Distance Vector Operation (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-23
Distance Vector Operation (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-24
Distance Vector Operation (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-25
Distance Vector Operation (Cont.)

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-26
Summary
•Distance vector-based routing algorithms
(also known as Bellman-Ford algorithms) pass periodic
copies of a routing table from router to router.
•When the topology in a distance vector protocol
internetwork changes, routing table updates must
occur. As with the network discovery process,
topology change updates proceed step-by-step from
router to router.
•When maintaining the routing information,
inconsistencies can occur if the internetwork’s slow
convergence on a new configuration causes incorrect
routing entries.

© 2002, Cisco Systems, Inc. All rights reserved. ICND v2.0—5-27
Summary (Cont.)
•The condition called count to infinity arises when
routing table updates continue to increase the metric
to a destination that cannot be reached, rather than
marking the destination as unreachable.
•A routing loop occurs when two or more routers have
incorrect routing information indicating that a valid
path to an unreachable destination exists through the
other routers.
•A number of techniques are available to eliminate
routing loops including: split horizon, route poisoning,
poison reverse, holddown timers, and triggered
updates.
Tags