CloudTadaInsights

Routing Protocols: Connecting Networks Across the Internet

Routing Protocols: Connecting Networks Across the Internet

Routing protocols are the backbone of internetworking, determining the best paths for data to travel across networks. Understanding routing protocols is essential for network design, optimization, and troubleshooting in complex network environments.

Introduction to Routing

What is Routing?

Routing is the process of selecting paths in a network along which to send network traffic. Routers use routing protocols to exchange information about network topology and determine the best paths for forwarding packets.

Types of Routing

Static Routing

  • Manual Configuration: Administrator manually configures routes
  • Low Overhead: No protocol overhead
  • Security: Predictable and secure
  • Maintenance: Requires manual updates

Dynamic Routing

  • Automatic Updates: Protocols automatically update routing tables
  • Adaptive: Responds to network changes
  • Overhead: Protocol traffic overhead
  • Complexity: More complex to configure and troubleshoot

Routing Protocol Categories

Interior Gateway Protocols (IGPs)

IGPs route within an autonomous system (AS):

Distance Vector Protocols

  • RIP (Routing Information Protocol): Hop count metric
  • EIGRP (Enhanced Interior Gateway Protocol): Composite metric
  • Characteristics: Periodic updates, slow convergence
  • OSPF (Open Shortest Path First): SPF algorithm
  • IS-IS (Intermediate System to Intermediate System): ISO standard
  • Characteristics: Event-driven updates, fast convergence

Path Vector Protocols

  • BGP (Border Gateway Protocol): Primary exterior gateway protocol
  • Characteristics: Loop-free, policy-based routing

Exterior Gateway Protocols (EGPs)

EGPs route between autonomous systems:

  • BGP: Current standard for inter-AS routing
  • Characteristics: Policy-based, path selection

Distance Vector Protocols

RIP (Routing Information Protocol)

RIP is one of the oldest routing protocols, using hop count as its metric.

Versions

  • RIPv1: Classful, no VLSM support
  • RIPv2: Classless, supports VLSM and authentication
  • RIPng: IPv6 version

Characteristics

  • Metric: Hop count (maximum 15 hops)
  • Algorithm: Bellman-Ford
  • Update Interval: Every 30 seconds
  • Convergence: Slow
  • Scalability: Small networks only

Configuration Example

TEXT
router rip
version 2
network 192.168.1.0
network 192.168.2.0
no auto-summary

EIGRP (Enhanced Interior Gateway Protocol)

EIGRP is Cisco's advanced distance vector protocol with link-state features.

Features

  • Metric: Composite (bandwidth, delay, reliability, load, MTU)
  • Algorithm: DUAL (Diffusing Update Algorithm)
  • Update Type: Triggered updates only
  • Convergence: Fast
  • Scalability: Medium to large networks

Composite Metric Formula

TEXT
Metric = [(K1 * BW + K2 * BW/(256-load) + K3 * delay) * K5/(reliability + K4)]

Default: K1=1, K3=1, K2=K4=K5=0 Simplified: Metric = Bandwidth + Delay

Configuration Example

TEXT
router eigrp 100
network 192.168.1.0 0.0.0.255
network 192.168.2.0 0.0.0.255
metric weights 0 1 1 1 1 1

OSPF (Open Shortest Path First)

OSPF is a link-state protocol that uses Dijkstra's shortest path first algorithm.

Features

  • Metric: Cost (based on bandwidth)
  • Algorithm: SPF (Shortest Path First)
  • Update Type: Link-state advertisements (LSAs)
  • Convergence: Fast
  • Areas: Hierarchical design support

OSPF Areas

  • Area 0: Backbone area
  • Standard Areas: Regular OSPF areas
  • Stub Areas: Reduced LSA flooding
  • NSSA: Not-So-Stubby Areas

Cost Calculation

TEXT
Cost = Reference Bandwidth / Interface Bandwidth
Default Reference Bandwidth = 100 Mbps

Configuration Example

TEXT
router ospf 1
router-id 1.1.1.1
network 192.168.1.0 0.0.0.255 area 0
network 192.168.2.0 0.0.0.255 area 1
area 1 stub

IS-IS (Intermediate System to Intermediate System)

IS-IS is an ISO standard link-state protocol similar to OSPF.

Features

  • Levels: Level 1 (intra-area) and Level 2 (inter-area)
  • Metric: Similar to OSPF cost
  • Algorithm: SPF
  • Design: Inspired OSPF development

Exterior Gateway Protocol: BGP

Border Gateway Protocol

BGP is the de facto standard for inter-AS routing on the internet.

Features

  • Protocol Type: Path vector
  • Algorithm: Policy-based path selection
  • Update Type: Incremental updates
  • Convergence: Slow but stable
  • Scalability: Internet-scale

BGP Attributes

Well-Known Mandatory
  • Origin: Where route originated
  • AS_Path: AS path to destination
  • Next_Hop: Next hop address
Well-Known Discretionary
  • Local_Pref: Preference within AS
  • Atomic_Aggregate: Aggregation indicator
Optional Transitive
  • Aggregator: Entity that aggregated route
  • Community: Route tagging for policy
Optional Non-Transitive
  • MED: Multi-Exit Discriminator
  • Originator_ID: Route originator

BGP Path Selection Process

  1. Highest weight (Cisco proprietary)
  2. Highest local preference
  3. Locally originated routes
  4. Shortest AS path
  5. Lowest origin type (IGP < EGP < Incomplete)
  6. Lowest MED
  7. EBGP over IBGP
  8. Lowest IGP cost to next hop
  9. Oldest eBGP path
  10. Lowest router ID
  11. Lowest neighbor address

Configuration Example

TEXT
router bgp 65001
neighbor 10.0.0.2 remote-as 65002
neighbor 10.0.0.2 update-source Loopback0
network 192.168.1.0 mask 255.255.255.0

Routing Information Exchange

Neighbor Discovery

Hello Protocol

  • OSPF: Hello packets to discover neighbors
  • EIGRP: Hello packets with reliable transport
  • BGP: TCP connection establishment

Adjacency Formation

  • 2-way: Bidirectional communication established
  • Full: LSDB synchronized (OSPF)
  • Established: BGP session up

Route Advertisement

Distance Vector

  • Periodic Updates: Regular routing table broadcasts
  • Split Horizon: Prevents route advertisement back to source
  • Poison Reverse: Marks routes as unreachable
  • Flooding: LSAs flooded throughout area
  • Database Synchronization: LSDB synchronization
  • SPF Calculation: Individual SPF calculation per router

Routing Tables and Forwarding

Routing Table Structure

Components

  • Destination Network: Target network
  • Next Hop: Next router in path
  • Outgoing Interface: Interface to forward packet
  • Metric: Route preference value
  • Administrative Distance: Protocol preference

Administrative Distance

Measures protocol trustworthiness:

ProtocolAD
Connected Interface0
Static Route1
EBGP20
Internal EIGRP90
OSPF110
IS-IS115
EBGP170
Unknown Route255

Route Selection Process

  1. Longest prefix match
  2. Administrative distance
  3. Metric comparison

Advanced Routing Concepts

Equal Cost Multi-Path (ECMP)

Distributes traffic across multiple equal-cost paths:

  • Benefits: Load balancing, redundancy
  • Implementation: Router-level or switch-level
  • Algorithms: Hash-based path selection

Policy-Based Routing (PBR)

Forwards packets based on policies rather than destination:

  • Use Cases: Traffic engineering, security policies
  • Configuration: Match criteria and action
  • Flexibility: More control than traditional routing

Route Redistribution

Sharing routes between different routing protocols:

  • Challenges: Routing loops, suboptimal paths
  • Tools: Route maps, distribution lists
  • Considerations: Administrative distance, metrics

Troubleshooting Routing Issues

Common Problems

  • Routing Loops: Packets circling indefinitely
  • Suboptimal Paths: Traffic taking inefficient routes
  • Convergence Issues: Slow network adaptation
  • Black Holes: Packets disappearing without trace

Diagnostic Commands

  • show ip route: Display routing table
  • show ip protocols: Display protocol status
  • debug ip routing: Monitor route updates
  • traceroute: Trace packet path

Troubleshooting Methodology

  1. Verify Connectivity: Basic ping tests
  2. Check Routing Tables: Verify routes exist
  3. Validate Configuration: Check protocol settings
  4. Monitor Updates: Observe route advertisements
  5. Analyze Metrics: Compare route preferences

Security Considerations

Routing Protocol Security

Authentication

  • Plain Text: Basic password authentication
  • MD5: Hash-based authentication
  • Keyed SHA: Stronger hashing

Route Filtering

  • Prefix Lists: Filter specific networks
  • Access Lists: Basic permit/deny filtering
  • Route Maps: Complex policy-based filtering

Common Attacks

  • Route Injection: Unauthorized route advertisements
  • Route Modification: Altering route attributes
  • Route Suppression: Withholding route advertisements
  • Denial of Service: Overwhelming routing tables

Modern Routing Technologies

Segment Routing

Source-based routing that simplifies network operations:

  • Concept: Source specifies path through network
  • Benefits: Scalability, traffic engineering
  • Implementation: MPLS or IPv6 data plane

Software-Defined Networking (SDN)

Centralized routing control:

  • Controller: Centralized routing decisions
  • Southbound API: Controller to device communication
  • Northbound API: Application to controller communication

Intent-Based Networking

High-level network intent specification:

  • Abstraction: High-level network goals
  • Translation: Intent to device configurations
  • Assurance: Continuous verification of intent

Best Practices

Protocol Selection

  • Network Size: Match protocol to network scale
  • Convergence Requirements: Consider speed needs
  • Administrative Complexity: Evaluate skill requirements
  • Budget Constraints: Factor in licensing costs

Design Principles

  • Redundancy: Multiple paths for reliability
  • Scalability: Plan for growth
  • Security: Implement authentication and filtering
  • Documentation: Maintain current network documentation

Operational Practices

  • Monitoring: Continuous route monitoring
  • Backup: Regular configuration backups
  • Testing: Regular failover testing
  • Documentation: Maintain network diagrams

Future of Routing

IPv6 Routing

  • RIPng: IPv6 version of RIP
  • OSPFv3: IPv6 version of OSPF
  • BGP4+: BGP with IPv6 NLRI

Emerging Technologies

  • IPv6 Segment Routing: Source routing for IPv6
  • SRv6: Segment routing over IPv6
  • Intent-Based Networking: Automated routing policies

Conclusion

Routing protocols form the backbone of internetworking, enabling global connectivity through intelligent path selection. Understanding the differences between distance vector, link-state, and path vector protocols, along with their appropriate use cases, is crucial for effective network design and operation.

The choice of routing protocol depends on network size, complexity, convergence requirements, and administrative expertise. Modern networks increasingly rely on sophisticated routing technologies that combine traditional protocols with software-defined approaches to achieve greater agility and efficiency.

In the next article of this series, we'll explore the Transport Layer protocols—TCP and UDP—and their roles in providing reliable and efficient data delivery across networks.

Share this article

You might also like

Browse all articles