Wireless Home Networking


Fix Connectivity Issues

It sounds crazy, but 95 percent of all Internet connectivity problems can be solved by power-cycling both the router and the modem. Turn them both off, and then turn the modem back on first. Once its "sync" or signal light comes on, turn on your router.

Use Encryption

You've probably heard this before, but it bears repeating: Always enable your router's wireless security! Wired Equivalent Privacy (WEP) encryption is the oldest (and weakest) form of security; the newer (and stronger) Wi-Fi Protected Access (WPA) and WPA-2 are the best protection available today for home users.

Update Your Router's Firmware

All routers include internal read-only chips with embedded instructions that can be updated by the manufacturer. Router manufacturers generally update a product's firmware to increase performance as well as to resolve bugs and security issues, so it's wise to keep your router's firmware up-to-date. Check the manufacturer's Web site for the latest updates.

Boost Your Wireless Signal

If walls and distance are causing wireless signal degradation, you can do a few things to boost it. Move your router to higher ground—the signal radiates downward. You can also try a signal extender (or repeater), which boosts the signal. Finally, high-gain antennas will work, but they only focus the signal in one direction.

Change Admin Password

Every router has a well-known default password that's used to access the router's browser-based configuration page. Most setup wizards will make you change this password, but not all do. If not, be sure to change it yourself to prevent unwanted hangers-on from changing your network's settings.

Go Back to Factory Settings

If you've lost or forgotten your router's login credentials, you can get around this predicament by resetting the router to its factory settings. Do this by holding down the button on the back of it for 30 seconds. Next, look in the manual for the default user name and password, and then change them on your router's browser-based configuration page.

Disable SSID Broadcast

Unless you disable it, your router broadcasts its service set identifier (SSID)—the name of your network—which allows your neighbors to see (and attempt to gain access to) your network. Instead, disable broadcasting, making the network appear as "SSID not broadcast." Access the unnamed network by typing in the SSID name when prompted.

Change the Default SSID

Change your pre-defined, default SSID—leaving it as "Linksys," for example, tells the world that you haven't configured your router, which invites attackers.

Filter by MAC Address

Every piece of networking gear includes a unique "fingerprint" called a media access control, or MAC, address. You can configure your router to filter connections using these addresses so that only your computers can connect to your network. Most routers will show you connected devices, so adding an adapter's MAC address is a one-click process.

Step Up to 5GHz

The majority of today's networks operate in the crowded 2.4GHz frequency range, which is shared by microwaves, cordless phones, and other home networks. To avoid possible interference, many new routers are capable of broadcasting at 5GHz, which has 23 wide-open channels as opposed to 2.4GHz's three non-overlapping channels.

Limit Your Number of DHCP Clients

Most people use their router as a DHCP server; when clients connect, the router dynamically assigns IP addresses from a large pool of addresses. Limiting that list to the number of clients in your home, however, will help prevent interlopers from hopping onto your network.

Use Your Router's Firewall

Two features make most hardware firewalls more powerful than software firewalls: stateful packet inspection (SPI) and network address translation (NAT). SPI examines packets' content and behavior before granting access, and NAT hides all PCs connected to the router from the Internet, "translating" their IP addresses into private ones that are unreachable from outside the firewall.

Change Your Channel

Wireless B and G (and some N) routers operate at the 2.4GHz frequency, which only has three non-overlapping channels: 1, 6 and 11. By default, your router will most likely be using one of these channels, and the bad news is so your neighbors' routers as well. If you experience dropped connections, sluggish performance or both, a good first step is to switch the channel. If it's set to channel 1, go to 11. If it's set to 6, try either 1 or 11 for best results.

Let Windows Control Your Wireless Networks

If a network adapter's software takes control of your wireless network, it can be difficult to put Windows back in charge. First, click Start, then Run, then type services.msc. Scroll down to Wireless Zero Configuration and start the service. Right-click your wireless connection, select view available networks, and then click advanced settings on the left. Click the wireless networks tab, and check "Use Windows to Configure my wireless network settings."

Disable File Sharing in Public

If you're in a public place with a Net connection, it's a good idea to disable File and Printer Sharing for Microsoft Networks. In the properties of your network adapter, uncheck the appropriate box. It's also a good idea to switch your notebook's wireless radio off if you aren't using it.

Mac OS X 10.5 Leopard.


View Files in the Trash

With Leopard's Quick Look, you no longer have to drag items from the trash in order to view them. While in the trash folder, hit Command+Y while on any file to see a preview of its contents.

Change a Folder Icon

Want to change an icon to something more to your liking? First, find the icon you want. Then click on it, and hit Command+C to copy it. Click on the icon you want to change, and use Command+I to launch the folder info. Click on the old icon in the folder and use Command+V to paste the new icon.

Open New Tabs with the Address Bar in Safari

If you want to open an address in a new tab without deselecting your current tab, type the address into the address bar, then press Command+Enter. This allows you to work easily in multiple tabs.

Preview a Font

If you want to see what a font looks like, you don't have to open Font Book or a font manager. In Cover Flow, a font icon will appear as a small, two-letter sample of the font you have selected. To see a larger sample of the font, select a font file and use Quick Look (Command+Y) to see it, or just hit the spacebar.

Change Your Stack View

You can choose to view your stack in either a fan or a grid view. To change it, click on a stack until a menu appears. Then, select "View As" and choose either Fan or Grid. The stack will then open with your preferred style.

Speedup your Windows XP.


Control Inactive System Tray Icons

You don't have to hide or show all the icons in your system tray—you can control their disappearing acts. Right-click on the taskbar and select Properties. Click on the checkbox next to "Hide inactive icons" (if it's not checked by default), then click on the Customize button. For each item on this list, you can choose "Hide when inactive," "Always hide," or "Always show" options to decide what you'll see and when.

Fit More Icons on Your Desktop

If your screen is so cluttered with Word documents and program shortcuts that you can't see the rolling meadows of your wallpaper, you don't need to move piles of stuff to the Recycling Bin. Just change the amount of space between icons. Right-click on the desktop, select Properties, then click on the Appearance tab, and click the Advanced button. In the "Item" drop-down, scroll down to Icon Spacing (Horizontal) and Icon Spacing (Vertical); changing the value in the "Size" field will move icons closer together (while increasing the number will move them farther apart). When you're done, click OK. To make your existing icons follow these rules, right-click on the desktop, select "Arrange Icons By" and then click Align to Grid, then go back to the same menu and click "Auto Arrange."

Shut Down from Your Desktop

If you're trying to eliminate every extraneous mouse click, you can shut down your computer with an icon on the desktop. Right-click on your desktop, click "New," and then click "Shortcut." In the "Type the location of the item" field, type "shutdown -s -t 00" to give you a way to shut down the computer immediately. (Change the -s to -r to create a reboot shortcut instead.)

Change What Programs Start When Windows Does

You can prevent a lot of apps forcing Windows into chilled-molasses boot times—without uninstalling anything. Click Start, then "Run...," and type msconfig. This brings up the System Configuration Utility window. Click on the Startup tab to see a list of all the apps slated to start when you boot up Windows. Click the check mark next to any you don't want, and then click OK to save your choices.

Type With an Onscreen Keyboard

Whether you have trouble with your hands or you just prefer using the mouse, typing with Windows' onscreen keyboard can be a great convenience. Navigate to Start > All Programs > Accessories > Accessibility, and click "On-Screen Keyboard." Click OK to clear the dialogue box and then start "typing"—you can even change the settings to "press" keys just by hovering your mouse over the letter you want (enable this feature by selecting "Typing Mode" from the Settings menu).

No-wait Screen Savers

Don't want to wait for your screen saver to kick in? Create a shortcut to it just as you would for any other program by hitting Windows key + F to search your computer and click on "All files and folders." Type "*.scr" in the "All or part of the file name" field to find every screen saver file on your computer. In the resulting list, right-click and drag the screen saver you want to your desktop. Whenever you want it to start, just double-click its icon.

5 Best Free Antivirus and Anti-Spyware Software for Windows.


1. Microsoft Security Essentials
It can be installed in Windows XP, Vista and Windows 7. Windows 8 already comes with MSE preinstalled. You can install it in both 32-bit and 64-bit operating systems.
2. Avast! Free Antivirus
Avast! Free Antivirus It can be installed in Windows 2000 professional SP4, Windows XP SP2 or higher, Windows Vista, Windows 7 and Windows 8. Both 32-bit and 64-bit editions are supported.
3. AVG Antivirus Free Edition
AVG antivirus is almost equivalent to avast! antivirus. It also comes with antivirus, anti-spyware, link scanner and many other security features. It can be installed in Windows XP, Vista and Windows 7.
4. Avira Free Antivirus
Avira antivirus can be installed in Windows XP, Vista and Windows 7. It supports both 32-bit and 64-bit Windows editions.
5. Panda Cloud Free Antivirus
It can be used in Windows XP, Vista, Windows 7 and Windows 8. As usual both 32-bit and 64-bit editions are supported. “Panda free antivirus” which is a very light-weight antivirus software for Windows.

Top 5 Best Free Firewall Software for Windows.


1. Zone Alarm Free Firewall

There has been a new offer added to FreebieJeebies and it is called ZoneAlarm. ZoneAlarm is an AnitivirusSoftware that has a Firewall, and protects you from hackers, viruses, plus more. They have a version that adds extra protection for FaceBook.
Its absolutely free for private use. You can download it using following link:
2. Comodo Firewall
Comodo is another popular free firewall software for Windows. Its very lightweight program which comes with simple and easy to use interface.
Just like any other firewall.
You can download it using following link:
3. Outpost Security Suite Free
Outpost is another popular firewall company for Windows.
In past they used to release only firewall software for Windows but now they have replaced it with a complete security suite which can be downloaded absolutely free..
You can download it using following link:
4. Online Armor Free Firewall
Online Armor is another free firewall available for Windows.
It provides complete protection from inbound threats and control of data leaving your computer for the internet.
You can download it using following link:
5. Windows Firewall
If you are using Windows 7 or Windows 8, you can use the built-in Windows firewall program. Windows XP and Vista firewall was not that great but Microsoft has greatly improved it in Windows 7 and Windows 8 OS. Windows Firewall is enabled by default and automatically monitors and blocks suspicious attacks.

How to Reset BIOS or CMOS Password?


BIOS passwords are used to add some extra security to computers. You can either set a password to prevent access to bios setting or to prevent PC from booting.
But sometimes this extra security might become a pain when you forget the BIOS password or someone changes your system BIOS password intentionally.
But there is no need to worry. There are many known ways to reset / remove / bypass the password:
  1. By removing CMOS battery
  2. By using motherboard jumper
  3. By using MS DOS command
  4. By using software
  5. By using Backdoor BIOS password

Important Safety Tips and Alternatives to Cisco’s FabricPath Switches


Entering the Nexus

If you have a data center or if you have any services running in a data center then at some point you may have considered Cisco's Nexus switching platform.  Rightly so, Cisco's Nexus platform promises and delivers huge flexibility and scalability gains within the data center.

FabricPath

To provide this next leap in data center  switching Cisco has created FabricPath.  A proprietary switching protocol that in some ways replaces spanning tree (no STP inside).  You'll still need STP for backward compatibility, but FabricPath essentially turns your network into... well... a Fabric.
Groups of switches that are connected using FabricPath are now seen as one  single switch. An internal protocol adds fabric-wide "intelligence" (cisco speak for virtualization).  This protocol provides:
  • Optimized Conectivity
  • Low Latency
  • Any to Any
  • High Bandwidth, high resiliency
  • Open Management and troublehsooting
  • FabricPath also provide additonal L3 integration
Enabling FabricPath on a switch or set of switches is easy.  Almost too easy.  Two config lines enable FabricPath on an interface.
NK(config)# interface ethernet 1/1
N7K(config-if)# switchport mode fabricpath

In our lab tests we ran into a few gotcha's that seemed a bit funky that we wanted to share with you.

Licensing:  When enabling fiber-channels on our switch, while it's not documented anywhere that we could find, only a single fiber-channel 8-port license could be installed on a given 5k-series switch.   This was convenient in a way, because it unlocked all ports on the switch; However, to be compliant a license must be purchased for every FC port that will be used….you just won’t be able to actually install subsequent licenses on the switch itself.  Weird.
FC ports: Again, while it doesn't seem to be documented anywhere “official”…there seems to exist a limitation on what ports can be configured to be in native FC mode on a Nexus 5k.
Basically, within a given module, the range of FC ports must extend to the last physical port *of that module*.  In a 5596, the first 48 ports that are included by default are all considered a single module, thus the FC ports must start from whatever port you choose and then must extend to port 48 with no ethernet ports in the middle. If you have expansion modules (the 5596 can take 3 modules), then that restriction exists within the ports of that module only. And since Cisco didn’t think it was important enough to document *HOW* to put a given nexus switch port in FC mode, here is a support forum thread which details the procedure:https://supportforums.cisco.com/message/3352978

Cisco Nexus isn't the only new "Fabric" technology in town- check out Brocade!

Brocade has their own fabric technology called Virtual Cluster Switching (VCS).  Included in the Brocade VDX line of data center switches, VCS may also change how data center networks are architected, deployed, and managed.
One advantage Brocade seems to have over Cisco is it's more graceful entry into the data center.  Starting with two small Top-of-rack switches you can then slowly grow to a larger virtualized architecture as it suits your need. (with Cisco purchasing the access layer mean also pruchasing a 5K aggregation switch which will cost you)
Brocade VDX 6720 devices support the following:
  • Classic 10Gig active-active access/aggregation.
  • Scalable fabrics that enables large scale server vitualization deployments
  • LAN/SAN convergence. Converges storage and IP data segments onto a single data center network. End to end FCoE, iSCSI, NAS storage traffic IP LAN.
  • Allows the entire switch fabric to be managed as one switch
We haven't tested the new Brocade hardware quite as much as the Cisco Nexus but so far from what we have seen, the Brocade VDX devices work as promised and look to be a serious player in the new battle for the data center switching fabric.
One thing is for sure, whether you choose Cisco Nexus, Brocade VDX or any other new fabric switching technology, switching the old school way will never be the same. Long live STP!
Are you implementing Nexus or Brocade in your environment?  If so, leave a comment and let us know your experience with it.

Understanding Network Routing Protocols


The purpose of routing protocols is to learn of available routes that exist on the enterprise network, build routing tables and make routing decisions. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. There are two primary routing protocol types although many different routing protocols defined with those two types. Link state and distance vector protocols comprise the primary types. Distance vector protocols advertise their routing table to all directly connected neighbors at regular frequent intervals using a lot of bandwidth and are slow to converge. When a route becomes unavailable, all router tables must be updated with that new information. The problem is with each router having to advertise that new information to its neighbors, it takes a long time for all routers to have a current accurate view of the network. Distance vector protocols use fixed length subnet masks which aren't scalable. Link state protocols advertise routing updates only when they occur which uses bandwidth more effectively. Routers don't advertise the routing table which makes convergence faster. The routing protocol will flood the network with link state advertisements to all neighbor routers per area in an attempt to converge the network with new route information. The incremental change is all that is advertised to all routers as a multicast LSA update. They use variable length subnet masks, which are scalable and use addressing more efficiently.
Interior Gateway Routing Protocol (IGRP)
Interior Gateway Routing Protocol is a distance vector routing protocol developed by Cisco systems for routing multiple protocols across small and medium sized Cisco networks. It is proprietary which requires that you use Cisco routers. This contrasts with IP RIP and IPX RIP, which are designed for multi-vendor networks. IGRP will route IP, IPX, Decnet and AppleTalk which makes it very versatile for clients running many different protocols. It is somewhat more scalable than RIP since it supports a hop count of 100, only advertises every 90 seconds and uses a composite of five different metrics to select a best path destination. Note that since IGRP advertises less frequently, it uses less bandwidth than RIP but converges much slower since it is 90 seconds before IGRP routers are aware of network topology changes. IGRP does recognize assignment of different autonomous systems and automatically summarizes at network class boundaries. As well there is the option to load balance traffic across equal or unequal metric cost paths.
Characteristics
· Distance Vector
· Routes IP, IPX, Decnet, Appletalk
· Routing Table Advertisements Every 90 Seconds
· Metric: Bandwidth, Delay, Reliability, Load, MTU Size
· Hop Count: 100
· Fixed Length Subnet Masks
· Summarization on Network Class Address
· Load Balancing Across 6 Equal or Unequal Cost Paths ( IOS 11.0 )
· Metric Calculation = destination path minimum BW * Delay (usec)
· Split Horizon
· Timers: Invalid Timer (270 sec), Flush Timer (630 sec), Holddown Timer (280 sec)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Enhanced Interior Gateway Routing Protocol is a hybrid routing protocol developed by Cisco systems for routing many protocols across an enterprise Cisco network. It has characteristics of both distance vector routing protocols and link state routing protocols. It is proprietary which requires that you use Cisco routers. EIGRP will route the same protocols that IGRP routes (IP, IPX, Decnet and Appletalk) and use the same composite metrics as IGRP to select a best path destination. As well there is the option to load balance traffic across equal or unequal metric cost paths. Summarization is automatic at a network class address however it can be configured to summarize at subnet boundaries as well. Redistribution between IGRP and EIGRP is automatic as well. There is support for a hop count of 255 and variable length subnet masks.
Convergence
Convergence with EIGRP is faster since it uses an algorithm called dual update algorithm or DUAL, which is run when a router detects that a particular route is unavailable. The router queries its neighbors looking for a feasible successor. That is defined as a neighbor with a least cost route to a particular destination that doesn't cause any routing loops. EIGRP will update its routing table with the new route and the associated metric. Route changes are advertised only to affected routers when changes occur. That utilizes bandwidth more efficiently than distance vector routing protocols.
Autonomous Systems
EIGRP does recognize assignment of different autonomous systems which are processes running under the same administrative routing domain. Assigning different autonomous system numbers isn't for defining a backbone such as with OSPF. With IGRP and EIGRP it is used to change route redistribution, filtering and summarization points.
Characteristics
· Advanced Distance Vector
· Routes IP, IPX, Decnet, Appletalk
· Routing Advertisements: Partial When Route Changes Occur
· Metrics: Bandwidth, Delay, Reliability, Load, MTU Size
· Hop Count: 255
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 6 Equal or Unequal Cost Paths (IOS 11.0)
· Timers: Active Time (180 sec)
· Metric Calculation = destination path minimum BW * Delay (msec) * 256
· Split Horizon
· LSA Multicast Address: 224.0.0.10
Open Shortest Path First (OSPF)
Open Shortest Path First is a true link state protocol developed as an open standard for routing IP across large multi-vendor networks. A link state protocol will send link state advertisements to all connected neighbors of the same area to communicate route information. Each OSPF enabled router, when started, will send hello packets to all directly connected OSPF routers. The hello packets contain information such as router timers, router ID and subnet mask. If the routers agree on the information they become OSPF neighbors. Once routers become neighbors they establish adjacencies by exchanging link state databases. Routers on point-to-point and point-to-multipoint links (as specified with the OSPF interface type setting) automatically establish adjacencies. Routers with OSPF interfaces configured as broadcast (Ethernet) and NBMA (Frame Relay) will use a designated router that establishes those adjacencies.
Areas
OSPF uses a hierarchy with assigned areas that connect to a core backbone of routers. Each area is defined by one or more routers that have established adjacencies. OSPF has defined backbone area 0, stub areas, not-so-stubby areas and totally stubby areas. Area 0 is built with a group of routers connected at a designated office or by WAN links across several offices. It is preferable to have all area 0 routers connected with a full mesh using an Ethernet segment at a core office. This provides for high performance and prevents partitioning of the area should a router connection fail. Area 0 is a transit area for all traffic from attached areas. Any inter-area traffic must route through area 0 first. Stub areas use a default route to forward traffic destined for an external network such as EIGRP since the area border router doesn't send or receive any external routes. Inter-area and intra-area routing is as usual. Totally stubby areas are a Cisco specification that uses a default route for inter-area and external destinations. The ABR doesn't send or receive external or inter-area LSA's. The not-so-stubby area ABR will advertise external routes with type 7 LSA. External routes aren't received at that area type. Inter-area and intra-area routing is as usual. OSPF defines internal routers, backbone routers, area border routers (ABR) and autonomous system boundary routers (ASBR). Internal routers are specific to one area. Area border routers have interfaces that are assigned to more than one area such as area 0 and area 10. An autonomous system boundary router has interfaces assigned to OSPF and a different routing protocol such as EIGRP or BGP. A virtual link is utilized when an area doesn't have a direct connection to area 0. A virtual link is established between an area border router for an area that isn't connected to area 0, and an area border router for an area that is connected to area 0. Area design involves considering geographical location of offices and traffic flows across the enterprise. It is important to be able to summarize addresses for many offices per area and minimize broadcast traffic.
Convergence
Fast convergence is accomplished with the SPF (Dijkstra) algorithm which determines a shortest path from source to destination. The routing table is built from running SPF which determines all routes from neighbor routers. Since each OSPF router has a copy of the topology database and routing table for its particular area, any route changes are detected faster than with distance vector protocols and alternate routes are determined.
Designated Router
Broadcast networks such as Ethernet and Non-Broadcast Multi Access networks such as Frame Relay have a designated router (DR) and a backup designated router (BDR) that are elected. Designated routers establish adjacencies with all routers on that network segment. This is to reduce broadcasts from all routers sending regular hello packets to its neighbors. The DR sends multicast packets to all routers that it has established adjacencies with. If the DR fails, it is the BDR that sends multicasts to specific routers. Each router is assigned a router ID, which is the highest assigned IP address on a working interface. OSPF uses the router ID (RID) for all routing processes.
Characteristics
· Link State
· Routes IP
· Routing Advertisements: Partial When Route Changes Occur
· Metric: Composite Cost of each router to Destination (100,000,000/interface speed)
· Hop Count: None (Limited by Network)
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 4 Equal Cost Paths
· Router Types: Internal, Backbone, ABR, ASBR
· Area Types: Backbone, Stubby, Not-So-Stubby, Totally Stubby
· LSA Types: Intra-area (1,2) Inter-area (3,4), External (5,7)
· Timers: Hello Interval and Dead Interval (different for network types)
· LSA Multicast Address: 224.0.0.5 and 224.0.0.6 (DR/BDR) Don't Filter !
· Interface Types: Point to Point, Broadcast, Non-Broadcast, Point to Multipoint, Loopback
Integrated IS-IS
Integrated Intermediate System - Intermediate System routing protocol is a link state protocol similar to OSPF that is used with large enterprise and ISP customers. An intermediate system is a router and IS-IS is the routing protocol that routes packets between intermediate systems. IS-IS utilizes a link state database and runs the SPF Dijkstra algorithm to select shortest paths routes. Neighbor routers on point to point and point to multipoint links establish adjacencies by sending hello packets and exchanging link state databases. IS-IS routers on broadcast and NBMA networks select a designated router that establishes adjacencies with all neighbor routers on that network. The designated router and each neighbor router will establish an adjacency with all neighbor routers by multicasting link state advertisements to the network itself. That is different from OSPF, which establishes adjacencies between the DR and each neighbor router only. IS-IS uses a hierarchical area structure with level 1 and level 2 router types. Level 1 routers are similar to OSPF intra-area routers, which have no direct connections outside of its area. Level 2 routers comprise the backbone area which connects different areas similar to OSPF area 0. With IS-IS a router can be an L1/L2 router which is like an OSPF area border router (ABR) which has connections with its area and the backbone area. The difference with IS-IS is that the links between routers comprise the area borders and not the router. Each IS-IS router must have an assigned address that is unique for that routing domain. An address format is used which is comprised of an area ID and a system ID. The area ID is the assigned area number and the system ID is a MAC address from one of the router interfaces. There is support for variable length subnet masks, which is standard with all link state protocols. Note that IS-IS assigns the routing process to an interface instead of a network.
Characteristics
· Link State
· Routes IP, CLNS
· Routing Advertisements: Partial When Routing Changes Occur
· Metric: Variable Cost (default cost 10 assigned to each interface)
· Hop Count: None (limited by network)
· Variable Length Subnet Masks
· Summarization on Network Class Address or Subnet Boundary
· Load Balancing Across 6 Equal Cost Paths
· Timers: Hello Interval, Hello Multiplier
· Area Types: Hierarchical Topology similar to OSPF
· Router Types: Level 1 and Level 2
· LSP Types: Internal L1 and L2, External L2
· Designated Router Election , No BDR
Border Gateway Protocol (BGP)
Border Gateway Protocol is an exterior gateway protocol, which is different from the interior gateway protocols discussed so far. The distinction is important since the term autonomous system is used somewhat differently with protocols such as EIGRP than it is with BGP. Exterior gateway protocols such as BGP route between autonomous systems, which are assigned a particular AS number. AS numbers can be assigned to an office with one or several BGP routers. The BGP routing table is comprised of destination IP addresses, an associated AS-Path to reach that destination and a next hop router address. The AS-Path is a collection of AS numbers that represent each office involved with routing packets. Contrast that with EIGRP, which uses autonomous systems as well. The difference is their autonomous systems refer to a logical grouping of routers within the same administrative system. An EIGRP network can configure many autonomous systems. They are all managed by the company for defining route summarization, redistribution and filtering. BGP is utilized a lot by Internet Service Providers (ISP) and large enterprise companies that have dual homed internet connections with single or dual routers homed to the same or different Internet Service Providers. BGP will route packets across an ISP network, which is a separate routing domain that is managed by them. The ISP has its own assigned AS number, which is assigned by InterNIC. New customers can either request an AS assignment for their office from the ISP or InterNIC. A unique AS number assignment is required for customers when they connect using BGP. There are 10 defined attributes that have a particular order or sequence, which BGP utilizes as metrics to determine the best path to a destination. Companies with only one circuit connection to an ISP will implement a default route at their router, which forwards any packets that are destined for an external network. BGP routers will redistribute routing information (peering) with all IGP routers on the network (EIGRP, RIP, OSPF etc) which involve exchange of full routing tables. Once that is finished, incremental updates are sent with topology changes. Each BGP router can be configured to filter routing broadcasts with route maps instead of sending/receiving the entire internet routing table.
BGP Routing Table Components
· Destination IP Address / Subnet Mask
· AS-Path
· Next Hop IP Address
Shaun Hummel is the author of Network Planning and Design Guide and has a web site focused on information technology job search solutions and certifications.

What are Routing Protocols?


The purpose of routing protocols is to learn of available routes that exist on the enterprise network, build routing tables and make routing decisions. Some of the most common routing protocols include RIP, IGRP, EIGRP, OSPF, IS-IS and BGP. There are two primary routing protocol types although many different routing protocols defined with those two types. Link state and distance vector protocols comprise the primary types. Distance vector protocols advertise their routing table to all directly connected neighbors at regular frequent intervals using a lot of bandwidth and are slow to converge. When a route becomes unavailable, all router tables must be updated with that new information. The problem is with each router having to advertise that new information to its neighbors, it takes a long time for all routers to have a current accurate view of the network. Distance vector protocols use fixed length subnet masks which aren't scalable. Link state protocols advertise routing updates only when they occur which uses bandwidth more effectively. Routers don't advertise the routing table which makes convergence faster. The routing protocol will flood the network with link state advertisements to all neighbor routers per area in an attempt to converge the network with new route information. The incremental change is all that is advertised to all routers as a multicast LSA update. They use variable length subnet masks, which are scalable and use addressing more efficiently.
Interior Gateway Routing Protocol (IGRP)
Interior Gateway Routing Protocol is a distance vector routing protocol developed by Cisco systems for routing multiple protocols across small and medium sized Cisco networks. It is proprietary which requires that you use Cisco routers. This contrasts with IP RIP and IPX RIP, which are designed for multi-vendor networks. IGRP will route IP, IPX, Decnet and AppleTalk which makes it very versatile for clients running many different protocols. It is somewhat more scalable than RIP since it supports a hop count of 100, only advertises every 90 seconds and uses a composite of five different metrics to select a best path destination. Note that since IGRP advertises less frequently, it uses less bandwidth than RIP but converges much slower since it is 90 seconds before IGRP routers are aware of network topology changes. IGRP does recognize assignment of different autonomous systems and automatically summarizes at network class boundaries. As well there is the option to load balance traffic across equal or unequal metric cost paths.
Characteristics
Distance Vector
Routes IP, IPX, Decnet, Appletalk
Routing Table Advertisements Every 90 Seconds
Metric: Bandwidth, Delay, Reliability, Load, MTU Size
Hop Count: 100
Fixed Length Subnet Masks
Summarization on Network Class Address
Load Balancing Across 6 Equal or Unequal Cost Paths ( IOS 11.0 )
Metric Calculation = destination path minimum BW * Delay (usec)
Split Horizon
Timers: Invalid Timer (270 sec), Flush Timer (630 sec), Holddown Timer (280 sec)
Enhanced Interior Gateway Routing Protocol (EIGRP)
Enhanced Interior Gateway Routing Protocol is a hybrid routing protocol developed by Cisco systems for routing many protocols across an enterprise Cisco network. It has characteristics of both distance vector routing protocols and link state routing protocols. It is proprietary which requires that you use Cisco routers. EIGRP will route the same protocols that IGRP routes (IP, IPX, Decnet and Appletalk) and use the same composite metrics as IGRP to select a best path destination. As well there is the option to load balance traffic across equal or unequal metric cost paths. Summarization is automatic at a network class address however it can be configured to summarize at subnet boundaries as well. Redistribution between IGRP and EIGRP is automatic as well. There is support for a hop count of 255 and variable length subnet masks.
Convergence
Convergence with EIGRP is faster since it uses an algorithm called dual update algorithm or DUAL, which is run when a router detects that a particular route is unavailable. The router queries its neighbors looking for a feasible successor. That is defined as a neighbor with a least cost route to a particular destination that doesn't cause any routing loops. EIGRP will update its routing table with the new route and the associated metric. Route changes are advertised only to affected routers when changes occur. That utilizes bandwidth more efficiently than distance vector routing protocols.
Autonomous Systems
EIGRP does recognize assignment of different autonomous systems which are processes running under the same administrative routing domain. Assigning different autonomous system numbers isn't for defining a backbone such as with OSPF. With IGRP and EIGRP it is used to change route redistribution, filtering and summarization points.
Characteristics
Advanced Distance Vector
Routes IP, IPX, Decnet, Appletalk
Routing Advertisements: Partial When Route Changes Occur
Metrics: Bandwidth, Delay, Reliability, Load, MTU Size
Hop Count: 255
Variable Length Subnet Masks
Summarization on Network Class Address or Subnet Boundary
Load Balancing Across 6 Equal or Unequal Cost Paths (IOS 11.0)
Timers: Active Time (180 sec)
Metric Calculation = destination path minimum BW * Delay (msec) * 256
Split Horizon
LSA Multicast Address: 224.0.0.10
Open Shortest Path First (OSPF)
Open Shortest Path First is a true link state protocol developed as an open standard for routing IP across large multi-vendor networks. A link state protocol will send link state advertisements to all connected neighbors of the same area to communicate route information. Each OSPF enabled router, when started, will send hello packets to all directly connected OSPF routers. The hello packets contain information such as router timers, router ID and subnet mask. If the routers agree on the information they become OSPF neighbors. Once routers become neighbors they establish adjacencies by exchanging link state databases. Routers on point-to-point and point-to-multipoint links (as specified with the OSPF interface type setting) automatically establish adjacencies. Routers with OSPF interfaces configured as broadcast (Ethernet) and NBMA (Frame Relay) will use a designated router that establishes those adjacencies.
Areas
OSPF uses a hierarchy with assigned areas that connect to a core backbone of routers. Each area is defined by one or more routers that have established adjacencies. OSPF has defined backbone area 0, stub areas, not-so-stubby areas and totally stubby areas. Area 0 is built with a group of routers connected at a designated office or by WAN links across several offices. It is preferable to have all area 0 routers connected with a full mesh using an Ethernet segment at a core office. This provides for high performance and prevents partitioning of the area should a router connection fail. Area 0 is a transit area for all traffic from attached areas. Any inter-area traffic must route through area 0 first. Stub areas use a default route to forward traffic destined for an external network such as EIGRP since the area border router doesn't send or receive any external routes. Inter-area and intra-area routing is as usual. Totally stubby areas are a Cisco specification that uses a default route for inter-area and external destinations. The ABR doesn't send or receive external or inter-area LSA's. The not-so-stubby area ABR will advertise external routes with type 7 LSA. External routes aren't received at that area type. Inter-area and intra-area routing is as usual. OSPF defines internal routers, backbone routers, area border routers (ABR) and autonomous system boundary routers (ASBR). Internal routers are specific to one area. Area border routers have interfaces that are assigned to more than one area such as area 0 and area 10. An autonomous system boundary router has interfaces assigned to OSPF and a different routing protocol such as EIGRP or BGP. A virtual link is utilized when an area doesn't have a direct connection to area 0. A virtual link is established between an area border router for an area that isn't connected to area 0, and an area border router for an area that is connected to area 0. Area design involves considering geographical location of offices and traffic flows across the enterprise. It is important to be able to summarize addresses for many offices per area and minimize broadcast traffic.
Convergence
Fast convergence is accomplished with the SPF (Dijkstra) algorithm which determines a shortest path from source to destination. The routing table is built from running SPF which determines all routes from neighbor routers. Since each OSPF router has a copy of the topology database and routing table for its particular area, any route changes are detected faster than with distance vector protocols and alternate routes are determined.
Designated Router
Broadcast networks such as Ethernet and Non-Broadcast Multi Access networks such as Frame Relay have a designated router (DR) and a backup designated router (BDR) that are elected. Designated routers establish adjacencies with all routers on that network segment. This is to reduce broadcasts from all routers sending regular hello packets to its neighbors. The DR sends multicast packets to all routers that it has established adjacencies with. If the DR fails, it is the BDR that sends multicasts to specific routers. Each router is assigned a router ID, which is the highest assigned IP address on a working interface. OSPF uses the router ID (RID) for all routing processes.
Characteristics
Link State
Routes IP
Routing Advertisements: Partial When Route Changes Occur
Metric: Composite Cost of each router to Destination (100,000,000/interface speed)
Hop Count: None (Limited by Network)
Variable Length Subnet Masks
Summarization on Network Class Address or Subnet Boundary
Load Balancing Across 4 Equal Cost Paths
Router Types: Internal, Backbone, ABR, ASBR
Area Types: Backbone, Stubby, Not-So-Stubby, Totally Stubby
LSA Types: Intra-area (1,2) Inter-area (3,4), External (5,7)
Timers: Hello Interval and Dead Interval (different for network types)
LSA Multicast Address: 224.0.0.5 and 224.0.0.6 (DR/BDR) Don't Filter!
Interface Types: Point to Point, Broadcast, Non-Broadcast, Point to Multipoint, Loopback
Integrated IS-IS
Integrated Intermediate System - Intermediate System routing protocol is a link state protocol similar to OSPF that is used with large enterprise and ISP customers. An intermediate system is a router and IS-IS is the routing protocol that routes packets between intermediate systems. IS-IS utilizes a link state database and runs the SPF Dijkstra algorithm to select shortest paths routes. Neighbor routers on point to point and point to multipoint links establish adjacencies by sending hello packets and exchanging link state databases. IS-IS routers on broadcast and NBMA networks select a designated router that establishes adjacencies with all neighbor routers on that network. The designated router and each neighbor router will establish an adjacency with all neighbor routers by multicasting link state advertisements to the network itself. That is different from OSPF, which establishes adjacencies between the DR and each neighbor router only. IS-IS uses a hierarchical area structure with level 1 and level 2 router types. Level 1 routers are similar to OSPF intra-area routers, which have no direct connections outside of its area. Level 2 routers comprise the backbone area which connects different areas similar to OSPF area 0. With IS-IS a router can be an L1/L2 router which is like an OSPF area border router (ABR) which has connections with its area and the backbone area. The difference with IS-IS is that the links between routers comprise the area borders and not the router. Each IS-IS router must have an assigned address that is unique for that routing domain. An address format is used which is comprised of an area ID and a system ID. The area ID is the assigned area number and the system ID is a MAC address from one of the router interfaces. There is support for variable length subnet masks, which is standard with all link state protocols. Note that IS-IS assigns the routing process to an interface instead of a network.
Characteristics
Link State
Routes IP, CLNS
Routing Advertisements: Partial When Routing Changes Occur
Metric: Variable Cost (default cost 10 assigned to each interface)
Hop Count: None (limited by network)
Variable Length Subnet Masks
Summarization on Network Class Address or Subnet Boundary
Load Balancing Across 6 Equal Cost Paths
Timers: Hello Interval, Hello Multiplier
Area Types: Hierarchical Topology similar to OSPF
Router Types: Level 1 and Level 2
LSP Types: Internal L1 and L2, External L2
Designated Router Election, No BDR
Border Gateway Protocol (BGP)
Border Gateway Protocol is an exterior gateway protocol, which is different from the interior gateway protocols discussed so far. The distinction is important since the term autonomous system is used somewhat differently with protocols such as EIGRP than it is with BGP. Exterior gateway protocols such as BGP route between autonomous systems, which are assigned a particular AS number. AS numbers can be assigned to an office with one or several BGP routers. The BGP routing table is comprised of destination IP addresses, an associated AS-Path to reach that destination and a next hop router address. The AS-Path is a collection of AS numbers that represent each office involved with routing packets. Contrast that with EIGRP, which uses autonomous systems as well. The difference is their autonomous systems refer to a logical grouping of routers within the same administrative system. An EIGRP network can configure many autonomous systems. They are all managed by the company for defining route summarization, redistribution and filtering. BGP is utilized a lot by Internet Service Providers (ISP) and large enterprise companies that have dual homed internet connections with single or dual routers homed to the same or different Internet Service Providers. BGP will route packets across an ISP network, which is a separate routing domain that is managed by them. The ISP has its own assigned AS number, which is assigned by InterNIC. New customers can either request an AS assignment for their office from the ISP or InterNIC. A unique AS number assignment is required for customers when they connect using BGP. There are 10 defined attributes that have a particular order or sequence, which BGP utilizes as metrics to determine the best path to a destination. Companies with only one circuit connection to an ISP will implement a default route at their router, which forwards any packets that are destined for an external network. BGP routers will redistribute routing information (peering) with all IGP routers on the network (EIGRP, RIP, OSPF etc) which involve exchange of full routing tables. Once that is finished, incremental updates are sent with topology changes. Each BGP router can be configured to filter routing broadcasts with route maps instead of sending/receiving the entire internet routing table.
BGP Routing Table Components
Destination IP Address / Subnet Mask
AS-Path
Next Hop IP Address
Copyright2006 Shaun Hummel All Rights Reserved
Shaun Hummel is the author of Network Planning and Design Guide and CiscoDesignBooks.com featuring networking books, eBooks, certifications, articles and design tools.

Introduction