Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Friday, 24 January 2014
Hello Folks, How you doing?. I hope i't going good. Well if you guys remembered we talked about Eigrp Concept and terminology last time. This time we will discuss Eigrp Technology.
So here we go let's discuss it in details. It includes many new ones,
Representing an improvement in operating efficiency, speed of convergence, or
functionality relative to IGRP and other routing protocols. There are four
categories of technology and these technologies fall in one of the following
four categories:
- Neighbour discovery and recovery
- Reliable Transport Protocol
- DUAL finite-state machine algorithm
- Modules which are Protocol-dependent
Relationship
with their neighbours are not established in Simple distance vector routers.
RIP and IGRP routers merely broadcast or multicast updates on configured
interfaces. While Relationship with their neighbours are made possible in EIGRP
routers, this is the feature that OSPF has.
EIGRP routers
establish adjacencies with neighbour routers by using small hello packets. which
are sent by default every five seconds.As long as EIGRP receiving hello packets
from known neighbours, those neighbours and their routes remain viable or
passive. By forming adjacencies, EIGRP routers do these thng. Firstly it Dynamically
learn of new routes that join their network. Secondly it Identify routers that
become either unreachable or inoperable. Thirdly Rediscover routers that had
previously been unreachable
Reliable
Transport Protocol (RTP): This protocol is used by EIGRP to achieve many
purpose. Let’s discuss it. What significanse does it hold for EIGRP. RTP is a
transport-layer protocol that can guarantee ordered delivery of EIGRP packets
to all neighbours. On an IP network, hosts use TCP to sequence packets and
ensure their timely delivery. However, EIGRP is protocol-independent. This
means it does not rely on TCP/IP to exchange routing information the way that
RIP, IGRP, and OSPF do. To stay independent of IP, EIGRP uses RTP as its own
proprietary transport-layer protocol to guarantee delivery of routing
information.
EIGRP can call
on Reliable transport protocol, to provide reliable or unreliable service as the
situation warrants. For Instanse, hello packets do not require the overhead of
reliable delivery because they are frequent and should be kept small.
Nevertheless, the reliable delivery of other routing information can actually
speed convergence, because EIGRP routers are not waiting for a timer to expire
before they retransmit.
EIGRP using RTP
can multicast and unicast to different peers simultaneously, which means that
efficiency will be maximum.
Diffusing
Update Algorithm (DUAL) is The centrepiece of EIGRP, which is known as EIGRP
route-calculation engine. DUAL finite-state machine (FSM) is the feature or
technology behind it. An FSM is known as an algorithm engine. FSMs define a set
of possible states that something can go through, what events cause those
states, and what events result from those states. To determine How a device,
computer program, or routing algorithm will react to a set of input events Designers
use FSM. The DUAL FSM contains all the logic required to calculate and compare
routes in an EIGRP network.
All the routes
advertised by neighbours tracked by DUAL. Composite metrics of each route are
used to compare routes Advertised. DUAL ensure that each path is loop free.
DUAL inserts lowest cost paths into the routing table. These primary routes are
known as successor routes. Topology table contain a copy of the successor
routes.
EIGRP keeps
important route and topology information readily available in a neighbour table
and a topology table. These tables supply DUAL with comprehensive route
information in case of network disruption. DUAL use the information in these
tables to selects alternate routes quickly by. DUAL search an alternative route,
path or feasible successor, in the topology table, if there is a failure of a
link.
Modular design
is one of the best features of EIGRP. It has proven to be most scalable and
adaptable. Support for routed protocols, such as IP, IPX, and AppleTalk, are
included in EIGRP through PDMs. In theory, EIGRP can easily adapt to new or
revised routed protocols, such as IPv6, by adding protocol-dependent modules.
Each PDM is
responsible for all functions related to its specific routed protocol. The
IP-EIGRP module is responsible for the following:
- Transferring and receiving EIGRP packets that bear IP data
- Informing DUAL of new IP routing information that is received
- Looking after or maintaining the results of DUAL routing decisions in the IP routing table
- Furthermore Redistributing routing information that was learned by other IP-capable routing protocols
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment