fabricpath design

Data Center Fabric

Data Center Fabric

In today's digital age, where vast amounts of data are generated and processed, data centers play a vital role in ensuring seamless and efficient operations. At the heart of these data centers lies the concept of data center fabric – a sophisticated infrastructure that forms the backbone of modern computing. In this blog post, we will delve into the intricacies of data center fabric, exploring its importance, components, and benefits.

Data center fabric refers to the underlying architecture and interconnectivity of networking resources within a data center. It is designed to efficiently handle data traffic between various components, such as servers, storage devices, and switches while ensuring high performance, scalability, and reliability. Think of it as the circulatory system of a data center, facilitating the flow of data and enabling seamless communication between different entities.

A well-designed data center fabric consists of several key components. Firstly, network switches play a vital role in facilitating connectivity among different devices. These switches are often equipped with advanced features such as high port density, low latency, and support for various protocols. Secondly, the physical cabling infrastructure, including fiber optic cables, ensures fast and reliable data transfer. Lastly, network management tools and software provide centralized control and monitoring capabilities, optimizing the overall performance and security of the fabric.

Data center fabric offers numerous benefits that contribute to the efficiency and effectiveness of data center operations. Firstly, it enables seamless scalability, allowing organizations to easily expand their infrastructure as their needs grow. Additionally, data center fabric enhances network resiliency by providing redundant paths and minimizing single points of failure. This ensures high availability and minimizes the risk of downtime. Moreover, the centralized management of the fabric simplifies network administration and troubleshooting, saving valuable time and resources.

As the demand for digital services continues to skyrocket, data center fabric plays a pivotal role in shaping the digital landscape. Its high-speed and reliable connectivity enable the smooth functioning of cloud computing, e-commerce platforms, content delivery networks, and other services that rely on data centers. Furthermore, data center fabric empowers enterprises to adopt emerging technologies such as artificial intelligence, big data analytics, and Internet of Things (IoT), which heavily depend on robust network infrastructure.

Highlights: Data Center Fabric

The need for a data center fabric

Due to the advent of network virtualization, applications have also evolved from traditional client/server architecture to highly distributed microservices architectures composed of cloud-native workloads. A scale-out approach connects all components to different access switches instead of having all components on the same physical server.

IP Fabric

Clos fabrics provide physical connectivity between switches, facilitating the network’s actual goal of connecting workloads and servers in the fabric (and the outside world). Routing protocols are used to connect these endpoints. According to RFC 7938, BGP is the preferred routing protocol, with spines and leaves peering externally at each other (eBGP). A VXLAN-based fabric is built upon such a fabric, which is called an IP fabric.

VXLAN Fabric

While utilizing the same physically connected 3-stage Clos network, VXLAN fabrics introduce an abstraction level into the network that elevates workloads and the services they provide into another layer called the overlay. An encapsulation method such as Generic Routing Encapsulation (GRE) or MPLS (which adds an MPLS label) is used to accomplish this. In these tunneling mechanisms, packets are tunneled from one point to another utilizing the underlying network. A VXLAN header is added to IP packets containing a UDP header, a VXLAN header, and an IP header. VXLAN Tunnel Endpoints (VTEPs) are devices configured to encapsulate VXLAN traffic.

VXLAN unicast mode

Example: Data Center Fabric – FabricPath

Network devices are deployed in highly interconnected layers, represented as a fabric. Unlike traditional multitier architectures, a data center fabric effectively flattens the network architecture, reducing the distance between endpoints within the data center. An example of a data center fabric is FabricPath.

Cisco has validated FabricPath as an Intra-DC Layer 2 multipath technology. Design cases are also available where FabricPath is deployed for DCI ( Data Center Interconnect ). Regarding a FabricPath DCI option, design carefully over short distances with reliable interconnects, such as Dark Fiber or Protected Dense Wavelength Division Multiplexing (DWDM ).

FabricPath designs are suitable for a range of topologies. Unlike hierarchical virtual Port Channel ( vPC ) designs, FabricPath does not need to follow any topology. It can accommodate any design type: full mesh, partial mesh, hub, and spoke topologies.

Example: Data Center Fabric – Cisco ACI 

ACI Cisco is a software-defined networking (SDN) architecture that brings automation and policy-driven application profiles to data centers. By decoupling network hardware and software, ACI provides a flexible and scalable infrastructure to meet dynamic business requirements. It enables businesses to move from traditional, manual network configurations to a more intuitive and automated approach.

One of the defining features of Cisco ACI is its application-centric approach. It allows IT teams to define policies based on application requirements rather than individual network components. This approach simplifies network management, reduces complexity, and ensures that network resources are aligned with the needs of the applications they support.

SDN data center
Diagram: Cisco ACI fabric checking.

Related: Before you proceed, you may find the following posts helpful:

  1. What Is FabricPath
  2. Data Center Topologies
  3. ACI Networks
  4. Active Active Data Center Design
  5. Redundant Links



Data Center Fabric

Key Data Center Fabric Discussion Points:


  • Introduction to the data center fabric and what is involved.

  • Highlighting the details of FabricPath.

  • Critical points on the possible alternatives to FabricPath.

  • Technical details on the load balancing.

Back to basic with a data center fabric.

Key Components of Data Center Fabric:

1. Network Switches: Network switches form the core of the data center fabric, providing connectivity between servers, storage devices, and other networking equipment. These switches are designed to handle massive data traffic, offering high bandwidth and low latency to ensure optimal performance.

2. Cabling Infrastructure: A well-designed cabling infrastructure is crucial for data center fabric. High-speed fiber optic cables are commonly used to connect various components within the data center, ensuring rapid data transmission and minimizing signal loss.

3. Network Virtualization: Network virtualization technologies, such as software-defined networking (SDN), play a significant role in the data center fabric. By decoupling the network control plane from the physical infrastructure, SDN enables centralized management, improved agility, and flexibility in allocating resources within the data center fabric.

Flattening the network architecture

In this current data center network design, network devices are deployed in two interconnected layers, representing a fabric. Sometimes, massive data centers are interconnected with three layers. Unlike conventional multitier architectures, a data center fabric flattens the network architecture, reducing the distance between endpoints within the data center. This design results in high efficiency and low latency. Very well suited for east-to-west traffic flows.

Data center fabrics provide a solid layer of connectivity in the physical network and move the complexity of delivering use cases for network virtualization, segmentation, stretched Ethernet segments, workload mobility, and various other services to an overlay that rides on top of the fabric.

When paired with an overlay, the fabric itself is called the underlay. The overlay could be deployed with, for example, VXLAN. To gain network visibility into user traffic, you would examine the overlay, and the underlay is used to route traffic between the overlay endpoints.

VXLAN, short for Virtual Extensible LAN, is a network virtualization technology that enables the creation of virtual networks over an existing physical network infrastructure. It provides a scalable and flexible approach to address the challenges posed by traditional VLANs, such as limited scalability, spanning domain constraints, and the need for manual configuration.

Lab guide on overlay networking with VXLAN

The following example shows VLXAN tunnel endpoints on Leaf A and Leaf B. The bridge domain is mapped to a VNI on G3 on both leaf switches. This enables a Layer 2 overlay for the two hosts to communicate. This VXLAN overlay goes across Spine A and Spine B.

Note that the Spine layer, which acts as the core network, a WAN network, or any other type of Routed Layer 3 network, does not have any VXLAN configuration. We have flattened the network while providing Layer 2 connectivity over a routed core.

VXLAN overlay
Diagram: VXLAN Overlay

Fabricpath Design: Problem Statement

Key Features of Cisco Fabric Path:

Transparent Interconnection: Cisco Fabric Path allows for creating a multi-path forwarding infrastructure that provides transparent Layer 2 connectivity between devices within a network. This enables the efficient utilization of available bandwidth and simplifies network design.

Scalability: With Cisco Fabric Path, organizations can quickly scale their network infrastructure to accommodate growing data loads. It supports up to 16 million virtual network segments, enabling seamless expansion of network resources without compromising performance.

Fault Tolerance: Cisco Fabric Path incorporates advanced fault-tolerant mechanisms like loop-free topology and equal-cost multipath routing. These features ensure high availability and resiliency, minimizing the impact of network failures and disruptions.

2.4 Traffic Optimization: Cisco Fabric Path employs intelligent load-balancing techniques to distribute traffic across multiple paths, optimizing network utilization and reducing congestion. This results in improved application performance and enhanced user experience.

The problem with traditional classical Ethernet is the flooding behavior of unknown unicasts and broadcasts and the process of MAC learning. All switches must learn all MAC addresses, leading to inefficient resource use. In addition, Ethernet has no Time-to-Live ( TTL ) value, and if precautions are not in place, it could cause an infinite loop.

data center fabric
Diagram: The need for a data center fabric

Deploying Spanning Tree Protocol ( STP ) at Layer 2 blocks loops, but STP has many known limitations. One of its most significant flaws is that it offers a single topology for all traffic with one active forwarding path. Scaling the data center with classical Ethernet and spanning trees is inefficient as it blocks all but one path. With spanning trees’ default behavior, the benefits of adding extra spines do not influence bandwidth or scalability.

Possible alternatives

Multichassis EtherChannel 

To overcome these limitations, Cisco introduced Multichassis EtherChannel ( MEC ). MEC comes in two flavors: Virtual Switching System ( VSS ) with Catalyst 6500 series or Virtual Port Channel ( vPC ) with Nexus Series. Both offer active/active forwarding but present scalability challenges when scaling out Spine / Core layers. Additionally, complexity increases when deploying additional spines.

Multiprotocol Label Switching 

Another option would be to scale out with Multiprotocol Label Switching ( MPLS ). Replace Layer 2 switching with Layer 3 forwarding and MPLS with Layer 2 pseudowires. This type of complexity would lead to an operational nightmare. The prevalent option is to deploy Layer 2 multipath with THRILL or FabricPath. In intra-DC communication, Layer 2 and Layer 3 designs are possible in two forms: Traditional DC design and Switched DC design.

MPLS overlay

FabricPath VLANs use Conversational Learning, meaning a subset of MAC addresses is learned at the network’s edge. Conversation learning consists of a three-way handshake. Each interface learns the MAC addresses of interested hosts. Compared to classical Ethernet, each switch device learns all MAC addresses for that VLAN.

  1. Traditional DC design replaces hierarchical vPC and STP with FabricPath. Core, distribution, and access elements stay the same. The same layered hierarchical model exists but with FabricPath in the core.
  2. Switched DC design based on Clos Fabrics. Integrate additional Spines for Layer 2 and Layer 3 forwarding.

 

Traditional data center design

what is data center fabric
Diagram: what is data center fabric

 

Fabric Path in the core replaces vPC. It still uses port channels, but the hierarchical vPC technology previously used to provide active/active forwarding is not required. Instead, designs are based on modular units called PODs; within each POD, traditional DC technologies exist, such as vPC. Active/active ( dual-active paths ) forwarding based on a two-node Spine, Hot Standby Router Protocol ( HSRP ), announces the virtual MAC of the emulated switch from each of the two cores. For this to work, implement vPC+ on the inter-spine peer links.

 

Switched data center design

Switched Fabric Data Center
Diagram: Switched Fabric Data Center

Each edge node has equidistant endpoints to each other, offering predictable network characteristics. From FabricPath’s outlook, the entire Spine Layer is one large Fabric-based POD. In the traditional model presented above, port and MAC address capacity are key factors influencing the ability to scale out. The key advantage of Clos-type architecture is that it expands the overall port and bandwidth capacity within each POD.

Implementing load balancing 4 wide spines challenges traditional First Hop Redundancy Protocol ( FHRP ) like HSRP, which works with 2 active pairs by default. Implementing load balancing 4 wide spines with VLANs allowed on certain links is possible but can cause link polarization

For optimized designs, utilize a redundancy protocol to work with a 4-node gateway. Deploy Gateway Load Balancing Protocol ( GLBP ) and Anycast FHRP. GLBP uses a weighting parameter that allows Address Resolution Protocol ( ARP ) requests to be answered by MAC addresses pointing to different routers. Anycast FHRP is the recommended solution for designs with 4 or more spine nodes.

FabricPath Key Points:

  • FabricPath removes the requirement for a spanning tree and offers a more flexible and scalable design to its vPC-based Layer 2 alternative. No requirement for a spanning tree, enabling Equal Cost Multipath ( ECMP ).

  • FabricPath no longer forwards using spanning tree. Offering designers bi-sectional bandwidth and up to 16-way ECMP. 16 x 10Gbps links equate to 2.56 terabits per second between switches.

  • Data Centers with FabricPath are easy to extend and scale.

  • Layer 2 troubleshooting tools for FabricPath including FabricPath PING and Traceroute can now test multiple equal paths.

  • Control plane based on Intermediate System-to-Intermediate System ( IS-IS ).

  • Loop prevention is now in the data plane based on the TTL field.

 

Summary: Data Center Fabric

In the fast-paced digital age, where data rules supreme, the backbone of reliable and efficient data processing lies within data center fabrics. These intricate systems of interconnections enable the seamless flow of data, ensuring businesses and individuals can harness technology’s power. In this blog post, we dived deep into the world of data center fabric, exploring its architecture, benefits, and role in shaping our digital landscape.

Understanding Data Center Fabric

Data center fabric refers to the underlying framework that connects various components within a data center, including servers, storage, and networking devices. It comprises a complex network of switches, routers, and interconnecting cables, all working to facilitate data transmission and communication.

The Architecture of Data Center Fabric

Data center fabrics adopt a leaf-spine architecture called a Clos network. This design consists of leaf switches that directly connect to servers and spine switches that interconnect the leaf switches. The leaf-spine architecture ensures high bandwidth, low latency, and scalability, allowing data centers to handle increasing workloads and traffic demands.

Benefits of Data Center Fabric

  • Enhanced Performance:

Data center fabrics offer improved performance by minimizing latency and providing high-speed connectivity. The low-latency nature of fabrics ensures quick data transfers, enabling real-time processing and reducing bottlenecks.

  • Scalability and Flexibility:

With the ever-growing data requirements of modern businesses, scalability is crucial. Data center fabrics allow adding or removing switches seamlessly, accommodating changing demands without disrupting operations. This scalability is a significant advantage, especially in cloud computing environments.

  • Improved Resilience and Redundancy:

Data center fabrics are designed to provide redundancy and fault tolerance. In case of a link or switch failure, the fabric’s distributed nature allows traffic to be rerouted dynamically, ensuring uninterrupted service availability. This resiliency is vital for mission-critical applications and services.

Hyper-Scale Data Centers:

Tech giants like Google, Facebook, and Amazon heavily rely on data center fabrics to support their massive workloads. These hyper-scale data centers utilize fabric architectures to handle the vast amounts of data millions of users worldwide generate.

Enterprise Data Centers:

Medium to large-scale enterprises leverage data center fabrics for efficient data processing and seamless connectivity. Fabric architectures enable these organizations to enhance their IT infrastructure, ensuring optimal performance and reliability.

Conclusion:

The data center fabric is the backbone of modern digital infrastructure, enabling rapid and secure data transmission. With its scalable architecture, enhanced performance, and fault-tolerant design, data center fabrics have become indispensable in the age of cloud computing, big data, and the Internet of Things. As technology evolves, data center fabrics will play a vital role in powering the digital revolution.

IP Forwarding Example

Forwarding Routing Protocols

Forwarding Routing Protocols

Forwarding routing protocols are crucial for computer networks, enabling efficient data transmission and device communication. This blog post will explore forwarding routing protocols, their significance, and some famous examples.

Forwarding routing protocols, or routing algorithms, determine the paths data packets take in a network. These protocols are vital in delivering information from a source to a destination device. They ensure data packets are transmitted along the most efficient paths, minimizing delays and optimizing network performance.

Forwarding routing protocols are essential components of network communication. They determine the best path for data packets to travel from source to destination, taking into consideration factors such as network congestion, link reliability, and available bandwidth. By efficiently directing traffic, forwarding routing protocols enhance network performance and ensure reliable data transmission.

There are several types of forwarding routing protocols, each with its own characteristics and use cases. This section will explore some of the most common ones, including:

- Distance Vector Routing Protocols:
- Link State Routing Protocols
- Hybrid Routing Protocols:

Choosing the right forwarding routing protocol for a specific network environment requires careful consideration of various factors.

What is IP routing? To answer this question, we must first understand routers' protocol to forward messages. Forwarding routing protocols are networking protocols that facilitate communication between different network nodes.

They are responsible for finding the optimal path for data to travel from one node to another and managing and maintaining routing tables containing information about the available paths for various destinations.

Highlights: Forwarding Routing Protocols

Starting points: Networking Protocols

Networking protocols facilitate communication between computer systems. Today, computer systems use three main protocols: Ethernet, TCP/IP, and Fibre Channel. Cables are used to connect various networking devices using Ethernet. Wireless computer networks are created using the TCP/IP protocol. Fiber channels are used to transfer large amounts of data between computers.

Routing, forwarding, and switching are network terms used when data is sent from one party to another. Each plays a crucial role in data delivery. Routing is the process of moving data from one device to another. Forwarding involves collecting data from one device and sending it to another. With switching, data is collected from one device and sent to multiple devices based on their MAC addresses.

Moving data between devices

Moving data between devices is known as routing. Networking devices called routers perform routing most of the time. Furthermore, routers can forward connections to other networks. In addition, routers help create and manage networks. Within networks, they move data from one device to another. Routers can also transmit data across different networks in some cases. Routing is done at the network layer in the OSI model. The network layer chooses the optimal or shortest path from sender to receiver. Optimal paths are calculated using routing algorithms.

OSI Model and testing

The forwarding process involves collecting data from one device and sending it to another. Unlike routing, this process does not move data between devices. Forwarding differs from routing because it performs some actions instead of simply forwarding packets. It doesn’t decide the path. The packets are only sent to another network in the forwarding process: The network layer performs routing and forwarding. Forwarding devices collect data and send it to another device. Switches, routers, and hubs are standard forwarding devices.

Forwarding Methods

Let’s discuss some popular forwarding methods in networking. In the next hop method, packets are sent from the router to the next gateway in the direction of the destination. Routing tables with network-specific entries contain destinations connected to routers. A routing table is a set of rules, often displayed as a table, that determine where data packets will be directed over an Internet Protocol (IP) network. Routers and switches, as well as all IP-enabled devices, use routing tables. Lastly, when using the host-specific method, the routing table contains information about all the destination hosts in the destination network.

The Role of Switching

Data is switched from one port to another by collecting it from one port and sending it to the destination by switching. There are two types of switching: connectionless and connection-oriented. Connectionless switching does not require handshaking to establish a connection. A forwarding table determines how packets received in a port are sent. Conversely, connection-oriented switching uses a predefined circuit between the sender and receiver and an intermediate node ID.

Switching techniques can be divided into circuit, message, and packet switching. Circuit switching requires establishing a circuit before sending data. The received data is treated as a message when message switching is used and sent to the intermediate switching device. Packet switching breaks the data into small chunks called packets. Each packet is transmitted independently.

router on a stick

IP Routing

Routing is the process of moving IP packets from one network to another. IP routing protocols or static configuration allow routers to learn about nonattached networks. When a network topology change occurs, dynamic IP routing protocols update the network topology without intervention. Depending on the size of the network, IP routing may be limited to static routes due to design or hardware limitations.

Static routes are not accommodating when the topology changes and can be burdensome for network engineers. An IP packet is forwarded to its destination IP address with the help of a router that selects a loop-free path through a network.

Autonomous systems are networks of interconnected routers and related systems managed by a common network administrator. A global network of autonomous systems makes up the Internet.

 

 

Rules and Algorithms

Forwarding routing protocols are rules and algorithms that determine the best path for data packets to follow within a network. They facilitate the exchange of routing information between routers and ensure that information is forwarded most efficiently. These protocols direct data packets from the source device to the correct destination device, ensuring reliable and timely delivery.

Common Forwarding Routing Protocols

Two of the most commonly used forwarding routing protocols are Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP). OSPF is an interior gateway protocol (IGP) used within autonomous systems and networks managed by a single administrative entity. It uses a link-state algorithm to determine the best route for data to travel. Conversely, BGP is an exterior gateway protocol (EGP) used to connect autonomous systems. It uses a path vector algorithm to determine the best route for data to travel.

Both protocols are essential for routing data across networks, and they both have their advantages and disadvantages. OSPF is more efficient and supports more features, while BGP is more secure and reliable. However, both protocols are required to communicate data across networks efficiently.

forwarding routing protoocols

Forwarding Protocols.

Key Forwarding Routing Protocols Design Discussion Points:


  • Introduction to forwarding routing protocols and what is involved.

  • Highlighting the details of the TCP/IP suite.

  • Technical details on the packet and the datagram. 

  • Scenario: Routing tables and forwarding.

  • Details on routing convergence and path selection.

Related: Before you proceed, you may find the following posts helpful:

  1. IP Forwarding
  2. Routing Convergence
  3. OpenFlow Protocol
  4. IPsec Fault Tolerance
  5. BGP SDN
  6. ICMPv6
  7. SDN Router
  8. Segment Routing
  9. Routing Control Platform
  10. Computer Networking

Back to Basics: Forwarding Routing Protocols

Switching and Routing

Before we get into the technical details of which protocol routers use to forward messages, let us address the basics. We know we have Layer 2 switches that create Ethernet LANs. So, all endpoints physically connect to a Layer 2 switch. And if you are on a single LAN with one large VLAN, you are prepared with this setup as switches work out of the box, causing conclusions based on Layer 2 MAC addresses. However, what if you want to send data from your network to another, across the Internet, or a different set of VLANs in different IP subnets?

Routers and Switches

In this case, we need a Layer 3 router and the process of IP routing with an IP forwarding algorithm. So, if you want to know which protocol routers use to forward messages? The Layer 3 router uses the information in the IP header to determine whether and where to forward each received packet and which network interface to send the packet to.

Examples: Forwarding Routing Protocols

One of the most commonly used forwarding routing protocols is the Routing Information Protocol (RIP). RIP is a distance-vector protocol that uses a metric, typically hop count, to determine the best path for data packets. It exchanges routing information with neighboring routers and updates its routing table accordingly. RIP is suitable for small to medium-sized networks due to its simplicity and ease of configuration.

Another widely used forwarding routing protocol is the Open Shortest Path First (OSPF) protocol. OSPF is a link-state protocol that calculates the shortest path to a destination based on various factors, such as bandwidth, delay, reliability, and cost. It advertises link-state information to neighboring routers, allowing them to build a complete topology of the network. OSPF is commonly implemented in large-scale networks due to its scalability and advanced features.

Border Gateway Protocol (BGP) is a forwarding routing protocol commonly used in internet service provider (ISP) networks. BGP is an exterior gateway protocol that facilitates the exchange of routing information between different autonomous systems (ASes). It enables ISPs to select the best path for data packets based on various policies, such as path length, network congestion, and customer preferences. BGP is crucial for maintaining a stable and efficient internet routing infrastructure.

1st Lab Guide: OSPF

In the following lab guide, we address OSPF. OSPF, developed by the Internet Engineering Task Force (IETF), is an interior gateway protocol (IGP) used for routing within autonomous systems (AS). A link-state routing protocol uses the Shortest Path First (SPF) algorithm to determine the best path for forwarding data packets. OSPF is widely adopted due to its scalability, fast convergence, and support for multiple network types.

Note:

Notice that we have two OSPF neighbors. We use the default broadcast network type and have an OSPF status of FULL/DR. I have changed the OSPF cost on the link Gi1 so that we can perform traffic engineering. Now that the links have the exact OSPF costs, a total metric of 4, we can perform ECMP. You can also bond links; we combine two links for additional bandwidth.

Forwarding Routing Protocols
Diagram: Leaf and Spine Routed.re.

Example: OSPF Routed Core

With a leaf and spine, we can have a routed core. So, we gain the benefits of running a routing protocol, such as OSPF, all the way down to the access layer. This has many benefits, such as full use of links. The guide below has three routers: two leaves and two spines. OSPF is the routing protocol with Area 0; we are not running STP.

Therefore, we can have Layer 3 routing for both spines to reach the destinations on Leaf B. I have a loopback configured on Leaf B of 1.1.1.1. Each leaf has an OSPF neighbor relationship to each spine with an OSPF network type of Broadcast. Notice the command: Show IP route 1.1.1.1 on Leaf A.

Note:

We initially only had one path via Spine B, i.e., the shortest path based on OSPF cost. Once I made the OSPF costs the same for the entire path  (Cost of 4, routing metric of 4 ), we installed 2 paths in the routing table and can now rely on the fast convergence of OSPF for link failure detection and recovery.

We will expand this with one of the following lab guides in this blog with VXLAN and create a layer 2 overlay. Remember that ACI does not have OSPF and uses IS-IS; it also has a particular configuration for VXLAN, and much of the CLI complexity is abstracted. However, the focus of these lab guides is on illustration and learning.

The process of routing and network stretch

Routing is selecting a path for traffic in a network or between or among multiple networks. Routing is performed for various networks, including the Internet, circuit-switched, and packet-switched networks. The routing process usually directs forwarding based on routing tables, which maintain a record of the routes to various network destinations. Thus, constructing routing tables in the router’s memory is crucial for efficient routing.

Routing is typically based on the shortest path algorithm, which finds the shortest path from source to destination in a network. The shortest path algorithm can be implemented using various techniques, such as Dijkstra’s and Bellman-Ford’s algorithms. In addition, routing can also be based on other criteria, such as least cost, lowest delay, or highest reliability.

Routing Tables

Routing protocols are used to maintain router routing tables. These protocols enable the routers to exchange information about the network topology, such as which nodes are connected, and then determine the best routes. The most common routing protocols are the Open Shortest Path First (OSPF) and the Routing Information Protocol (RIP).

Routing also ensures that data sent over the Internet reaches its destination. To do this, routers use the Internet Protocol (IP) to forward packets between networks. They examine the packet’s IP header and use this information to determine the best route for the packet.

The routing process
Diagram: The routing process. The source is Baeldung.

Lab Guide: EIGRP Configuration

EIGRP stands for Enhanced Interior Gateway Routing Protocol and is a routing protocol created by Cisco. Initially, it was only available on Cisco hardware, but for a few years, it’s now an open standard. EIGRP is called a hybrid or advanced distance vector protocol, and most of the rules that apply to RIP also apply here:

  • Split Horizon
  • Route Poisoning
  • Poison Reverse

EIGRP routers will send hello packets to other routers just like OSPF; if you send and receive them, you will become neighbors. EIGRP neighbors will exchange routing information, which will be saved in the topology table

Configuring EIGRP is similar to RIP. The “1” is the AS number, which must be the same on all routers! We require the no auto-summary command because, by default, EIGRP behaves classfully, and we want it to be classless.

EIGRP Neighbors

Next, let’s have a look at the routing table below. The first thing you might notice is that you see a “D” for the EIGRP entries. You see a “D” and not an “E” because the last one has already been taken for EGP, an old routing protocol we no longer use. “D” stands for “dual,” which is the mechanism behind EIGRP. The loopback 4.4.4.0 is connected to R4, and R1 has two ways to reach this network. This is because all links are Gigabit Ethernet, and I have not changed any metrics.

EIGRP routing

EIGRP Changes

Routing vs Forwarding

Often, routing is confused with forwarding, but routing is a different process. When routing data, routers move data between devices. During data forwarding, a device collects data from one device and sends it to another. Let’s take a closer look at the forwarding process.

The forwarding process involves collecting data from one device and sending it to another. Data is not moved from one device to another in this process. In contrast to routing, forwarding performs some actions and forwards packets to intermediate routers. It does not determine the path. We only forward the packets to another attached network in the forwarding process.

The network layer performs both routing and forwarding. A forwarding device collects data and sends it to another. Hubs, routers, and switches are some of the most popular forwarding devices.

3rd Lab Guide: IS-IS Routing Protocol

In the following sample, we have an IS-IS network.

The ISIS routing protocol is a link-state routing protocol that operates at the OSI (Open Systems Interconnection) layer 2. It was initially developed for large-scale networks such as the Internet, where scalability, stability, and efficient routing are paramount.

Note:

Below, we have four routers. R1 and R2 are in area 12, and R3 and R4 are in area 34. R1 and R3 are intra-area routers so they will be configured as level 1 routers. R2 and R4 form the backbone so these routers will be configured as levels 1-2.

Routing Protocol
Diagram: Routing Protocol. ISIS.

♦ Key Features of ISIS Routing Protocol:

Hierarchical Design: ISIS employs a hierarchical design, dividing the network into areas to simplify routing and improve scalability. Each region has a designated router, the Intermediate System (IS), which is responsible for exchanging routing information with other ISes.

Link-State Database: ISIS maintains a link-state database that contains information about the network topology and the state of individual links. This database calculates the shortest path to a destination and ensures efficient routing.

2.3. Dynamic Updates: ISIS uses a dynamic routing algorithm to exchange routing information between ISes. It continuously updates the link-state database based on network changes, ensuring that the routing information is always up to date.

2.4. Support for Multiple Routing Protocols: ISIS is interoperable with protocols such as OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol). This flexibility allows networks to integrate ISIS with existing routing infrastructures seamlessly.

Packet-switching Networks

The Internet is a packet-switching network that enables its attached devices, such as your personal computer ( PC ), to exchange information with other devices. Information exchange could take many different forms. From a user level, it could be checking your bank balance with Internet banking, buying a book on an Amazon website, watching a movie online, or downloading your favorite song.

Hypertext Transfer Protocol ( HTTP ) accounts for most Internet traffic and is the protocol behind the World Wide Web ( WWW ). However, for these upper-layer protocols ( HTTP ) to work efficiently and offer a satisfactory user experience, elements lower in the Open Systems Interconnection ( OSI ) communication module must be fine-tuned and operational for data transfers. 

Packet Switching Networks
Diagram: Packet Switching Networks. Source is GeeksforGeeks.

Forwarding Protocols

Which protocol is used by routers to forward messages?

  • The two transport protocols

The TCP/IP protocol suite supports two transport protocols ( Layer 4 ): Transmission Control Protocol (TCP ) and User Datagram Protocol ( UDP ). TCP reliably provides a host-to-host communication service, while UDP provides host-to-host communication in an unreliable fashion.

As a result, TCP offers many services better suited for applications requiring certain service guarantees and error correction and detection, such as Border Gateway Protocol, which operates on Port 179. On the other hand, UDP offers fewer services and is helpful for situations where packet loss is less sensitive but time delays are more problematic.

Port 179
Diagram: Port 179 with BGP peerings.

This information is traversed across the Internet backbone via the Network ( Layer 3 ) and Data Link layer ( Layer 2 ). It is encoded in long strings of bits called packets. Packets describe a chunk of data going from the IP ( Internet Protocol ) layer to the network interface ( Data Link Layer ).

The Packet and a Datagram

A packet is not the same as a datagram and can be either an IP datagram or a fragment of an IP datagram. Note: The terminology “packet” refers to the Ethernet payload, which consists of the IP header and the user data. The terminology frame refers to the data link headers and the payload.

As these packets travel through the Internet from their source ( your personal computer ) to their destination ( Amazon website ), certain decisions are made by each device the packet traverses. These are known as routing decisions and determine if the packet should go this way or that way.

The devices making these decisions are called routers. Different routers act at different network points, such as over the WAN with SD-WAN routers: SD WAN tutorial.

IP Packet versus IP Datagram
The diagram shows the different definitions of an IP packet compared to an IP datagram. It also shows how an IP datagram is fragmented into two IP packets, with the second IP packet being the second part of the first IP packet.

IP packet vs Datagram
Diagram: IP packet vs Datagram. Source is crnetpacket

Routing Tables and Routing Protocols

These devices have a routing table that tells them how and where to forward the packets. The routing table is populated by a dynamic or static process known as a routing protocol. A static routing protocol is specific to that device, manually configured, and is not automatically populated to other routers.

A dynamic process runs distributed algorithms that the routers run among themselves to make the correct routing decision.

An example of a dynamic routing protocol is OSPF, and a static routing protocol would be a static route. A router’s routing protocol may be Distance Vector Algorithms or Link-State Algorithms. Distance Vector Algorithms are more straightforward and usually try to find paths with a simple metric, such as the number of router hops ( devices ) to the destination.

Then, on the WAN side of things, we have Border Gateway Protocol (BGP) and the use case of BGP SDN. We are enabling WAN virtualization and SDN traffic optimizations.

4th Lab Guide: EIGRP

In the following, we have an EIGRP network that consists of two routers.

Note:

Efficient Exchange of Routing Information

One of the strengths of EIGRP lies in its ability to exchange routing information with neighboring routers. Using Hello packets and Update packets, EIGRP establishes and maintains neighbor relationships. This dynamic exchange ensures that routers are constantly updated with the latest network topology information, facilitating efficient route computation and decision-making.

EIGRP

 For neighbor discovery and recovery, EIGRP neighbors send hello packets. If you send and receive hello packets, EIGRP will form a neighbor relationship with another router. If you receive hello packets from the other side, EIGRP will assume the other router is still present. When you no longer receive them, you’ll lose the neighbor relationship called adjacency, and EIGRP might have to look for another route.

EIGRP uses RTP (Reliable Transport Protocol) to deliver packets between neighbors in a reliable and orderly manner. There are two ways to send packets, multicast and unicast, and not all packets are sent reliably to keep things efficient. We need acknowledgment from the other side to ensure our packets are reliable.

EIGRP topology

Analysis:

    • Populating the Topology Table

EIGRP populates its topology table by exchanging Hello and Update packets with neighboring routers. These packets carry information about the network’s topology, such as feasible successors, advertised distances, and reported distances. As EIGRP receives these updates, its topology table will be updated accordingly.

    • Computing the Best Paths

Once the topology table is populated, EIGRP utilizes the DUAL algorithm to determine the best paths to reach destination networks. The algorithm considers bandwidth, delay, reliability, and load to calculate each route’s composite metric, the metric value. This metric value aids in selecting the optimal path for packet forwarding.

    • Maintaining and Updating the Topology Table

The EIGRP topology table is a dynamic entity that undergoes constant updates. EIGRP ensures that the topology table is kept current as changes occur in the network. When a link or router fails, EIGRP recalculates paths based on the remaining available routes and updates the topology table accordingly.

Routing convergence: Determine the Best Path

A router runs its algorithm and determines the best path to a particular destination; the router then notifies all of the neighboring routers of its current path; concurrently, the router’s neighbors also inform the router of their best paths. All of this occurs in a process known as routing convergence.

Rouitng Convergence

Forwarding in Networking


Detect


Describe


Switch 


Find

After seeing all the other best paths from its neighboring devices, the router may notice that there is a better path through one of its neighbors. If so, the router updates its routing table with better paths. A link-state algorithm employs a replicated database approach compared to a Distance Vector Algorithm ( distributed calculation ).

Each router contributes to database pieces; every device adds an element to create a complete network map. However, instead of advertising a list of distances to each known destination, the router advertises the states of its local links ( interfaces ).

routing convergence
The well-known steps in routing convergence.

Link state advertisements

These link-state advertisements are then advertised to the other routers; all these messages combine to complete a network database synchronized between each router at regular intervals.

Essentially, link-state protocols must flood information about the topology to every device in the network, and the distance ( path ) vector protocols must process the topology change information at every hop through the network.

 A final note on forwarding protocols: Forwarding routing protocols

Routing protocols continually reevaluate their contents, and the process of finding new information after a change in the network is called convergence. A network deemed to be highly available must have not only a redundant physical topology but also fast convergence so that service degradation or interruption is avoided. Convergence should be designed efficiently at Layer 2 and Layer 3 levels.

Fast convergence of Layer 2 environments is designed with the Spanning Tree Protocol ( STP ) enhancements, notably PVST+. In L3 environments, we prefer routing protocols that can quickly find new information ( next hops ), with protocols having a short convergence. 

You might conclude from the descriptions of both link-state and distance-vector protocols that link-state algorithms will always converge more quickly than distance or path-vector protocols. However, this isn’t the case; both converge exceptionally promptly if the underlying network has been designed and optimized for operation. 

Closing Points: Forwarding Routing Protocols

Forwarding routing protocols play a crucial role in efficiently transmitting data across networks. This blog post delved into forwarding routing protocols, exploring their significance, functionality, and types. By the end, you will clearly understand how these protocols enable seamless communication between devices on a network.

Forwarding routing protocols have several key benefits that make them essential in network communication:

1. Scalability: Forwarding routing protocols enable networks to expand and accommodate a growing number of devices. These protocols dynamically adapt to changes in network topology, allowing for the seamless integration of new devices and routes.

2. Redundancy: Forwarding routing protocols continuously exchange routing information to ensure alternative paths are available in case of link failures. This redundancy enhances network reliability and minimizes downtime.

3. Load Balancing: Forwarding routing protocols distribute network traffic across multiple paths, optimizing network performance and preventing congestion. This feature allows for efficient utilization of network resources.

Types of Forwarding Routing Protocols:

Various forwarding routing protocols are designed to cater to specific network requirements. Let’s explore some of the most commonly used types:

1. Distance Vector Protocols:

Distance vector protocols, such as the Routing Information Protocol (RIP), use a simple approach to determining the best path. Routers exchange their routing tables, which contain information about the distance and direction of various network destinations. RIP, for example, evaluates paths using hop count as a metric.

2. Link State Protocols:

Link state protocols, such as Open Shortest Path First (OSPF), build a detailed database of the network’s topology. Routers share information about their directly connected links, allowing each router to construct a complete network view. This comprehensive knowledge enables OSPF to calculate the shortest path to each destination.

3. Hybrid Protocols:

Hybrid protocols, like Enhanced Interior Gateway Routing Protocol (EIGRP), combine elements of both distance vector and link state protocols. These protocols balance simplicity and efficiency, utilizing fast convergence and load-balancing features to optimize network performance.

Forwarding routing protocols are essential for ensuring reliable and efficient data transmission in computer networks. By determining the optimal paths for data packets, these protocols contribute to the overall performance and stability of the network. Understanding different forwarding routing protocols, such as RIP, OSPF, and BGP, is crucial for network administrators and engineers to design and manage robust networks.

Forwarding protocols are vital in modern networking, enabling efficient data routing and seamless network communication. Understanding these protocols’ different types, benefits, and challenges is crucial for network administrators and engineers. Organizations can confidently navigate the digital highway by implementing best practices and staying abreast of advancements in forwarding routing protocols.

Summary: Forwarding Routing Protocols

In the vast landscape of computer networks, efficient data transmission is critical. Forwarding routing protocols play a crucial role in ensuring that data packets are delivered accurately and swiftly. In this blog post, we explored the world of forwarding routing protocols, their types, and their significance in modern networking.

Understanding Forwarding Routing Protocols

Forwarding routing protocols are algorithms routers use to determine the best path for data packets to traverse through a network. They enable routers to make informed decisions based on various factors such as network topology, cost metrics, and congestion levels. These protocols optimize network performance and ensure reliable data transmission by efficiently forwarding packets.

Types of Forwarding Routing Protocols

There are several forwarding routing protocols, each with its characteristics and use cases. Let’s explore a few prominent ones:

Distance Vector Protocols

Distance Vector protocols, such as Routing Information Protocol (RIP), share routing information with neighboring routers. They exchange routing tables periodically, making routing decisions based on the number of hops to reach a destination. While simple to implement, distance vector protocols may suffer from slow convergence and limited scalability.

Link State Protocols

Link State protocols, like Open Shortest Path First (OSPF), take a different approach. Routers in a link state network maintain detailed information about the network’s topology. Routers build a comprehensive network view by flooding link state advertisements and calculating the shortest path to each destination. Link state protocols offer faster convergence and better scalability but require more computational resources.

Hybrid Protocols

Hybrid protocols, such as Enhanced Interior Gateway Routing Protocol (EIGRP), combine the advantages of both distance vector and link state protocols. They offer the simplicity of distance vector protocols while providing faster convergence and better scalability. Hybrid protocols are widely used in enterprise networks.

Significance of Forwarding Routing Protocols

Forwarding routing protocols are crucial for efficient network operations. They bring several benefits to the table:

Optimal Path Selection

By analyzing network metrics and topology, forwarding routing protocols enable routers to choose the most efficient path for packet forwarding. This results in reduced latency, improved network reliability, and better overall performance.

Load Balancing

Many forwarding routing protocols support load balancing, distributing traffic across multiple paths. This helps prevent congestion on certain links and ensures efficient resource utilization throughout the network.

Fault Tolerance

Forwarding routing protocols often incorporate mechanisms to handle link failures and reroute traffic dynamically. In case of link failures, routers can quickly adapt and find alternative paths, minimizing downtime and maintaining network connectivity.

Conclusion:

In conclusion, forwarding routing protocols are the backbone of modern computer networks. They provide the intelligence needed for routers to make informed decisions, ensuring efficient packet forwarding and optimal network performance. By understanding the different types and significance of forwarding routing protocols, network administrators can design robust and scalable networks that meet the demands of today’s digital world.