Dynamic routing Protocol performs the same function as static routing Protocol does. In dynamic routing Protocol, if the destination is unreachable then an another entry, in the routing table, to the same destination can be used. One of the routing Protocol is EIGRP.
Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic routing Protocol which is used to find the best path between any two layer 3 device to deliver the packet. EIGRP works on network layer Protocol of osi model and uses the protocol number 88.It uses metric to find out best path between two layer 3 device (router or layer 3 switch) operating EIGRP. Administrative Distance for EIGRP are:-
|EIGRP routes||AD values|
It uses some messages to communicate with the neighbour devices that operates EIGRP. These are :-
- Hello message-These messages are keep alive messages which are exchanged between two devices operating EIGRP. These messages are used for neighbour discovery/recovery, if there is any device operating EIGRP or if any device(operating EIGRP) coming up again.
These messages are used for neighbor discovery if multicast at 22.214.171.124. It contains values like AS number, k values etc.
These messages are used as acknowledgment when unicast. A hello with no data is used as the acknowledgment.
- NULL update-It is used to calculate SRTT(Smooth Round Trip Timer) and RTO(Retransmission Time Out).
SRTT:The time is taken by a packet to reach neighboring router and the acknowledgment of the packet to reach to the local router.
RTO: If a multicast fails then unicast are being sent to that router. RTO is the time for which the local router waits for an acknowledgment of the packet.
- Full Update – After exchanging hello messages or after the neighbourship is formed, these messages are exchanged. This message contains all the best routes.
- Partial update-These messages are exchanged when there is a topology change and new links are added. It contains only the new routes, not all the routes. These messages are multicast.
- Query message-These messages are multicast when the device is declared dead and it has no routes to it in its topology table.
- Reply message – These messages are the acknowledgment of the query message sent to the originator of the query message stating the route to the network which has been asked in the query message.
- Acknowledgement message
It is used to acknowledge EIGRP update, queries, and replies. Acks are hello packets that contain no data.
Note:-Hello, and acknowledgment packets do not require any acknowledgment.
Reply, query, update messages are reliable messages i.e requires acknowledgement.
Composite matrix-The EIGRP composite metric calculation can use up to 5 variables, but only 2 are used by default (K1 and K3). The composite metric values are :
The lowest bandwidth, load, delay, reliability, MTU along the path between the source and the destination is considered in the composite matrix in order to calculate the cost.
Note:- Generally, only k1 and k3 values are used for metric calculation by EIGRP. The values are 10100 for k1, k2, k3, k4, k5 respectively.
criteria To form EIGRP neighbourship, these criteria should be fulfilled:-
- k values should match.
- Autonomous system number should match. (AS is a group of networks running under a single administrative control) .
- authentication should match (if applied). EIGRP supports MD5 authentication only.
- subnet mask should be same.
Hello timer- The interval in which EIGRP sends a hello message on an interface. It is 5 seconds by default.
Dead timer- The interval in which the neighbor will be declared dead if it is not able to send the hello packet. It is 15 seconds by default.
- EIGRP Cost Calculation
- Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF) Protocol fundamentals
- EIGRP Configuration
- Difference between IGRP and EIGRP
- Difference between EIGRP and OSPF
- Difference between Spoofing and Phishing
- Introduction of Botnet in Computer Networks
- Difference between Bandwidth and Throughput
- Difference between EIGRP and OSPF
- OSI, TCP/IP and Hybrid models
- Local Broadcast and Loopback Address
- Internet of Things Based on Compressive Sensing
- Voice Biometric Technique in Network Security
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.