Discontiguous Subnets
One of the problems frequently encountered with classful routing protocols
is the need to support discontiguous subnets. A discontiguous subnet is two or
more portions of a major network that are divided by another major network.
Figure 3.3 illustrates the concept.
As shown, the major network 10.0.0.0 is split by the network 192.168.10.0.
When running a classful routing protocol, RIP for example, each router believes
that the major network is contained entirely outside its interface. Therefore,
the router on the left believes that the entire 10.0.0.0 network is available
outside the interface connected to the left. The same is true for the router on
the right.
Administrators can resolve discontiguous subnet problems by using tunnels,
or secondary interfaces, to link the two portions of the major network. This,
in effect, makes the two networks contiguous. A better solution is to use a
classless routing protocol that can summarize and accurately maintain
information regarding the two halves of the network. This also avails VLSM and
other features to the network and typically simplifies administration.
Discontiguous networks can be
addressed with static mappings and other techniques; however, this can lead
to black holes. This concept is presented in Chapter 13; briefly
however, a black hole may leave a network unreachable under various failure
scenarios.
Address Summarization
Address summarization provides a powerful function in IP networks. Under
normal circumstances, each subnet would require a routing entry on every router
in order to get packets to their destination. Thus, a collection of 32 subnets
would require 32 routes on every router.
However, the router is concerned only with the path to the destination. As
noted previously, a single default route could provide this path. While this
configuration seriously limits redundancy and scalability in the network, it is
a reasonable solution.
The compromise approach incorporates address summarization. Summarization
can present hundreds of routes as a single entry in the routing table. This
reduces memory demands and can prevent the need to recalculate a route should
only a portion of the summarized network fail. For example, if 10.0.0.0 is
available only via the FDDI (Fiber Distributed Date Interface) ring, it makes
little difference if 10.12.24.0 is unavailable because the administrator shut
down its interface.
Consider the following block of network addresses:
• 192.168.4.0
• 192.168.5.0
• 192.168.6.0
• 192.168.7.0
Each of these addresses would
typically be deployed with the natural Class C mask—255.255.255.0. This would
result in four route entries and four access-list entries. However, it would be
much more efficient to use a single route entry and a single access list to
represent all four address blocks.
Consider the binary representation of these addresses :
Notice how the only variance in the addresses is limited to two bits,
offset in bold? In order for the router to understand the range of addresses
that is important, the administrator need only define the base address—
192.168.4.0—and the number of bits that are significant—22. The 23rd and 24th
bits don’t matter, as whatever they equal still meets the range.
As a result of summarization, the network may be referenced as
192.168.4.0/22, or 255.255.252.0—the 23rd and 24th bits are moot. This
summarization may be used in access lists (defined with a wildcard mask) or
routing entries, although administrators should take care when using
summarization and non-subnet-aware routing protocols. This topic will be
discussed in detail in Chapter 4.
Summarization can be accomplished because the range of addresses meets two
very important criteria. These are:
The range of addresses is a power of two. In this example, there are four
addresses in the range.
- The significant byte, which in this example is the third octet, is a multiple of the number of subnets in the range. Again, this number is four.
Consider summarization in a network’s design along with addressing. An
addressing plan that places three subnets in each remote office will likely not
summarize at all—192.168.3.0 through 192.168.5.255, for example. This leads to
inefficiencies that are too important to ignore if the network is to scale, and
as a result it is generally preferable to skip addresses in the assignment
process so that each range provides for growth and evenness. It is not uncommon
to assign eight 254-host networks to a fairly small office, although it is
practical to do so only when using RFC 1918 address space.
Beyond the academic presentation of summarization, designers will find in
subsequent chapters and their designs that summarization is imperative to the
configuration of a hierarchical network. Without effective summarization, the
network cannot scale and becomes difficult to administer.


Tidak ada komentar:
Posting Komentar