EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

What is EIGRP?

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Cyber Security Tutorial » What is EIGRP?

What-is-EIGRP

Introduction to EIGRP

Enhanced Interior Gateway Routing Protocol or EIGRP automates the routing decisions and configurations in computer networking. Cisco designed the protocol and is available only on Cisco routers. Minimum bandwidth is used from the source to destination, and the delay is measured using metrics of the network. This is an advanced protocol to measure the distance and uses both link servicing and distance routing. Hence it is called a hybrid protocol. It transitions well with IPv6 and has the support of IPv4 as well. This is a classless routing technique. Two routers are connected, and the network is shared in EIGRP.

What is EIGRP?

Enhanced Interior Gateway Routing Protocol is an advanced distance vector routing protocol based on the principles of the Interior Gateway Routing Protocol (IGRP). It has a unique characteristic that improves the operational ability and fast converging rate. It can determine the shortest path distance vector, and it works on the principle of Interior Gateway Routing Protocol, a classless routing protocol. It uses metrics like bandwidth, load and delays to calculate the shortest optimal network route. It is a technologically, more advanced distance vector-based routing protocol. To exchange information using EIGRP, first and foremost, the routers need to become neighbors to EIGRP, then EIGRP uses the multicast address to share the information.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

Enhanced Interior Gateway Routing Protocol underlying logic is based on the concept of an autonomous system. In a system where each router should become neighbors to EIGRP and each system tagged as neighbors under Enhanced Interior, Gateway Routing Protocol will have the same system number configured.

Fundamentals of EIGRP

Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic routing protocol used for routers’ decisions and configuration. EIGRP only sends incremental updates, which in short reduces the workload of the routers and the amount of information transmitted. EIGRP is a classic hybrid protocol that supports classless routing, it supports automatic & manual summarization on an EIGRP enabled interface. It MD5 authentication on routers running EIGRP and also has a maximum hop count close to 255. EIGRP performs load balancing over the equal-cost path and un-equal cost path.

To perform the functions of EIGRP, it creates three tables which are:

  • Neighbor Table
  • Topology Table
  • Routing Table

Following represents the ideology and concepts behind the three major tables:

1. Neighbor Table

  • The neighbor table contains information about routers and neighborship relationships with those whom have been established.
  • Command to list router information: ‘show ip eigrp neighbors’.
  • The Neighbor Table has Fields like H: Handle, Address, Interface, Hold Time, Uptime, Smooth Round Trip Time, Retransmission Timeout, Queue Count, Sequence Number.

2. Topology Table

  • The topology table holds information about all the paths to networks understood by EIGRP routers.
  • Command to list router information- ‘show ip eigrp’ topology.
  • The topology table holds the following fields Passive, Feasible Distance, Advertised distance, Feasible distance

3. Routing Table

  • The routing table stores the routes which are currently active in sending packets to the network. It stores the optimal route for the destination from the sender.
  • Command to List Router Information: ’show ipv6 route’.
  • The routing table holds the following fields D, 90/ 5632. Via 11.0.0.2, GigabitEthernet0/1.

Packet Types

  • Hello: It determines the neighbors’ router and also serves as a keep-alive mechanism between the routers. If Router X is connected with Router Y and the Router X is not receiving the hello packets from Router Y, then it assumes that Router Y is not reachable and the network is down.
  • Update: Updates are to send the information about the route to its neighbors. When a new router is found, the update packets sent to the neighbor to build up the topology table.
  • Query: Queries are used specifically for requesting route info. They act as multi-part until they send received queries as the response. It will send the queries only when the destination state is active.
  • Reply: Reply packets respond to a query that indicates the originator router that it does not need to go into an Active state as reliable successors for the destination network. Replies are sent when destinations go into an Active state. For the reply packet, an acknowledgment is sent.
  • ACK: Acknowledgment packet will be sent to Enhanced Interior Gateway Routing Protocol Query, Update and Reply packets. It is shared with unicast address and, also, acknowledgment not sent to Hello packets.

Benefits of EIGRP

  • Enhanced Interior Gateway Routing Protocol converges at fast rapid times for the changes in the network topology.
  • It makes use of link more effectively through (ECMP) Equal-Cost Multi-Path and unequal cost load sharing.
  • It performs a much easier transition with a multi-address family.
  • It supports both IPV4 and IPV6 networks.
  • It provides encryption for security and can be used with iBGP for WAN routing.
  • It reduces network traffic by making use of ‘need-based’ updates
  • Enhanced Interior Gateway Routing Protocol(EIGRP) is an advanced distance-vector routing protocol that is used on a computer network to help automate routing decisions and configuration.

Pros of EIGRP

  1. EIGRP with protocol-dependent modules can route several different layer protocols.
  2. EIGRP configuration was designed to be easy to configure.
  3. With EIGRP Autonomous number and network command, EIGRP can be enabled.
  4. EIGRP will converge in 200 milliseconds.
  5. EIGRP Is the protocol that performs unequal cost load balancing.
  6. If the destination has more than one link, it will identify the variance between the links.
  7. One of the more advanced features of EIGRP is Manual route summarization. It improves stability and reduces the routing table size.

Cons of EIGRP

  1. EIGRP routing protocol can be accessible with the CISCO network devices.
  2. EIGRP is a distance vector routing protocol, and it relies on routes provided by neighbors.
  3. It does not support future applications as it is not extensible.

Conclusion

EIGRP is the most advanced routing protocol that relies on distance vector, and state route links are effective in identifying the optimal route path. It will have more impact in real-time as it makes use of required resources, and the only disadvantage is that it is not extensible.

Recommended Article

This is a guide to What is EIGRP?. Here we discuss the Introduction to EIGRP and the Fundamentals, Benefits, Packet Types, and pros and cons. You can also go through our other suggested articles to learn more –

Popular Course in this category
Cyber Security Training (12 Courses, 3 Projects)12 Online Courses | 3 Hands-on Projects | 77+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (5,945 ratings)
Course Price

View Course

Related Courses
Ethical Hacking Training (9 Courses, 7+ Projects)Penetration Testing Training Program (2 Courses)
  1. Routing Algorithms
  2. Internet Control Message Protocol
  3. Types of Networking Protocols
  4. What is IPv4?

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More