Route summarisation is used in order to reduce the number of routes that a router has to carry. The benefits of summarisation are:
- reduced memory requirements
- reduced bandwidth requirements since there are less routes to carry in routing updates
An example follows:
RtrA --- RtrB
Say router A has 4 routes it wants to advertise to RtrB:
IT could announce all four of these routes or it could summarise the 4 routes into 10.1.0.0/22. In terms of routing, it makes absolutely no difference whether you advertise the 4 routes separately or whether you advertise the single summary. But the single summary provides the advantages I've listed above.
Right, Paresh explained well. But there is one disadvantage of using route summarization.
When full routes are not sent to remote device then remote device dont have full information abt each and every route. In such a case chances of routing loops are there. One advantage other than Paresh mentioned is if there is any link fluctuation or any route failure then this will not be floated beyond the router where route summarization is enabled.
A huge benefit with route summarization in a large EIGRP network is that it reduces wide spread EIGRP query activity by establishing query boundries. This reduces EIGRP network activity, improves convergence times, and helps prevent SIA (stuck in active) conditions.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...