SlideShare une entreprise Scribd logo
1  sur  23
Routing Protocols
Prepared by
Risala Tasin Khan
Associate Professor
IIT, JU
Introduction
• The term “routing” refers to taking a packet from one device and
sending it through the network to other device on a different
network.
• Routers don’t really care about hosts------they only care about
networks and the best path to each one of them.
• The logical network address of the destination host is key to get
packets through a routed network.
• It’s the hardware address of the host that’s used to deliver he packet
from a router and ensure it arrives at the correct destination host.
Minimum factors a router must know
• Here is an important list of the minimum factors a router must know
to be able to affectively route packets:
• Destination Logical Address
• Neighbor routers from which it can learn about remote networks
• Possible routes to all remote networks
• The best route to each remote network
• How to maintain and verify routing information.
• The router learns about remote networks from neighboring routers or
from an administrator.
• The router then builds a routing table, which is basically a map of the
internetwork, and it describes how to find remote networks.
Routing…
• If a network is directly connected, then the router already knows how to get to it.
• But if a network is not directly connected to the router, the router must use one
of two ways to learn how to get to the remote network.
• The static routing method requires someone to hand-type all network locations
into the routing table.
• But when dynamic routing is used, a protocol on one router communicates with
the same protocol running on neighboring routers.
• The routers then update each other about all the networks they know about and place this
information into the routing table.
• If a change occurs in the network, the dynamic routing protocols automatically
inform all routers about the event.
• If static routing is used, the administrator is responsible fro updating all changes
by hand onto all routers.
TCP/IP Protocol Suite 5
Figure:1 Autonomous systems
An autonomous system is a set of networks and routers under
the control of a single administrative authority.
Routing within an autonomous system is intradomain routing.
Routing between autonomous systems is interdomain routing.
TCP/IP Protocol Suite 6
Figure 14.2 Popular routing protocols
TCP/IP Protocol Suite 7
DISTANCE VECTOR ROUTING
• In distance vector routing, the least cost route between any two nodes is the
route with minimum distance.
• In this protocol each node maintains a vector (table) of minimum distances
to every node
• Routers using distance-vector protocol do not have knowledge of the entire path to
a destination.
• Instead they use two methods:
1. Direction in which router or exit interface a packet should be forwarded.
2. Distance from its destination
• Distance-vector protocols are based on calculating the direction and distance to any
link in a network.
• "Direction" usually means the next hop address and the exit interface.
• "Distance" is a measure of the cost to reach a certain node.
• The least cost route between any two nodes is the route with minimum distance.
• Each node maintains a vector (table) of minimum distance to every node.
• The cost of reaching a destination is calculated using various route metrics.
• RIP uses the hop count of the destination whereas IGRP takes into account other
information such as node delay and available bandwidth.
TCP/IP Protocol Suite 8
Figure 14.4 Initialization of tables in distance vector routing
In distance vector routing, each node shares its table with
its immediate neighbor periodically (eg every 30s) and when
there is a change.
TCP/IP Protocol Suite 9
Figure 3 Distance vector routing tables
TCP/IP Protocol Suite 10
Figure.4 Updating in distance vector routing
Step 1: Add cost (2) to table received from neighbor (C).
Step 2: Compare Modified Table with Old Table (row by row).
If Next node entry is different, select the row with the smaller
cost. If tie, keep the old one.
If Next node entry the same, select the new row value (regard-
less of whether new value is smaller or not).
TCP/IP Protocol Suite 11
Figure 5 Two-node instability – what can happen with distance vector routing
Both A and B know
where X is.
Link between A and X
fails. A updates its
table immediately.
But before A can tell B,
B sends its info to A!
A, using B’s info, up-
dates its table (error!).
Then A send its table
to B and B updates its
table (more error).
Both routers keep up-
dating tables, event-
ually hitting infinity. In
the meantime, chaos!
TCP/IP Protocol Suite 12
Two-node instability – what can happen with distance vector routing
Possible Solutions to two-node instability:
1. Define infinity to be a much smaller value, such as 100.
Then it doesn’t take too long to become stable.
2. Split Horizon – instead of flooding entire table to each
node, only part of its table is sent. More precisely, if node
B thinks that the optimum router to reach X is via A, then
B does not need to advertise this piece of info to A – the
info has already come from A.
3. Split Horizon and Poison Reverse – Normally, the distance
vector protocol uses a timer. If there is no news about a
route, the node deletes the route from its table. So when A
never hears from B about the route to X, it deletes it.
Instead, Node B still advertises the value for X, but if the
source of info is A, it replaces the distance with infinity,
saying “Do not use this value; what I know about this route
comes from you.”
TCP/IP Protocol Suite 13
Three-node instability – no solutions here!
TCP/IP Protocol Suite 14
RIP
• The Routing Information Protocol (RIP) is an intra domain routing
protocol used inside an autonomous system.
• It is a very simple protocol based on distance vector routing.
• RIP prevents routing loops by implementing a limit on the number of
hops allowed in a path from the source to a destination.
• The maximum number of hops allowed for RIP is 15.
• This hop limit, however, also limits the size of networks that RIP can
support.
1) RIPv1 is Classful routing protocol and RIPv2 Classless routing protocol.
2) In RIPv1, subnet masks are NOT included in the routing update and In
RIPv2 Subnet masks are included in the routing update.
• RIPv2 supports CIDR supernets, VLSM and discontiguous networks.
TCP/IP Protocol Suite 15
Figure 14.8 Example of a domain using RIP
Note the
metric used
here for Cost
is simply the
hop count.
• Originally each RIP router transmitted full updates within every 30
seconds to all the routers in the network.
• In the early deployments, routing tables were small enough that the
traffic was not significant.
• As networks grew in size, it became evident that there could be
massive traffic burst in every 30 seconds even if the router had been
initialized at random times.
• RIP uses UDP as transport protocol and assigned a reserved port
number 520
RIP Version 1
• Version 1 is the most-deployed version as it is compatible with all RIP-
capable devices.
• The periodic routing updates do not carry subnet information as it
does not support VLSM
• Therefore, any IP address is treated as classful address
• This limitation makes it impossible to have different-sized subnets
inside the same network class.
• In other words, all subnets in a subnet class must have the same size.
• There is also no support for router authentication, making RIP
vulnerable to various attack.
RIP Version 2
• Developed in 1993
• Last standardized in 1998
• Ability to carry subnet information
• To maintain backward compatibility, the hop count limit of 15 remained.
• RIPv2 multicasts the entire routing table to all adjacent routers at the address
224.0.0.9
• In RIP, routing updates are exchanged between neighbors approximately every
30 seconds using a RIP response message.
• The response message sent by a router or host contains a list of up to 25
destination subnets within the AS, as well as the sender’s distance to each of
those subnets.
• Response messages are also known as RIP advertisements.
Network Layer 4-19
RIP ( Routing Information Protocol)
Consider the portion of an AS shown in Figure.
In this figure, lines connecting the routers denote subnets.
Only selected routers (A, B, C, and D) and subnets (w, x, y, and z) are labeled.
Dotted lines indicate that the AS continues on; thus this autonomous system has many more
routers and links than are shown
Each router maintains a RIP table known as a routing table. A router’s routing table includes both
the router’s distance vector and the router’s forwarding table
D
C
B
A
u v
w
x
y
z
subnet hops
u 1
v 2
w 2
x 3
y 3
z 2
from router A to destination subnets:
Network Layer 4-20
RIP: example
destination subnet next router # hops to dest
w A 2
y B 2
z B 7
x -- 1
…. …. ....
routing table in router D
w x y
z
A
C
D B
• The routing table
has three
columns.
• The first column
is for the
destination
subnet,
• The second
column indicates
the identity of
the next router
along the
shortest path to
the destination
subnet,
• And the third
column indicates
the number of
hops to get to the
destination
subnet
RIP Example
• Now suppose that 30 seconds later, router D receives from router A the
advertisement.
• Note that this advertisement is nothing other than the routing table
information from router A!
• This information indicates, in particular, that subnet z is only four hops
away from router A.
• Router D, upon receiving this advertisement, merges the advertisement
with the old routing table
• In particular, router D learns that there is now a path through router A to
subnet z that is shorter than the path through router B.
• Thus, router D updates its routing table to account for the shorter shortest
path.
Network Layer 4-22
w x y
z
A
C
D B
destination subnet next router # hops to dest
w A 2
y B 2
z B 7
x -- 1
…. …. ....
routing table in router D
A 5
dest next hops
w - 1
x - 1
z C 4
…. … ...
A-to-D advertisement
RIP: example
Network Layer 4-23
RIP: link failure, recovery
if no advertisement heard after 180 sec -->
neighbor/link declared dead
 routes via neighbor invalidated
 new advertisements sent to neighbors
 neighbors in turn send out new advertisements (if tables
changed)
 poison reverse used to prevent ping-pong loops (infinite
distance = 16 hops)

Contenu connexe

Similaire à Routing Protocols.pptx

Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing nCYBERINTELLIGENTS
 
16 coms 525 tcpip - routing protocols -all
16    coms 525 tcpip - routing protocols -all16    coms 525 tcpip - routing protocols -all
16 coms 525 tcpip - routing protocols -allPalanivel Kuppusamy
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing ProtocolsBIT DURG
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Amna Nawazish
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsHarsh Mehta
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector RoutingShouvikDhali
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicastinghamsa nandhini
 
Presentation 2
Presentation 2Presentation 2
Presentation 2Haripritha
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptxUNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptxsatvikpatil5
 

Similaire à Routing Protocols.pptx (20)

Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
16 coms 525 tcpip - routing protocols -all
16    coms 525 tcpip - routing protocols -all16    coms 525 tcpip - routing protocols -all
16 coms 525 tcpip - routing protocols -all
 
computer communications
computer communicationscomputer communications
computer communications
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
Notes
NotesNotes
Notes
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Dvrp 1
Dvrp 1Dvrp 1
Dvrp 1
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Rip presentation
Rip presentationRip presentation
Rip presentation
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
UNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptxUNIT2-nw layer autonomy.pptx
UNIT2-nw layer autonomy.pptx
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
Day 10 rip (2)
Day 10 rip (2)Day 10 rip (2)
Day 10 rip (2)
 

Dernier

办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 

Dernier (20)

办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 

Routing Protocols.pptx

  • 1. Routing Protocols Prepared by Risala Tasin Khan Associate Professor IIT, JU
  • 2. Introduction • The term “routing” refers to taking a packet from one device and sending it through the network to other device on a different network. • Routers don’t really care about hosts------they only care about networks and the best path to each one of them. • The logical network address of the destination host is key to get packets through a routed network. • It’s the hardware address of the host that’s used to deliver he packet from a router and ensure it arrives at the correct destination host.
  • 3. Minimum factors a router must know • Here is an important list of the minimum factors a router must know to be able to affectively route packets: • Destination Logical Address • Neighbor routers from which it can learn about remote networks • Possible routes to all remote networks • The best route to each remote network • How to maintain and verify routing information. • The router learns about remote networks from neighboring routers or from an administrator. • The router then builds a routing table, which is basically a map of the internetwork, and it describes how to find remote networks.
  • 4. Routing… • If a network is directly connected, then the router already knows how to get to it. • But if a network is not directly connected to the router, the router must use one of two ways to learn how to get to the remote network. • The static routing method requires someone to hand-type all network locations into the routing table. • But when dynamic routing is used, a protocol on one router communicates with the same protocol running on neighboring routers. • The routers then update each other about all the networks they know about and place this information into the routing table. • If a change occurs in the network, the dynamic routing protocols automatically inform all routers about the event. • If static routing is used, the administrator is responsible fro updating all changes by hand onto all routers.
  • 5. TCP/IP Protocol Suite 5 Figure:1 Autonomous systems An autonomous system is a set of networks and routers under the control of a single administrative authority. Routing within an autonomous system is intradomain routing. Routing between autonomous systems is interdomain routing.
  • 6. TCP/IP Protocol Suite 6 Figure 14.2 Popular routing protocols
  • 7. TCP/IP Protocol Suite 7 DISTANCE VECTOR ROUTING • In distance vector routing, the least cost route between any two nodes is the route with minimum distance. • In this protocol each node maintains a vector (table) of minimum distances to every node • Routers using distance-vector protocol do not have knowledge of the entire path to a destination. • Instead they use two methods: 1. Direction in which router or exit interface a packet should be forwarded. 2. Distance from its destination • Distance-vector protocols are based on calculating the direction and distance to any link in a network. • "Direction" usually means the next hop address and the exit interface. • "Distance" is a measure of the cost to reach a certain node. • The least cost route between any two nodes is the route with minimum distance. • Each node maintains a vector (table) of minimum distance to every node. • The cost of reaching a destination is calculated using various route metrics. • RIP uses the hop count of the destination whereas IGRP takes into account other information such as node delay and available bandwidth.
  • 8. TCP/IP Protocol Suite 8 Figure 14.4 Initialization of tables in distance vector routing In distance vector routing, each node shares its table with its immediate neighbor periodically (eg every 30s) and when there is a change.
  • 9. TCP/IP Protocol Suite 9 Figure 3 Distance vector routing tables
  • 10. TCP/IP Protocol Suite 10 Figure.4 Updating in distance vector routing Step 1: Add cost (2) to table received from neighbor (C). Step 2: Compare Modified Table with Old Table (row by row). If Next node entry is different, select the row with the smaller cost. If tie, keep the old one. If Next node entry the same, select the new row value (regard- less of whether new value is smaller or not).
  • 11. TCP/IP Protocol Suite 11 Figure 5 Two-node instability – what can happen with distance vector routing Both A and B know where X is. Link between A and X fails. A updates its table immediately. But before A can tell B, B sends its info to A! A, using B’s info, up- dates its table (error!). Then A send its table to B and B updates its table (more error). Both routers keep up- dating tables, event- ually hitting infinity. In the meantime, chaos!
  • 12. TCP/IP Protocol Suite 12 Two-node instability – what can happen with distance vector routing Possible Solutions to two-node instability: 1. Define infinity to be a much smaller value, such as 100. Then it doesn’t take too long to become stable. 2. Split Horizon – instead of flooding entire table to each node, only part of its table is sent. More precisely, if node B thinks that the optimum router to reach X is via A, then B does not need to advertise this piece of info to A – the info has already come from A. 3. Split Horizon and Poison Reverse – Normally, the distance vector protocol uses a timer. If there is no news about a route, the node deletes the route from its table. So when A never hears from B about the route to X, it deletes it. Instead, Node B still advertises the value for X, but if the source of info is A, it replaces the distance with infinity, saying “Do not use this value; what I know about this route comes from you.”
  • 13. TCP/IP Protocol Suite 13 Three-node instability – no solutions here!
  • 14. TCP/IP Protocol Suite 14 RIP • The Routing Information Protocol (RIP) is an intra domain routing protocol used inside an autonomous system. • It is a very simple protocol based on distance vector routing. • RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. • The maximum number of hops allowed for RIP is 15. • This hop limit, however, also limits the size of networks that RIP can support. 1) RIPv1 is Classful routing protocol and RIPv2 Classless routing protocol. 2) In RIPv1, subnet masks are NOT included in the routing update and In RIPv2 Subnet masks are included in the routing update. • RIPv2 supports CIDR supernets, VLSM and discontiguous networks.
  • 15. TCP/IP Protocol Suite 15 Figure 14.8 Example of a domain using RIP Note the metric used here for Cost is simply the hop count.
  • 16. • Originally each RIP router transmitted full updates within every 30 seconds to all the routers in the network. • In the early deployments, routing tables were small enough that the traffic was not significant. • As networks grew in size, it became evident that there could be massive traffic burst in every 30 seconds even if the router had been initialized at random times. • RIP uses UDP as transport protocol and assigned a reserved port number 520
  • 17. RIP Version 1 • Version 1 is the most-deployed version as it is compatible with all RIP- capable devices. • The periodic routing updates do not carry subnet information as it does not support VLSM • Therefore, any IP address is treated as classful address • This limitation makes it impossible to have different-sized subnets inside the same network class. • In other words, all subnets in a subnet class must have the same size. • There is also no support for router authentication, making RIP vulnerable to various attack.
  • 18. RIP Version 2 • Developed in 1993 • Last standardized in 1998 • Ability to carry subnet information • To maintain backward compatibility, the hop count limit of 15 remained. • RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9 • In RIP, routing updates are exchanged between neighbors approximately every 30 seconds using a RIP response message. • The response message sent by a router or host contains a list of up to 25 destination subnets within the AS, as well as the sender’s distance to each of those subnets. • Response messages are also known as RIP advertisements.
  • 19. Network Layer 4-19 RIP ( Routing Information Protocol) Consider the portion of an AS shown in Figure. In this figure, lines connecting the routers denote subnets. Only selected routers (A, B, C, and D) and subnets (w, x, y, and z) are labeled. Dotted lines indicate that the AS continues on; thus this autonomous system has many more routers and links than are shown Each router maintains a RIP table known as a routing table. A router’s routing table includes both the router’s distance vector and the router’s forwarding table D C B A u v w x y z subnet hops u 1 v 2 w 2 x 3 y 3 z 2 from router A to destination subnets:
  • 20. Network Layer 4-20 RIP: example destination subnet next router # hops to dest w A 2 y B 2 z B 7 x -- 1 …. …. .... routing table in router D w x y z A C D B • The routing table has three columns. • The first column is for the destination subnet, • The second column indicates the identity of the next router along the shortest path to the destination subnet, • And the third column indicates the number of hops to get to the destination subnet
  • 21. RIP Example • Now suppose that 30 seconds later, router D receives from router A the advertisement. • Note that this advertisement is nothing other than the routing table information from router A! • This information indicates, in particular, that subnet z is only four hops away from router A. • Router D, upon receiving this advertisement, merges the advertisement with the old routing table • In particular, router D learns that there is now a path through router A to subnet z that is shorter than the path through router B. • Thus, router D updates its routing table to account for the shorter shortest path.
  • 22. Network Layer 4-22 w x y z A C D B destination subnet next router # hops to dest w A 2 y B 2 z B 7 x -- 1 …. …. .... routing table in router D A 5 dest next hops w - 1 x - 1 z C 4 …. … ... A-to-D advertisement RIP: example
  • 23. Network Layer 4-23 RIP: link failure, recovery if no advertisement heard after 180 sec --> neighbor/link declared dead  routes via neighbor invalidated  new advertisements sent to neighbors  neighbors in turn send out new advertisements (if tables changed)  poison reverse used to prevent ping-pong loops (infinite distance = 16 hops)