SlideShare a Scribd company logo
1 of 58
Distance Vector RoutingDistance Vector Routing
ProtocolsProtocols
Vivek KumarVivek Kumar
Technical TrainerTechnical Trainer
Meaning of distance Vector (1/2)Meaning of distance Vector (1/2)
• A router using a distance vector routingA router using a distance vector routing
protocol does not have the knowledge ofprotocol does not have the knowledge of
the entire path to a destination network.the entire path to a destination network.
• The router only knowsThe router only knows
– The direction or interface in which packetsThe direction or interface in which packets
should be forwarded andshould be forwarded and
– The distance or how far it is to the destinationThe distance or how far it is to the destination
networknetwork
Meaning of distance Vector (2/2)Meaning of distance Vector (2/2)
Operation of distance vector (1/4)Operation of distance vector (1/4)
• Some distance vector routing protocolsSome distance vector routing protocols
call for the router to periodically broadcastcall for the router to periodically broadcast
the entire routing table to each of itsthe entire routing table to each of its
neighbors.neighbors.
• This method is inefficient because theThis method is inefficient because the
updates not only consume bandwidth butupdates not only consume bandwidth but
also consume router CPU resources toalso consume router CPU resources to
process the updates.process the updates.
Operation of distance vector (2/4)Operation of distance vector (2/4)
• Periodic UpdatesPeriodic Updates are sent at regular intervals (30are sent at regular intervals (30
seconds for RIP and 90 seconds for IGRP).seconds for RIP and 90 seconds for IGRP).
– Even if the topology has not changed in several days,Even if the topology has not changed in several days,
periodic updates continue to be sent to all neighbors.periodic updates continue to be sent to all neighbors.
– Neighbors are routers that share a link and areNeighbors are routers that share a link and are
configured to use the same routing protocol.configured to use the same routing protocol.
– The router is only aware of the network addresses ofThe router is only aware of the network addresses of
its own interfaces and the remote network addresses itits own interfaces and the remote network addresses it
can reach through its neighborscan reach through its neighbors
Operation of distance vector (3/4)Operation of distance vector (3/4)
• Broadcast UpdatesBroadcast Updates are sent toare sent to
255.255.255.255.255.255.255.255.
– Neighboring routers that are configured withNeighboring routers that are configured with
the same routing protocol will process thethe same routing protocol will process the
updates.updates.
– All other devices will also process the updateAll other devices will also process the update
up to Layer 3 before discarding it.up to Layer 3 before discarding it.
– Some distance vector routing protocols useSome distance vector routing protocols use
multicast addresses instead of broadcastmulticast addresses instead of broadcast
addresses.addresses.
Operation of distance vector (4/4)Operation of distance vector (4/4)
• Entire Routing Table UpdatesEntire Routing Table Updates are sent,are sent,
periodically to all neighbors.periodically to all neighbors.
– Neighbors receiving these updates mustNeighbors receiving these updates must
process the entire update to find pertinentprocess the entire update to find pertinent
information and discard the rest.information and discard the rest.
– Some distance vector routing protocols likeSome distance vector routing protocols like
EIGRP do not send periodic routing tableEIGRP do not send periodic routing table
updates.updates.
Routing AlgorithmRouting Algorithm
• The algorithm used for the routing protocolsThe algorithm used for the routing protocols
defines the following processes:defines the following processes:
– Mechanism for sending and receiving routingMechanism for sending and receiving routing
information.information.
– Mechanism for calculating the best paths andMechanism for calculating the best paths and
installing routes in the routing table.installing routes in the routing table.
– Mechanism for detecting and reacting toMechanism for detecting and reacting to
topology changes.topology changes.
Routing protocol characteristicsRouting protocol characteristics
(1/3)(1/3)
• Time to ConvergenceTime to Convergence - Time to convergence- Time to convergence
defines how quickly the routers in thedefines how quickly the routers in the
network topology share routing informationnetwork topology share routing information
and reach a state of consistent knowledge.and reach a state of consistent knowledge.
– The faster the convergence, the more preferableThe faster the convergence, the more preferable
the protocol.the protocol.
– Routing loops can occur when inconsistentRouting loops can occur when inconsistent
routing tables are not updated due to slowrouting tables are not updated due to slow
convergence in a changing network.convergence in a changing network.
Routing protocol characteristicsRouting protocol characteristics
(2/3)(2/3)
• ScalabilityScalability - Scalability defines how large a- Scalability defines how large a
network can become based on the routingnetwork can become based on the routing
protocol that is deployed.protocol that is deployed.
– The larger the network is, the more scalable the routingThe larger the network is, the more scalable the routing
protocol needs to be.protocol needs to be.
• Classless (Use of VLSM) or ClassfulClassless (Use of VLSM) or Classful - Classless- Classless
routing protocols include the subnet mask in therouting protocols include the subnet mask in the
updates.updates.
– This feature supports the use of Variable Length SubnetThis feature supports the use of Variable Length Subnet
Masking (VLSM) and better route summarization.Masking (VLSM) and better route summarization.
– Classful routing protocols do not include the subnetClassful routing protocols do not include the subnet
mask and cannot support VLSM.mask and cannot support VLSM.
Routing protocol characteristicsRouting protocol characteristics
(3/3)(3/3)
• Resource UsageResource Usage - Resource usage includes the- Resource usage includes the
requirements of a routing protocol such as memoryrequirements of a routing protocol such as memory
space, CPU utilization, and link bandwidthspace, CPU utilization, and link bandwidth
utilizationutilization
– Higher resource requirements necessitate more powerfulHigher resource requirements necessitate more powerful
hardware to support the routing protocol operation inhardware to support the routing protocol operation in
addition to the packet forwarding processes.addition to the packet forwarding processes.
• Implementation and MaintenanceImplementation and Maintenance - Implementation- Implementation
and maintenance describes the level of knowledgeand maintenance describes the level of knowledge
that is required for a network administrator tothat is required for a network administrator to
implement and maintain the network based on theimplement and maintain the network based on the
routing protocol deployed.routing protocol deployed.
Distance Vector Routing Protocols
Comparison of Routing ProtocolComparison of Routing Protocol
Periodic updatesPeriodic updates :RIP(1/3):RIP(1/3)
• The term periodic updates refers to the factThe term periodic updates refers to the fact
that a router sends the complete routingthat a router sends the complete routing
table to its neighbors at a predefinedtable to its neighbors at a predefined
interval.interval.
– For RIP, these updates are sent every 30For RIP, these updates are sent every 30
seconds as a broadcast (255.255.255.255)seconds as a broadcast (255.255.255.255)
whether or not there has been a topologywhether or not there has been a topology
change.change.
– This 30-second interval is a route update timerThis 30-second interval is a route update timer
that also aids in tracking the age of routingthat also aids in tracking the age of routing
information in the routing table.information in the routing table.
Periodic updates:RIPPeriodic updates:RIP (2/3)(2/3)
• The age of routing information in a routing table isThe age of routing information in a routing table is
refreshed each time an update is received.refreshed each time an update is received.
• This way information in the routing table can beThis way information in the routing table can be
maintained when there is a topology change.maintained when there is a topology change.
• Changes may occur for several reasons,Changes may occur for several reasons,
including:including:
– Failure of a linkFailure of a link
– Introduction of a new linkIntroduction of a new link
– Failure of a routerFailure of a router
– Change of link parametersChange of link parameters
Periodic updates:RIPPeriodic updates:RIP (3/3)(3/3)
RIP TimersRIP Timers (1/3)(1/3)
• In addition to the update timer, the IOS implementsIn addition to the update timer, the IOS implements
three additional timers for RIP:three additional timers for RIP:
• Invalid TimerInvalid Timer. If an update has not been received to. If an update has not been received to
refresh an existing route after 180 seconds (therefresh an existing route after 180 seconds (the
default), the route is marked as invalid by settingdefault), the route is marked as invalid by setting
the metric to 16.the metric to 16.
– The route is retained in the routing table until the flushThe route is retained in the routing table until the flush
timer expires.timer expires.
• Flush TimerFlush Timer. By default, the flush timer is set for. By default, the flush timer is set for
240 seconds, which is 60 seconds longer than the240 seconds, which is 60 seconds longer than the
invalid timer. When the flush timer expires, theinvalid timer. When the flush timer expires, the
route is removed from the routing table.route is removed from the routing table.
RIP TimersRIP Timers (2/3)(2/3)
• Holddown Timer. This timer stabilizesHolddown Timer. This timer stabilizes
routing information and helps preventrouting information and helps prevent
routing loops during periods when therouting loops during periods when the
topology is converging on new information.topology is converging on new information.
– Once a route is marked as unreachable, itOnce a route is marked as unreachable, it
must stay in holddown long enough for allmust stay in holddown long enough for all
routers in the topology to learn about therouters in the topology to learn about the
unreachable network.unreachable network.
– By default, the holddown timer is set for 180By default, the holddown timer is set for 180
seconds.seconds.
RIP TimersRIP Timers (3/3)(3/3)
Bounded Updates :EIGRP(1/2)Bounded Updates :EIGRP(1/2)
• Unlike other distance vector routing protocols,Unlike other distance vector routing protocols,
EIGRP does not send periodic updates.EIGRP does not send periodic updates.
• Instead, EIGRP sends bounded updates about aInstead, EIGRP sends bounded updates about a
route when a path changes or the metric for thatroute when a path changes or the metric for that
route changes.route changes.
• When a new route becomes available or when aWhen a new route becomes available or when a
route needs to be removedroute needs to be removed,, EIGRP sends anEIGRP sends an
update only about that network instead of theupdate only about that network instead of the
entire table.entire table.
• This information is sent only to those routers thatThis information is sent only to those routers that
need it.need it.
Bounded Updates :EIGRP(2/2)Bounded Updates :EIGRP(2/2)
• EIGRP uses updates that are:EIGRP uses updates that are:
– Non-periodic because they are not sent out onNon-periodic because they are not sent out on
a regular basis.a regular basis.
– Partial updates sent only when there is aPartial updates sent only when there is a
change in topology that influences routingchange in topology that influences routing
information.information.
– Bounded, meaning the propagation of partialBounded, meaning the propagation of partial
updates are automatically bounded so thatupdates are automatically bounded so that
only those routers that need the informationonly those routers that need the information
are updated.are updated.
Triggered UpdateTriggered Update (1/3)(1/3)
• To speed up the convergence when there is aTo speed up the convergence when there is a
topology change,topology change, RIP uses triggered updatesRIP uses triggered updates..
• A triggered update is a routing table update thatA triggered update is a routing table update that
is sent immediately in response to a routingis sent immediately in response to a routing
changechange..
• Triggered updates do not wait for update timersTriggered updates do not wait for update timers
to expire.to expire.
– The detecting router immediately sends an updateThe detecting router immediately sends an update
message to adjacent routers.message to adjacent routers.
– The receiving routers, in turn, generate triggeredThe receiving routers, in turn, generate triggered
updates that notify their neighbors of the change.updates that notify their neighbors of the change.
Triggered UpdateTriggered Update (2/3)(2/3)
• Triggered updates are sent when one ofTriggered updates are sent when one of
the following occurs:the following occurs:
– An interface changes state (up or down)An interface changes state (up or down)
– A route has entered (or exited) theA route has entered (or exited) the
"unreachable" state"unreachable" state
– A route is installed in the routing tableA route is installed in the routing table
Triggered UpdateTriggered Update (3/3)(3/3)
• However, there are two problems with triggeredHowever, there are two problems with triggered
updates:updates:
– Packets containing the update message can bePackets containing the update message can be
dropped or corrupted by some link in the network.dropped or corrupted by some link in the network.
– The triggered updates do not happen instantaneously. ItThe triggered updates do not happen instantaneously. It
is possible that a router that has not yet received theis possible that a router that has not yet received the
triggered update will issue a regular update at just thetriggered update will issue a regular update at just the
wrong time, causing the bad route to be reinserted in awrong time, causing the bad route to be reinserted in a
neighbor that had already received the triggeredneighbor that had already received the triggered
update.update.
Routing Loop (1/6)Routing Loop (1/6)
• A routing loop is a condition in which aA routing loop is a condition in which a
packet is continuously transmitted within apacket is continuously transmitted within a
series of routers without ever reaching itsseries of routers without ever reaching its
intended destination network.intended destination network.
• A routing loop can occur when two orA routing loop can occur when two or
more routers have routing information thatmore routers have routing information that
incorrectly indicates that a valid path to anincorrectly indicates that a valid path to an
unreachable destination exists.unreachable destination exists.
Routing Loop (2/6)Routing Loop (2/6)
• The loop may be a result of:The loop may be a result of:
– Incorrectly configured static routesIncorrectly configured static routes
– Incorrectly configured route redistributionIncorrectly configured route redistribution
(redistribution is a process of handing the routing(redistribution is a process of handing the routing
information from one routing protocol to anotherinformation from one routing protocol to another
routing protocol)routing protocol)
– Inconsistent routing tables not being updatedInconsistent routing tables not being updated
due to slow convergence in a changing networkdue to slow convergence in a changing network
– Incorrectly configured or installed discard routesIncorrectly configured or installed discard routes
Routing Loop (3/6)Routing Loop (3/6)
Routing Loop (4/6)Routing Loop (4/6)
Routing Loop (5/6)Routing Loop (5/6)
Routing Loop (6/6)Routing Loop (6/6)
Count to infinity (1/5)Count to infinity (1/5)
• Count to infinity is a condition that existsCount to infinity is a condition that exists
when inaccurate routing updates increasewhen inaccurate routing updates increase
the metric value to "infinity" for a networkthe metric value to "infinity" for a network
that is no longer reachable.that is no longer reachable.
Count to infinity (2/5)Count to infinity (2/5)
Count to infinity (3/5)Count to infinity (3/5)
Count to infinity (4/5)Count to infinity (4/5)
Count to infinity (5/5)Count to infinity (5/5)
Setting a Maximum (1/2)Setting a Maximum (1/2)
• To eventually stop the incrementing of theTo eventually stop the incrementing of the
metric, "infinity" is defined by setting ametric, "infinity" is defined by setting a
maximum metric value.maximum metric value.
• For example, RIP defines infinity as 16For example, RIP defines infinity as 16
hops - an "unreachable" metric.hops - an "unreachable" metric.
• Once the routers "count to infinity," theyOnce the routers "count to infinity," they
mark the route as unreachable.mark the route as unreachable.
Setting a Maximum (2/2)Setting a Maximum (2/2)
Preventing routing loop withPreventing routing loop with
holddown timerholddown timer (1/5)(1/5)
• Holddown timers are used to prevent regularHolddown timers are used to prevent regular
update messages from inappropriately reinstatingupdate messages from inappropriately reinstating
a route that may have gone bad.a route that may have gone bad.
• Holddown timers instruct routers to hold anyHolddown timers instruct routers to hold any
changes that might affect routes for a specifiedchanges that might affect routes for a specified
period of time.period of time.
• If a route is identified as down or possibly down,If a route is identified as down or possibly down,
any other information for that route containing theany other information for that route containing the
same status, or worse, is ignored for asame status, or worse, is ignored for a
predetermined amount of time (the holddownpredetermined amount of time (the holddown
period).period).
Preventing routing loop withPreventing routing loop with
holddown timerholddown timer (2/5)(2/5)
Preventing routing loop withPreventing routing loop with
holddown timerholddown timer (3/5)(3/5)
Preventing routing loop withPreventing routing loop with
holddown timerholddown timer (4/5)(4/5)
Preventing routing loop withPreventing routing loop with
holddown timerholddown timer (5/5)(5/5)
Split Horizon Rules (1/5)Split Horizon Rules (1/5)
• The split horizon rule says that a routerThe split horizon rule says that a router
should not advertise a network throughshould not advertise a network through
the interface from which the update came.the interface from which the update came.
Split Horizon Rules (2/5)Split Horizon Rules (2/5)
Split Horizon Rules (3/5)Split Horizon Rules (3/5)
Split Horizon Rules (4/5)Split Horizon Rules (4/5)
Split Horizon Rules (5/5)Split Horizon Rules (5/5)
Route Poisoning (1/4)Route Poisoning (1/4)
• Route poisoning is yet another methodRoute poisoning is yet another method
employed by distance vector routingemployed by distance vector routing
protocols to prevent routing loops.protocols to prevent routing loops.
• Route poisoning is used to mark the routeRoute poisoning is used to mark the route
as unreachable in a routing update that isas unreachable in a routing update that is
sent to other routers.sent to other routers.
• Unreachable is interpreted as a metric thatUnreachable is interpreted as a metric that
is set to the maximum.is set to the maximum.
– For RIP, a poisoned route has a metric of 16.For RIP, a poisoned route has a metric of 16.
Route Poisoning (2/4)Route Poisoning (2/4)
Route Poisoning (3/4)Route Poisoning (3/4)
Route Poisoning (4/4)Route Poisoning (4/4)
Split Horizon with Poison reverseSplit Horizon with Poison reverse
(1/5)(1/5)
• The concept of split horizon with poisonThe concept of split horizon with poison
reverse is that explicitly telling a router toreverse is that explicitly telling a router to
ignore a route is better than not telling itignore a route is better than not telling it
about the route in the first place.about the route in the first place.
Split Horizon with Poison reverseSplit Horizon with Poison reverse
(2/5)(2/5)
• The following process occurs:The following process occurs:
• Network 10.4.0.0 becomes unavailable due to aNetwork 10.4.0.0 becomes unavailable due to a
link failure.link failure.
• R3 poisons the metric with a value of 16 andR3 poisons the metric with a value of 16 and
then sends out a triggered update stating thatthen sends out a triggered update stating that
10.4.0.0 is unavailable.10.4.0.0 is unavailable.
• R2 processes that update, invalidates theR2 processes that update, invalidates the
routing entry in its routing table, and immediatelyrouting entry in its routing table, and immediately
sends a poison reverse back to R3.sends a poison reverse back to R3.
Split Horizon with Poison reverseSplit Horizon with Poison reverse
(3/5)(3/5)
Split Horizon with Poison reverseSplit Horizon with Poison reverse
(4/5)(4/5)
Split Horizon with Poison reverseSplit Horizon with Poison reverse
(5/5)(5/5)
Time to Live (1/2)Time to Live (1/2)
• Time to Live (TTL) is an 8-bit field in the IPTime to Live (TTL) is an 8-bit field in the IP
headerheader that limits the number of hops athat limits the number of hops a
packet can traverse through the networkpacket can traverse through the network
before it is discarded.before it is discarded.
• The purpose of the TTL field is to avoid aThe purpose of the TTL field is to avoid a
situation in which an undeliverable packetsituation in which an undeliverable packet
keeps circulating on the network endlessly.keeps circulating on the network endlessly.
Time to Live (2/2)Time to Live (2/2)
• With TTL, the 8-bit field is set with a value by theWith TTL, the 8-bit field is set with a value by the
source device of the packet. The TTL issource device of the packet. The TTL is
decreased by one by every router on the routedecreased by one by every router on the route
to its destination.to its destination.
• If the TTL field reaches zero before the packetIf the TTL field reaches zero before the packet
arrives at its destination, the packet is discardedarrives at its destination, the packet is discarded
and the router sends an Internet Controland the router sends an Internet Control
Message Protocol (ICMP) error message backMessage Protocol (ICMP) error message back
to the source of the IP packetto the source of the IP packet

More Related Content

What's hot

Tems training-by ritesh sati
Tems training-by ritesh satiTems training-by ritesh sati
Tems training-by ritesh sati
Ritesh sati
 
Umts call-flow-scenarios overview
Umts call-flow-scenarios overviewUmts call-flow-scenarios overview
Umts call-flow-scenarios overview
aritra321
 
04 ota053001 clock synchronization theory issue1.0
04 ota053001 clock synchronization theory issue1.004 ota053001 clock synchronization theory issue1.0
04 ota053001 clock synchronization theory issue1.0
Vũ Trần Huy
 

What's hot (20)

timing and synchronization
timing and synchronizationtiming and synchronization
timing and synchronization
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH network
 
Tems training-by ritesh sati
Tems training-by ritesh satiTems training-by ritesh sati
Tems training-by ritesh sati
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
LTE Procedures
LTE ProceduresLTE Procedures
LTE Procedures
 
3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)3 lte mac_rrc(조봉열)
3 lte mac_rrc(조봉열)
 
Umts call-flow-scenarios overview
Umts call-flow-scenarios overviewUmts call-flow-scenarios overview
Umts call-flow-scenarios overview
 
04 ota053001 clock synchronization theory issue1.0
04 ota053001 clock synchronization theory issue1.004 ota053001 clock synchronization theory issue1.0
04 ota053001 clock synchronization theory issue1.0
 
Harq & arq interactions in lte
Harq & arq interactions in lteHarq & arq interactions in lte
Harq & arq interactions in lte
 
Routing Information Protocol (RIP)
Routing Information Protocol(RIP)Routing Information Protocol(RIP)
Routing Information Protocol (RIP)
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentation
 
Dvrp 1
Dvrp 1Dvrp 1
Dvrp 1
 
05 a rrm ul dl scheduler
05 a rrm ul dl scheduler05 a rrm ul dl scheduler
05 a rrm ul dl scheduler
 
Versatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor NetworksVersatile Low Power Media Access for Wireless Sensor Networks
Versatile Low Power Media Access for Wireless Sensor Networks
 
Xcap post processing tool
Xcap post processing toolXcap post processing tool
Xcap post processing tool
 
LTE Location Management and Mobility Management
LTE Location Management and Mobility ManagementLTE Location Management and Mobility Management
LTE Location Management and Mobility Management
 
Drive test final
Drive test  finalDrive test  final
Drive test final
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
 
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
 
Synchronization Overview
Synchronization OverviewSynchronization Overview
Synchronization Overview
 

Viewers also liked

Computer network (Lecture 2)
Computer network (Lecture 2)Computer network (Lecture 2)
Computer network (Lecture 2)
Vishwajit Nandi
 
Network Layer Part 4
Network Layer Part 4Network Layer Part 4
Network Layer Part 4
Tutun Juhana
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
Vishwajit Nandi
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
Abhishek Kesharwani
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
lavanyapathy
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 

Viewers also liked (20)

Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Chp4
Chp4Chp4
Chp4
 
Computer network (Lecture 2)
Computer network (Lecture 2)Computer network (Lecture 2)
Computer network (Lecture 2)
 
Network Layer Part 4
Network Layer Part 4Network Layer Part 4
Network Layer Part 4
 
Computer network (Lecture 1)
Computer network (Lecture 1)Computer network (Lecture 1)
Computer network (Lecture 1)
 
Ch 18 intro to network layer - section 5
Ch 18   intro to network layer - section 5Ch 18   intro to network layer - section 5
Ch 18 intro to network layer - section 5
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Ch 19 Network-layer protocols - section 2
Ch 19   Network-layer protocols - section 2Ch 19   Network-layer protocols - section 2
Ch 19 Network-layer protocols - section 2
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 

Similar to 2008118090324 hk

Similar to 2008118090324 hk (20)

Group 1
Group 1Group 1
Group 1
 
Day 10 rip
Day 10 ripDay 10 rip
Day 10 rip
 
Day 10 loops+ rip+ igrp
Day 10 loops+  rip+ igrpDay 10 loops+  rip+ igrp
Day 10 loops+ rip+ igrp
 
Chapter07
Chapter07Chapter07
Chapter07
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Ospf
OspfOspf
Ospf
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
computer communications
computer communicationscomputer communications
computer communications
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet MulticastingNP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
NP - Unit 4 - Routing - RIP, OSPF and Internet Multicasting
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
ccna2_mod6_Routing & Routing Protocols.pptx
ccna2_mod6_Routing & Routing Protocols.pptxccna2_mod6_Routing & Routing Protocols.pptx
ccna2_mod6_Routing & Routing Protocols.pptx
 
CCNA ppt Day 5
CCNA ppt Day 5CCNA ppt Day 5
CCNA ppt Day 5
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
ENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptxENCOR_Chapter_6.pptx
ENCOR_Chapter_6.pptx
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
ROUTING
ROUTINGROUTING
ROUTING
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

2008118090324 hk

  • 1. Distance Vector RoutingDistance Vector Routing ProtocolsProtocols Vivek KumarVivek Kumar Technical TrainerTechnical Trainer
  • 2. Meaning of distance Vector (1/2)Meaning of distance Vector (1/2) • A router using a distance vector routingA router using a distance vector routing protocol does not have the knowledge ofprotocol does not have the knowledge of the entire path to a destination network.the entire path to a destination network. • The router only knowsThe router only knows – The direction or interface in which packetsThe direction or interface in which packets should be forwarded andshould be forwarded and – The distance or how far it is to the destinationThe distance or how far it is to the destination networknetwork
  • 3. Meaning of distance Vector (2/2)Meaning of distance Vector (2/2)
  • 4. Operation of distance vector (1/4)Operation of distance vector (1/4) • Some distance vector routing protocolsSome distance vector routing protocols call for the router to periodically broadcastcall for the router to periodically broadcast the entire routing table to each of itsthe entire routing table to each of its neighbors.neighbors. • This method is inefficient because theThis method is inefficient because the updates not only consume bandwidth butupdates not only consume bandwidth but also consume router CPU resources toalso consume router CPU resources to process the updates.process the updates.
  • 5. Operation of distance vector (2/4)Operation of distance vector (2/4) • Periodic UpdatesPeriodic Updates are sent at regular intervals (30are sent at regular intervals (30 seconds for RIP and 90 seconds for IGRP).seconds for RIP and 90 seconds for IGRP). – Even if the topology has not changed in several days,Even if the topology has not changed in several days, periodic updates continue to be sent to all neighbors.periodic updates continue to be sent to all neighbors. – Neighbors are routers that share a link and areNeighbors are routers that share a link and are configured to use the same routing protocol.configured to use the same routing protocol. – The router is only aware of the network addresses ofThe router is only aware of the network addresses of its own interfaces and the remote network addresses itits own interfaces and the remote network addresses it can reach through its neighborscan reach through its neighbors
  • 6. Operation of distance vector (3/4)Operation of distance vector (3/4) • Broadcast UpdatesBroadcast Updates are sent toare sent to 255.255.255.255.255.255.255.255. – Neighboring routers that are configured withNeighboring routers that are configured with the same routing protocol will process thethe same routing protocol will process the updates.updates. – All other devices will also process the updateAll other devices will also process the update up to Layer 3 before discarding it.up to Layer 3 before discarding it. – Some distance vector routing protocols useSome distance vector routing protocols use multicast addresses instead of broadcastmulticast addresses instead of broadcast addresses.addresses.
  • 7. Operation of distance vector (4/4)Operation of distance vector (4/4) • Entire Routing Table UpdatesEntire Routing Table Updates are sent,are sent, periodically to all neighbors.periodically to all neighbors. – Neighbors receiving these updates mustNeighbors receiving these updates must process the entire update to find pertinentprocess the entire update to find pertinent information and discard the rest.information and discard the rest. – Some distance vector routing protocols likeSome distance vector routing protocols like EIGRP do not send periodic routing tableEIGRP do not send periodic routing table updates.updates.
  • 8. Routing AlgorithmRouting Algorithm • The algorithm used for the routing protocolsThe algorithm used for the routing protocols defines the following processes:defines the following processes: – Mechanism for sending and receiving routingMechanism for sending and receiving routing information.information. – Mechanism for calculating the best paths andMechanism for calculating the best paths and installing routes in the routing table.installing routes in the routing table. – Mechanism for detecting and reacting toMechanism for detecting and reacting to topology changes.topology changes.
  • 9. Routing protocol characteristicsRouting protocol characteristics (1/3)(1/3) • Time to ConvergenceTime to Convergence - Time to convergence- Time to convergence defines how quickly the routers in thedefines how quickly the routers in the network topology share routing informationnetwork topology share routing information and reach a state of consistent knowledge.and reach a state of consistent knowledge. – The faster the convergence, the more preferableThe faster the convergence, the more preferable the protocol.the protocol. – Routing loops can occur when inconsistentRouting loops can occur when inconsistent routing tables are not updated due to slowrouting tables are not updated due to slow convergence in a changing network.convergence in a changing network.
  • 10. Routing protocol characteristicsRouting protocol characteristics (2/3)(2/3) • ScalabilityScalability - Scalability defines how large a- Scalability defines how large a network can become based on the routingnetwork can become based on the routing protocol that is deployed.protocol that is deployed. – The larger the network is, the more scalable the routingThe larger the network is, the more scalable the routing protocol needs to be.protocol needs to be. • Classless (Use of VLSM) or ClassfulClassless (Use of VLSM) or Classful - Classless- Classless routing protocols include the subnet mask in therouting protocols include the subnet mask in the updates.updates. – This feature supports the use of Variable Length SubnetThis feature supports the use of Variable Length Subnet Masking (VLSM) and better route summarization.Masking (VLSM) and better route summarization. – Classful routing protocols do not include the subnetClassful routing protocols do not include the subnet mask and cannot support VLSM.mask and cannot support VLSM.
  • 11. Routing protocol characteristicsRouting protocol characteristics (3/3)(3/3) • Resource UsageResource Usage - Resource usage includes the- Resource usage includes the requirements of a routing protocol such as memoryrequirements of a routing protocol such as memory space, CPU utilization, and link bandwidthspace, CPU utilization, and link bandwidth utilizationutilization – Higher resource requirements necessitate more powerfulHigher resource requirements necessitate more powerful hardware to support the routing protocol operation inhardware to support the routing protocol operation in addition to the packet forwarding processes.addition to the packet forwarding processes. • Implementation and MaintenanceImplementation and Maintenance - Implementation- Implementation and maintenance describes the level of knowledgeand maintenance describes the level of knowledge that is required for a network administrator tothat is required for a network administrator to implement and maintain the network based on theimplement and maintain the network based on the routing protocol deployed.routing protocol deployed.
  • 13. Comparison of Routing ProtocolComparison of Routing Protocol
  • 14. Periodic updatesPeriodic updates :RIP(1/3):RIP(1/3) • The term periodic updates refers to the factThe term periodic updates refers to the fact that a router sends the complete routingthat a router sends the complete routing table to its neighbors at a predefinedtable to its neighbors at a predefined interval.interval. – For RIP, these updates are sent every 30For RIP, these updates are sent every 30 seconds as a broadcast (255.255.255.255)seconds as a broadcast (255.255.255.255) whether or not there has been a topologywhether or not there has been a topology change.change. – This 30-second interval is a route update timerThis 30-second interval is a route update timer that also aids in tracking the age of routingthat also aids in tracking the age of routing information in the routing table.information in the routing table.
  • 15. Periodic updates:RIPPeriodic updates:RIP (2/3)(2/3) • The age of routing information in a routing table isThe age of routing information in a routing table is refreshed each time an update is received.refreshed each time an update is received. • This way information in the routing table can beThis way information in the routing table can be maintained when there is a topology change.maintained when there is a topology change. • Changes may occur for several reasons,Changes may occur for several reasons, including:including: – Failure of a linkFailure of a link – Introduction of a new linkIntroduction of a new link – Failure of a routerFailure of a router – Change of link parametersChange of link parameters
  • 17. RIP TimersRIP Timers (1/3)(1/3) • In addition to the update timer, the IOS implementsIn addition to the update timer, the IOS implements three additional timers for RIP:three additional timers for RIP: • Invalid TimerInvalid Timer. If an update has not been received to. If an update has not been received to refresh an existing route after 180 seconds (therefresh an existing route after 180 seconds (the default), the route is marked as invalid by settingdefault), the route is marked as invalid by setting the metric to 16.the metric to 16. – The route is retained in the routing table until the flushThe route is retained in the routing table until the flush timer expires.timer expires. • Flush TimerFlush Timer. By default, the flush timer is set for. By default, the flush timer is set for 240 seconds, which is 60 seconds longer than the240 seconds, which is 60 seconds longer than the invalid timer. When the flush timer expires, theinvalid timer. When the flush timer expires, the route is removed from the routing table.route is removed from the routing table.
  • 18. RIP TimersRIP Timers (2/3)(2/3) • Holddown Timer. This timer stabilizesHolddown Timer. This timer stabilizes routing information and helps preventrouting information and helps prevent routing loops during periods when therouting loops during periods when the topology is converging on new information.topology is converging on new information. – Once a route is marked as unreachable, itOnce a route is marked as unreachable, it must stay in holddown long enough for allmust stay in holddown long enough for all routers in the topology to learn about therouters in the topology to learn about the unreachable network.unreachable network. – By default, the holddown timer is set for 180By default, the holddown timer is set for 180 seconds.seconds.
  • 19. RIP TimersRIP Timers (3/3)(3/3)
  • 20. Bounded Updates :EIGRP(1/2)Bounded Updates :EIGRP(1/2) • Unlike other distance vector routing protocols,Unlike other distance vector routing protocols, EIGRP does not send periodic updates.EIGRP does not send periodic updates. • Instead, EIGRP sends bounded updates about aInstead, EIGRP sends bounded updates about a route when a path changes or the metric for thatroute when a path changes or the metric for that route changes.route changes. • When a new route becomes available or when aWhen a new route becomes available or when a route needs to be removedroute needs to be removed,, EIGRP sends anEIGRP sends an update only about that network instead of theupdate only about that network instead of the entire table.entire table. • This information is sent only to those routers thatThis information is sent only to those routers that need it.need it.
  • 21. Bounded Updates :EIGRP(2/2)Bounded Updates :EIGRP(2/2) • EIGRP uses updates that are:EIGRP uses updates that are: – Non-periodic because they are not sent out onNon-periodic because they are not sent out on a regular basis.a regular basis. – Partial updates sent only when there is aPartial updates sent only when there is a change in topology that influences routingchange in topology that influences routing information.information. – Bounded, meaning the propagation of partialBounded, meaning the propagation of partial updates are automatically bounded so thatupdates are automatically bounded so that only those routers that need the informationonly those routers that need the information are updated.are updated.
  • 22. Triggered UpdateTriggered Update (1/3)(1/3) • To speed up the convergence when there is aTo speed up the convergence when there is a topology change,topology change, RIP uses triggered updatesRIP uses triggered updates.. • A triggered update is a routing table update thatA triggered update is a routing table update that is sent immediately in response to a routingis sent immediately in response to a routing changechange.. • Triggered updates do not wait for update timersTriggered updates do not wait for update timers to expire.to expire. – The detecting router immediately sends an updateThe detecting router immediately sends an update message to adjacent routers.message to adjacent routers. – The receiving routers, in turn, generate triggeredThe receiving routers, in turn, generate triggered updates that notify their neighbors of the change.updates that notify their neighbors of the change.
  • 23. Triggered UpdateTriggered Update (2/3)(2/3) • Triggered updates are sent when one ofTriggered updates are sent when one of the following occurs:the following occurs: – An interface changes state (up or down)An interface changes state (up or down) – A route has entered (or exited) theA route has entered (or exited) the "unreachable" state"unreachable" state – A route is installed in the routing tableA route is installed in the routing table
  • 24. Triggered UpdateTriggered Update (3/3)(3/3) • However, there are two problems with triggeredHowever, there are two problems with triggered updates:updates: – Packets containing the update message can bePackets containing the update message can be dropped or corrupted by some link in the network.dropped or corrupted by some link in the network. – The triggered updates do not happen instantaneously. ItThe triggered updates do not happen instantaneously. It is possible that a router that has not yet received theis possible that a router that has not yet received the triggered update will issue a regular update at just thetriggered update will issue a regular update at just the wrong time, causing the bad route to be reinserted in awrong time, causing the bad route to be reinserted in a neighbor that had already received the triggeredneighbor that had already received the triggered update.update.
  • 25. Routing Loop (1/6)Routing Loop (1/6) • A routing loop is a condition in which aA routing loop is a condition in which a packet is continuously transmitted within apacket is continuously transmitted within a series of routers without ever reaching itsseries of routers without ever reaching its intended destination network.intended destination network. • A routing loop can occur when two orA routing loop can occur when two or more routers have routing information thatmore routers have routing information that incorrectly indicates that a valid path to anincorrectly indicates that a valid path to an unreachable destination exists.unreachable destination exists.
  • 26. Routing Loop (2/6)Routing Loop (2/6) • The loop may be a result of:The loop may be a result of: – Incorrectly configured static routesIncorrectly configured static routes – Incorrectly configured route redistributionIncorrectly configured route redistribution (redistribution is a process of handing the routing(redistribution is a process of handing the routing information from one routing protocol to anotherinformation from one routing protocol to another routing protocol)routing protocol) – Inconsistent routing tables not being updatedInconsistent routing tables not being updated due to slow convergence in a changing networkdue to slow convergence in a changing network – Incorrectly configured or installed discard routesIncorrectly configured or installed discard routes
  • 31. Count to infinity (1/5)Count to infinity (1/5) • Count to infinity is a condition that existsCount to infinity is a condition that exists when inaccurate routing updates increasewhen inaccurate routing updates increase the metric value to "infinity" for a networkthe metric value to "infinity" for a network that is no longer reachable.that is no longer reachable.
  • 32. Count to infinity (2/5)Count to infinity (2/5)
  • 33. Count to infinity (3/5)Count to infinity (3/5)
  • 34. Count to infinity (4/5)Count to infinity (4/5)
  • 35. Count to infinity (5/5)Count to infinity (5/5)
  • 36. Setting a Maximum (1/2)Setting a Maximum (1/2) • To eventually stop the incrementing of theTo eventually stop the incrementing of the metric, "infinity" is defined by setting ametric, "infinity" is defined by setting a maximum metric value.maximum metric value. • For example, RIP defines infinity as 16For example, RIP defines infinity as 16 hops - an "unreachable" metric.hops - an "unreachable" metric. • Once the routers "count to infinity," theyOnce the routers "count to infinity," they mark the route as unreachable.mark the route as unreachable.
  • 37. Setting a Maximum (2/2)Setting a Maximum (2/2)
  • 38. Preventing routing loop withPreventing routing loop with holddown timerholddown timer (1/5)(1/5) • Holddown timers are used to prevent regularHolddown timers are used to prevent regular update messages from inappropriately reinstatingupdate messages from inappropriately reinstating a route that may have gone bad.a route that may have gone bad. • Holddown timers instruct routers to hold anyHolddown timers instruct routers to hold any changes that might affect routes for a specifiedchanges that might affect routes for a specified period of time.period of time. • If a route is identified as down or possibly down,If a route is identified as down or possibly down, any other information for that route containing theany other information for that route containing the same status, or worse, is ignored for asame status, or worse, is ignored for a predetermined amount of time (the holddownpredetermined amount of time (the holddown period).period).
  • 39. Preventing routing loop withPreventing routing loop with holddown timerholddown timer (2/5)(2/5)
  • 40. Preventing routing loop withPreventing routing loop with holddown timerholddown timer (3/5)(3/5)
  • 41. Preventing routing loop withPreventing routing loop with holddown timerholddown timer (4/5)(4/5)
  • 42. Preventing routing loop withPreventing routing loop with holddown timerholddown timer (5/5)(5/5)
  • 43. Split Horizon Rules (1/5)Split Horizon Rules (1/5) • The split horizon rule says that a routerThe split horizon rule says that a router should not advertise a network throughshould not advertise a network through the interface from which the update came.the interface from which the update came.
  • 44. Split Horizon Rules (2/5)Split Horizon Rules (2/5)
  • 45. Split Horizon Rules (3/5)Split Horizon Rules (3/5)
  • 46. Split Horizon Rules (4/5)Split Horizon Rules (4/5)
  • 47. Split Horizon Rules (5/5)Split Horizon Rules (5/5)
  • 48. Route Poisoning (1/4)Route Poisoning (1/4) • Route poisoning is yet another methodRoute poisoning is yet another method employed by distance vector routingemployed by distance vector routing protocols to prevent routing loops.protocols to prevent routing loops. • Route poisoning is used to mark the routeRoute poisoning is used to mark the route as unreachable in a routing update that isas unreachable in a routing update that is sent to other routers.sent to other routers. • Unreachable is interpreted as a metric thatUnreachable is interpreted as a metric that is set to the maximum.is set to the maximum. – For RIP, a poisoned route has a metric of 16.For RIP, a poisoned route has a metric of 16.
  • 49. Route Poisoning (2/4)Route Poisoning (2/4)
  • 50. Route Poisoning (3/4)Route Poisoning (3/4)
  • 51. Route Poisoning (4/4)Route Poisoning (4/4)
  • 52. Split Horizon with Poison reverseSplit Horizon with Poison reverse (1/5)(1/5) • The concept of split horizon with poisonThe concept of split horizon with poison reverse is that explicitly telling a router toreverse is that explicitly telling a router to ignore a route is better than not telling itignore a route is better than not telling it about the route in the first place.about the route in the first place.
  • 53. Split Horizon with Poison reverseSplit Horizon with Poison reverse (2/5)(2/5) • The following process occurs:The following process occurs: • Network 10.4.0.0 becomes unavailable due to aNetwork 10.4.0.0 becomes unavailable due to a link failure.link failure. • R3 poisons the metric with a value of 16 andR3 poisons the metric with a value of 16 and then sends out a triggered update stating thatthen sends out a triggered update stating that 10.4.0.0 is unavailable.10.4.0.0 is unavailable. • R2 processes that update, invalidates theR2 processes that update, invalidates the routing entry in its routing table, and immediatelyrouting entry in its routing table, and immediately sends a poison reverse back to R3.sends a poison reverse back to R3.
  • 54. Split Horizon with Poison reverseSplit Horizon with Poison reverse (3/5)(3/5)
  • 55. Split Horizon with Poison reverseSplit Horizon with Poison reverse (4/5)(4/5)
  • 56. Split Horizon with Poison reverseSplit Horizon with Poison reverse (5/5)(5/5)
  • 57. Time to Live (1/2)Time to Live (1/2) • Time to Live (TTL) is an 8-bit field in the IPTime to Live (TTL) is an 8-bit field in the IP headerheader that limits the number of hops athat limits the number of hops a packet can traverse through the networkpacket can traverse through the network before it is discarded.before it is discarded. • The purpose of the TTL field is to avoid aThe purpose of the TTL field is to avoid a situation in which an undeliverable packetsituation in which an undeliverable packet keeps circulating on the network endlessly.keeps circulating on the network endlessly.
  • 58. Time to Live (2/2)Time to Live (2/2) • With TTL, the 8-bit field is set with a value by theWith TTL, the 8-bit field is set with a value by the source device of the packet. The TTL issource device of the packet. The TTL is decreased by one by every router on the routedecreased by one by every router on the route to its destination.to its destination. • If the TTL field reaches zero before the packetIf the TTL field reaches zero before the packet arrives at its destination, the packet is discardedarrives at its destination, the packet is discarded and the router sends an Internet Controland the router sends an Internet Control Message Protocol (ICMP) error message backMessage Protocol (ICMP) error message back to the source of the IP packetto the source of the IP packet