SlideShare a Scribd company logo
Before going to discuss about the count to infinity
let us understand the concept of routing
information protocol which is related to our topic
count to infinity.
What is routing information protocol(RIP)?
The Routing Information Protocol (RIP) is one of the most
commonly used Interior Gateway Protocol on internal networks
which helps a router dynamically adapt to changes of network
connections by communicating information about which
networks each router can reach and how far away those networks
are.
Although RIP is still actively used, it is generally considered to
have been obsolete by Link-state routing protocol such as OSPF.
RIP uses a distributed version of Bellman-Ford algorithm.
Bellman-Ford algorithm computes single-source shortest paths in
a weighted graph .
The algorithm is distributed because it involves a
number of nodes (routers) within an Autonomous
system. It consists of the following steps:
Each node calculates the distances between itself and all other
nodes within the AS and stores this information as a table.
Each node sends its table to all neighbouring nodes.
When a node receives distance tables from its neighbours, it
calculates the shortest routes to all other nodes and updates its
own table to reflect any changes.
The main disadvantages of Bellman-Ford algorithm in this
setting are :
Does not scale well .
Changes in network topology are not reflected quickly since
updates are spread node-by-node.
RIP prevents routing loops from continuing indefinitely
by implementing a limit on the number of hops allowed
in a path from the source to a destination. The
maximum number of hops in a path is 15.
If a router receives a routing update that contains a
new or changed entry, and if increasing the metric
value by 1 causes the metric to be infinity (that is 16),
the network destination is considered unreachable.
The downside of this stability feature is that it limits
the maximum diameter of a RIP network to less than 16
. hops. An example would if Router 2's link to Network
A is via Router 1's link i.e. R2 has learned about a route
to network A from R1 initially.
R3 R2 R1
Network A
Loop is created.
If This links will be
fail.
Loop is created.
If Router 1's link to network A fails, R1 will update its
routing table immediately to make the distance 16
(infinite). In the next broadcast, R1 will report the
higher cost route. Now suppose r2 advertise a route to
Network A via R1 in its normal advertisement
message, just after R1’s connection to network A fails. If
so R1 will receive this update message and sees that
Router 2 has a two-hop link (which is actually via
Router 1) to Network A, according to the normal vector-
distance algorithm it will install a new route to network
A via R2, of length 3.
After this, it would began advertising it has a three-hop
link to Network A and then route all traffic to Network A
through R2. This would create a routing loop, since
when Router 2 (R2) sees that Router 1 get to Network A in
three hops, it alters it own routing table entry to show it
has a four-hop path to Network A.
This is known as Count-to Infinity problem, i.e. bad
news travel slowly through the network and to advertise
a bad news throughout the entire network will take a
long time. This problem is also called as slow
convergence problem. In the next section we shall
discuss some of the possible solutions to this slow
convergence problem .
In this section we shall discuss some of the solutions to
slow converge problem, which makes operations of RIP
more stable. Some of these solutions are :
Hold-Downs prevent inappropriately reinstating a route that
has gone bad when routers broadcast their regular update
messages.
When a route is down, neighbor routers will detect it and
attempt to broadcast route changes after they have calculated
the new routes.
This triggered route updates may not arrive at certain network
devices and those devices may broadcast a regular update
message stating that the route that has gone down is still good
to devices that has just been notified of the network failure. As
such, the latter devices contains incorrect routing information
which they may potentially further advertise.
R3 R2 R1
Network A
Loop is created.
This links will be
fail.
1..Link failure msg.
Link failure msg.
2.. regular update
msg.
To solve the abovementioned problem, a technique
known as Hold Down is considered. Hold downs tell
routers to hold on to any changes that might affect
recently removed routes for a certain period of time,
usually calculated just to be greater than the period of
time necessary to update the entire network with a
route change.
This prevents count-to-infinity problem. As per our
example, it means that once R2 has removed the
route to Network A, after receiving a link failure
message from R1, It will not change or add any new
route to network A, until a certain amount of time
has passed. This time duration is known as Hold
Down time.
Typically hold down time is around 60 sec. So the
idea is to wait long enough to ensure that all machines
receive the bad news (link failure news) and not
mistakenly accepts a message that is out dated.
came and thus split horizons is used to prevent updates
that are redundant to the network. For this purpose Router
records the interface over which it received a particular
route and does not propagates its information about that
route back to the same interface.
Let us consider an example in which Router 1 advertises
that it has a route to Network A. If Router 2 is sending
traffic to Network A via Router 1, there is no reason for
Router 2 to include the route info in its update back to
Router 1, because Router 1 is closer to Network A.
R2 R1
Network A
Regular update
message contains
advertisement of a
route to Network A
Regular update message
should not include a route
a advertisement to route
to Network A Via R1
This is yet another technique used to solve the slow
convergence problem. Larger routing loops prevented
using poison reverse updates. Once a connection
disappears, the router advertising the connection
retains the entry for several update periods, and
include an infinite cost in the broadcast. The updates
are sent to remove downed route and place it in hold-
down.
R2 R1
Network A
Regular update
message contains
advertisement of a
route to network A
with distance 16.
This links
will be
fail.
To make Poison reverse more efficient,
it must be combined with Triggered Updates. Triggered
updates force a router to send an immediate broadcast
when receiving bad news, instead of waiting for the
next periodic broadcast. By sending an update
immediately, a router minimizes the time it is
vulnerable to believing in good news.
R2 R1
Network A
Immediate broadcast a
message as a Triggered
Update.
This links
will be
fail.
network convergence  problem and solutions
network convergence  problem and solutions

More Related Content

What's hot

Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
KABILESH RAMAR
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 
TCP/ IP
TCP/ IP TCP/ IP
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
Transport services
Transport servicesTransport services
Transport services
Navin Kumar
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
IGMP
IGMPIGMP
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Rip presentation
Rip presentationRip presentation
Rip presentation
Ebrahim AlRahawe
 
Application Layer
Application Layer Application Layer
Application Layer
Dr Shashikant Athawale
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
SAhammedShakil
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
Fatbardh Hysa
 

What's hot (20)

Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Transport layer
Transport layer Transport layer
Transport layer
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Transport services
Transport servicesTransport services
Transport services
 
Transport layer
Transport layerTransport layer
Transport layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
IGMP
IGMPIGMP
IGMP
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Rip presentation
Rip presentationRip presentation
Rip presentation
 
Application Layer
Application Layer Application Layer
Application Layer
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Transport layer (computer networks)
Transport layer (computer networks)Transport layer (computer networks)
Transport layer (computer networks)
 

Similar to network convergence problem and solutions

Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
Amna Nawazish
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
anilinvns
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
anilinvns
 
Qs.pptx
Qs.pptxQs.pptx
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
Krishna Nanda
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
sazia7
 
Group 1
Group 1Group 1
Group 1
lifetobeart
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
CYBERINTELLIGENTS
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
apexjaipur
 
RIP Loop Prevention
RIP Loop PreventionRIP Loop Prevention
RIP Loop Prevention
NetProtocol Xpert
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
IOSR Journals
 
16 coms 525 tcpip - routing protocols -all
16    coms 525 tcpip - routing protocols -all16    coms 525 tcpip - routing protocols -all
16 coms 525 tcpip - routing protocols -all
Palanivel Kuppusamy
 
RIP and OSPF
RIP and OSPFRIP and OSPF
RIP and OSPF
MusharratTabassum
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
pbrinda
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
dada827350
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
SagarR24
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
Mahmmoud Mahdi
 

Similar to network convergence problem and solutions (20)

Routing Information Protocol (RIP)
Routing Information Protocol (RIP)Routing Information Protocol (RIP)
Routing Information Protocol (RIP)
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
Group 1
Group 1Group 1
Group 1
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf3a.Error detection provides for accurate data transfer. Indeed, if.pdf
3a.Error detection provides for accurate data transfer. Indeed, if.pdf
 
Routing
RoutingRouting
Routing
 
RIP Loop Prevention
RIP Loop PreventionRIP Loop Prevention
RIP Loop Prevention
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
An Improvement on Route Recovery by Using Triangular Fuzzy Numbers on Route E...
 
16 coms 525 tcpip - routing protocols -all
16    coms 525 tcpip - routing protocols -all16    coms 525 tcpip - routing protocols -all
16 coms 525 tcpip - routing protocols -all
 
RIP and OSPF
RIP and OSPFRIP and OSPF
RIP and OSPF
 
UNIT-IV.pptx
UNIT-IV.pptxUNIT-IV.pptx
UNIT-IV.pptx
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Lesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing ALesson.7: Configuring IP Routing A
Lesson.7: Configuring IP Routing A
 

More from Siddhi Viradiya

Pagereplacement algorithm(computional concept)
Pagereplacement algorithm(computional concept)Pagereplacement algorithm(computional concept)
Pagereplacement algorithm(computional concept)
Siddhi Viradiya
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)
Siddhi Viradiya
 
chapter 1 intoduction to operating system
chapter 1 intoduction to operating systemchapter 1 intoduction to operating system
chapter 1 intoduction to operating system
Siddhi Viradiya
 
functional dependencies with example
functional dependencies with examplefunctional dependencies with example
functional dependencies with example
Siddhi Viradiya
 
non linear data structure -introduction of tree
non linear data structure -introduction of treenon linear data structure -introduction of tree
non linear data structure -introduction of treeSiddhi Viradiya
 
AEM Fourier series
 AEM Fourier series AEM Fourier series
AEM Fourier series
Siddhi Viradiya
 
global warming ch-07
 global warming ch-07 global warming ch-07
global warming ch-07
Siddhi Viradiya
 

More from Siddhi Viradiya (7)

Pagereplacement algorithm(computional concept)
Pagereplacement algorithm(computional concept)Pagereplacement algorithm(computional concept)
Pagereplacement algorithm(computional concept)
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)
 
chapter 1 intoduction to operating system
chapter 1 intoduction to operating systemchapter 1 intoduction to operating system
chapter 1 intoduction to operating system
 
functional dependencies with example
functional dependencies with examplefunctional dependencies with example
functional dependencies with example
 
non linear data structure -introduction of tree
non linear data structure -introduction of treenon linear data structure -introduction of tree
non linear data structure -introduction of tree
 
AEM Fourier series
 AEM Fourier series AEM Fourier series
AEM Fourier series
 
global warming ch-07
 global warming ch-07 global warming ch-07
global warming ch-07
 

Recently uploaded

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

network convergence problem and solutions

  • 1.
  • 2. Before going to discuss about the count to infinity let us understand the concept of routing information protocol which is related to our topic count to infinity. What is routing information protocol(RIP)?
  • 3. The Routing Information Protocol (RIP) is one of the most commonly used Interior Gateway Protocol on internal networks which helps a router dynamically adapt to changes of network connections by communicating information about which networks each router can reach and how far away those networks are. Although RIP is still actively used, it is generally considered to have been obsolete by Link-state routing protocol such as OSPF. RIP uses a distributed version of Bellman-Ford algorithm. Bellman-Ford algorithm computes single-source shortest paths in a weighted graph .
  • 4. The algorithm is distributed because it involves a number of nodes (routers) within an Autonomous system. It consists of the following steps: Each node calculates the distances between itself and all other nodes within the AS and stores this information as a table. Each node sends its table to all neighbouring nodes. When a node receives distance tables from its neighbours, it calculates the shortest routes to all other nodes and updates its own table to reflect any changes.
  • 5. The main disadvantages of Bellman-Ford algorithm in this setting are : Does not scale well . Changes in network topology are not reflected quickly since updates are spread node-by-node.
  • 6.
  • 7. RIP prevents routing loops from continuing indefinitely by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops in a path is 15. If a router receives a routing update that contains a new or changed entry, and if increasing the metric value by 1 causes the metric to be infinity (that is 16), the network destination is considered unreachable. The downside of this stability feature is that it limits the maximum diameter of a RIP network to less than 16 . hops. An example would if Router 2's link to Network A is via Router 1's link i.e. R2 has learned about a route to network A from R1 initially.
  • 8. R3 R2 R1 Network A Loop is created. If This links will be fail. Loop is created.
  • 9. If Router 1's link to network A fails, R1 will update its routing table immediately to make the distance 16 (infinite). In the next broadcast, R1 will report the higher cost route. Now suppose r2 advertise a route to Network A via R1 in its normal advertisement message, just after R1’s connection to network A fails. If so R1 will receive this update message and sees that Router 2 has a two-hop link (which is actually via Router 1) to Network A, according to the normal vector- distance algorithm it will install a new route to network A via R2, of length 3.
  • 10. After this, it would began advertising it has a three-hop link to Network A and then route all traffic to Network A through R2. This would create a routing loop, since when Router 2 (R2) sees that Router 1 get to Network A in three hops, it alters it own routing table entry to show it has a four-hop path to Network A. This is known as Count-to Infinity problem, i.e. bad news travel slowly through the network and to advertise a bad news throughout the entire network will take a long time. This problem is also called as slow convergence problem. In the next section we shall discuss some of the possible solutions to this slow convergence problem .
  • 11. In this section we shall discuss some of the solutions to slow converge problem, which makes operations of RIP more stable. Some of these solutions are :
  • 12. Hold-Downs prevent inappropriately reinstating a route that has gone bad when routers broadcast their regular update messages. When a route is down, neighbor routers will detect it and attempt to broadcast route changes after they have calculated the new routes. This triggered route updates may not arrive at certain network devices and those devices may broadcast a regular update message stating that the route that has gone down is still good to devices that has just been notified of the network failure. As such, the latter devices contains incorrect routing information which they may potentially further advertise.
  • 13. R3 R2 R1 Network A Loop is created. This links will be fail. 1..Link failure msg. Link failure msg. 2.. regular update msg.
  • 14. To solve the abovementioned problem, a technique known as Hold Down is considered. Hold downs tell routers to hold on to any changes that might affect recently removed routes for a certain period of time, usually calculated just to be greater than the period of time necessary to update the entire network with a route change. This prevents count-to-infinity problem. As per our example, it means that once R2 has removed the route to Network A, after receiving a link failure message from R1, It will not change or add any new route to network A, until a certain amount of time has passed. This time duration is known as Hold Down time.
  • 15. Typically hold down time is around 60 sec. So the idea is to wait long enough to ensure that all machines receive the bad news (link failure news) and not mistakenly accepts a message that is out dated.
  • 16. came and thus split horizons is used to prevent updates that are redundant to the network. For this purpose Router records the interface over which it received a particular route and does not propagates its information about that route back to the same interface. Let us consider an example in which Router 1 advertises that it has a route to Network A. If Router 2 is sending traffic to Network A via Router 1, there is no reason for Router 2 to include the route info in its update back to Router 1, because Router 1 is closer to Network A.
  • 17. R2 R1 Network A Regular update message contains advertisement of a route to Network A Regular update message should not include a route a advertisement to route to Network A Via R1
  • 18. This is yet another technique used to solve the slow convergence problem. Larger routing loops prevented using poison reverse updates. Once a connection disappears, the router advertising the connection retains the entry for several update periods, and include an infinite cost in the broadcast. The updates are sent to remove downed route and place it in hold- down.
  • 19. R2 R1 Network A Regular update message contains advertisement of a route to network A with distance 16. This links will be fail.
  • 20. To make Poison reverse more efficient, it must be combined with Triggered Updates. Triggered updates force a router to send an immediate broadcast when receiving bad news, instead of waiting for the next periodic broadcast. By sending an update immediately, a router minimizes the time it is vulnerable to believing in good news.
  • 21. R2 R1 Network A Immediate broadcast a message as a Triggered Update. This links will be fail.