RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
RIP V2 CCNP S1(5), Chapter 4.
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
Computer Networks with Internet Technology William Stallings
Courtesy: Nick McKeown, Stanford
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts – Chapter.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization –All routers are identical –Network is flat. Not true in Practice Hierarchical.
Nov 04, 2004CS573: Network Protocols and Standards1 IP Routing: GGP and RIP Network Protocols and Standards Autumn
RIP – Routing Information Protocol Syeda Momina Tabish MIT - 7.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
COS 420 Day 17. Agenda Finished Grading Individualized Projects Very large disparity in student grading No two students had same ranking for other students.
1 Dynamic Routing Protocols I RIP Relates to Lab 4. The first module on dynamic routing protocols. This module provides an overview of routing, introduces.
Lab 4 Dynamic Routing CS144 Review Session 5 October 30, 2009 Samir Selman.
RIP. A PPROACHES TO S HORTEST P ATH R OUTING There are two basic routing algorithms found on the Internet. 1. Distance Vector Routing Each node knows.
Switching and Routing Technique
INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is.
TCP/IP Protocol Suite1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
ROUTING BASICS. Why are Routers Necessary? One of the key components of the technical infrastructure of the network One of the key components of the technical.
Introduction to Routing and Routing Protocols By Ashar Anwar.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
Distance Vector Routing Protocols W.lilakiatsakun.
Routing Information Protocol 2 (RIP2)
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
CS 4396 Computer Networks Lab
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 7 Distance Vector Routing Protocols.
Slide /2009COMM3380 Routing Algorithms Distance Vector Routing Each node knows the distance (=cost) to its directly connected neighbors A node sends.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
1 CMPT 471 Networking II RIP. © Janice Regan, Dynamic Routing  In very simple small and stable networks static routing may be adequate.  As networks.
Routing and Routing Protocols Routing Protocols Overview.
Introduction to Dynamic Routing Protocol
Code : STM#520-1 Samsung Electronics Co., Ltd. OfficeServ7400 Router Operation Distribution EnglishED01.
Review Routing fundamental W.lilakiatsakun. Review Routing Fundamental VLSM VLSM Route Summarization Route Summarization Static & Dynamic Routing Static.
1 3-Oct-15 Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
RIP2 (Routing Information Protocol) Team Agile. Routing Protocols Link State – OSPF – ISIS Distance vector – RIP (version 1 and 2) – IGRP (Cisco Proprietary)
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
CCNA 2 Week 7 Distance Vector Routing. Copyright © 2005 University of Bolton Topics Distance Vector Protocol Issues RIP IGRP.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/35- OfficeServ 7x00 Enterprise IP Solutions Quick Install Guide.
Distance Vector Routing Protocols Dynamic Routing.
1 1-Dec-15 S Ward Abingdon and Witney College Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
TCOM 515 Lecture 2. Lecture 2 Objectives Dynamic Routing Distance Vectore Routing Link State Routing Interior vs Exterior RIP - Routing Information Protocol.
Routing Protocols Brandon Wagner.
Objectives After completing this chapter you will be able to: Describe the Routing Information Protocol (RIP version 1 and RIP version 2) Describe Routing.
RIP Routing Information Protocol 指導老師:梁德昭 老師 簡報者:方佳娣.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
1 Dynamic Routing Protocols I RIP Relates to Lab 4. The first module on dynamic routing protocols. This module provides an overview of routing, introduces.
1. 2  An autonomous system is a region of the Internet that is administered by a single entity.  Examples of autonomous regions are:  UVA’s campus.
Routing Information Protocol (RIP) Sungsu Kim Sungsu Kim March 25, 2008.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
RIP.
Dynamic Routing Protocols part2
Routing Protocols (RIP, OSPF, BGP)
Routing Information Protocol (RIP)
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Routing Information Protocol (RIP)
CCNA 2 v3.1 Module 7 Distance Vector Routing Protocols
Distance Vector and Link State RIP OSPF
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Dynamic Routing Protocols part2
RFC 1058 & RFC 2453 Routing Information Protocol
Distance Vector Routing Protocols
CCE1030 Computer Networking
Distance Vector Routing
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization All routers are identical Network is flat. Not true in Practice Hierarchical.
Presentation transcript:

RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss

2 Motivation n Introduction n Review the Basic Protocol n RIP Characteristics n Protocol Extensions & Compatibility

3 Introduction Basic Internet Model R2 R3 H1 H2 N2 N1 N3 R1

4 Why RIP? n Although OSPF has a lot of advantages, we still need RIP : –Very little “overhead” in small networks Mainly in terms of bandwidth, Configuration and management time. –Very easy to implement

5 RIP 1 Limitations - I n RIP 1 doesn’t consider : –Autonomous Systems and IGP/EGP interactions. –Subnetting –Authentication

6 The Basic Protocol

7 So, What is RIP ? n A routing protocol n Based on Bellman-Ford Algorithm n Uses a distance vector algorithm n Historically : –Used since the early ARPANET –Based on the program “routed”, which is included in the Berkeley Unix. –An updated version was used by XNS (Xerox Network Systems)

8 RIP Basic Protocol (Cont..) n RIP is working as an IGP (Interior Gatway Protocol) in moderate size AS’s

9 Limitations of the protocol - II n Only Networks with longest path (Network diameter) of 15 hops n Identifying Loops requires a lot of time and bandwidth n “Best route” doesn’t consider real-time parameters (e.g. delay, reliability, dollar cost, or load)

10 Distance Vectors Algorithms n Find a path from the sender to the destination n Forwarding inside Network or Subnet is the responsibility of Network technology n Network technology is Transparent to IP

11 Distance Vectors Algorithms (Cont..) n Each Router has it’s own data-base about all the destinations n Each entry includes : –Next router –“Metric” (e.g. time delay, dollar cost) n Destinations are networks but could be individual host

12 The router’s data base n For each destination keep the following: –address (subnet): In IP implementation –router : First router along the path –interface : The physical network to be used to reach the first router –metric : indicating the distance –timer :amount of time since the entry was last updated –other flags...

13 The router’s rule n Periodically, Send to others update messages about your data base content n Take care to keep your data base updated

14 So, what is “good” path ? n Goodness is determined according to the value of the “metric” (1..15) n In simple networks : “metric” simply counts the number of routers a message must go through n In more complex : May consider delay, cost and others

15 Calculating the minimal metric n Based on Bellman-Ford Algorithm n Formally : –D(i,i) = 0 all i –D(i,j) = min k [d(i,k) + D(k,j)] otherwise * D(i,j) represents the metric of the best rout from I to j n Algorithm will converge in finite time n Assuming no topology change occurred

16 Calculating the minimal metric (Cont..) n Data is adaptively updated - No need to keep the whole estimates n Only routers participate in the game - No need for individual hosts information n Worse metric that comes from the next router, should be considered

17 Calculating the minimal metric (Cont..) R1 R2 R3 N3R2 5 Example : N1 N2 N3

18 So Far So Good !! n But … n The discussion assumes fixed topology n In practice routers and lines often fail Algorithm needs modifications 

19 Dealing with changes in topology n Main problem : If a router crashes, it has no way to notify it’s neighbors n Solution : time-out paradigm n Details depend upon the protocol itself n In RIP : Send update messages to your neighbors every 30 seconds

20 Dealing with changes in topology (Cont..) n If R1 doesn’t hear from R2 for 180 seconds,R2 is marked invalid n R1 notifies its neighbors the R2 is unreachable n Unreachable metric = 16

21 Preventing Instability n Main problem : Mathematics proves that the algorithm converges in finite time, but it doesn’t tell how long does it take it to converge !!! n “Count to infinity” method n Choose “infinity” value to be 16.

22 Preventing Instability (Cont..) AB C D Cost=1 Cost=10 Example NCost=1

23 Preventing Instability (Cont..) AB C D Cost=1 Cost=10 Example NCost=1 D: dir 1, dir 1 ….. dir 1 B: unreach, C 4, C5 … C12 C: B 3, A 4, A 5,...A 11, D 11 A: B 3, C 4, C 5, …,C 11, C 12

24 Preventing Instability (Cont..) n If network becomes inaccessible, we want to stop counting as soon as possible n “infinity” was chosen to be as small as possible

25 Preventing Instability (Cont..) n “Simple Split Horizon Scheme” –Omit routes learned from one neighbor in updates sent to that neighbor n “Split Horizon With Poisoned Reverse” –Include such routs in update but set their metric to infinity

26 Protocol Characteristics

27 Message Format Command (1) Version (1)Must be Zero (2) RIP Entry (20) RIP1 Packet Format Address Family identifier (2)Must be Zero (2) RIP1 Entry Format IPv4 address (4) Must be Zero (4) Metric (4)

28 Handling messages n Input processing –Request Messages –Response Messages

29 Protocol Extensions

30 Entry Format Address Family identifier (2)Rout Tag (2) IP address (4) Subnet Mask(4) Next Hop (4) Metric (4)

31 Authentication n Authentication scheme uses the space of an entire RIP entry Command (2)Unused (2) 0xFFFF Authentication (16) Version (2) Authentication type (2)

32 Compatibility n Implemented by compatibility switch n Necessary for two reasons : –Some implementations still follow RIP1 –Use of Multicasting (*) would prevent RIP1 from receiving RIP2 updates (*) Multicasting is used to reduce the unnecessary load on hosts not listening to RIP2 messages