1 Distance Vector Routing Protocols Dr. Rocky K. C. Chang 14 November 2006.

Slides:



Advertisements
Similar presentations
Karlston D'Emanuele Distance Vector Routing Protocols Notes courtesy of Mr. Joe Cordina Password Removed
Advertisements

RIP V2 CCNP S1(5), Chapter 4.
Copyright 2008 Kenneth M. Chipps Ph.D. Cisco CCNA Exploration CCNA 2 Routing Protocols and Concepts Chapter 4 Distance Vector Routing Protocols.
Routing - I Important concepts: link state based routing, distance vector based routing.
Dynamic routing Routing Algorithm (Dijkstra / Bellman-Ford) – idealization –All routers are identical –Network is flat. Not true in Practice Hierarchical.
CIS 235: Networks Fall, 2007 Western State College Computer Networks Fall, 2007 Prof Peterson.
CSE331: Introduction to Networks and Security Lecture 9 Fall 2002.
Routing So how does the network layer do its business?
Nov 04, 2004CS573: Network Protocols and Standards1 IP Routing: GGP and RIP Network Protocols and Standards Autumn
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
RIP – Routing Information Protocol Syeda Momina Tabish MIT - 7.
Distance-Vector Routing COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Michael Freedman
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Routing and Routing Protocols
Routing.
COS 420 Day 17. Agenda Finished Grading Individualized Projects Very large disparity in student grading No two students had same ranking for other students.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
CSE 461: Distance Vector Routing. Next Topic  Focus  How do we calculate routes for packets?  Routing is a network layer function  Routing Algorithms.
Announcement r Project 2 Extension ? m Previous grade allocation: Projects 40% –Web client/server7% –TCP stack21% –IP routing12% Midterm 20% Final 20%
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
Computer Networking Intra-Domain Routing, Part I RIP (Routing Information Protocol)
RIP. A PPROACHES TO S HORTEST P ATH R OUTING There are two basic routing algorithms found on the Internet. 1. Distance Vector Routing Each node knows.
Distance Vector Routing Protocols Distance Vector Routing.
ROUTING BASICS. Why are Routers Necessary? One of the key components of the technical infrastructure of the network One of the key components of the technical.
Routing Concepts Warren Toomey GCIT. Introduction Switches need to know the link address and location of every station. Doesn't scale well, e.g. to several.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
Distance Vector Routing Protocols W.lilakiatsakun.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
Distance Vector Routing Protocols
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
Slide /2009COMM3380 Routing Algorithms Distance Vector Routing Each node knows the distance (=cost) to its directly connected neighbors A node sends.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
1 3-Oct-15 Distance Vector Routing CCNA Exploration Semester 2 Chapter 4.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
RIP2 (Routing Information Protocol) Team Agile. Routing Protocols Link State – OSPF – ISIS Distance vector – RIP (version 1 and 2) – IGRP (Cisco Proprietary)
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
Distance Vector Routing Protocols Routing Protocols and Concepts Lecture Week 4.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
4: Network Layer4a-1 Distance Vector Routing Algorithm iterative: r continues until no nodes exchange info. r self-terminating: no “signal” to stop asynchronous:
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Routing Protocols and Concepts Dr. Muazzam A. Khan.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
4. Interconnecting Networks: Routers. © Tallal Elshabrawy 2 Bridges Vs Routers BRIDGES DO WELL IN SMALL (FEW HUNDRED HOSTS) WHILE ROUTERS USED IN LARGE.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
RIP.
CS 5565 Network Architecture and Protocols
Routing Protocols and Concepts
Routing Information Protocol (RIP)
Internet Networking recitation #4
Routing: Distance Vector Algorithm
Distance Vector Routing: overview
Routing in Packet Networks Shortest Path Routing
Road Map I. Introduction II. IP Protocols III. Transport Layer
Routers Routing algorithms
RFC 1058 & RFC 2453 Routing Information Protocol
ECE453 – Introduction to Computer Networks
Communication Networks NETW 501
Communication Networks
EE 122: Intra-domain routing: Distance Vector
Presentation transcript:

1 Distance Vector Routing Protocols Dr. Rocky K. C. Chang 14 November 2006

2 The routing problem  Problem: How can a router/host determine the path to a destination?  Any routing protocol must allow routers to make a corporate, consistent, and correct local forwarding decisions regarding any destination in a global routing fabric. Sources and destinations are generally not directly connected. Routers are generally not directly connected.

3 Design issues  Scalability: scale to the number of networks Routing table size Routing messages Time to converge  Free of permanent/transient routing loops  Optimal paths: hop count, type-of-service, quality-of-service, etc.  Security  Host mobility and perhaps router mobility

4 Design choices  Centralized vs decentralized A central processor computes the routes.  Source-based vs hop-by-hop E.g., source routing and destination-based routing  With or without the global topological info. E.g., OSPF vs RIP  Dynamic (or state-dependent) vs static routing IP routing vs ATM routing  Single-path vs multiple path

5 Two main routing approaches  Distance vector (DV) and link state (LS) Both are implemented as distributed protocols. Both are hop-by-hop routing protocols. DV routers do not have the complete topological info but LS routers do (partially). Both are dynamic routing protocols. Both could maintain multiple paths.  Each DV router tells its neighbor routers what it has learnt. Each LS router tells all routers the states of its directly connected links.

6 Distance vector approach  The origin of distance vector protocols is traced back to the Bellman-Ford algorithm. Let d ij : the cost of the link from node i to node j, which is  if the link does not exist. D ij (h): the cost of the minimum-cost route from node i to node j on the number of h hops. Initial conditions: D ii (h) = 0 for all i and h, and D ij (0) =  for i  j. Iterative steps: D ij (h+1) = min k [d ik + D kj (h)] for all i  j. until D ij (h+1) = D ij (h) for all i and j.

7 Bellman-Ford algorithm  Conditions: The link costs are additive. If all cycles not containing the destination have nonnegative length.  The Bellman-Ford algorithm terminates after a finite number of iterations (at most N, the number of nodes), gives minimum-cost paths from all nodes to other nodes, and its computational complexity in the worse case is O(N 3 ).

8 An example A B E C D A B E C D 7 1 A B E C D A B E C D

9 1 A B E C D 1 2 2

10 Distributed, asynchronous B-F algorithm  Node i executes the B-F algorithm asynchronously: D ii (t) = 0, for all i and t  0. D ij (t) = min k [d ik + D i kj (t)] for i  j, where D ij (t) is the estimate of the cost to node j available to node i at time t. D i kj (t) is node k’s estimate of the cost to node j available to node i at time t.  Node i distributes its distance vector D ij (t) for all j to its neighbors.

11 Distributed, asynchronous B-F algorithm  Node i also keeps the distance vectors sent from its neighbors.  The algorithm still converges if each node will eventually execute the algorithm and transmit the results to the neighbors. The convergence time, of course, depends on how quickly each node computes and distributes the results.  When the algorithm converges and there are no changes in the network, the transmissions of distance vectors stop.

12 An example (from [1])  Consider that E-->A via D  Consider that E-->A via B A B E C D Dest 8

13 Good news travels fast (from [1])  Consider X Y Z

14 Bad news travels slow (from [1])  Consider X Y Z

15 Bad news travels slow  When does the temporary routing loop stop? Count to infinity problem  Consider X Y Z 41 fail

16 Split horizon  If Z routes through Y to reach X, then Z will not advertise the route to X back to Y or advertise the router to X with infinite cost to Y (with poisonous reverse). X Y Z

17 Split horizon  In either case, Y is asked not to use Z as a next-hop to reach X.  In the last example,

18 Split horizon  Split horizon can break temporary/permanent routing loops of 2 nodes but not for more than 2 nodes.  A certain “large” cost should be selected to represent the unavailability of a link. X Y Z 41 fail X Y Z W

19 Path vector  Augment each distance vector entry with a path vector. Y advertises to Z about a route to X with a cost of 4 plus a path vector {Y}. Z advertises to Y about a route to X with a cost of 5 plus a path vector {Y, Z}. When Y receives the route, it checks whether its identity is in the path vector. X Y Z

20 Source tracing  Augment each distance vector entry with the identity of the router immediately preceding the destination, e.g., E-->B Trace the route to be B<--C<--D<--E. A B E C D

21 Distributed update algorithm (DUAL)  Each router keeps distance vectors reported by its neighbors.  If receiving a route that is better than the current one, use it. This new route is impossibly involved in a routing loop.  If the cost of the existing route increases, try to find a shorter route from the distance vectors. If not, freeze the routing table and propagate this change until all routers have updated them.

22 Routing Information Protocol (RIP)  RIP is an implementation of the distance vector approach at the application level. Common daemons used on the Unix systems are the programs routed and gated. RIP packets are carried over UDP and IP.  Most RIP implementations use hop count (the number of routers traversed) as the cost. A hop count of 16 is interpreted as infinity.  Each node is a RIP router, which is generally connected to a number of networks.

23 RIP-1 messages

24 More protocol details  RIP routers only retain the current minimum-cost route and the corresponding next-hop routers’ identities. They do not keep the distance vectors from their neighbor routers. This form of implementation also inherits the same temporary/permanent routing loop problems, e.g., Y may receive an out-dated distance vector from Z before Y can send an updated one to Z.

25 Triggered and periodic updates  To cater for link and router failures, each route will time out unless receiving a corresponding distance vector. Each RIP router broadcasts its distance vectors to its neighbors every 30 seconds (periodic updates). Timeout period may be set to 30x6 seconds.  To accelerate convergence, triggered updates are also employed. Immediately send cost updates to neighbor routers instead of waiting for periodic updates. Can avoid many routing loop problems.

26 Hold-down  When a router removes a route, it invokes a hold-down that would not accept new routes to the same destination for a time period. During this period, the removed route is advertised to other routers (triggered update). The purpose is to allow the triggered update to propagate to other routers. Routing loops can be avoided if the time period is long enough.  The downside is to take longer for routers to learn new routes.

27 RIP-2  RIP-2 improves RIP-1 by providing Subnet masks which facilitate subnet routing, CIDR, and variable length subnet masks Data authentication: a security leader and a security trailer (RFC 2082) Next hop: Allow packets destined to the IP address specified in RIP-2 messages sent to somewhere else (specified in the next hop field). multicasting of routing advertisements ( ), instead of broadcasting

28 RIP-2 messages  The route tag is used to flag “external routes,” and is used in conjunction with BGP.

29 Conclusions  Internet routing is the “intelligence” of the network layer.  Distance vector routing has been deployed in the intra-domain routing protocols today.  However, it suffers from the slow convergence problem and it is prone to routing loops.  A number of additional mechanisms were added to the basic distance-vector routing, e.g., path vector, etc.

30 References 1. J. Kurose and K. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, Addison Wesley, M. Steenstrup, Routing in Communications Networks, Prentice Hall, S. Keshav, An Engineering Approach to Computer Networking, Addison Wesley, C. Huitema, Routing in the Internet, Prentice Hall PTR, Second Edition, 1999.