Unit3-Routing Protocols - Edited
Unit3-Routing Protocols - Edited
Unit3-Routing Protocols - Edited
Routing
Protocols
By
V VIKAS
ETM, GNITS
OBJECTIVES:
To introduce the idea of autonomous systems (ASs) that divide
the Internet into smaller administrative regions.
To discuss the idea of distance vector routing and the RIP that is
used to implement the idea.
To discuss the idea of link state routing as the second intra-AS
routing method and OSPF that is used to implement the idea.
To discuss the idea of path vector routing as the dominant inter-
AS routing method and BGP that is used to implement the idea.
Chapter 11.1 Introduction
Outline 11.2 Intra- and Inter-Domain
Routing
11.3 Distance Vector Routing
11.4 RIP
11.5 Link State Routing
11.6 OSPF
11.7 Path Vector Routing
11.8 BGP
11-1 INTRODUCTION
indicate the
working node.
Figure 11.1 Autonomous systems
Figure 11.2 Popular routing protocols
Figure 11.3 A graph for Bellman-Ford algorithm
Topics Discussed in the Section
Bellman-Ford Algorithm
Distance Vector Routing Algorithm
Count to Infinity
Figure 11.4 The fact behind Bellman-Ford algorithm
Figure 14.3 Distance vector routing tables
Figure 14.4 Initialization of tables in distance vector routing
Note:
4 3 2
Net5 , 1Net4 , 1Net2 , 1
Example 11.3
Figure 11.7 shows the final routing tables for routers in Figure
11.5.
Figure 11.7 Example 11.3
Figure 11.8 Two-node instability
Two-Node Instability (1)
• Defining Infinity
– Most implementations define 16 as infinity
• Split Horizon
– Instead of flooding the table through each
interface, each node sends only part of its
table through each interface
– E.g. node B thinks that the optimum route
to reach X is via A, it does not need to
advertise this piece of information to A
Two-Node Instability (2)
• Split Horizon and Poison Reverse
– One drawback of Split Horizon
• Normally, the DV protocol uses a timer and if
there is no news about a route, the node deletes
the route from its table
• In the previous e.g., node A cannot guess that
this is due to split horizon or because B has not
received any news about X recently
– Poison Reverse
• Node B can still advertise the value for X, but is
the source of information is A, it can replace
the distance with infinity as a warning
Figure 11.9 Three-node instability
Update loop
until infinity
11-4 RIP
On interface 130.0.0.2
to R2
RIP messages
Request
A request message is sent by a router that
has just come up or by a router that has
some time-out entries
A request can ask about specific entries or all
entries
Response
A response can be either solicited or
unsolicited (30s or when there is a change in
the routing table)
Figure 11.14 RIP timers
RIP Timers
Periodic timer
It controls the advertising of regular update message. The
value of timer set to any random value between 25 and 35s
Expiration timer
It governs the validity of a route (180 sec). If an update is
received then the timer is reset.
The route is considered expired and the hop count of the
route is set to 16
Garbage collection timer
A invalid route is not purged from the routing table
until this timer expires (120 sec).
This timer allows neighbors to become aware of the
invalidity of route prior to purging.
Encapsulation
Multicasting and
Multicast Routing Protocols
Objectives
Upon completion you will be able to:
• Differentiate between a unicast, multicast, and broadcast
message
• Know the many applications of multicasting
• Understand multicast link state routing and MOSPF
• Understand multicast link state routing and DVMRP
• Understand the Core-Based Tree Protocol
• Understand the Protocol Independent Multicast Protocols
• Understand the MBONE concept
15.1 UNICAST, MULTICAST,
AND BROADCAST
A message can be unicast, multicast, or broadcast. Let us clarify these
terms as they relate to the Internet.
Unicasting
Multicasting
Broadcasting
Multicasting versus Multiple Unicasting
Figure 15.1 Unicasting