Lecture 5 (Part - 1) : Unicast Routing Protocols
Lecture 5 (Part - 1) : Unicast Routing Protocols
Default
Summary
Floating
5-2 INTER- AND INTRA-DOMAIN ROUTING
4 3 2
Net5 , 1Net4 , 1Net2 , 1
Example 5.3
Figure below shows the final routing tables for routers in
previous Figure.
Figure 5.5 Two-node instability
Two-Node Instability (1)
Defining Infinity
◦ Most implementations define 16 as infinity
Split Horizon
◦ Instead of flooding the table through each interface,
each node sends only part of its table through each
interface
◦ E.g. node B thinks that the optimum route to reach X
is via A, it does not need to advertise this piece of
information to A
Two-Node Instability (2)
Split Horizon and Poison Reverse
◦ One drawback of Split Horizon
◦ Normally, the DV protocol uses a timer and if there is no news
about a route, the node deletes the route from its table
◦ In the previous e.g., node A cannot guess that this is due to
split horizon or because B has not received any news about X
recently
◦ Poison Reverse
◦ Node B can still advertise the value for X, but is the source of
information is A, it can replace the distance with infinity as a
warning
Figure 5.6 Three-node instability
Update loop
until infinity
5-4 RIP
Authentication
Multicasting
◦ RIPv1 uses broadcasting to send RIP messages to every
neighbors. Routers as well as hosts receive the packets
◦ RIPv2 uses the all-router multicast address to send the RIP
messages only to RIP routers in the network
Figure 5.8 RIP message format
Figure 5.9 Request messages
Figure 5.10 Example of a domain using RIP
Example 5.4
Figure 5.11 shows the update message sent from router R1 to
router R2 in Figure 5.10, The message is sent out of interface
130.10.0.2.
The message is prepared with the combination of split
horizon and poison reverse strategy in mind. Router R1 has
obtained information about networks 195.2.4.0, 195.2.5.0, and
195.2.6.0 from router R2. When R1 sends an update message
to R2, it replaces the actual value of the hop counts for these
three networks with 16 (infinity) to prevent any confusion for R2.
The figure also shows the table extracted from the message.
Router R2 uses the source address of the IP datagram carrying
the RIP message from R1 (130.10.02) as the next hop address.
Router R2 also increments each hop count by 1 because the
values in the message are relative to R1, not R2.
Figure 5.11 Solution to Example 5.4
Figure 5.12 RIP version 2 format
Note