Rip 97 New

Embed Size (px)

Citation preview

  • 8/8/2019 Rip 97 New

    1/42

    The Third CEENet WorkshopZagreb, Croatia 1Iskra Djonova-Popova

    Distance Vector ProtocolsDistance Vector Protocols(contents)(contents)

    IGPs - what are they and why they

    are needed

    Routing algorithms - the designgoals

    Distance vector versus Link state

    RIP (Routing Information Protocol)

  • 8/8/2019 Rip 97 New

    2/42

    The Third CEENet WorkshopZagreb, Croatia 2Iskra Djonova-Popova

    IGP

    IGP -- What Are TheyWhat Are They

    Internal Gateway Protocols

    Single network administration Unique routing policy

    Make best use of network resources

  • 8/8/2019 Rip 97 New

    3/42

    The Third CEENet WorkshopZagreb, Croatia 3Iskra Djonova-Popova

    IGPIGP -- Why They are NeededWhy They are Needed

    A B C

    D E

    2

    3 4

    5

    1

    Routing algorithms would scale

    better

    Static routes would be fine

    6

  • 8/8/2019 Rip 97 New

    4/42

    The Third CEENet WorkshopZagreb, Croatia 4Iskra Djonova-Popova

    Routing AlgorithmsRouting Algorithms -- thethe

    Design GoalsDesign Goals

    O

    ptimallySimplicity/Low overhead

    Robustness/ Stability

    Rapid Convergence

    Flexibility

  • 8/8/2019 Rip 97 New

    5/42

    The Third CEENet WorkshopZagreb, Croatia 5Iskra Djonova-Popova

    Routing on the InternetRouting on the Internet -- thethe

    Two ParadigmsTwo ParadigmsCentralized approach

    good routes can be found but reliability is

    questionable

    too much traffic on lines connected to the

    network center

    Distributed approachthe failure of one part doesnt affect the

    functioning of the rest of the network

  • 8/8/2019 Rip 97 New

    6/42

    The Third CEENet WorkshopZagreb, Croatia 6Iskra Djonova-Popova

    Distributed Approach WinsDistributed Approach Wins

    GGP - Predecessor of RIP

    No distinction between hosts androuters

    Attempts to keep track of the load

    in the network

  • 8/8/2019 Rip 97 New

    7/42

    The Third CEENet WorkshopZagreb, Croatia 7Iskra Djonova-Popova

    InternetGrowsInternetGrows

    Autonomous systems are introduced

    to support hierarchical routing

    The distance vector protocols are notany more sutable

    Link state protocols are developed

    Routers routs

  • 8/8/2019 Rip 97 New

    8/42

    The Third CEENet WorkshopZagreb, Croatia 8Iskra Djonova-Popova

    HostReleased from BurdenHostReleased from Burden

    ofRoutingofRouting The subnet masked bits of the

    destination address mach those of thelocal address

    true - the destination is on the local network

    (next hops address is the destination

    address)

    false - the destination is remote (next hops

    address is some of the routers)

  • 8/8/2019 Rip 97 New

    9/42

    The Third CEENet WorkshopZagreb, Croatia 9Iskra Djonova-Popova

    Distance Vector ProtocolsDistance Vector Protocols

    Neighboring nodes send information in

    regular time intervals

    Install routes directly in tables, lowest

    cost wins

    The information sent (the distancevectors) are all routes from the table

  • 8/8/2019 Rip 97 New

    10/42

    The Third CEENet WorkshopZagreb, Croatia 10Iskra Djonova-Popova

    TheR

    outing AlgorithmTheR

    outing Algorithm

    the shortest path tree is contained

    in the routing table

    Calculations are based on the

    Bellman-Ford algorithm

  • 8/8/2019 Rip 97 New

    11/42

    The Third CEENet WorkshopZagreb, Croatia 11Iskra Djonova-Popova

    The Centralized Version of theThe Centralized Version of the

    AlgorithmAlgorithm

    Cycle Node B C D E

    Initial (., g) (., g) (., g) (., g)

    1 (1, 1) (2, 2) (3, 1) (4, 2)

    A B C

    D E

    2

    3 4

    56

    1 A B C

    D E

    2

    3 4

    1

  • 8/8/2019 Rip 97 New

    12/42

    The Third CEENet WorkshopZagreb, Croatia 12Iskra Djonova-Popova

    The Distributed VersionThe Distributed Version

    A B C

    D E

    1 2

    3 4

    5

    6

    Example of simple network with 5 nodes (routers)

    and 6 links (interfaces)

    The cost of all links is assumed to be 1

    From A to Link CostB 1 1

    C 1 2

    D 3 1

    E 1 2

    Routing table for A

  • 8/8/2019 Rip 97 New

    13/42

    The Third CEENet WorkshopZagreb, Croatia 13Iskra Djonova-Popova

    AdvantagesAdvantages

    simple to implement

    low requirement in processing andmemory at the nodes

    suitable for small networks

  • 8/8/2019 Rip 97 New

    14/42

    The Third CEENet WorkshopZagreb, Croatia 14Iskra Djonova-Popova

    DisadvantagesDisadvantagesSlow convergence

    Bouncing effectCounting to infinity problem

  • 8/8/2019 Rip 97 New

    15/42

    The Third CEENet WorkshopZagreb, Croatia 15Iskra Djonova-Popova

    S

    low Convergence

    A B C

    D E

    2

    3 4

    5

    6

    XXX

    When a link breaks the routers are supposed to

    reestablish the routing tables

    link 1 breaks

  • 8/8/2019 Rip 97 New

    16/42

    The Third CEENet WorkshopZagreb, Croatia 16Iskra Djonova-Popova

    The Bouncing Effect

    link 2 breaks and A sends its routing

    table to B before B sends it to A

    A B C

    D E

    3 4

    5

    6

    XXX

    1

  • 8/8/2019 Rip 97 New

    17/42

    The Third CEENet WorkshopZagreb, Croatia 17Iskra Djonova-Popova

    Counting to Infinity Problems

    D E

    3

    A B C2

    4

    5

    XXX

    XXX

    Links 1 and 6

    break.

    A sends its old routing table

    before D sends the new routing table

  • 8/8/2019 Rip 97 New

    18/42

    The Third CEENet WorkshopZagreb, Croatia 18Iskra Djonova-Popova

    SplitHorizon for Preventing

    Two-hop Loops

    Simple

    the information about destination routed on

    the link is omitted

    With poisonous reverse

    the corresponding distance is set to infinity

    if the destination is routed on the link

  • 8/8/2019 Rip 97 New

    19/42

    The Third CEENet WorkshopZagreb, Croatia 19Iskra Djonova-Popova

    Triggered UpdatesTriggered Updates

    A timer is associated with each entry in

    the routing table

    much longer than the period of transmission

    of information

    Triggered updatesrequest nodes to send messages as soon

    as they notice a change in the routing table

  • 8/8/2019 Rip 97 New

    20/42

    The Third CEENet WorkshopZagreb, Croatia 20Iskra Djonova-Popova

    Different Distance VectorDifferent Distance Vector

    ProtocolsProtocols

    Metric they use

    Structure of the addresses

    Range of links they support

  • 8/8/2019 Rip 97 New

    21/42

    The Third CEENet WorkshopZagreb, Croatia 21Iskra Djonova-Popova

    RIPRIP -- RoutingInformationRoutingInformation

    ProtocolProtocol

    first used in XNS (Xerox Network

    Systems)

    designed as a component of thenetworking code for the BSD release of

    UNIX incorporated in program routed (rote management

    daemon)

    documented in rfc 1058

  • 8/8/2019 Rip 97 New

    22/42

    The Third CEENet WorkshopZagreb, Croatia 22Iskra Djonova-Popova

    RIPRIP -- CharacteristicsCharacteristics

    the metric is a hop-countThe value of 1 to 15 is used (16 denotes infinity)

    supports point-to-point links andbroadcast networks

    doesn't support CIDR

    used only in IP networksat first the intention was to be used in variety of

    networks

  • 8/8/2019 Rip 97 New

    23/42

    The Third CEENet WorkshopZagreb, Croatia 23Iskra Djonova-Popova

    RIPRIP -- CharacteristicsCharacteristics

    packets are sent every 30 seconds

    or faster when necessary

    route is considered down if notrefreshed within 180 sec. (distance

    set to infinity)

    two kinds of messages request

    response

  • 8/8/2019 Rip 97 New

    24/42

    The Third CEENet WorkshopZagreb, Croatia 24Iskra Djonova-Popova

    RIPRIP -- Message FormatMessage Format

    command (1) version (1) must be zero(2)

    address family identifier (2) must be zero(2)

    IP address(4)

    must be zero(4)

    must be zero(4)

    metric(4)

    0 31

  • 8/8/2019 Rip 97 New

    25/42

    The Third CEENet WorkshopZagreb, Croatia 25Iskra Djonova-Popova

    RIPRIP -- ProcessingProcessing

    When processing an incoming

    response a set of validation checks are

    performed if each address is valid A, B orC address

    the network number is not 127 (loopback) or 0

    (except in in the case of default address 0.0.0.0) the host part is not a broadcast address

    the metric is not larger than 16 (infinity)

  • 8/8/2019 Rip 97 New

    26/42

    The Third CEENet WorkshopZagreb, Croatia 26Iskra Djonova-Popova

    RIPRIP -- ProcessingProcessing

    the metric associated with thedestination

    the address of the next router

    a recently updated flagseveral timers

    Each entry in the routing tables

    contains:

  • 8/8/2019 Rip 97 New

    27/42

    The Third CEENet WorkshopZagreb, Croatia 27Iskra Djonova-Popova

    RIPRIP -- LimitationsLimitations

    Maximum hop count of 15

    restricts the use of RIP in larger networks,

    but prevents the count to infinity problem(endless loops)

    Difference in links speed is not reflected

    in the hop-count metricscongested links can be still included in the

    best path

  • 8/8/2019 Rip 97 New

    28/42

    The Third CEENet WorkshopZagreb, Croatia 28Iskra Djonova-Popova

    RIP2RIP2 -- Why Was Developed?Why Was Developed?

    many superior IGP exists (RIP is often

    referred as Rest In Peace)

    there are still many implementations ofRIP

    given that RIP will still be used, it

    deserves improvementsRIP 2 is documented in RFC-1287, RFC-

    1388 and RFC-1389

  • 8/8/2019 Rip 97 New

    29/42

    The Third CEENet WorkshopZagreb, Croatia 29Iskra Djonova-Popova

    RIP2RIP2 -- Message FormatMessage Format

    command (1) version (1) Routing domain(2)

    address family identifier (2) Route Tag(2)

    IP address(4)

    Next Hop(4)

    Subnet Mask(4)

    metric(4)

  • 8/8/2019 Rip 97 New

    30/42

    The Third CEENet WorkshopZagreb, Croatia 30Iskra Djonova-Popova

    RIP2RIP2 -- The Added FieldsThe Added Fields

    routing domain

    used together with the next hop fieldto allow multiple autonomous systems

    to share a single wire

    route tag

    to flag external routes and is for use

    by EGP and BGP

  • 8/8/2019 Rip 97 New

    31/42

    The Third CEENet WorkshopZagreb, Croatia 31Iskra Djonova-Popova

    RIP2RIP2 -- ImprovementsImprovements

    authentication

    routing per subnet

    support of multiple metrics

    routing domainsmulticasting

  • 8/8/2019 Rip 97 New

    32/42

    The Third CEENet WorkshopZagreb, Croatia 32Iskra Djonova-Popova

    AuthenticationAuthentication

    specifies that first entry in a packet

    can be replaced by an authenticationsegment

    currently the only algorithm defined is

    simple password procedure

  • 8/8/2019 Rip 97 New

    33/42

    The Third CEENet WorkshopZagreb, Croatia 33Iskra Djonova-Popova

    Routing perSubnetRouting perSubnet

    support CIDR

    subnet mask included in themessage

    compatible with RIP1 because the

    subnet filed is ignored whencooperating with RIP1

  • 8/8/2019 Rip 97 New

    34/42

    The Third CEENet WorkshopZagreb, Croatia 34Iskra Djonova-Popova

    Multiple MetricsMultiple Metrics

    metric contains two components

    hop count

    throughput, measured as 10logC ten times the decimal logarithm of the maximum data

    rate in Kbs

    selected path with largest throughputif two paths with same throughput the one

    with lower hop count is chosen

  • 8/8/2019 Rip 97 New

    35/42

    The Third CEENet WorkshopZagreb, Croatia 35Iskra Djonova-Popova

    Routing DomainRouting Domain

    different autonomous systems share

    the same wire (Ethernet or FDDI)

    routers dont want to process messages

    bound to his network

    routing domain number is theautonomous system number

  • 8/8/2019 Rip 97 New

    36/42

    The Third CEENet WorkshopZagreb, Croatia 36Iskra Djonova-Popova

    To create a routing process for RIP,

    use the configuration command:

    router rip

    no router rip

    To shut down the routing process

    use the command:

    RIPRIP -- ConfigurationConfiguration

  • 8/8/2019 Rip 97 New

    37/42

    The Third CEENet WorkshopZagreb, Croatia 37Iskra Djonova-Popova

    Specifying the List ofSpecifying the List of

    NetworksNetworksSpecify the list of networks with the network routerSpecify the list of networks with the network router

    configuration subcommand.configuration subcommand.

    network networknetwork network--numbernumber

    no network networkno network network--numbernumber

    The argument networkThe argument network--number is a network number in dotted IPnumber is a network number in dotted IP

    notation (of directly connected networks). Note that this numbernotation (of directly connected networks). Note that this number

    must not contain subnet information. You may specify multiplemust not contain subnet information. You may specify multiple

    network subcommands. RIP routing updates will be sent andnetwork subcommands. RIP routing updates will be sent andreceived only through interfaces on this network. The networkreceived only through interfaces on this network. The network

    router subcommand is a mandatory configuration command androuter subcommand is a mandatory configuration command and

    must be included in the configuration of each IP routing process.must be included in the configuration of each IP routing process.

  • 8/8/2019 Rip 97 New

    38/42

    The Third CEENet WorkshopZagreb, Croatia 38Iskra Djonova-Popova

    Example:

    The following example configuration defines RIP as

    the routing protocol to be used on all interfaces

    connected to networks 128.99.0.0 and 192.31.7.0.

    router rip

    network 128.99.0.0

    network 192.31.7.0

    To remove a network from the list, use the nonetwork router subcommand followed by the

    network address.

  • 8/8/2019 Rip 97 New

    39/42

    The Third CEENet WorkshopZagreb, Croatia 39Iskra Djonova-Popova

    RIP is not aloneRIP is not alone

    IGRPIGRP

    Developed in the mid1980s by cisco

    Systems, Inc.

    Designed to overcome the limitations

    of RIP

    Initially worked in IP environment, butlatter ported to OSI CLNP networks

  • 8/8/2019 Rip 97 New

    40/42

    The Third CEENet WorkshopZagreb, Croatia 40Iskra Djonova-Popova

    IGRPIGRP -- Main CharacteristicsMain Characteristics

    Distance vector protocol

    Uses a combination of metricsinternetwork, delay, bandwidth, reliability

    and load

    the weighting factors are set either byadministrators or default values are

    used

  • 8/8/2019 Rip 97 New

    41/42

    The Third CEENet WorkshopZagreb, Croatia 41Iskra Djonova-Popova

    IGRPIGRP -- Additional flexibilityAdditional flexibility

    Wide metric ranges

    allow satisfactory metric setting in

    internetworks with widely varying

    performance characteristics

    Permits multipath routing

    dual equal-bandwidth lines may run a

    single stream of traffic in round-robin

    fashion

  • 8/8/2019 Rip 97 New

    42/42

    The Third CEENet WorkshopZagreb, Croatia 42Iskra Djonova-Popova

    IGRPIGRP -- Stability FeaturesStability Features

    hold-downs

    split horizons

    poison reverse updates

    timers

    update timer

    hold time periodinvalid timer

    flush timer