Hardware Information |
Routing, Routed, and Non-Routable Protocols
ROUTING PROTOCOLS A generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. The routing protocol also specifies how routers in a network share information with each other and report changes. The routing protocol enables a network to make dynamic adjustments to its conditions, so routing decisions do not have to be predetermined and static. Routing, Routed and Non-Routable Protocols ROUTING | ROUTED | NON-ROUTABLE ROUTING PROTOCOLS ROUTING PROTOCOLS are the software that allow routers to dynamically advertise and learn routes, determine which routes are available and which are the most efficient routes to a destination. Routing protocols used by the Internet Protocol suite include: · Routing Information Protocol (RIP and RIP II). Routing is the process of moving data across two or more networks. Within a network, all hosts are directly accessable because they are on the same ROUTED PROTOCOLS ROUTED PROTOCOLS are nothing more than data being transported across the networks. Routed protocols include: · Internet Protocol Outside a network, specialized devices called ROUTES are used to perform the routing process of forwarding packets between networks. Routers are connected to the edges of two or more networks to provide connectivity between them. These devices are usually dedicated machines with specialized hardware and software to speed up the routing process. These devices send and receive routing information to each other about networks that they can and cannot reach. Routers examine all routes to a destination, determine which routes have the best metric, and insert one or more routes into the IP routing table on the router. By maintaining a current list of known routes, routers can quicky and efficiently send your information on it's way when received. There are many companies that produce routers: Cisco, Juniper, Bay, Nortel, 3Com, Cabletron, etc. Each company's product is different in how it is configured, but most will interoperate so long as they share common physical and data link layer protocols (Cisco HDLC or PPP over Serial, Ethernet etc.). Before purchasing a router for your business, always check with your Internet provider to see what equipment they use, and choose a router, which will interoperate with your Internet provider's equipment. NON-ROUTABLE PROTOCOLS NON-ROUTABLE PROTOCOLS cannot survive being routed. Non-routable protocols presume that all computers they will ever communicate with are on the same network (to get them working in a routed environment, you must bridge the networks). Todays modern networks are not very tolerant of protocols that do not understand the concept of a multi-segment network and most of these protocols are dying or falling out of use. · NetBEUI RIP (Routing Information Protocol) RIP is a dynamic internetwork routing protocol primary used in interior routing environments. A dynamic routing protocol, as opposed to a static routing protocol, automatically discovers routes and builds routing tables. Interior environments are typically private networks (autonomous systems). In contrast, exterior routing protocols such as BGP are used to exchange route summaries between autonomous systems. BGP is used among autonomous systems on the Internet. RIP uses the distance-vector algorithm developed by Bellman and Ford (Bellman-Ford algorithm). Routing Information Protocol Background The Routing Information Protocol, or RIP, as it is more commonly called, is one of the most enduring of all routing protocols. RIP is also one of the more easily confused protocols because a variety of RIP-like routing protocols proliferated, some of which even used the same name! RIP and the myriad RIP-like protocols were based on the same set of algorithms that use distance vectors to mathematically compare routes to identify the best path to any given destination address. These algorithms emerged from academic research that dates back to 1957. Today's open standard version of RIP, sometimes referred to as IP RIP, is formally defined in two documents: Request For Comments (RFC) 1058 and Internet Standard (STD) 56. As IP-based networks became both more numerous and greater in size, it became apparent to the Internet Engineering Task Force (IETF) that RIP needed to be updated. Consequently, the IETF released RFC 1388 in January 1993, which was then superceded in November 1994 by RFC 1723, which describes RIP 2 (the second version of RIP). These RFCs described an extension of RIP's capabilities but did not attempt to obsolete the previous version of RIP. RIP 2 enabled RIP messages to carry more information, which permitted the use of a simple authentication mechanism to secure table updates. More importantly, RIP 2 supported subnet masks, a critical feature that was not available in RIP. This chapter summarizes the basic capabilities and features associated with RIP. Topics include the routing update process, RIP routing metrics, routing stability, and routing timers. Routing Updates RIP sends routing-update messages at regular intervals and when the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route. The metric value for the path is increased by 1, and the sender is indicated as the next hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination. After updating its routing table, the router immediately begins transmitting routing updates to inform other network routers of the change. These updates are sent independently of the regularly scheduled updates that RIP routers send. RIP Routing Metric RIP uses a single routing metric (hop count) to measure the distance between the source and a destination network. Each hop in a path from source to destination is assigned a hop count value, which is typically 1. When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table. The IP address of the sender is used as the next hop. RIP Stability Features RIP prevents routing loops from continuing indefinitely by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops in a path is 15. If a router receives a routing update that contains a new or changed entry, and if increasing the metric value by 1 causes the metric to be infinity (that is, 16), the network destination is considered unreachable. The downside of this stability feature is that it limits the maximum diameter of a RIP network to less than 16 hops. RIP includes a number of other stability features that are common to many routing protocols. These features are designed to provide stability despite potentially rapid changes in a network's topology. For example, RIP implements the split horizon and holddown mechanisms to prevent incorrect routing information from being propagated. RIP Timers RIP uses numerous timers to regulate its performance. These include a routing-update timer, a route-timeout timer, and a route-flush timer. The routing-update timer clocks the interval between periodic routing updates. Generally, it is set to 30 seconds, with a small random amount of time added whenever the timer is reset. This is done to help prevent congestion, which could result from all routers simultaneously attempting to update their neighbors. Each routing table entry has a route-timeout timer associated with it. When the route-timeout timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires. Packet Formats · Command—Indicates whether the packet is a request or a response. The request asks that a router send all or part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables. · Version number—Specifies the RIP version used. This field can signal different potentially incompatible versions. · Zero—This field is not actually used by RFC 1058 RIP; it was added solely to provide backward compatibility with prestandard varieties of RIP. Its name comes from its defaulted value: zero. · Address-family identifier (AFI)—Specifies the address family used. RIP is designed to carry routing information for several different protocols. Each entry has an address-family identifier to indicate the type of address being specified. The AFI for IP is 2. · Address—Specifies the IP address for the entry. · Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. Note: Up to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. (Up to 25 destinations can be listed in a single RIP packet.) RIP 2 Packet Format · Command—Indicates whether the packet is a request or a response. The request asks that a router send all or a part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables. · Version—Specifies the RIP version used. In a RIP packet implementing any of the RIP 2 fields or using authentication, this value is set to 2. · Unused—Has a value set to zero. · Address-family identifier (AFI)—Specifies the address family used. RIPv2's AFI field functions identically to RFC 1058 RIP's AFI field, with one exception: If the AFI for the first entry in the message is 0xFFFF, the remainder of the entry contains authentication information. Currently, the only authentication type is simple password. · Route tag—Provides a method for distinguishing between internal routes (learned by RIP) and external routes (learned from other protocols). · IP address—Specifies the IP address for the entry. · Subnet mask—Contains the subnet mask for the entry. If this field is zero, no subnet mask has been specified for the entry. ·Next hop—Indicates the IP address of the next hop to which packets for the entry should be forwarded. · Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. Note: Up to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. That is, up to 25 routing table entries can be listed in a single RIP packet. If the AFI specifies an authenticated message, only 24 routing table entries can be specified. Given that individual table entries aren't fragmented into multiple packets, RIP does not need a mechanism to resequence datagrams bearing routing table updates from neighboring routers. Summary Despite RIP's age and the emergence of more sophisticated routing protocols, it is far from obsolete. RIP is mature, stable, widely supported, and easy to configure. Its simplicity is well suited for use in stub networks and in small autonomous systems that do not have enough redundant paths to warrant the overheads of a more sophisticated protocol. Review Questions Q—Name RIP's various stability features. Q—What is the purpose of the timeout timer? Q—What two capabilities are supported by RIP 2 but not RIP? Q—What is the maximum network diameter of a RIP network? This article is submitted by Kashif Raza http://www.networkingtutorials.net
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
A Look Inside The Elusive Inkjet Industry The Inkjet printer industry is booming. Office supply companies report they make more money on ink sales alone than on printer sales overall. Selecting a Laptop Small Can Be BeautifulWhen purchasing a new computer, you may be better served by a laptop than a traditional desktop computer. Recently, laptops with capabilities similar to desktops can be purchased for a comparable price. Adding Serial Ports to a Computer with Only USB Ports So you bought a new computer but you don't have serial ports?It's surprisingly common these days - you find an awesome machine that does everything you want it to do, but then you get home and find out that amongst the lightning-fast processor and terabyte hard drive, you're missing something - a serial port.Most laptop manufacturers have killed RS-232In an effort to enforce newer standards, such as USB and FireWire, many laptop manufacturers have let serial ports fall by the wayside. Quality Recovery and Rework - When It All Goes Wrong When Quality is the Target, but not the Result, what do you do?While Quality may be the overarching goal of all production, stuff happens, resulting in non-conforming parts. This results in failure verification, rework, recalls, sorting, kitting, retest, relabeling and pipeline management, which are facts of life in the manufacturing, assembly and production world we live in. Nvidia Geforce 7800 GTX Review Nvidia has done it again, with it's newest video card, the geforce 7800 GTX. If money is no object and you demand the best, this is the video card for you. A Short Introduction to Blu Ray Blu ray is a next generation optical media format developed by the Blu ray disc association, a group of leading consumer electronics and technology companies such as Apple, Mitsubishi, Panasonic, Philips, Samsung, Sony, TDK to name, but a few.The format was developed for high definition video, as well as storing large amounts of data. The Importance of Ergonomic Products Interestingly, ergonomics though sounds to be a modern and trendy phenomenon, its principles are based on primitive life style. It is a known fact that earlier generations did not have to face a whole lot of medical complications that our generation is facing. Surge Protector: A Simple Mechanism Description A surge protector [AKA surge suppressor] is an electrical plug-in device designed to distribute safe electrical voltages to other electrical or electronic devices. Surge protectors resemble power strips in appearance; however, they are more sophisticated and deliver a constant, continuous power supply. The Newest Thing in Lighting - LED Lighting and What It Can Do The other day my son said to me, what else could anyone possibly invent? Sometimes it would seem that way, but I think that couldn't be further from the truth. Back in the late sixties and early seventies someone realized that light emitting diodes could be used for indicator lights. Printers: What Really Happens When You Hit "Print" You just poured hours upon hours into a lengthy research paper. All that's left to do is print it out. Pixel Disruption To Cause Nausea From User of Computer Screen As we study the issues associated with teaching kids in the classroom we find that fluorescent lighting can plague the learning abilities. A slight flicker from such a light can cause disruption in normal brain patterns. Video Encryption What is Video Encryption?Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.The scrambling is the easy part. Flash Your ATI Video Cards BIOS Flash your ATI video card BIOS.You will need the following:1. Review: Implementing the Google Search Appliance in an Intranet environment Our corporate intranet is a non-framed environment with both Lotus Domino and IIS (.Net and classic ASP) applications and content. A Review of Refurbished Toshiba Laptops Toshiba offers a few of their refurbished laptops in the "Clearance Store" of their official website toshibadirect.com. How To Backup Your Hard Drive We all know that we should back up our system as soon as possible. But if you're like most of us, you will get to it tomorrow. A Guide to Refurbished IBM Laptops IBM boasts a very large array of older and newer refurbished laptops on their website ibm.com. How To Buy A Printer That Won't Break The Bank OK I confess I've bought at least 10 inkjet printers in the last 5 years and finally found one that I really like. I'm not going to mention the brand here but I will tell you what the must have features are for me. An Introduction to Tape Backup If you run a small business, chances are you're saving important files to a server. But what happens when disaster strikes? How are you ensuring that your files won't be lost? Many people fail to realize that the loss of files could cripple their business. A Review of HP Laser Toners Hewlett-Packard is, along with Brother and Samsung, one of the most readily available brands of laser toner. This is due, in part, to the fact that HP was first to release a laser toner inexpensive enough to catch the attention of the average consumer, in 1984. |
home | site map | Contact Us |