1 / 32

RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss

RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss. Motivation. Introduction Review the Basic Protocol RIP Characteristics Protocol Extensions & Compatibility. Introduction Basic Internet Model. H1. N1. R1. R2. N2. R3. N3. H2. Why RIP?.

twyla
Télécharger la présentation

RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFC 2453RIP 2(Routing Information Protocol)Daher Kaiss

  2. Motivation • Introduction • Review the Basic Protocol • RIP Characteristics • Protocol Extensions & Compatibility

  3. IntroductionBasic Internet Model H1 N1 R1 R2 N2 R3 N3 H2

  4. Why RIP? • Although OSPF has a lot of advantages, we still need RIP : • Very little “overhead” in small networks • Mainly in terms of bandwidth, Configuration and management time. • Very easy to implement

  5. RIP 1 Limitations - I • RIP 1 doesn’t consider : • Autonomous Systems and IGP/EGP interactions. • Subnetting • Authentication

  6. The Basic Protocol

  7. So, What is RIP ? • A routing protocol • Based on Bellman-Ford Algorithm • Uses a distance vector algorithm • Historically : • Used since the early ARPANET • Based on the program “routed”, which is included in the Berkeley Unix. • An updated version was used by XNS (Xerox Network Systems)

  8. RIP Basic Protocol (Cont..) • RIP is working as an IGP (Interior Gatway Protocol) in moderate size AS’s

  9. Limitations of the protocol - II • Only Networks with longest path (Network diameter) of 15 hops • Identifying Loops requires a lot of time and bandwidth • “Best route” doesn’t consider real-time parameters (e.g. delay, reliability, dollar cost, or load)

  10. Distance Vectors Algorithms • Find a path from the sender to the destination • Forwarding inside Network or Subnet is the responsibility of Network technology • Network technology is Transparent to IP

  11. Distance Vectors Algorithms (Cont..) • Each Router has it’s own data-base about all the destinations • Each entry includes : • Next router • “Metric” (e.g. time delay, dollar cost) • Destinations are networks but could be individual host

  12. The router’s data base • For each destination keep the following: • address (subnet): In IP implementation • router : First router along the path • interface : The physical network to be used to reach the first router • metric : indicating the distance • timer : amount of time since the entry was last updated • other flags ...

  13. The router’s rule • Periodically, Send to others update messages about your data base content • Take care to keep your data base updated

  14. So, what is “good” path ? • Goodness is determined according to the value of the “metric” (1..15) • In simple networks : “metric” simply counts the number of routers a message must go through • In more complex : May consider delay, cost and others

  15. Calculating the minimal metric • Based on Bellman-Ford Algorithm • Formally : • D(i,i) = 0 all i • D(i,j) = mink [d(i,k) + D(k,j)] otherwise * D(i,j) represents the metric of the best rout from I to j • Algorithm will converge in finite time • Assuming no topology change occurred

  16. Calculating the minimal metric (Cont..) • Data is adaptively updated - No need to keep the whole estimates • Only routers participate in the game - No need for individual hosts information • Worse metric that comes from the next router, should be considered

  17. Calculating the minimal metric (Cont..) Example : R2 N1 R1 N3 N2 R3 N3 R2 5

  18. So Far So Good !! J • But … • The discussion assumes fixed topology • In practice routers and lines often fail Algorithm needs modifications L

  19. Dealing with changes in topology • Main problem : If a router crashes, it has no way to notify it’s neighbors • Solution : time-out paradigm • Details depend upon the protocol itself • In RIP : Send update messages to your neighbors every 30 seconds

  20. Dealing with changes in topology (Cont..) • If R1 doesn’t hear from R2 for 180 seconds,R2 is marked invalid • R1 notifies its neighbors the R2 is unreachable • Unreachable metric = 16

  21. Preventing Instability • Main problem : Mathematics proves that the algorithm converges in finite time, but it doesn’t tell how long does it take it to converge !!! • “Count to infinity” method • Choose “infinity” value to be 16.

  22. Preventing Instability (Cont..) Example Cost=1 A B Cost=1 Cost=1 C Cost=1 Cost=10 D N Cost=1

  23. Preventing Instability (Cont..) Example Cost=1 A B Cost=1 Cost=1 C D: dir 1, dir 1 ….. dir 1 B: unreach, C 4, C5 … C12 Cost=10 C: B 3, A 4, A 5, . ..A 11, D 11 D A: B 3, C 4, C 5, …,C 11, C 12 N Cost=1

  24. Preventing Instability (Cont..) • If network becomes inaccessible, we want to stop counting as soon as possible • “infinity” was chosen to be as small as possible

  25. Preventing Instability (Cont..) • “Simple Split Horizon Scheme” • Omit routes learned from one neighbor in updates sent to that neighbor • “Split Horizon With Poisoned Reverse” • Include such routs in update but set their metric to infinity

  26. Protocol Characteristics

  27. Message Format RIP1 Packet Format Command (1) Version (1) Must be Zero (2) RIP Entry (20) RIP1 Entry Format Address Family identifier (2) Must be Zero (2) IPv4 address (4) Must be Zero (4) Must be Zero (4) Metric (4)

  28. Handling messages • Input processing • Request Messages • Response Messages

  29. Protocol Extensions

  30. Entry Format Address Family identifier (2) Rout Tag (2) IP address (4) Subnet Mask(4) Next Hop (4) Metric (4)

  31. Authentication • Authentication scheme uses the space of an entire RIP entry Command (2) Version (2) Unused (2) 0xFFFF Authentication type (2) Authentication (16)

  32. Compatibility • Implemented by compatibility switch • Necessary for two reasons : • Some implementations still follow RIP1 • Use of Multicasting (*) would prevent RIP1 from receiving RIP2 updates (*) Multicasting is used to reduce the unnecessary load on hosts not listening to RIP2 messages

More Related