Hardware Information |
|
Routing, Routed, and Non-Routable Protocols
ROUTING PROTOCOLS A generic term that refers to a formula, or protocol, used by a router to determine the appropriate path over which data is transmitted. The routing protocol also specifies how routers in a network share information with each other and report changes. The routing protocol enables a network to make dynamic adjustments to its conditions, so routing decisions do not have to be predetermined and static. Routing, Routed and Non-Routable Protocols ROUTING | ROUTED | NON-ROUTABLE ROUTING PROTOCOLS ROUTING PROTOCOLS are the software that allow routers to dynamically advertise and learn routes, determine which routes are available and which are the most efficient routes to a destination. Routing protocols used by the Internet Protocol suite include: · Routing Information Protocol (RIP and RIP II). Routing is the process of moving data across two or more networks. Within a network, all hosts are directly accessable because they are on the same ROUTED PROTOCOLS ROUTED PROTOCOLS are nothing more than data being transported across the networks. Routed protocols include: · Internet Protocol Outside a network, specialized devices called ROUTES are used to perform the routing process of forwarding packets between networks. Routers are connected to the edges of two or more networks to provide connectivity between them. These devices are usually dedicated machines with specialized hardware and software to speed up the routing process. These devices send and receive routing information to each other about networks that they can and cannot reach. Routers examine all routes to a destination, determine which routes have the best metric, and insert one or more routes into the IP routing table on the router. By maintaining a current list of known routes, routers can quicky and efficiently send your information on it's way when received. There are many companies that produce routers: Cisco, Juniper, Bay, Nortel, 3Com, Cabletron, etc. Each company's product is different in how it is configured, but most will interoperate so long as they share common physical and data link layer protocols (Cisco HDLC or PPP over Serial, Ethernet etc.). Before purchasing a router for your business, always check with your Internet provider to see what equipment they use, and choose a router, which will interoperate with your Internet provider's equipment. NON-ROUTABLE PROTOCOLS NON-ROUTABLE PROTOCOLS cannot survive being routed. Non-routable protocols presume that all computers they will ever communicate with are on the same network (to get them working in a routed environment, you must bridge the networks). Todays modern networks are not very tolerant of protocols that do not understand the concept of a multi-segment network and most of these protocols are dying or falling out of use. · NetBEUI RIP (Routing Information Protocol) RIP is a dynamic internetwork routing protocol primary used in interior routing environments. A dynamic routing protocol, as opposed to a static routing protocol, automatically discovers routes and builds routing tables. Interior environments are typically private networks (autonomous systems). In contrast, exterior routing protocols such as BGP are used to exchange route summaries between autonomous systems. BGP is used among autonomous systems on the Internet. RIP uses the distance-vector algorithm developed by Bellman and Ford (Bellman-Ford algorithm). Routing Information Protocol Background The Routing Information Protocol, or RIP, as it is more commonly called, is one of the most enduring of all routing protocols. RIP is also one of the more easily confused protocols because a variety of RIP-like routing protocols proliferated, some of which even used the same name! RIP and the myriad RIP-like protocols were based on the same set of algorithms that use distance vectors to mathematically compare routes to identify the best path to any given destination address. These algorithms emerged from academic research that dates back to 1957. Today's open standard version of RIP, sometimes referred to as IP RIP, is formally defined in two documents: Request For Comments (RFC) 1058 and Internet Standard (STD) 56. As IP-based networks became both more numerous and greater in size, it became apparent to the Internet Engineering Task Force (IETF) that RIP needed to be updated. Consequently, the IETF released RFC 1388 in January 1993, which was then superceded in November 1994 by RFC 1723, which describes RIP 2 (the second version of RIP). These RFCs described an extension of RIP's capabilities but did not attempt to obsolete the previous version of RIP. RIP 2 enabled RIP messages to carry more information, which permitted the use of a simple authentication mechanism to secure table updates. More importantly, RIP 2 supported subnet masks, a critical feature that was not available in RIP. This chapter summarizes the basic capabilities and features associated with RIP. Topics include the routing update process, RIP routing metrics, routing stability, and routing timers. Routing Updates RIP sends routing-update messages at regular intervals and when the network topology changes. When a router receives a routing update that includes changes to an entry, it updates its routing table to reflect the new route. The metric value for the path is increased by 1, and the sender is indicated as the next hop. RIP routers maintain only the best route (the route with the lowest metric value) to a destination. After updating its routing table, the router immediately begins transmitting routing updates to inform other network routers of the change. These updates are sent independently of the regularly scheduled updates that RIP routers send. RIP Routing Metric RIP uses a single routing metric (hop count) to measure the distance between the source and a destination network. Each hop in a path from source to destination is assigned a hop count value, which is typically 1. When a router receives a routing update that contains a new or changed destination network entry, the router adds 1 to the metric value indicated in the update and enters the network in the routing table. The IP address of the sender is used as the next hop. RIP Stability Features RIP prevents routing loops from continuing indefinitely by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops in a path is 15. If a router receives a routing update that contains a new or changed entry, and if increasing the metric value by 1 causes the metric to be infinity (that is, 16), the network destination is considered unreachable. The downside of this stability feature is that it limits the maximum diameter of a RIP network to less than 16 hops. RIP includes a number of other stability features that are common to many routing protocols. These features are designed to provide stability despite potentially rapid changes in a network's topology. For example, RIP implements the split horizon and holddown mechanisms to prevent incorrect routing information from being propagated. RIP Timers RIP uses numerous timers to regulate its performance. These include a routing-update timer, a route-timeout timer, and a route-flush timer. The routing-update timer clocks the interval between periodic routing updates. Generally, it is set to 30 seconds, with a small random amount of time added whenever the timer is reset. This is done to help prevent congestion, which could result from all routers simultaneously attempting to update their neighbors. Each routing table entry has a route-timeout timer associated with it. When the route-timeout timer expires, the route is marked invalid but is retained in the table until the route-flush timer expires. Packet Formats · Command—Indicates whether the packet is a request or a response. The request asks that a router send all or part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables. · Version number—Specifies the RIP version used. This field can signal different potentially incompatible versions. · Zero—This field is not actually used by RFC 1058 RIP; it was added solely to provide backward compatibility with prestandard varieties of RIP. Its name comes from its defaulted value: zero. · Address-family identifier (AFI)—Specifies the address family used. RIP is designed to carry routing information for several different protocols. Each entry has an address-family identifier to indicate the type of address being specified. The AFI for IP is 2. · Address—Specifies the IP address for the entry. · Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. Note: Up to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. (Up to 25 destinations can be listed in a single RIP packet.) RIP 2 Packet Format · Command—Indicates whether the packet is a request or a response. The request asks that a router send all or a part of its routing table. The response can be an unsolicited regular routing update or a reply to a request. Responses contain routing table entries. Multiple RIP packets are used to convey information from large routing tables. · Version—Specifies the RIP version used. In a RIP packet implementing any of the RIP 2 fields or using authentication, this value is set to 2. · Unused—Has a value set to zero. · Address-family identifier (AFI)—Specifies the address family used. RIPv2's AFI field functions identically to RFC 1058 RIP's AFI field, with one exception: If the AFI for the first entry in the message is 0xFFFF, the remainder of the entry contains authentication information. Currently, the only authentication type is simple password. · Route tag—Provides a method for distinguishing between internal routes (learned by RIP) and external routes (learned from other protocols). · IP address—Specifies the IP address for the entry. · Subnet mask—Contains the subnet mask for the entry. If this field is zero, no subnet mask has been specified for the entry. ·Next hop—Indicates the IP address of the next hop to which packets for the entry should be forwarded. · Metric—Indicates how many internetwork hops (routers) have been traversed in the trip to the destination. This value is between 1 and 15 for a valid route, or 16 for an unreachable route. Note: Up to 25 occurrences of the AFI, Address, and Metric fields are permitted in a single IP RIP packet. That is, up to 25 routing table entries can be listed in a single RIP packet. If the AFI specifies an authenticated message, only 24 routing table entries can be specified. Given that individual table entries aren't fragmented into multiple packets, RIP does not need a mechanism to resequence datagrams bearing routing table updates from neighboring routers. Summary Despite RIP's age and the emergence of more sophisticated routing protocols, it is far from obsolete. RIP is mature, stable, widely supported, and easy to configure. Its simplicity is well suited for use in stub networks and in small autonomous systems that do not have enough redundant paths to warrant the overheads of a more sophisticated protocol. Review Questions Q—Name RIP's various stability features. Q—What is the purpose of the timeout timer? Q—What two capabilities are supported by RIP 2 but not RIP? Q—What is the maximum network diameter of a RIP network? This article is submitted by Kashif Raza http://www.networkingtutorials.net
MORE RESOURCES: Nvidia RTX 4070 Ti with memory mod easily beats RTX 4080 in Superposition benchmark - Tom's Hardware Asus vows to improve clarity surrounding warranty claims and astronomical hardware repair costs Tom's Hardware Bye Bye, AI: How to turn off Google's annoying AI overviews and just get search results Tom's Hardware Montclair hardware store to close after 131 years in business News 12 New Jersey My Mom and Dad Owned Competing Side-by-Side Hardware Stores. It Was a Lesson in Life. The Wall Street Journal OP police looking for 6 people involved in hardware store theft: WDAF FOX4 Kansas City Hardware Center in Paoli shutting down after nearly 73 years The Philadelphia Inquirer Ace Hardware Reports Increase in Q1 2024 Revenues Hardware Retailing Canyon ISD brings home hardware at UIL state tennis tournament Press Pass Sports Overland Park police searching for suspects in multiple thefts KMBC Kansas City Best Tech and PC Hardware Deals Tom's Hardware TSMC's third generation 3nm node on track — N3P mass production to begin later this year Tom's Hardware ACE HARDWARE REPORTS FIRST QUARTER 2024 RESULTS PR Newswire Intel-powered Aurora supercomputer fails to dethrone AMD-powered Frontier on Top500 list, again — claims spot as ... Tom's Hardware Three-year-old CPU beats Intel's fastest current chip in RAM benchmark — 7 GHz Core i9-11900K tops 8.3 GHz Core ... Tom's Hardware Enthusiast gets Windows XP running on an i486 — merging two dinosaurs from different eras Tom's Hardware Best Webcams for 2024 Tom's Hardware OpenAI's new assistant makes Apple's Siri look primitive, also announces GPT-4o and new desktop PC client (Updated) Tom's Hardware Schoolmeester, Diani bring home hardware for Banks | Sports | forestgrovenewstimes.com Forest Grove News times Massive Dell blunder leaks Intel and Nvidia's mobile roadmaps — Nova Lake, Panther Lake CPUs and GENxx Nvidia ... Tom's Hardware How Much Does It Cost To Open an Ace Hardware Franchise? 1851 Franchise Ace Hardware purchases 13 local chain store locations across central Illinois The State Journal-Register Melaco Sisters Hardware & Supplies Player of the Week: Zariell Pollard Lafourche Gazette DisplayPort 2.1 has a serious issue with UHBR-certified cables — it could explain Nvidia sticking with DP 1.4 on RTX ... Tom's Hardware CPU Benchmarks and Hierarchy 2024: CPU Rankings Tom's Hardware Western Digital rolls out new 2.5-inch HDDs for the first time in seven years: is 6TB the swan song for 2.5-inch hard ... Tom's Hardware US to increase tariffs on Chinese semiconductors by 100% in 2025 — officials say it protects the $53 billion spent on ... Tom's Hardware Homegrown European processor for supercomputers delayed by a year — chip upgraded to 80 cores, but timeline gets ... Tom's Hardware GPU Price Index 2024: Lowest price on every graphics card from Nvidia, AMD, and Intel today Tom's Hardware If you think PCIe 5.0 runs hot, wait till you see PCIe 6.0's new thermal throttling technique Tom's Hardware Ace Hardware Brunswick | Ads | fredericknewspost.com Frederick News Post Hardware Wildlife Education Center Utah Division of Wildlife Resources Microsoft offers to relocate nearly 10% of China-based staffers to the US or allied nations — AI and cloud engineering ... Tom's Hardware URI club sailing team heads to nationals, collects post-season hardware The University of Rhode Island Apple’s M4 iPad Pro offers stellar, high-performance hardware handicapped by iPadOS - MacDailyNews Intel's 1500W TDP for Falcon Shores AI processor confirmed — next-gen AI chip consumes more power than Nvidia's ... Tom's Hardware Hardware visit Utah Division of Wildlife Resources PS5 Best-Seller, Sales Drop For All Consoles - Europe Hardware Estimates for April 2024 - Sales VGChartz Nintendo Switch hacked to run Windows 11 on Arm, and it's just about as awful as you can imagine Tom's Hardware Intel's new Thunderbolt Share provides file and screen sharing without hurting network performance Tom's Hardware Ace Hardware partners with Webster Parish Council on Aging for fan drive Minden Press-Herald Area softball teams in search of hardware at various state tournaments Moscow-Pullman Daily News Save up to 50% on BBQs, lawn mowers and garden essentials during Home Hardware's massive pre-summer sale Yahoo Canada Shine On Windows translator makes PC games run on Android — Fallout 4 demoed at 30 fps using Winlator app Tom's Hardware Our newest hardware office in Taiwan The Keyword | Google Product and Technology News Curt's Ace Hardware Ribbon Cutting - Morristown, TN | Local News | citizentribune.com Citizentribune OLED monitor momentum expected to continue — analysts expect 1.34 million units shipped by year end Tom's Hardware 5 Best Hardware Wallets for DeFi in 2024 CoinCodex Windows 11 24H2 will enable BitLocker encryption for everyone — happens on both clean installs and reinstalls Tom's Hardware Asus quotes ridiculous $2750 fee to replace chipped GPU power connector— docs back up claims of egregious repair ... Tom's Hardware Newcomer Campbell Collects Major Hardware in CAA Softball Postseason Honors Colonial Athletic Association Stack Overflow bans users en masse for rebelling against OpenAI partnership — users banned for deleting answers to ... Tom's Hardware Huawei brings sanctions-busting Kirin 9000C CPU to desktop PCs to replace banned Intel Alder Lake chips Tom's Hardware Full scan of 1 cubic millimeter of brain tissue took 1.4 petabytes of data, equivalent to 14000 4K movies — Google's AI ... Tom's Hardware Nvidia's next-gen Blackwell AI Superchips could cost up to $70000 — fully-equipped server racks reportedly range up ... Tom's Hardware |
RELATED ARTICLES
Your Business versus Mother Nature Business Consultants earn hundreds of thousands of dollars every year showing businesses how to improve their productivity. All business consultants in the Information Technology area agree that the biggest threat to business survival is data loss. Ink Cartridge Recycling 101 Let's take a moment to think about the topic of ink cartridge recycling. In our modern world we just keep throwing our trash away without sparing it a second thought. What is ESR Meter? All capacitors have a certain amount of resistance to the passage of AC current. ESR (Equivalent Series Resistance) is the sum of all internal resistances of a capacitor measured in Ohms. How to Choose The Right Laptop Accessories? The notebook computer is coming of age. For the firsttime in history, notebooks or laptops are out-sellingtheir bigger cousins, desktop computers. Preventing Tape Drive Failure Contrary to popular belief, tape drives are generally robust and reliable. However, there are three common mistakes that people make that dramatically increase the probability of tape drive failure. Choosing The Right Bar Code Reader The importance of a bar code reader in this day and age cannot be denied. A lot of practical and pragmatic applications for a bar code reader have been rendered essential by the changing times. A Review of Samsung Laser Toners Samsung laser toner is just as popular as its Hewlett-Packard and Brother counterparts. Samsung is a group of products and services that began in Korea in 1938. Intel Celeron vs Pentium The Celeron and Pentium Processors are two of Intel's best selling CPUs. They are found in a majority of home computer systems. Hard Drive Selection Perhaps the biggest mistake people make when building their computer(s) is to underestimate the importance of the hard disk drive (HDD). In our modern society, bigger is synonymous with better, so when you go to buy a hard drive you look at how "big" it is, its data capacity. Blu-ray: A Primer Blu-ray is an optical disc format which is set to rival HD-DVDin the race to be the de-facto standard storage medium for HDTV. The HD-DVD vs Blu-ray battle resembles that between Betamax and VHS and DVD+RW and DVD-RW. Laptop Computers and the PVP Effect! Roll over lumbering desktop computers, the limber laptop is here, and it's here to stay! For a while now notebooks have outstripped their ageing desktop PC siblings, easily winning the gold medal in the computer sales olympics. We will illustrate how the PVP effect has contributed greatly to the increase in popularity of notebook computers. Ink Cartridges & Printing - Poor Print Quality Solutions Why are there faint areas or gaps in my print out?* Unlikely, but your paper may need changing due to its deterioration due to its age.* Check that the type of paper you are using in your printer matches ('Media Type') the setting in the printer software 'Main Menu' or 'Print' dialog box. Refurbished Laptops are the Real Deal! Laptop computers have found usefulness as portable media devices.Even refurbished laptops can be used as DVD players, stereos, and recording devices. Bluetooth Basics - Bluetooth Technology Tutorial Bluetooth BasicsBluetooth technology is nothing new, but in many respects it still seems to be more of a buzz word rather than a well understood, commonly accepted technology. You see advertisements for Bluetooth enabled cell phones, PDAs, and laptops, and a search of the Geeks. Used Laptop Computer: Your Quick Purchase Inspection Guide - Part 2 Used laptop computers are everywhere these days. How can you sift through the mass of available used laptop computers to narrow your search down to the right laptop for you? This is the second part of a series of articles designed to give you a few suggestions for your next purchase. TiVo: An Introduction for the Few Who Dont Know Yet TiVo will change your life.. How To Take Care Of Your Laptop Computer As the proud owner of a laptop computer, you'll want to keep your machine in the best possible condition.Aside from cleaning your screen and dusting the keyboard, however, you'll need to take a few extra steps to maintain your laptop's health:-- Play it coolA laptop computer generates a lot of heat, especially when running the latest high-powered software. Three Must Have Accessories For Notebook Computers An Optical MouseNotebooks are normally equipped with touch pads which can beawkward. There's no substitute for the mouse. Cisco CCNA Certification: Why You NEED Hands-On Practice ! CCNA and CCNP candidates hear it all the time: "you have to get some hands-on experience to pass the exams".Candidates tend to think that's just so they can solve the simulator problems, but that's only the more obvious reason. How To Choose The Best Gaming Laptop The gaming laptop is coming of age! It is steadilyincreasing in popularity as performance quality goes up. Gamers now regularly consider laptops or notebookswhen searching for that perfect gaming machine. |
home | site map |
© 2006 |