Group 8
Group 8
• Distance vector routing, while simple to implement, can be susceptible to routing loops.
• Loop-free distance vector algorithms, such as DSDV and Bellman-Ford with
enhancements, employ techniques like sequence numbers, split horizon, poison reverse,
and shortest path calculations to prevent these loops.
• By understanding these concepts and techniques, network engineers can design and
implement reliable and efficient routing protocols.
INTRODUCTION TO LOOP-PREVENTION TECHNIQUES
Loop-prevention techniques are essential in distance vector routing to prevent routing loops, which can
result in significant network inefficiency and instability. This presentation explores various methods
designed to enhance the reliability of distance vector algorithms, ensuring that routing information
converges correctly. Understanding these mechanisms is vital for network professionals to optimize
routing protocols.
Key Characteristics
What is Distance Vector Routing?
Common Protocols
Examples of distance vector protocols include
Routing Information Protocol (RIP) and
Interior Gateway Routing Protocol (IGRP),
which are widely implemented in smaller, less
complex networks. These protocols
emphasize ease of use and configuration.
Overview of Split Horizon Technique
Concept and Application of Split Horizon
Concept:
Advantages
Route poisoning is a technique whereby a
This method helps in speeding up
router marks a failed route as having an
convergence times in distance vector
infinite cost, effectively preventing its use.
protocols. By quickly echoing the poison
For example, if a route fails, it is advertised
status through the network, routers can swiftly
with a metric of infinity (often 16 in RIP).
recalibrate their routing tables.
Implementation: Limitations
Upon detection of a route failure, the router However, route poisoning can lead to
immediately informs neighbouring routers increased routing overhead and must be
of the poisoned route, quickly propagating implemented alongside other loop-prevention
this information to the network. This techniques to be most effective. Additionally,
ensures that other routers do not attempt to it requires routers to have established the
use the invalid route. distance vector relationship to be effective.
Understanding Hold-Down Timers Functionality
As network architectures evolve, distance vector algorithms will also adapt to incorporate
more advanced loop-prevention techniques. Future developments may include the integration
of machine learning for predictive routing adjustments and the adoption of hybrid protocols
that combine the strengths of both distance vector and link-state routing. These innovations
will enhance the robustness of these algorithms and improve their ability to handle larger,
more complex networks effectively.
LINK STATE ROUTING
• Bandwidth required is less due to local • Bandwidth required is more due to flooding
sharing, small packets and no flooding. and sending of large link state packets.
• Based on local knowledge, since it updates • Based on global knowledge, it have
table based on information from knowledge about entire network.
neighbours.
COMPARISON BETWEEN DISTANCE VECTOR ROUTING AND LINK
STATE ROUTING
ROUTER A
Hello ROUTER B Hello ROUTER C
Packet Packet
Once neighbors are identified, each router generates Link-State
Advertisements (LSAs), which contain critical information about the router's
interfaces, link states, and costs. LSAs act as snapshots of the router’s
operational state and include sequence numbers and lifetimes to indicate
their freshness and validity duration.
After creating LSAs, routers use a flooding mechanism to disseminate this
information to all directly connected neighbors. Each router forwards LSAs to
its neighbors, ensuring that all routers receive the same data and build an
identical link-state database.
This synchronized database enables routers to make efficient routing decisions
using algorithms like Dijkstra’s shortest path algorithm, optimizing data packet
routing based on the current network topology.
START
IDENTIFY NEIGHBORS
GENERATE LSA
END
2. MAINTAINING THE LINK-STATE DATABASE.
The second phase involves maintaining the link-state database to ensure its
accuracy and reliability. Each LSA has a predefined lifetime to prevent outdated
information from persisting in the network. As LSAs approach expiration,
routers refresh them to keep the LSDB current.
Reliability is maintained through acknowledgment messages. When a router
receives an LSA, it sends an acknowledgment back to the originating router. If
an acknowledgment is not received, the originating router retransmits the LSA
to ensure all routers have the latest information.
Additionally, when a router detects a change in its link state, it generates a
new LSA reflecting that change. This new LSA is immediately flooded
throughout the network, ensuring that all routers are informed of the updated
state.
3. UPDATING THE ROUTING TABLE
The final phase of the link-state routing update algorithm is updating the
routing table. Once the link-state database is populated with current
information, routers apply Dijkstra’s Shortest Path First (SPF) algorithm to
calculate the shortest paths to all destination networks. The algorithm
evaluates potential routes and selects the one with the lowest cost.
The results of the SPF calculation populate the routing table, directing data
packets along the most efficient routes. Importantly, routers only recalculate
their routing tables when changes occur in the network, minimizing
computational overhead and enhancing efficiency.
DIJKSTRA ALGORITHM.
https://youtu.be/_lHSawdgXpI?si=273HOSiu9DNa4-LJ
ADVANCED ROUTING TECHNIQUES BEYOND DISTANCE AND HOP COUNT
Software Defined Network is virtual networking Traditional network is the old conventional
approach. networking approach.
• Definition: Ensures specific service quality standards, critical for voice, video, and real-time services.
• Protocols:
• Multiprotocol Label Switching (MPLS): Uses labels to direct traffic along paths that meet QoS needs
(e.g., prioritizing video conferencing).
• Enhanced Interior Gateway Routing Protocol (EIGRP): Uses composite metrics (delay, reliability) for QoS-
based routing.
DIAGRAM SHOWING MPLS NETWORK
BANDWIDTH-BASED ROUTING
• Definition: Routes traffic based on available bandwidth, suitable for high-data applications
(file transfers, streaming).
• Protocols :
• OSPF with Traffic Engineering (OSPF-TE): Considers link bandwidth for load balancing.
• IS-IS with Traffic Engineering (IS-IS-TE): Similar to OSPF-TE, calculates routes based on
bandwidth availability.
LATENCY-BASED ROUTING
• Definition: Essential for applications needing fast response times (online gaming, live
streaming).
• Protocols:
• BGP with Performance-Based Routing: Some implementations can prioritize latency and
packet loss.
• EIGRP: Configurable delay metric for low-latency path selection.
COST-BASED ROUTING
1. Doyle, J. 2005). Routing TCP/IP, Volume 1. Cisco Press. This foundational text covers routing protocols
comprehensively, including discussions on distance vector algorithms and their inherent challenges.
Essential for anyone wanting to deepen their understanding.
2. Geeks for Geeks https://www.geeksforgeeks.org/difference-between-distance-vector-routing-and-link-state-routing/
3. Kurose, J., & Ross, K. (2020). Analyzing Distance Vector Protocols: Journal of Network Research, 15(2), 123-
135. This paper thoroughly reviews various loop-prevention techniques, offering insights and data-driven analysis, making
it a vital resource for network professionals
4.Kurose, J. F., & Ross, K. W. (2013). Computer networking: A top-down approach. Pearson Education..
5. Perkins, C. E., & Bhagwat, P. (1994). A scalable protocol for internet routing. In Proceedings of the ACM SIGCOMM
'94 conference on Applications, technologies, architectures, and protocols for computer communication (pp. 149-158).
6. Scaler Blog. (n.d.). Link state routing algorithm. Scaler. Retrieved October 31, 2024, from
https://www.scaler.in/blog/link-state-routing-algorithm/
7. Scaler. (n.d.). Link state routing algorithm. Scaler. Retrieved October 31, 2024, from
https://www.scaler.in/topics/link-state-routing-algorithm
8. Wikipedia. (n.d.). Link-state routing protocol. Retrieved October 31, 2024, from
https://en.wikipedia.org/wiki/Link-state_routing_protocol