DISTANCE VECTOR ROUTING Flashcards

1
Q

Describe Distance Vector Routing Protocols

A
  • Advertise networks as vectors of distance
    and direction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the divisions of Distance Vector Routing Protocols

A

− Classful routing protocols do not include a subnet
mask in the routing update
− Classless routing protocols include a subnet mask in the routing update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the General Characteristics of DV Routing Protocols

A
  1. Periodic Updates
    * Updates to the routing tables are sent at the end of a certain time
    period e.g. 90 seconds for IGRP, 30 seconds for RIP
  2. Triggered Updates
    * when changes occur in the topology the router immediately sends
    out an update without waiting for the end of the periodic update
    interval
  3. Full Routing Table Update
    * the entire routing table (not only entries which change) is sent to
    their neighbors
  4. Route invalidation timers
    * They use various timers to invalidate routing table entries if they
    are not refreshed
    * e.g. for RIP if no update is received from a specific neighbor
    within the 30 seconds, it will use various timers to invalidate the
    entries as it waits for a valid update
  5. Have an incomplete view/ knowledge of the network
    topology
    * Routers do not know the details about the network’s topology
    beyond a neighboring router
    * “routing by rumor”
  6. They are generally prone to routing loops
    * Generally distance vector protocols take longer to converge due to the time taken to calculate routes and forward updates, thus updates about changes may not be processed
    in a timely manner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the routing table and its table entries

A
  • Each router maintains a routing table, where
    each node/router in the network has an entry in
    the table
  • Each table entry contains two parts:
    1. the outgoing line (interface) for the destination (node)
    and
    2. the distance (time, cost, whatever metric is used) to
    the destination
  • Each router knows the distance to its neighbors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the first step of how DV Protocols build routing tables

A

. Initialization – each node knows only the distance
between itself and immediate neighbor (those directly
connected to it
* At this point only directly connected networks are initially
placed in the routing table

*See 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the second step of how DV Protocols build routing tables

A
  1. Initial Exchange of Routing Information
    * If a distance vector routing protocol is configured then the
    routers will exchange routing information (each router
    passes its routing table to the neighbor)
    * Routing updates will be received from other directly
    connected routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens at the initial exchange if there is new information

A
  • If there is new information:
    the metric is re-calculated to determine the new minimum distance
    the outgoing link for the destination is also recorded
    and the new information is stored in routing table
  • If multiple routes to the same destination network exist, the router
    chooses the route with the lowest metric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the third step of how DV Protocols build routing tables

A
  1. Exchange of more Routing Information
    * Routers continue to exchange routing information
    * If no new information is found then convergence is
    reached
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the third step of how DV Protocols build routing tables

A
  1. Exchange of more Routing Information
    * Routers continue to exchange routing information
    * If no new information is found then convergence is
    reached
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When is a network said to be converged

A

The network is converged when all routers have
complete and accurate information about the
entire network:
A network is not completely operable until the
network has converge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is convergence time

A

Convergence time is the time it takes routers to
share information, calculate best paths, and
update their routing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does achieving convergence depend on

A

a) The speed of propagation of routing information
and
* The speed of propagation refers to the amount
of time it takes for routers within the network to
forward routing information
b) The speed of calculation of optimal paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Router Information Protocol (RIP)

A
  • Was among the first IGP used over the Internet
  • Is designed as an IGP to be used among routers
    within an autonomous system
  • Is a distance vector protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the various versions of RIP

A
  1. RIP version 1-for IP version 4 networks
  2. RIP version 2- for IP version 4 networks
  3. RIPng - for IP version 6 networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some common Characteristics of RIP v1 RIP v2 and RIPng:

A
  1. Used for routing within an autonomous system
    (intradomain routing)
  2. Metric used is - hop count only - i.e. RIP measures
    distance in network hops
  3. Maximum hop count is 15 hops - thus is ideal for small
    networks
  4. Has a default administrative distance (AD) of 120
    − AD measures the preference of one source of routing information
    as opposed to another.
    − The lower the AD the preferable the source
  5. Marks a network as unreachable if the hop count
    reaches16
    − Also known as ‘route poisoning’
  6. Uses Bellman Ford’s Algorithm/Ford Fulkerson’s
    Algorithm
  7. Uses two message types: request and response
    − Request - used to ask neighboring nodes (routers) for an update
    − Response - contains an update
  8. Rely on periodic updates i.e. they periodically send updates every 30 seconds
  9. Use invalidation timers “garbage collection” timers to
    flash unreachable networks from the routing tables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some characteristics of RIP Version 1

A
  1. Periodically broadcasts it’s routing updates using the address:
    255.255.255.255
  2. Does not support MD5 authentication thus is relatively insecure
    * i.e. can only send updates in plain text and the receiving
    interface does not authenticate the source
  3. Uses transport layer port 520
  4. Does not support CIDR
    * When supernets are configured, the protocol does not forward
    the supernet routes in the update since it cannot forward
    updates with a mask smaller than that of the default address
    class
  5. Does not support VLSM
    * Since the protocol does not include a subnet mask in the routing update, when VLSM is used on a routing domain, some subnets
    will not propagated in the update, hence the devices on these networks will not be reachable (see 8 for eg on this)
  6. Does not support discontiguos networks/subnets (see 9 for eg on this)
17
Q

Give characteristics of RIP 2

A
  1. Periodically multicasts it’s routing updates using the address:
    224.0.0.9
  2. Supports MD5 authentication though it is not configured by
    default
    * RIP version 2 is able to authenticate the source of routing
    information so that the router only installs updates from trusted
    sources
  3. Uses transport layer port 520
  4. Supports CIDR
    * When supernets are configured, the protocol forwards the
    supernet route with its subnet mask
  5. Supports VLSM
    * Since it sends a subnet mask in the routing update, all subnets
    are propagated in the update regardless of their masks
  6. Can be configured where there are subnets discontiguos
18
Q

Give characteristics of RIP Next Generation (RIPng)

A
  1. Configured in IP version 6 networks
  2. Uses transport layer port 521
  3. Periodically multicasts its updates using the IPv6 address:
    FF02::9
  4. RIPng does not include its own authentication mechanism.
    * It is assumed that if authentication and/or encryption are
    needed, they will be provided using the standard IPSec
    features defined for IPv6 at the IP layer
    * This is more efficient than having individual protocols like
    RIPng perform authentication.
19
Q

Discuss The Enhanced Interior Gateway
Routing Protocol (EIGRP)

A
  • It is a Cisco-proprietary interior gateway, classless
    distance-vector routing protocol
  • EIGRP is the classless version of IGRP
  • It is ideal for large, multiprotocol networks built
    primarily on Cisco routers
  • NB: some of its features are now open and have
    been adapted for use on multi-vendor devices
20
Q

Give some EIGRP Characteristics

A
  1. Uses the Diffusing Update Algorithm (DUAL)
    * DUAL guarantees loop-free and backup paths throughout the
    routing domain
  2. Uses Partial and Bounded updates
    * Instead of periodic updates, EIGRP sends partial triggered updates
    when a path or metric changes (i.e. partial updates)
    * Only those routers that require the information are updated
    minimizing bandwidth use (i.e. bounded updates)
  3. Can perform both equal and unequal cost load balancing
    * This allows administrators to better distribute traffic flow in their
    networks
  4. Uses the Reliable Transport Protocol (RTP) at transport layer
    to deliver EIGRP packets to neighbors
    * It does not rely on TCP at transport layer
    * This ensures multiprotocol support
  5. It uses FIVE message types: Hello, Ack, Update, Query,
    and Reply
  6. It generally used bandwidth and delay as the default routing
    metrics but can be configured to include load and reliability
    as part of the metric calculation
  7. Multicasts updates using the addresses: 224.0.0.10 (for
    IPv4) and FF02::A (for IPv6)
  8. At transport layer port 88 is used to identify EIGRP
    communication
  9. It is a classless protocol hence supports CIDR, VLSM and
    networks with discontiguious subnets
  10. EIGRP supports authentication
    ―authentication ensures that routers
21
Q

Discuss the five message types of EIGRP

A

i. Hello packets
―are used to discover and form adjacencies with neighbors.
―On hearing hellos, a router creates a neighbor table and the
continued receipt of Hellos maintains the table
ii. EIGRP Update packets
―are used to propagate routing information
―Sent to initially exchange topology information or topology change
―EIGRP updates are partial (i.e. only contain needed routing
information and bounded (i.e. are unicast to routers that require it).
iii. EIGRP Acknowledgement (EIGRP Ack)
―Used to acknowledge the receipt of Update packets, Query packets,
and Reply packets
iv. Query Packets – Used by DUAL to search for specific routing
information from EIGRP enabled neighbors
v. Reply Packets – sent in response to a query