3 ACN Unit
3 ACN Unit
Network address This field indicates the number of hops (routers) th-
1. Command
3.13.1 Request Message: omol ette ett
The request message is created in the
Indicates whether the type of the packet i.e. a request or following
a response, The request asks that a router send all or situations
part of its routing table. The response can be an 1 It is created by a'router which has just come u
unsolicited regular routing update or a reply to a 2 Or it is created by a router which has some tir
request. Responses contain routing table entries. Out entries.
Multiple RIP packets are used to convey information
In a request message, information about some spec
from large routing tables.
entries or all the entries is asked.
2. Version: Fig. 3.13.1(a) shows the format of the request messa
This field specifies the RIP version used. This field can for one and Fig. 3.13.1(b) shows the format of reque
message for all.
signal different potentially incompatible versions.
ACN (Comp Sem. 5/MSBTE)
3-21 Unicast &Multicast Routing Protocols
Com 1 Version
Family
Reserved This timer counts down from the set value (25to
All zeros
Network address 35 sec.) and sends an update message when its
Repeated Al Os count reaches a zero. Then the timer is set once
All Os again to a random value between 25 and 35
All Os
seconds
G-2145) (a) Format of request message (RIP) for one
2. Expiration Timer
Fig. 3.13.1
The responsibility of expiration timer is to govern
Com. 1
Version Reserved the validity of a route.
Family All zeros
All Os When a router gives out the update information
Repeated All Os about a route, the value of this timer is set at 180
All Os
sec or 3 minutes.
All Os
This timer is reset, everytime a new update for that
G-2146) (b) Format of request message (RIP) for all
route is received, which under normal working
Fig. 3.13.1 conditions happen after every 30 sec.
3.13.2 Response Message But due to some problem on the Internet, if a new
update for that route is not received within 180
Response message in RIP can be one of the
following sec, then that route is considered expired and the
twotypes hop count of that route is set to 16. This is an
1 Solicited response or 2. Unsolicited response. indication that the destination is not reachable.
A solicited response is the one which is sent
only as an There is a separate expiration timer for each route.
answer to a request message. It carries with it the
information about the destination specified in the 3. Garbage Collection Timer
request message. The router does not purge a particular route from
An unsolicited response, is not sent only once but it is its table even when the information about that
sent periodically (every 30 seconds or so) when there is
route becomes invalid. Instead the router
any change in the routing table. This response is also
continues to advertise that route by increasing its
called as the update packet.
metric value to 16 (destination is not reachable).
3.13.3 Timers in RIP: At the same time, the router sets another timer
RIP uses three different timers as follows for supporting called garbage collection timer to 120 sec. for
its options. this route.
L The periodic timer to control the process of As soon as this count goes to zero, that route is
sending messages. purged from the router table, Due this timers the
2. The expiration timer is used for governing the neighbours become aware that a particular root
validity of a route. has became invalid, before its
purging.
3 The garbage collection timer is used for
4. Disadvantages of RIPV1
advertising the failure of a route.
1. Periodic Timer Some of the important disadvantages of the
original RIP version i.e. RIPv1 are as follows
The task of the periodic timer is to control the
1. RIPv1 only understands the shortest route to a
advertising of the update messages regularly.
destination, which is based on simple count of
As per protocol specifications, this timer should be number of router hops.
set to30 sec. but practically it is set
randomly 2. It depend on other routers for computed routing
between 25 and 35 sec. Each router has one
updates.
periodic timer.
TechKnowledge
Pub I1cati0ns
ACN Comp Sem.5MSBTE) 3-22 Unicast&Muiticast Routing Protoeru
3 Routing tables can get large and these are Soln.
broadcasted every3 seconds Table P. 3.13.1: Routing table at A
F
3.13.4 RIP Version 2:
D 2 C
In November 1994, RIP was modified with some
G 2 F
additions (extensions) to overcome some of its
shortcomings. RIP version 1 is still being used on many
Message format (RIPv2):
routers and continues to outnumber OSPF networks.
The modified RIP is called RIP version 2 protocol. The message format of RIPV2 is as shown in Fig. 3.13.2
G-500) Fig. P. 3.13.1 part of the same A.S. or some other A.S.
Tech Knowledge
PubIIC atioui
ACN (Comp. /Sem.
5MSBTE) 3-23 Unicast&Multicast Routing Protocols
Classless Addressing
There is no field in RIP message which can indicate the
The most
versions
important difference between the two length of message. The length has to be
the
of RIP is
that RIPVI can
determined from the UDP packet. The well known port
classful
addressing, whereas RIPv2 cansupport
also
only the
520 has been assigned to RIP in UDP
classless addressing. support the
Due to the 3.13.5 Problems in RIP
additional field called
possible to define a network subnet mask, it is
RIP is the most used Internet interior routing protocols
Hence classless prefix length in RIPV2.
addressing becomes possible. It is based on the distance vector routing principle. RIP
Authentication: has many limitations. Some of them are as follows
Authentication is a safety measure 1. Width restriction : RIP uses a 4-bit metric to count
ensure the
taken by RIPV2 to router hops to the destination. For RIP infinity is defined
protection of message against unauthorized
advertisement as 16 which corresponds to 15 hops.
TechPubllcations
Knowledge
Unicast&Multicast Routing Protoco
3-24
ACN (Comp Sem 5MSBTE) network will be ignors
approach two-hop high-speed
Area link would be used insteadd.
and a one-hop low-speed
Networks, hosts and routers are collectively called as an make a router to take a beter path by adjustinn
We can
should be
vanious areas. All the networks inside an area
reduces the available
diameter
connected
RIP updates its entire
table on a periodic basis using the
Area border routers: broadcast address. (RIPV1; RIPV2 uses multicast or
broadcast). But this would
consume bandwidth
which used at the
These are special type of routers are
576 byte data
borders of an area. These routers summarize the information RIP sends its update with the help of a
entries than 512 bytes, then
gram. If there
are more
about the area and sernt it to the other areas.
backbone can continue to function as primary area architecture well beyond the maximum 16 hops
supported by RIP
Area identification:
Rather than exchanging node (and network) reachability
Each area has an area identification. The area
information, OSPF routers exchange link state
identification of the backbone is zero. An autonomous
system is as shown in Fig. 3.14.1(a) information.
net Outer
net roule neD To other
A.S.
Backbone router Backbone router
Area 0 (Backbone). A.S
boundaryrouter
Autonomous system
A*********A*a***5
3.14.1 Features of OSPF the link state information for all information in their
Although the relationships between routers are The protocols used to support oSPF routing
maintained on a logical link basis, link state include database broadcast packets and link state
transmissions are minimized by the architecture. change broadcasts. A "Hello" protocol is used to
detect changes in the availability of adjacent
Designated gateways are responsible for transmitting
routers.
Tech Knowledge
Pubilc a t l o n s
Unicast& Multicast Routing Protocoh
Cols
ACN (Comp 5/MSBTE)
3-26
between the neighbouring routers isa
The relationship
3.14.2 Metric Each router has been connecte
shown in Fig. 3.14.4(a).
this arrangement
Tne each route by an OSP
to every other neighbour. But
cost assigned to
non-realistic. In order to
metric of that route. In the nonefficient and
administrator is called as extremely
efficient and realistic,
the configuration of
OSPF protocol the metric can be based on a type of make it more
routers attached to
it as
network having many Fig. 3.14.5(a) is a special case of
It is The stub network of
a
WANs are of
3.14.3. All LANS and
some
use the same link to
shown in Fig. transient network. The data packets
The graphical representation of the A.S. as seen by produced by the designated router for the transit
OSPF has been shown in Fig. 3.14.6(b). network. It describes all the OSPF routers fully adjacent
to the designated router.
3.14.6 LinkState Advertisements (LSAs):
3. Summary Links
Each entity in a network distributes the Link State
Summary Link advertisements describe a single route to
Advertisements (LSAs). An LSA announces the states of
a destination. The destinations described are external to
entity links.
the area but internal to the Autonomous System. Some
Diferent types of LSAs depending on the type of entity condensing of routing information occurs when creating
are as shown in Fig. 3.14.. these summary link state advertisements.
N2 line 5
Ns
T-3 line
Tech Knowledge
Pub CationS
ACN (Comp. /Sem.5MSBTE) 3-29 Unicast &Multicast Routing Protocols
the
Authentication
But everytime a router forwards this message,
This 64-bit field is the actual value of the authentication cumulative value of this field.
stub
by only one path is called as the
For now, if the authentication type is 0, this field is filled area.
backbone
3.14.8 Link State Update Packet: possible for the router to handle multiple
services
Table 3.14.1
G-211 Fig. 3.14.10: Format oflink state update packet
Type Link Link state ID
Each update packet may contain many different LSAs.
1 Router link IP address of router
Fig. 3.14.11 shows the general header which is common
to all five types of LSAs. 2. Network link IP address of designated
router.
3.14.9 General LSA Header 3. Summary link to Address of the network
network.
Link state age ReservedE T Link state type
Link state lD 4 Summary link to IP address of AS boundary
Advertising router AS boundary router
Link state sequence number router
6. Advertising router:
(G-2118) Fig. 3.14.11 LSA general header
Let us discuss various fields of LSA general header The field contains the IP address of the router which
1.
advertises this message.
Link state age
7. Link state sequence number
This field is useful in indicating the time (in seconds)
elapsed from the instant of generation of this message. This field contains sequence number that is
a
assigned
Ihis type of message travels from router to router to each link state update message.
which is called as flooding. 8. Link state checksum
At the instant of creation of this message by a router,
The contents of this field is not the usual checksum. But
the value of this field is 0.
the value of this field is calculated on a special type
Tech Knowledgë
Pubitcations
ACN (Comp. /Sem. 5/MSBTE) 3-30 Unicast& Multicast RoutingProtocols
called as Fletcher's checksum. This method of Table 3.14.2
The router link LSA is used for advertising all the links of number of types of services that are announced for each
RIPV2 OSPF
Updatepolicy Route table Route tablo 3.15.1 Typos of Autonomous Systems
every Overy |Link-stata We have already discussed sbout autonomous systems.
30 seconds 30 changos, or
secondsevery 30 Now let us discuss about their types.
are as
|minutos] he three categories of autonomous systems
Update address
Broadcast Broadcast, Multicast follows
multicast 1 Stub AS
Dead interval 300 300 2. Multihomed AS Transit AS
|300 3.
seconds seconds
total Seconds Stub AS:
|total total, but one
A stub AS is that type of AS which has only
usually
connection to another AS. The hosts in the AS
can
much less
Send and receive data traffic to the hosts
Supports No Yes
authentication
Yes belonging to other AS.
But note that data traffic cannot pass through a
Convergence time Variable Variable Media stub AS. In other words the stub traffic can be
(based on(based on
delay either a source or sink.
number of number of |dead
routersX routersX interval 2. Multihomed AS:
dead dead An AS which has more than one connection to
interval) interval) other ASs is known as multihomed AS. But it is
operation takes place on the basis of the routing The path for a destination address can be presented as
a list of attributes. We get some information from each
method called path vector routing.
attribute about the path.
is used because the distance
vector
Ihis principle The receiving router takes the help of this list of
routing and link state do not prove to be much
routing attributes for making a better decision when applying
utable for interautonomous system routing.
itspolicies
TechPubllcations
Knowledge
3-34 Unicast &Multicast Routing Protocols
ACN (Comp. /Sem.5/MSBTE)
3.15.4 Types of Attributes We can use the E-BGP session for exchanging
information between two nodes which are present in
There are two categories of attributes two different ASs. This is as shown in Fig. 3.16.1.
1. A will known attribute. I- BGP 999sion
E-BGP sesslon
2. An optional attribute.
can be defined as the which must be recognized information which is known to them over the E-BGP
one by
each router, but it need not be included in session.
every update
message. But these routers collect information from the other
We can also subdivide the optional attributes into two routers belonging to their own A.S. using the I-BGP
sessions shown by dotted lines in Fig. 3.16.1.
categories as transitive and nontransitive optional
attributes. 3.16.2 Types of Messages
We may define the optional transitive attribute as the BGP uses four different types of messages, as shown in
one which should be passed to next router that has not Fig. 3.16.2.
implemented this attribute. BGP messages
This message is used by a router running BGP to create The nonzero value of option parameter
parameters.
TechPubitcations
Knowledge
Unicast&Multicast RoutingProtocole
3-36
ACN (Comp. Sem 5MSBTE) The contents
of this 1-byte field ars
follows: 2. Error subcode:
are as of error in each category
in the update message define the type
The important felds used to further
This 2-byte long field is used contents of this
field can be used for
L Unfeasibleroute length: 3. Errordata: The
of the next field. information about the error.
for defining the length more diagnostic
giving
contents of this variable length
2 Withdrawn routes: The
advertised routes 3.16.8 Encapsulation
field gives the list of all the previously
in TCP segments by
which should be deleted. are encapsulated
BGP messages
179. The error control and
of this 2-byte long known port
3 Path attribute length: The
contents
using the well
next field. therefore not needed
feld defines the length of the flow control are
used for TCP connection,
the update, keepalive
4Path attributes: ofthis field
The contents
are
After opening a
whose are exchanged until a
Eror suboode
Error data H
(Varlable length)
Notification message
(G-2131) Fig. 3.16.7: (G-512) Fig. 3.16.8: A set of BGP router
The notification message
has the following importantfields: BCD, IFGCD
As shown in Table 3.16.1, these routes are
Introduction: Here is
destination
A host
We have already discussed in the previous sections that,
in the datagram forwarding a datagram by a router is (G-2235) Fig. 3.17.1: Concept of unicasting
based on the prefix of the destination address which
3.17.2 Multicasting:
describes the network to which destination host is G931203et
connected. In the following section we will define In multicast communication, the communication takes
unicasting, multicasting and broadcasting to place between one source and a group of destinations
understand the forwarding principle. ie. the source to destination relationship is
one-to-many.
3.17.1 Unicasting
The type of source address is unicast address but the
In the unicast communication, the communication takes
type of destination address is a group address that
place between one source and one destination. That
defines one or more destinations. The group address
means the relation between source and destination is
actually identifies all the members of a group.
one-to-one.
When a router receives a packet, it will forward the
In the IP datagram, both the source and destination copies of packet to all the destinations through 'more
addresses are the unicast addresses assigned to the than one of its interfaces, as shown in Fig. 3.17.2.
hosts.
Router R sends the datagram through interface 2
In unicasting when a router receives a packet it
and 4.
forwards the packet through only one of its interfaces.
Router Rg Sends the datagram via both its interfaces 1
This interface is the one corresponding to the optimum
and 2. As Rg knows that there is atleast one member is
path. The router may discard the packet if the
interested which belongs to this group in the area
destination can not be found.
reached by interfaces 1 and 2.
Fig. 3.17.1 shows the concept of unicasting. Delivery of Router R, sends the datagram through interface 2. R
unicast packet from a source computer to a destination
knows that there is no member interested in
computer is as shown in Fig. 3.17.1 receiving
datagram which belongs to the group in area reached
In Fig. 3.17.1, P is a source and destination computer is by interfacel.
attached to Ethernet switch F.
TechPubIICations
Knowledge
3.17.4 Multiple Unicasting Versus
Source. Multicasting:
host
Where -Ethemet Fig. 3.17.3 shows the concept of multiple unicasting and
Ethemet wiich
Swilch - Multcast multicasting.
ouler
Polnlo-point
Multiple unicasting:
WAN
In this, many packets starts from the source. If there are
four destinations, the source sends four packets. Each
packet is having different unicast destination address.
It is important to note that, between two routers there
can be several copies travelling.
No At least No No At least At least
member One member member one one Example of multiple unicasting is e-mail. If a person
member member member
want to send an e-mail to a group of people, the e-mail
G-223 Fig. 3.17.2: Concept of multicasting application software generates copies of the messages,
only one source host and all other host act as In multicasting, single packet starts from the source and
destinations is duplicated by the routers. For all replicas, the
On Internet the broadcasting does not take place due destination address in each packet is same. It is
to the huge amount of traffic it woukd create and the important to note that, between any two routers only
one copy of the packet travels.
corresponding bandwidth requirement
Source Source
olcaro
Where
- Unicastrouter
Muticast router
UD Unicast destination
GM Group member
2. For information
dissemination
Instead these routers have to their own
construct
TechKneuledge
Pubtlc a t o n s
3-40 Unicast &Multicast Routing Proto
ACN (Comp. /Sem. 5MSBTE) Shorted
cols
But this is not multicasting, this is broadcasting. path
Another problem is that it gives ise to looping
Armval
problems. That means the same packet may return
to the same router from some other interface and
may get forwarded again
Recall that a DVRP table gives the router departure RPF guarantees that each network would receive a copy
information specifically, the shortest path to the of the multicast packet without formation of loops. But.
destination. In DVRMP, the router reverses the RPF does not guarantee that each network would
roles of the destination and the source. The router receive only one copy of the intended packet ie. a
uses the source address of the packet (which is a network may receive two or more copies of the same
unicast address) packet. The reason is that forwarding is not based on
to find the corresponding
the destination address (a group address); instead it is
departng interface in the routing table (as if it
based on the source address.
wants to send a packet to that address).
This problem of RPF has been demonstrated in
f the departing interface found in the table is the
Fig. 3.20.2. In Fig. 3.20.2 the packet created by the
same as the interface from which the packet is
source travels two different paths and hence two copies
arriving, then it is an indication that the packet has of the same packet reach Net-2
traveled the shortest path. In other words, since the Source
path from the router to the source is the shortest,
the path from the source to the router will also be
the shortest because the metrics in distance vector
routing (hop counts) are symmetric. T h e same packet
follows two different
In Fig. 3.20.1a), the packet arrives at interface 1 of .A paths lo reach Net-2
Tech Knowledge
PubIICàtions
ACN (Comp. /Sem.5/MSBTE)
Protocols
341 Unicast &Mutlcast Routing
There duplication takes place because atree
has4. Reverse Path Muticasting (RPM)
not been made; stead of a tree we have a RPB broadcasts
the packets.
Net-2 has two parents: routers R and R,
graph YOU must have noted that
efficient way
not an
This is
t does not multicast them.
by
increased ensuring
can be
To eliminate such duplication, we must define only G1 fouting, the efficiency networks
reach only those
one parent router for each network. A network that the muticast packets
which have the active members
of that particular group.
must receive a multicast packet from any source
Multicasting (RPM)
only through the designated parent router. This This is called as Reverse Path
restriction needs to be implemented. Path Multicasting (RPM):
the
Thus for each source, therouter sends the packet in order to covert the broadcasting to muticasting
only out of those interfaces for which it is the RPM uses procedures as follows:
two
designated parent. This policy is called reverse path 1 Pruning and 2 Grafting
broadcasting (RPB), The RPB ensures that the is demonstrated in
The concept of pruning and grafting
packet reaches every network and that every
Fig. 3.20.4.
network receives only one copy of each packet.
Pruning:
RPF and RPB:
Comparison of each network has been
The designated parent router of
the membership
Refer Fig. 3.20.3 which demonstrates the difference gven the responsibility of holding
achieve this.
between RPF and RPB. information The IGMP protocol is used to
souter connected to a
The question is how to determine the designated The process starts when a
is interest in a multicast
parent router ? The answer is that the router with network finds that there no
(6-521) Fig. 3.20.3: Difference between RPF and RPB Fig. 3.20.4 (Contd..)
TechPub Knouledge
a tions
3-42 Unicast& Multicast Routing
ACN (Comp. Sem. 5/MsBTE) cols
passes through every router located between
the
sender and rendezvous router
The CBT is a group shared protocol. t uses the core as The selection of rendezvous router to optimize the
root of the tree. The autonomous system is divided into process and multicasting is not a simple process.
The first step is to select the rendezvous point After routing protocols
that the unicast address of the selected router is Protocol Independent Multicast Desne Mode
The need of multicasting has increased in internet due Q. 20 Explain the Beliman. Ford algorthm.
tomultimedia and real time communication. Q.21 What is PVR ?
But a very small number of internet routers are Q. 22 Explatn the RIP updating algorithm.
muiticast routers. Therefore tunnelling is used to|a. 23 Describe the RIP message format.
overcome this problem.
TechPuitc
Kneuledg
ations