Learning About RIP (Routing Information Protocol) |
- Learning About RIP (Routing Information Protocol)
- Home working spreads among office workers
- Craigslist urged to ban 'adult services' across all sites
- Symantec launches Norton 2011 security products
- Hackers create 57,000 malicious pages per week
- Trend Micro Revamps Entire Product Line With 'Titanium'
- Email is 'counter-productive' says Salesforce.com
- Apple matches Mozilla, patches DLL hijacking bug in Safari
- Norton Releases 2011 Security Products
- Mozilla fixes Firefox's DLL load hijacking bug
- Symantec: Most hacking victims blame themselves
- Kaspersky Lab: Facebook facing increased phishing attacks
- Spammers exploit second Facebook bug in a week
- Getting Your Data Safely Across the Border
Learning About RIP (Routing Information Protocol) Posted: 08 Sep 2010 10:19 PM PDT The Routing Information Protocol (RIP) is a dynamic routing protocol used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP). It uses the distance-vector routing algorithm. It was first defined in RFC 1058 (1988). The protocol has since been extended several times, resulting in RIP Version 2 (RFC 2453). Both versions are still in use today, however, they are considered to have been made technically obsolete by more advanced techniques such as Open Shortest Path First (OSPF) and the OSI protocol IS-IS. RIP has also been adapted for use in IPv6 networks, a standard known as RIPng (RIP next generation), published in RFC 2080 (1997). The routing algorithm used in RIP, the Bellman-Ford algorithm, was first deployed in a computer network in 1967, as the initial routing algorithm of the ARPANET. The earliest version of the specific protocol that became RIP was the Gateway Information Protocol, part of the PARC Universal Packet internetworking protocol suite, developed at Xerox Parc. A later version, named the Routing Information Protocol, was part of Xerox Network Systems. A version of RIP which supported the Internet Protocol (IP) was later included in the Berkeley Software Distribution (BSD) of the Unix operating system. It was known as the routed daemon. Various other vendors would create their own implementations of the routing protocol. Eventually, RFC 1058 unified the various implementations under a single standard. RIP is a distance-vector routing protocol, which employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process. RIP implements the split horizon, route poisoning and holddown mechanisms to prevent incorrect routing information from being propagated. These are some of the stability features of RIP. It is also possible to use the so called RIP-MTI (Minimal Topology Information) algorithm to cope with the count to infinity problem. With its help, it is possible to detect every possible loop with a very small computation effort. Originally each RIP router transmitted full updates every 30 seconds. In the early deployments, routing tables were small enough that the traffic was not significant. As networks grew in size, however, it became evident there could be a massive traffic burst every 30 seconds, even if the routers had been initialized at random times. It was thought, as a result of random initialization, the routing updates would spread out in time, but this was not true in practice. Sally Floyd and Van Jacobson showed in 1994 that, without slight randomization of the update timer, the timers synchronized over time. In most current networking environments, RIP is not the preferred choice for routing as its time to converge and scalability are poor compared to EIGRP, OSPF, or IS-IS (the latter two being link-state routing protocols), and (without RIP-MTI) a hop limit severely limits the size of network it can be used in. However, it is easy to configure, because RIP does not require any parameters on a router unlike other protocols. RIP is implemented on top of the User Datagram Protocol as its transport protocol. It is assigned the reserved port number 520. RIP Versions: There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng. RIP version 1 The original specification of RIP, defined in RFC 1058, uses classful routing. The periodic routing updates do not carry subnet information, lacking support for variable length subnet masks (VLSM). This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks.The RIP version 1 works when there is only 16 hop counts(0-15).If there are more than 16 hops between two routers it fails to send data packets to the destination address. RIP version 2 Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was developed in 1993 and last standardized in 1998. It included the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature allows fine-grained interoperability adjustments. In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1 which uses broadcast. Unicast addressing is still allowed for special applications. (MD5) authentication for RIP was introduced in 1997. RIPv2 is Internet Standard STD-56. Route tags were also added in RIP version 2. This functionality allows for routes to be distinguished from internal routes to external redistributed routes from EGP protocols. RIPng RIPng (RIP next generation), defined in RFC 2080,[8] is an extension of RIPv2 for support of IPv6, the next generation Internet Protocol. The main differences between RIPv2 and RIPng are: * Support of IPv6 networking. * While RIPv2 supports RIPv1 updates authentication, RIPng does not. IPv6 routers were, at the time, supposed to use IPsec for authentication. * RIPv2 allows attaching arbitrary tags to routes, RIPng does not; * RIPv2 encodes the next-hop into each route entries, RIPng requires specific encoding of the next hop for a set of route entries.xxx ... |
Home working spreads among office workers Posted: 08 Sep 2010 09:00 AM PDT |
Craigslist urged to ban 'adult services' across all sites Posted: 08 Sep 2010 09:00 AM PDT |
Symantec launches Norton 2011 security products Posted: 08 Sep 2010 09:00 AM PDT |
Hackers create 57,000 malicious pages per week Posted: 08 Sep 2010 09:00 AM PDT |
Trend Micro Revamps Entire Product Line With 'Titanium' Posted: 08 Sep 2010 09:00 AM PDT Following up Norton's new product launch early Wednesday, Trend Micro announced an overhaul of its entire home user product line on Wednesday, under the moniker "Titanium." The new products, Titanium Internet Security, Titanium Maximum Security, and Titanium Antivirus+, include new features that use cloud computing for malware detection. |
Email is 'counter-productive' says Salesforce.com Posted: 08 Sep 2010 09:00 AM PDT |
Apple matches Mozilla, patches DLL hijacking bug in Safari Posted: 08 Sep 2010 09:00 AM PDT |
Norton Releases 2011 Security Products Posted: 08 Sep 2010 09:00 AM PDT |
Mozilla fixes Firefox's DLL load hijacking bug Posted: 08 Sep 2010 09:00 AM PDT |
Symantec: Most hacking victims blame themselves Posted: 08 Sep 2010 09:00 AM PDT |
Kaspersky Lab: Facebook facing increased phishing attacks Posted: 07 Sep 2010 09:00 AM PDT |
Spammers exploit second Facebook bug in a week Posted: 07 Sep 2010 09:00 AM PDT |
Getting Your Data Safely Across the Border Posted: 07 Sep 2010 09:00 AM PDT Since the terrorist attack on the 9/11, the United States has sacrificed some freedoms and liberties in exchange for tighter security in an attempt to prevent future attacks. The ACLU has joined with other groups in filing a legal challenge to one such security measure that infringes on personal liberty--the practice of searching laptops without cause at border crossings. However, there are also other ways you can get your data across the border without having it accessed by the prying eyes of Big Brother. |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment