Learning About RIP (Routing Information Protocol)

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Learning About RIP (Routing Information Protocol)


Learning About RIP (Routing Information Protocol)

Posted: 08 Sep 2010 10:19 PM PDT


The Routing Information Protocol (RIP) is a dynamic routing protocol used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP). It uses the distance-vector routing algorithm. It was first defined in RFC 1058 (1988). The protocol has since been extended several times, resulting in RIP Version 2 (RFC 2453). Both versions are still in use today, however, they are considered to have been made technically obsolete by more advanced techniques such as Open Shortest Path First (OSPF) and the OSI protocol IS-IS. RIP has also been adapted for use in IPv6 networks, a standard known as RIPng (RIP next generation), published in RFC 2080 (1997).

The routing algorithm used in RIP, the Bellman-Ford algorithm, was first deployed in a computer network in 1967, as the initial routing algorithm of the ARPANET.

The earliest version of the specific protocol that became RIP was the Gateway Information Protocol, part of the PARC Universal Packet internetworking protocol suite, developed at Xerox Parc. A later version, named the Routing Information Protocol, was part of Xerox Network Systems.

A version of RIP which supported the Internet Protocol (IP) was later included in the Berkeley Software Distribution (BSD) of the Unix operating system. It was known as the routed daemon. Various other vendors would create their own implementations of the routing protocol. Eventually, RFC 1058 unified the various implementations under a single standard.

RIP is a distance-vector routing protocol, which employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process.

RIP implements the split horizon, route poisoning and holddown mechanisms to prevent incorrect routing information from being propagated. These are some of the stability features of RIP. It is also possible to use the so called RIP-MTI (Minimal Topology Information) algorithm to cope with the count to infinity problem. With its help, it is possible to detect every possible loop with a very small computation effort.

Originally each RIP router transmitted full updates every 30 seconds. In the early deployments, routing tables were small enough that the traffic was not significant. As networks grew in size, however, it became evident there could be a massive traffic burst every 30 seconds, even if the routers had been initialized at random times. It was thought, as a result of random initialization, the routing updates would spread out in time, but this was not true in practice. Sally Floyd and Van Jacobson showed in 1994 that, without slight randomization of the update timer, the timers synchronized over time. In most current networking environments, RIP is not the preferred choice for routing as its time to converge and scalability are poor compared to EIGRP, OSPF, or IS-IS (the latter two being link-state routing protocols), and (without RIP-MTI) a hop limit severely limits the size of network it can be used in. However, it is easy to configure, because RIP does not require any parameters on a router unlike other protocols.

RIP is implemented on top of the User Datagram Protocol as its transport protocol. It is assigned the reserved port number 520.

RIP Versions:

There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng.

RIP version 1

The original specification of RIP, defined in RFC 1058, uses classful routing. The periodic routing updates do not carry subnet information, lacking support for variable length subnet masks (VLSM). This limitation makes it impossible to have different-sized subnets inside of the same network class. In other words, all subnets in a network class must have the same size. There is also no support for router authentication, making RIP vulnerable to various attacks.The RIP version 1 works when there is only 16 hop counts(0-15).If there are more than 16 hops between two routers it fails to send data packets to the destination address.

RIP version 2

Due to the deficiencies of the original RIP specification, RIP version 2 (RIPv2) was developed in 1993 and last standardized in 1998. It included the ability to carry subnet information, thus supporting Classless Inter-Domain Routing (CIDR). To maintain backward compatibility, the hop count limit of 15 remained. RIPv2 has facilities to fully interoperate with the earlier specification if all Must Be Zero protocol fields in the RIPv1 messages are properly specified. In addition, a compatibility switch feature allows fine-grained interoperability adjustments.

In an effort to avoid unnecessary load on hosts that do not participate in routing, RIPv2 multicasts the entire routing table to all adjacent routers at the address 224.0.0.9, as opposed to RIPv1 which uses broadcast. Unicast addressing is still allowed for special applications.

(MD5) authentication for RIP was introduced in 1997.

RIPv2 is Internet Standard STD-56.

Route tags were also added in RIP version 2. This functionality allows for routes to be distinguished from internal routes to external redistributed routes from EGP protocols.

RIPng

RIPng (RIP next generation), defined in RFC 2080,[8] is an extension of RIPv2 for support of IPv6, the next generation Internet Protocol. The main differences between RIPv2 and RIPng are:

* Support of IPv6 networking.
* While RIPv2 supports RIPv1 updates authentication, RIPng does not. IPv6 routers were, at the time, supposed to use IPsec for authentication.
* RIPv2 allows attaching arbitrary tags to routes, RIPng does not;
* RIPv2 encodes the next-hop into each route entries, RIPng requires specific encoding of the next hop for a set of route entries.xxx

...

Home working spreads among office workers

Posted: 08 Sep 2010 09:00 AM PDT


Once seen as an eccentric privilege, remote working is now so established that as many as half of UK office workers were doing it this summer, according to a new survey.

Craigslist urged to ban 'adult services' across all sites

Posted: 08 Sep 2010 09:00 AM PDT


Online auction site Craigslist is being urged to close its 'adult services' section on all of its global sites.

Symantec launches Norton 2011 security products

Posted: 08 Sep 2010 09:00 AM PDT


Symantec has made launched the fulll versions of its Norton Internet Security 2011 and Norton AntiVirus 2011 security products.

Hackers create 57,000 malicious pages per week

Posted: 08 Sep 2010 09:00 AM PDT


Hackers create 57,000 new web pages every week in a bid to infect web users with malicious software, says PandaLabs.

Trend Micro Revamps Entire Product Line With 'Titanium'

Posted: 08 Sep 2010 09:00 AM PDT


Following up Norton's new product launch early Wednesday, Trend Micro announced an overhaul of its entire home user product line on Wednesday, under the moniker "Titanium." The new products, Titanium Internet Security, Titanium Maximum Security, and Titanium Antivirus+, include new features that use cloud computing for malware detection.

Email is 'counter-productive' says Salesforce.com

Posted: 08 Sep 2010 09:00 AM PDT


Most emails sent at work are 'irrelevant', a survey for cloud company salesforce.com,has found.

Apple matches Mozilla, patches DLL hijacking bug in Safari

Posted: 08 Sep 2010 09:00 AM PDT


Apple yesterday patched three vulnerabilities in Safari, including one in the Windows version that quashed a bug Microsoft said individual developers had to fix themselves.

Norton Releases 2011 Security Products

Posted: 08 Sep 2010 09:00 AM PDT


Norton on Wednesday announced its 2011 versions of its Norton Internet Security suite and Norton Antivirus software. Norton also announced a new application--Norton Power Eraser--that is designed to remove the increasingly common fake antivirus malware.

Mozilla fixes Firefox's DLL load hijacking bug

Posted: 08 Sep 2010 09:00 AM PDT


Mozilla on Tuesday patched 15 vulnerabilities in Firefox, 11 of them labeled critical.

Symantec: Most hacking victims blame themselves

Posted: 08 Sep 2010 09:00 AM PDT


Just under two-thirds of all Internet users have been hit by some sort of cybercrime, and while most of them are angry about it, a surprisingly large percentage feel guilt too, according to a survey commissioned by Symantec.

Kaspersky Lab: Facebook facing increased phishing attacks

Posted: 07 Sep 2010 09:00 AM PDT


True to the dictum that popularity extracts its own price, Facebook has left eBay behind, becoming the second most popular target for phishers using spam e-mails.

Spammers exploit second Facebook bug in a week

Posted: 07 Sep 2010 09:00 AM PDT


Facebook today said it has fixed the bug that allowed a spamming worm to automatically post messages to users' walls earlier this week.

Getting Your Data Safely Across the Border

Posted: 07 Sep 2010 09:00 AM PDT


Since the terrorist attack on the 9/11, the United States has sacrificed some freedoms and liberties in exchange for tighter security in an attempt to prevent future attacks. The ACLU has joined with other groups in filing a legal challenge to one such security measure that infringes on personal liberty--the practice of searching laptops without cause at border crossings. However, there are also other ways you can get your data across the border without having it accessed by the prying eyes of Big Brother.

0 comments:

Post a Comment