SlideShare a Scribd company logo
Section 2
 Distance-Vector Routing
- Bellman-Ford Equation.
- Distance Vectors.
- Distance-Vector Routing Algorithm.
 Link-State Routing
- Link-State Database (LSDB).
- Formation of Least-Cost Trees.
 Path-Vector Routing
- Spanning Trees.
- Creation of Spanning Trees.
- Path-Vector Algorithm.
 The distance-vector (DV) routing uses the goal to
find the best route.
 The first thing each node creates is its own least-
cost tree with the rudimentary information it has
about its immediate neighbors.
 The incomplete trees are exchanged between
immediate neighbors to make the trees more and
more complete and to represent the whole
internet.
 router continuously tells all of its neighbors what it
knows about the whole internet,
(although the knowledge can be incomplete).
 Bellman-Ford equation is used to find the least cost (shortest
distance) between a source node x and a destination node y
through some intermediary nodes (a, b, c, . . .) when the costs
between the source and the intermediary nodes and the least
costs between the intermediary nodes and the destination are
given.
 Equation
 A least-cost tree is a combination of least-cost paths
from the root of the tree to all destinations.
 These paths are graphically glued together to form
the tree.
 Distance-vector routing unglues these paths and
creates a distance vector, a one-dimensional array to
represent the tree.
Note That :
 The name of the distance vector defines the root.
 The indexes define the destinations.
 The value of each cell defines the least cost from the root
to the destination.
1 - Each node in an internet, when it is booted, creates a very
rudimentary distance vector with the minimum information
the node can obtain from its neighborhood.
2. The node sends some greeting messages out of its interfaces
and discovers the identity of the immediate neighbors and
the distance between itself and each neighbor.
3. makes a simple distance vector by inserting the discovered
distances in the corresponding cells and leaves the value of
other cells as infinity.
Ch 20   UNICAST ROUTING  SECTION  2
 A problem with distance-vector routing is that
any decrease in cost (good news) propagates
quickly, but any increase in cost (bad news) will
propagate slowly.
 For a routing protocol to work properly, if a link
is broken (cost becomes infinity),
 every other router should be aware of it
immediately, but in distance-vector routing, this
takes some time.
 The problem is referred to as count to infinity.
 It sometimes takes several updates before the
cost for a broken link is recorded as infinity by
all routers.
Ch 20   UNICAST ROUTING  SECTION  2
 In this strategy, instead of flooding the table through each
interface, each node sends only part of its table through
each interface.
 If, according to its table, node B thinks that the optimum
route to reach X is via A.
 Taking information from node A, modifying it, and sending
it back to node A is what creates the confusion.
 In this case, node A keeps the value of infinity as the
distance to X.
 Later, when node A sends its forwarding table to B, node B
also corrects its forwarding table.
 The system becomes stable after the first update: both
node A and node B know that X is not reachable.
 Using the split-horizon strategy has one drawback.
 Normally, the corresponding protocol uses a timer, and if
there is no news about a route, the node deletes the route
from its table.
 When node B in the previous scenario eliminates the route to
X from its advertisement to A, B has not received any news
about X recently.
 In the poison reverse strategy B can still advertise the value
for X, but if the source of information is A, it can replace the
distance with infinity as a warning: “Do not use this value”.
 if the instability is between three nodes, stability cannot be
guaranteed.
 A routing algorithm that directly follows our discussion
for creating least-cost trees and forwarding tables is
link-state (LS) routing.
 This method uses the term link-state to define the
characteristic of a link (an edge) that represents a
network in the internet.
 Links with lower costs are preferred to links with
higher costs.
 if the cost of a link is infinity, it means that the link
does not exist or has been broken.
 To create a least-cost tree with this method, each
node needs to have a complete map of the network,
which means it needs to know the state of each link.
 There is only one LSDB for the whole internet.
how each node can create this LSDB that contains
information about the whole internet?
 This can be done by a process called flooding.
 Each node can send some greeting messages to all its
immediate neighbors to collect two pieces of information
for each neighboring node:
-The identity of the node.
-The cost of the link.
 The combination of these two pieces of information is called
the LS packet (LSP).
 The LSP is sent out of each interface, as shown in Figure 20.9
for our internet in Figure 20.
Ch 20   UNICAST ROUTING  SECTION  2
 When a node receives an LSP from one of its interfaces, it
compares the LSP with the copy it may already have.
 If the arrived LSP is older than the one it has, it discards
the arrived LSP.
 If it is newer than the one it has, the node discards the old
LSP and keeps the received one.
 It then sends a copy of it out of each interface except the
one from which the packet arrived.
To create a least-cost tree for itself, using the shared LSDB,
each node needs to run the famous Dijkstra Algorithm.
This iterative algorithm uses the following steps:
1. The node chooses itself as the root of the tree, creating
a tree with a single node, and sets the total cost of each
node based on the information in the LSDB.
2. The node selects one node, among all nodes not in the
tree, which is closest to the root, and adds this to the
tree.
After this node is added to the tree, the cost of all other
nodes not in the tree needs to be updated because the
paths may have been changed.
3. The node repeats step 2 until all nodes are added to the
tree.
Ch 20   UNICAST ROUTING  SECTION  2
Ch 20   UNICAST ROUTING  SECTION  2
 Both link-state and distance-vector routing are
based on the least-cost goal.
 router may belong to an organization that does
not provide enough security or it may belong to
a commercial rival of the sender which might
inspect the packets for obtaining information.
 Least-cost routing does not prevent a packet
from passing through an area when that area is
in the least-cost path.
 Path-vector routing does not have the
drawbacks of LS or DV routing as described
above because it is not based on least-cost
routing.
 The best route is determined by the source
using the policy it imposes on the route.
 In other words, the source can control the
path.
 path-vector routing is not actually used in an
internet, and is mostly designed to route a
packet between ISPs
 The tree determined by the source when it
imposes its own policy.
 If there is more than one route to a destination,
the source can choose the route that meets its
policy best.
 A source may apply several policies at the same
time.
 One of the common policies uses the minimum
number of nodes to be visited.
 common policy is to avoid some nodes as the
middle node in a route.
 The policy imposed by all sources is to use the minimum number
of nodes to reach a destination.
 The spanning tree selected by A and E is such that the
communication does not pass through D as a middle node.
 When a node is booted, it creates a path vector
based on the information it can obtain about its
immediate neighbor.
 A node sends greeting messages to its immediate
neighbors to collect these pieces of information.
 The policy is defined by selecting the best of multiple
paths.
 Path-vector routing also imposes one more condition on
this equation: If Path (v, y) includes x, that path is
discarded to avoid a loop in the path.
 In other words, x does not want to visit itself when it
selects a path to y.
Ch 20   UNICAST ROUTING  SECTION  2
Ch 20   UNICAST ROUTING  SECTION  2

More Related Content

PPTX
Transport layer
PPTX
Csma cd and csma-ca
PPT
data-link layer protocols
PPT
Distance vector routing
PPTX
Network layer - design Issues
PDF
Transport layer services
PPTX
Circuit Switching
PPTX
Distance Vector Routing
Transport layer
Csma cd and csma-ca
data-link layer protocols
Distance vector routing
Network layer - design Issues
Transport layer services
Circuit Switching
Distance Vector Routing

What's hot (20)

PPT
Unit 3 Network Layer PPT
PPTX
Transmission Control Protocol (TCP)
PPTX
User datagram protocol (udp)
PPTX
Computer Network - Network Layer
PPTX
TCP and UDP
PPTX
Computer network switching
PPTX
HDLC(High level Data Link Control)
PPTX
Routing algorithm
PPSX
Issues in Data Link Layer
PPTX
Network Layer design Issues.pptx
PPTX
Distance Vector Routing Protocols
PPT
Introduction to switching & circuit switching
PPTX
Media Access Control
PPSX
Congestion control in TCP
PPTX
Routing algorithm
PPTX
Transport Layer In Computer Network
PPT
Circuit and packet_switching
PPTX
Introduction to data link layer
PPTX
Electronic mail - Computer Networks
PPTX
Address resolution protocol (ARP)
Unit 3 Network Layer PPT
Transmission Control Protocol (TCP)
User datagram protocol (udp)
Computer Network - Network Layer
TCP and UDP
Computer network switching
HDLC(High level Data Link Control)
Routing algorithm
Issues in Data Link Layer
Network Layer design Issues.pptx
Distance Vector Routing Protocols
Introduction to switching & circuit switching
Media Access Control
Congestion control in TCP
Routing algorithm
Transport Layer In Computer Network
Circuit and packet_switching
Introduction to data link layer
Electronic mail - Computer Networks
Address resolution protocol (ARP)
Ad

Viewers also liked (20)

PPTX
Ch 18 intro to network layer - section 3
PPTX
Ch 18 intro to network layer - section 4
PPTX
Ch 19 Network-layer protocols Section 1
PPT
Routing algorithm
PPTX
Ch 18 intro to network layer - section 5
PPTX
Ch 18 intro to network layer - section 2
PPTX
Ch 19 Network-layer protocols - section 2
PPTX
Ch 18 intro to network layer - section 1
PPT
Network Layer,Computer Networks
PPTX
Network Layer Part 4
PPT
2008118090324 hk
PPT
Routing and OSPF
PPT
Routing algorithm network layer
PPTX
Link state routing protocol
PPT
Network Layer
PPT
PPT
Computer network (Lecture 2)
PPT
Link State Protocol
PPT
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
PPTX
Routing and routing algorithms
Ch 18 intro to network layer - section 3
Ch 18 intro to network layer - section 4
Ch 19 Network-layer protocols Section 1
Routing algorithm
Ch 18 intro to network layer - section 5
Ch 18 intro to network layer - section 2
Ch 19 Network-layer protocols - section 2
Ch 18 intro to network layer - section 1
Network Layer,Computer Networks
Network Layer Part 4
2008118090324 hk
Routing and OSPF
Routing algorithm network layer
Link state routing protocol
Network Layer
Computer network (Lecture 2)
Link State Protocol
Internet Routing Protocols: Fundamental Concepts of Distance-Vector and Link-...
Routing and routing algorithms
Ad

Similar to Ch 20 UNICAST ROUTING SECTION 2 (20)

PPT
Introducing ATM Technology unicast.ppt
PDF
An Insight on Routing
PDF
Computer Communication Networks-Routing protocols 1
DOCX
Link state routing protocol
DOCX
Link state routing protocol
PPTX
Comparative Analysis of Distance Vector Routing & Link State Protocols
PPTX
ROUTING STRATEGIES IN DTN
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
IT6601 MOBILE COMPUTING
PPTX
Routing Techniques
PDF
ICICCE0367
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
PDF
Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...
PDF
Study of load balanced routing protocols in mobile ad hoc networks
PDF
DCCN Network Layer congestion control TCP
PPTX
Network Layer
PDF
CS6003 AD HOC AND SENSOR NETWORKS
PPTX
CN_UNIT_3_routing algorithms.ppt.......x
PDF
Unit8 tgb
Introducing ATM Technology unicast.ppt
An Insight on Routing
Computer Communication Networks-Routing protocols 1
Link state routing protocol
Link state routing protocol
Comparative Analysis of Distance Vector Routing & Link State Protocols
ROUTING STRATEGIES IN DTN
International Journal of Engineering and Science Invention (IJESI)
IT6601 MOBILE COMPUTING
Routing Techniques
ICICCE0367
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...
Study of load balanced routing protocols in mobile ad hoc networks
DCCN Network Layer congestion control TCP
Network Layer
CS6003 AD HOC AND SENSOR NETWORKS
CN_UNIT_3_routing algorithms.ppt.......x
Unit8 tgb

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Lesson notes of climatology university.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Classroom Observation Tools for Teachers
Basic Mud Logging Guide for educational purpose
GDM (1) (1).pptx small presentation for students
Lesson notes of climatology university.
O7-L3 Supply Chain Operations - ICLT Program
01-Introduction-to-Information-Management.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
RMMM.pdf make it easy to upload and study
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
O5-L3 Freight Transport Ops (International) V1.pdf
Sports Quiz easy sports quiz sports quiz
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial diseases, their pathogenesis and prophylaxis
Classroom Observation Tools for Teachers

Ch 20 UNICAST ROUTING SECTION 2

  • 2.  Distance-Vector Routing - Bellman-Ford Equation. - Distance Vectors. - Distance-Vector Routing Algorithm.  Link-State Routing - Link-State Database (LSDB). - Formation of Least-Cost Trees.  Path-Vector Routing - Spanning Trees. - Creation of Spanning Trees. - Path-Vector Algorithm.
  • 3.  The distance-vector (DV) routing uses the goal to find the best route.  The first thing each node creates is its own least- cost tree with the rudimentary information it has about its immediate neighbors.  The incomplete trees are exchanged between immediate neighbors to make the trees more and more complete and to represent the whole internet.  router continuously tells all of its neighbors what it knows about the whole internet, (although the knowledge can be incomplete).
  • 4.  Bellman-Ford equation is used to find the least cost (shortest distance) between a source node x and a destination node y through some intermediary nodes (a, b, c, . . .) when the costs between the source and the intermediary nodes and the least costs between the intermediary nodes and the destination are given.  Equation
  • 5.  A least-cost tree is a combination of least-cost paths from the root of the tree to all destinations.  These paths are graphically glued together to form the tree.  Distance-vector routing unglues these paths and creates a distance vector, a one-dimensional array to represent the tree.
  • 6. Note That :  The name of the distance vector defines the root.  The indexes define the destinations.  The value of each cell defines the least cost from the root to the destination.
  • 7. 1 - Each node in an internet, when it is booted, creates a very rudimentary distance vector with the minimum information the node can obtain from its neighborhood.
  • 8. 2. The node sends some greeting messages out of its interfaces and discovers the identity of the immediate neighbors and the distance between itself and each neighbor. 3. makes a simple distance vector by inserting the discovered distances in the corresponding cells and leaves the value of other cells as infinity.
  • 10.  A problem with distance-vector routing is that any decrease in cost (good news) propagates quickly, but any increase in cost (bad news) will propagate slowly.  For a routing protocol to work properly, if a link is broken (cost becomes infinity),  every other router should be aware of it immediately, but in distance-vector routing, this takes some time.  The problem is referred to as count to infinity.  It sometimes takes several updates before the cost for a broken link is recorded as infinity by all routers.
  • 12.  In this strategy, instead of flooding the table through each interface, each node sends only part of its table through each interface.  If, according to its table, node B thinks that the optimum route to reach X is via A.  Taking information from node A, modifying it, and sending it back to node A is what creates the confusion.  In this case, node A keeps the value of infinity as the distance to X.  Later, when node A sends its forwarding table to B, node B also corrects its forwarding table.  The system becomes stable after the first update: both node A and node B know that X is not reachable.
  • 13.  Using the split-horizon strategy has one drawback.  Normally, the corresponding protocol uses a timer, and if there is no news about a route, the node deletes the route from its table.  When node B in the previous scenario eliminates the route to X from its advertisement to A, B has not received any news about X recently.  In the poison reverse strategy B can still advertise the value for X, but if the source of information is A, it can replace the distance with infinity as a warning: “Do not use this value”.  if the instability is between three nodes, stability cannot be guaranteed.
  • 14.  A routing algorithm that directly follows our discussion for creating least-cost trees and forwarding tables is link-state (LS) routing.  This method uses the term link-state to define the characteristic of a link (an edge) that represents a network in the internet.  Links with lower costs are preferred to links with higher costs.  if the cost of a link is infinity, it means that the link does not exist or has been broken.
  • 15.  To create a least-cost tree with this method, each node needs to have a complete map of the network, which means it needs to know the state of each link.  There is only one LSDB for the whole internet.
  • 16. how each node can create this LSDB that contains information about the whole internet?  This can be done by a process called flooding.  Each node can send some greeting messages to all its immediate neighbors to collect two pieces of information for each neighboring node: -The identity of the node. -The cost of the link.  The combination of these two pieces of information is called the LS packet (LSP).  The LSP is sent out of each interface, as shown in Figure 20.9 for our internet in Figure 20.
  • 18.  When a node receives an LSP from one of its interfaces, it compares the LSP with the copy it may already have.  If the arrived LSP is older than the one it has, it discards the arrived LSP.  If it is newer than the one it has, the node discards the old LSP and keeps the received one.  It then sends a copy of it out of each interface except the one from which the packet arrived.
  • 19. To create a least-cost tree for itself, using the shared LSDB, each node needs to run the famous Dijkstra Algorithm. This iterative algorithm uses the following steps: 1. The node chooses itself as the root of the tree, creating a tree with a single node, and sets the total cost of each node based on the information in the LSDB. 2. The node selects one node, among all nodes not in the tree, which is closest to the root, and adds this to the tree. After this node is added to the tree, the cost of all other nodes not in the tree needs to be updated because the paths may have been changed. 3. The node repeats step 2 until all nodes are added to the tree.
  • 22.  Both link-state and distance-vector routing are based on the least-cost goal.  router may belong to an organization that does not provide enough security or it may belong to a commercial rival of the sender which might inspect the packets for obtaining information.  Least-cost routing does not prevent a packet from passing through an area when that area is in the least-cost path.
  • 23.  Path-vector routing does not have the drawbacks of LS or DV routing as described above because it is not based on least-cost routing.  The best route is determined by the source using the policy it imposes on the route.  In other words, the source can control the path.  path-vector routing is not actually used in an internet, and is mostly designed to route a packet between ISPs
  • 24.  The tree determined by the source when it imposes its own policy.  If there is more than one route to a destination, the source can choose the route that meets its policy best.  A source may apply several policies at the same time.  One of the common policies uses the minimum number of nodes to be visited.  common policy is to avoid some nodes as the middle node in a route.
  • 25.  The policy imposed by all sources is to use the minimum number of nodes to reach a destination.  The spanning tree selected by A and E is such that the communication does not pass through D as a middle node.
  • 26.  When a node is booted, it creates a path vector based on the information it can obtain about its immediate neighbor.  A node sends greeting messages to its immediate neighbors to collect these pieces of information.
  • 27.  The policy is defined by selecting the best of multiple paths.  Path-vector routing also imposes one more condition on this equation: If Path (v, y) includes x, that path is discarded to avoid a loop in the path.  In other words, x does not want to visit itself when it selects a path to y.