SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Distance Vector Routing
a)
b)
c)

The least-cost route between any two nodes is the route with
minimum distance.
Each node maintains a vector(table) of minimum distances to
every node.
The table at each node also guides the packets to the desired
node by showing the showing the next hop routing.

Example:
Assume each node as the cities.
Lines as the roads connecting them.

1
Final Distance vector routing tables

2
Initialization
a)
b)
c)

The table in figure are stable.
Each node knows how to reach any other node and their cost.
At the beginning, each node know the cost of itself and its
immediate neighbor.[those node directly connected to it.]

d)

Assume that each node send a message to the immediate neighbors
and find the distance between itself and these neighbors.
The distance of any entry that is not a neighbor is marked as
infinite(unreachable).

e)

3
Initialization of tables in distance vector routing (DVR)

4
Sharing
a)
b)
c)
d)
e)
f)

Idea is to share the information between neighbors.
The node A does not know the distance about E, but node C does.
If node C share it routing table with A, node A can also know how
to reach node E.
On the other hand, node C does not know how to reach node D, but
node A does.
If node A share its routing table with C, then node C can also know
how to reach node D.
Node A and C are immediate neighbors, can improve their routing
tables if they help each other.

5
Sharing
a)
b)
c)
d)
e)

Contd.,

How much of the table must be shared with each neighbor?
The third column of the table(next hop) is not useful for the
neighbor.
When the neighbor receives a table, this column needs to be
replaced with the sender’s name.
If any of the rows can be used, the next node column filled with
sender of the table.
Therefore, a node can send only the first two column of its table to
any neighbor.

6
7
Updating in distance vector routing example: C to A
From C

From A

A to A via C: ACA = AC+ CA = 2+2
A to B via C: ACB = AC + CB = 2+4

A to D via C: ACD = AC + CD = 2+ inf.
A to E via C: ACD = AC + CE = 2+4

A to C via C: ACB = AC + CC = 2+0

8
When to share
a)
b)
c)



Periodic Update: A node sends its table, normally every 30s, in a
periodic update, it depends on the protocol that is using DVR.
Triggered Update: A node sends its two-column routing table to its
neighbors anytime there is a change in its routing table.
This is called triggered update the change can result from the
following:
A node receives a table from a neighbor, resulting in changes in its
own table after updating.
A node detects some failure in the neighboring links which results
in a distance change to infinity.

9
Distance Vector Routing (DVR)
a) 3 keys to understand how this algorithm works:
• Sharing knowledge about the entire AS. Each router
shares its knowledge about the entire AS with
neighbours. It sends whatever it has.
• Sharing only with immediate neighbours. Each
router sends whatever knowledge it has thru all its
interface.
• Sharing at regular intervals. sends at fixed intervals,
e.g. every 30 sec.
a) Problems: Tedious comparing/updating process, slow
response to infinite loop problem, huge list to be
maintained!!
10
11
12

Weitere ähnliche Inhalte

Was ist angesagt?

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocolSTEFFY D
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error controlManishTadhiyal
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 

Was ist angesagt? (20)

Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
HDLC
HDLCHDLC
HDLC
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
IPv4
IPv4IPv4
IPv4
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Transport layer
Transport layer Transport layer
Transport layer
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 

Ähnlich wie DVR - Distance Vector Routing Explained

Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingKlawal13
 
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxtidwellveronique
 
Introducing ATM Technology unicast.ppt
Introducing ATM Technology   unicast.pptIntroducing ATM Technology   unicast.ppt
Introducing ATM Technology unicast.pptgopi5692
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxHirazNor
 
module10-rip (1).ppt
module10-rip (1).pptmodule10-rip (1).ppt
module10-rip (1).pptRakesh Dhiman
 
routing algorithm
routing algorithmrouting algorithm
routing algorithmAnusuaBasu
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Mumbai Academisc
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 

Ähnlich wie DVR - Distance Vector Routing Explained (20)

Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Dsdv
DsdvDsdv
Dsdv
 
Dsdv
DsdvDsdv
Dsdv
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Bellmanford
BellmanfordBellmanford
Bellmanford
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routing
 
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docxECE 478578 Fundamentals of Computer NetworksProject # 1..docx
ECE 478578 Fundamentals of Computer NetworksProject # 1..docx
 
Introducing ATM Technology unicast.ppt
Introducing ATM Technology   unicast.pptIntroducing ATM Technology   unicast.ppt
Introducing ATM Technology unicast.ppt
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
End sem
End semEnd sem
End sem
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
module10-rip (1).ppt
module10-rip (1).pptmodule10-rip (1).ppt
module10-rip (1).ppt
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Part7-routing.pptx
Part7-routing.pptxPart7-routing.pptx
Part7-routing.pptx
 
routing algorithm
routing algorithmrouting algorithm
routing algorithm
 
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)Xtc a practical topology control algorithm for ad hoc networks (synopsis)
Xtc a practical topology control algorithm for ad hoc networks (synopsis)
 
Notes
NotesNotes
Notes
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 

Mehr von Siddique Ibrahim (20)

List in Python
List in PythonList in Python
List in Python
 
Python Control structures
Python Control structuresPython Control structures
Python Control structures
 
Python programming introduction
Python programming introductionPython programming introduction
Python programming introduction
 
Data mining basic fundamentals
Data mining basic fundamentalsData mining basic fundamentals
Data mining basic fundamentals
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Virtualization Concepts
Virtualization ConceptsVirtualization Concepts
Virtualization Concepts
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Osi model 7 Layers
Osi model 7 LayersOsi model 7 Layers
Osi model 7 Layers
 
Mysql grand
Mysql grandMysql grand
Mysql grand
 
Getting started into mySQL
Getting started into mySQLGetting started into mySQL
Getting started into mySQL
 
pipelining
pipeliningpipelining
pipelining
 
Micro programmed control
Micro programmed controlMicro programmed control
Micro programmed control
 
Hardwired control
Hardwired controlHardwired control
Hardwired control
 
interface
interfaceinterface
interface
 
Interrupt
InterruptInterrupt
Interrupt
 
Interrupt
InterruptInterrupt
Interrupt
 
DMA
DMADMA
DMA
 
Io devies
Io deviesIo devies
Io devies
 
Stack & queue
Stack & queueStack & queue
Stack & queue
 
Metadata in data warehouse
Metadata in data warehouseMetadata in data warehouse
Metadata in data warehouse
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

DVR - Distance Vector Routing Explained

  • 1. Distance Vector Routing a) b) c) The least-cost route between any two nodes is the route with minimum distance. Each node maintains a vector(table) of minimum distances to every node. The table at each node also guides the packets to the desired node by showing the showing the next hop routing. Example: Assume each node as the cities. Lines as the roads connecting them. 1
  • 2. Final Distance vector routing tables 2
  • 3. Initialization a) b) c) The table in figure are stable. Each node knows how to reach any other node and their cost. At the beginning, each node know the cost of itself and its immediate neighbor.[those node directly connected to it.] d) Assume that each node send a message to the immediate neighbors and find the distance between itself and these neighbors. The distance of any entry that is not a neighbor is marked as infinite(unreachable). e) 3
  • 4. Initialization of tables in distance vector routing (DVR) 4
  • 5. Sharing a) b) c) d) e) f) Idea is to share the information between neighbors. The node A does not know the distance about E, but node C does. If node C share it routing table with A, node A can also know how to reach node E. On the other hand, node C does not know how to reach node D, but node A does. If node A share its routing table with C, then node C can also know how to reach node D. Node A and C are immediate neighbors, can improve their routing tables if they help each other. 5
  • 6. Sharing a) b) c) d) e) Contd., How much of the table must be shared with each neighbor? The third column of the table(next hop) is not useful for the neighbor. When the neighbor receives a table, this column needs to be replaced with the sender’s name. If any of the rows can be used, the next node column filled with sender of the table. Therefore, a node can send only the first two column of its table to any neighbor. 6
  • 7. 7
  • 8. Updating in distance vector routing example: C to A From C From A A to A via C: ACA = AC+ CA = 2+2 A to B via C: ACB = AC + CB = 2+4 A to D via C: ACD = AC + CD = 2+ inf. A to E via C: ACD = AC + CE = 2+4 A to C via C: ACB = AC + CC = 2+0 8
  • 9. When to share a) b) c)   Periodic Update: A node sends its table, normally every 30s, in a periodic update, it depends on the protocol that is using DVR. Triggered Update: A node sends its two-column routing table to its neighbors anytime there is a change in its routing table. This is called triggered update the change can result from the following: A node receives a table from a neighbor, resulting in changes in its own table after updating. A node detects some failure in the neighboring links which results in a distance change to infinity. 9
  • 10. Distance Vector Routing (DVR) a) 3 keys to understand how this algorithm works: • Sharing knowledge about the entire AS. Each router shares its knowledge about the entire AS with neighbours. It sends whatever it has. • Sharing only with immediate neighbours. Each router sends whatever knowledge it has thru all its interface. • Sharing at regular intervals. sends at fixed intervals, e.g. every 30 sec. a) Problems: Tedious comparing/updating process, slow response to infinite loop problem, huge list to be maintained!! 10
  • 11. 11
  • 12. 12