A routed protocol allows for data routing. IP and AppleTalk are two examples of routed protocols. An addressing method is necessary for such a protocol. You may determine the network that a host belongs to as well as where that host is located on that network by using the addressing scheme. A routed protocol can be used by all hosts on the internetwork. On the other hand, a routing protocol is only employed when routers are involved. Its goal is to assist routers in creating and maintaining routing tables. Examples include IP and IPX.
Routing Protocols
Routing protocols
are mechanisms for exchanging routing data among routers so that decisions about where to route data may be made. The three most used routing protocols on the Internet are of these categories. In particular, these are the path vector, link state, and distance vector. Each of these three types of protocols’ core ideas and principles is presented in this chapter within a general framework. The distributed nature of routing systems makes them vulnerable to problems like looping.
To exchange information that enables them to choose routes between nodes in a computer network, routers must communicate with one another according to a routing protocol. Data packets are sent from router to router over the internet’s networks until they arrive at their target computer. Routers are responsible for traffic direction on the internet. The precise route decision is made by routing algorithms. Only the networks that are physically connected to each router are known to it. This information is sent throughout the network through a routing mechanism, initially to nearby nodes in the local vicinity. Routers learn about the network’s topology in this way. The fault tolerance and high availability of the Internet are due to the routing protocols’ capacity to dynamically adapt to changing situations, such as malfunctioning connections and components, and route data around obstacles.
The way routing protocols avoid routing loops, how they choose preferred routes, how they use hop cost information, how long it takes them to reach routing convergence, how scalable they are, and other elements like relay multiplexing and cloud access framework parameters are just a few of their unique characteristics. Distributing uncompromised networking gateways to permitted ports may also be accomplished by using some additional features, such as multilayer interfacing. Additionally, this avoids problems with routing protocol loops.
Types of Routing Protocols
Network routing protocols often fall into one of two categories –
- Static
- Dynamic
Static Routing Protocols
When an administrator chooses by hand the path from the source to the destination network, static routing protocols are applied. It provides the network with increased security.
Advantages:
- No CPU load on the router.
- No dead space between connections.
- Route addition is only possible by the administrator.
Disadvantages:
- The configuration of each router must be known by the administrator.
- Large networks should avoid this approach since it takes a lot of time.
- Every time a connection breaks, the entire network falls offline, which is impractical in small networks.
Dynamic Routing Protocols
Another essential kind of routing protocol is the dynamic routing protocol. By automatically receiving data from other connected routers, it aids routers in adding information to their routing tables. When the topological structure of the network changes, these kinds of protocols also broadcast topology updates.
Advantage:
- Even on bigger networks, the configuration is less difficult.
- If a link fails, it will have the ability to dynamically pick another path.
- Load balancing between several connections is made easier with its assistance.
Disadvantage:
- It uses bandwidth since updates are distributed among routers.
- The CPU or RAM of the router is subjected to increased stress by routing procedures.
Examples of Routing Protocols
- Routing Information Protocol (RIP)
One of the earliest routing protocols developed was known as RIP or Routing Information Protocol. RIP operates on the OSI model’s Application layer and is utilized in both LANs and WANs or Wide Area Networks. RIP is available in several variations, including RIPv1 and RIPv2. Based on the IP destination and the number of hops taken to get there, RIPv1’s first version chooses network pathways.
By broadcasting its IP table to every router connected to the network, RIPv1 communicates with the network. To deliver its routing table to a multicast address, RIPv2 is a little more advanced than this. A subnet mask and gateway are selected by RIPv2 for future traffic, and authentication is also used to keep data safer. - Interior Gateway Protocol (IGP)
Cisco created the distance vector routing technology known as Interior Gateway Protocol or IGP. The 15-hop restriction that was imposed on RIP was abolished, and IGP was meant to build on the foundations established by RIP to operate more efficiently inside larger linked networks. To evaluate the feasibility of routes inside the network, IGP compares characteristics including bandwidth, latency, dependability, and load. The only parameters utilized by IGP by default are bandwidth and latency. Because IGP transmits updates every 90 seconds and has a maximum hop count of 255, it is perfect for bigger networks. As a result, it can support bigger networks than a protocol like RIP. Because it automatically updates itself whenever a network route changes, IGP is especially popular because it is immune to routing loops. - Open Shortest Path First (OSPF)
In IP networks implementing theShortest Path First (SPF)
algorithm, theOpen Shortest Path First (OSPF)
protocol is a link-state IGP. The shortest path-spanning tree is determined by the SPF routing algorithm to ensure effective packet data delivery. Databases that include information about the network’s surrounding topology are kept up to date by OSPF routers. The information in this database is derived fromLink State Advertisements (LSAs)
transmitted by other routers. LSAs are packets that include information on the number of resources needed to travel a particular path.
When the topology of the network changes, OSPF additionally recalculates network pathways using the Dijkstra method. Due to its ability to validate protocol modifications and safeguard data, this protocol is also fairly secure. Topology changes are monitored, and if a previously utilized route has been blocked, OSPF can recalculate compromised packet paths. - Exterior Gateway Protocol (EGP)
In autonomous systems, gateway hosts that are close to one another utilize a protocol calledExterior Gateway Protocol (EGP)
to communicate. In other words, EGP gives routers a platform to exchange information across several domains. The internet itself is the most well-known example of an EGP. The EGP protocol’s routing table comprises network addresses of nearby devices as well as known routers, route charges, and addresses of nearby routes. The usage of EGP by bigger enterprises was widespread, but BGP has subsequently taken its place.
Because it doesn’t handle multipath networking setups, this protocol has lost popularity. The EGP protocol operates by maintaining a database of neighboring networks and potential routing routes to reach them.
To linked routers, this route data is transmitted. The devices can then update their routing tables and choose better paths throughout the network once it has arrived.
- Enhanced Interior Gateway Routing Protocol (EIGRP)
IP, AppleTalk, and NetWare networks all employ the distance vector routing technology known asEIGRP
orEnhanced Interior Gateway Routing Protocol
. The Cisco proprietary EIGRP protocol was created as a replacement for the original IGRP protocol. A router records the data from the routing tables of its neighbors while utilizing EIGRP. When a change happens, the router alerts its neighbors, and neighbors are asked for a route. As a result, surrounding routers are informed of what is happening in nearby devices.Reliable Transport Protocol (RTP)
and a Diffusing Update Algorithm are only a couple of the characteristics that EIGRP has to help it run as efficiently as possible (DUAL). Routes are revised to hasten the convergence process, increasing the efficiency of packet transfers. - Border Gateway Protocol (BGP)
The Internet’s BGP routing protocol is a distance path vector protocol and is known as theBorder Gateway Protocol
. With a decentralized method of routing, BGP was created to take the role of EGP. To choose the optimum paths for data packet transfers, the BGP Best Path Selection Algorithm is utilized. In the absence of any custom parameters, BGP will choose the routes that take the quickest route to the destination.
However, a lot of administrators opt to switch routing decisions to criteria that suit their requirements. By altering the BGP cost community attribute, the optimum routing path selection process may be changed. Several factors, including weight, local preference, locally produced, path length, origin type, multi-exit discriminator, eBGP over iBGP, IGP metric, router ID, cluster list, and neighbor IP address, can be used by BGP to determine where to route traffic.
Only when anything changes does BGP provide updated routing table information. As a result, topology changes are not automatically discovered, necessitating explicit BGP configuration by the user. BGP protocol may be authenticated to ensure that only authorized routers can securely communicate with one another. - Intermediate System-to-Intermediate System (IS-IS)
IGPP, link-state, and IP routing protocols are all used on the internet to convey IP routing information viaIntermediate System-to-Intermediate System (IS-IS)
. The Dijkstra algorithm has been updated for usage by IS-IS. A network that is IS-IS is made up of a variety of parts, such as end systems (user devices), intermediate systems (routers), regions, and domains.
An IS-IS domain is made up of several areas, which are groupings of routers that are arranged into IS regions. IS’s local Routers are categorized as Layer 1 routers, while Layer 2 routers are those that link segments together. IS-IS utilizesNetwork Service Access Point (NSAP)
andNetwork Entity Title (NET)
addresses as the two forms of network addresses (NET).
Routed Protocols
For router default routing, the routed protocol uses data packets. The data packets are sent through the router’s interfaces using the routed protocol. The optimal path is selected by the routing protocol, and the packets are then sent along it. On the interfaces of the router, routed protocols are defined. A router’s routing table is not updated or maintained by routed protocols. Data packets moving from one network to another are controlled by routed protocols.
Using a router’s exit interface as the destination, routed protocols deliver data packets. The router’s interfaces are where routed protocols are set up. IP, IPv6, Appletalk, and IPX are a few examples of routed protocols. In essence, routed protocols are the addressing scheme of the router’s interfaces. The right exit interface is chosen by the router after determining the destination network of a data packet. Routed protocols make use of the idea of subnetting.
Some networking certification programs make a distinction between routed and routing protocols. Traffic for applications is delivered using a routed protocol. To allow a packet to be forwarded from one network to another, it supplies the necessary addressing information in its network layer or internet layer. The Internet Protocol (IP)
and Internetwork Packet Exchange
are examples of routed protocols (IPX).
Over a routed network, routed protocols can be sent. Today, we don’t commonly consider routed versus unrouted protocols because IP (think of TCP/IP) is the predominant protocol used on the Internet and in most networks. This is due to IP’s nature as a routed protocol. In other words, IP is built to be routed across and via many networks. This is due to the subnet mask’s division of the IP address into a network and a node (host). NetBIOS is an illustration of a protocol that is not routed (unroutable). It functions flawlessly over a small local network (such as the one in your home), but it wouldn’t function properly over a big network connected by dedicated network circuits or the Internet.
- To transmit and receive data packets, end devices employ routed protocols.
- End device addressing is provided through routed protocols.
- Data packets are both enclosed and unveiled by routed protocols.
- The packet is sent to the default gateway by the routed protocol if the target address is not accessible on the local network.
- A routed protocol does not care about the path a packet travels from the default gateway to the remote destination.
- A routed protocol is one like the IP protocol.
Examples of Routed Protocols
AppleTalk, IPX, and IP over LAN are some instances of routed protocols.
Routed Protocols vs Routing protocols
Routed Protocols | Routing protocols |
---|---|
Used to learn, advertise, and maintain routing tables between Layer 3 devices | Used to guide user traffic across routers. Additionally known as network protocols |
To learn and maintain the routing table, the routing protocol routes a routed protocol. | Routing protocols direct directed protocols. |
Data packets are sent and received by end devices via routed protocols. | Routing protocols are used by intermediate routers to find routes and determine the optimum path between a source and a destination. |
End devices can be addressed through routed protocols. | Routes that are found are stored in routing tables by routing protocols. |
Data packets are encapsulated and decapsulated by routed protocols. | Route protocols manage and continually update routing tables. |
The packet is sent to the default gateway by the routed protocol if the target address is not accessible on the local network. | Between routers, routing protocols exchange data. |
Which path a packet travels from the default gateway to the distant target is irrelevant to a routed protocol. | What is contained in a packet is irrelevant to route methods. They are primarily concerned with how to get the packet to its intended location. |
An illustration of a routed protocol is the IP protocol. | Routing protocols include RIP, IGRP, EIGRP, OSPF, and IS-IS. |
Conclusion
- Application traffic is sent using a routed protocol. It offers the proper addressing data at its network or internet layer to enable packet forwarding from one network to another. Instances of routed protocols include
Internet Protocol (IP)
andInternetwork Packet Exchange (IPX)
. - In a network, routing protocols are used to transfer routing information among routers. Each router or Layer 3 device can decide the optimal route to follow to send your traffic when they are aware of the networks linked to the other routers.
- The routing table in routers is built and maintained with the use of routing protocols. Routing protocols are a crucial component of router default routing. The router is informed about the networks linked at each interface using routing protocols. The data packets are not in any manner carried or pushed by the routing methods.
- Routing protocols include
RIP
,RIPv2
,IGRP
,OSPF
, and others. Distance vector, link state, and hybrid protocols are further classifications of routing protocols. All of these routing protocols update each router in the network’s routing table. - Routed protocols are essentially the addressing scheme of a router’s interfaces. A data packet’s destination network is determined by the router, and the data packet is sent to the appropriate exit interface. Subnetting is a concept used in routed protocols.