Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
c 2001 Kluwer Academic Publishers. Printed in the Netherlands.
network
d destination network
1,2,3... distance metrics
d,2 router with distance 2 to the destination network d
source router with distance 1 to the destination network d
d,1
forwarding direction
Figure 1. Legend for the network/router diagrams
− triggered updates
− split horizon
− poison reverse
− path hold-down
The RIP-MTI algorithm also makes use of the other concepts for
suppressing counting to infinity. RIP-MTI routers must use split hori-
zon and triggered updates, may use poison reverse, and of course must
use MTI, which can be seen as a very fast conditional path hold
down for wrong alternative routing updates. The further explanation
is based on link costs of 1 – it will be shown in section 3.5 how a link
metric with arbitrary costs can be used as well.
Two cases of loop appearances may be considered:
First case loops: router i accepts (fig.4a) the routing update from
interface A concerning network d, because it detects no source
loop (the same applies to interface D)
3.1. Definitions
r2 r1 r2 r1 r2 r1
d, 2 d, 2
B C B C B C
i d, 2 i d, 2 i
A D A D A D
accepted
first
d, 1 d, -
case
d d d
d, 1 d, 1 d, 1 d, 1 d, - d, 1
r3 r4 r3 r4 r3 r4
d, 3
d, 3 d, 3 d, 3 d, - d, 3 d, 4
r2 r1 r2 r1 r2 second r1
case
d, 4
d, -
B C B C B C
rejected
d, - i d, - i d, - i
A D A D A D
d d d
d, - d, 1 d, - d, 1 d, - d, 1
r3 r4 r3 r4 r3 r4
able via interface A and via interface B. Then these two paths can be
combined into one composite path:
i,d,i
PA,B = (r1 = i, A, ..., d, ..., sL = B, rL+1 = i)
mincyciA,B = min{cyci,d,i
A,B for all destinations d}
It is crucial for this definition that cycles are the base for minimal
return routes. Imagine the minimal return route to be the shortest
possible route of a conventional message leaving the source router i via
the interface A and returning after minmA forwardings to the source
router i.
The existence of two distinct routes from one router to the same des-
tination
− a simple direct route and
− a composite route
is a necessary, but not sufficient criterion for a cycle.
Therefore all composite back routes with a source loop are shown
i,d,i
in one table (fig.5). The source loop corresponds to a path PA,B which
passes through the source router i two times:
− it leaves router i over interface A;
− it returns to router i via an arbitrary interface (A,B or any)
− it leaves the router i again via an arbitrary interface (A,B or any)
and
− it finally returns to router i via interface B
A source loop can return and leave a router via nine different network
combinations, because there are three interface possibilities to return
to and leave from the router, thus 32 network combinations are pos-
sible at all. Fig.5 provides a complete listing of all source loops using a
rubber band tightly connected to the interfaces A and B, entering and
leaving the router using all possible interface combinations. In fig.5, the
route mi,d
A was chosen to contain the source loop. For all nine cases the
path leaves router i via interface A first and finally enters router i via
interface B at the end. The nine combinations are constituted by the
the arbitrary choice of the:
"first return"
A-A A-B A - any
"second leave"
router
any-Interface
network
A B
source
any-Interface router
router
network
network d
Figure 5. A enumeration of all nine possible source loops within a composite back
route
The first condition is stated by theorem 1, which has been proven al-
ready. The second condition can be proven by the following observation:
Counting to infinity behavior (C) can be defined as: C is initiated, if
reachability information of a destination subnetwork d runs repeatedly
inside a cycle until the advertised distance d reaches the predefined
maximum value. The route to d contains a loop when it enters the
cycle for the second time. Hence, if routing loops are avoided, there is
no counting to infinity behavior.
That means that the interface A (or B) could serve as in and out
interface in the path PAi,d . These composite back routes are avoided by
the source router i which applies the split horizon rule (A router
does not send outgoing routing updates back to the router from which
it has learned this route). In a path
r1 r2
mi,d i i,d
A < minmA + mB
THEOREM 6. (Corollary):
Let mi,d,i i,d i,d
A,B be a composite back route metric and mA ≥ mB . All routers
use the split horizon rule. If
a) minmiA + minmiB > mi,d,iA,B (to avoid X combinations) and
b) minmiA > mi,d i,d
A − mB (to avoid Y combinations),
then mi,d,i i,d,i
A,B is a cycle cycA,B and therefore neither a source loop nor a
routing loop and no counting to infinity can arise.
most of the cases it is possible to use the composite back route metric
mi,d,i
A,B as upper bound of minmA and minmB . Only in the case of a
Y combination can the composite back route metric not be used as an
upper bound of minmB where mi,d i,d
A ≥ mB .
The problem with using a non-minimum hop metric is, that the formula
for calculating composite back routes (mi,d,i i,d i,d
A,B = mA + mB − 1 = L)
can be used for minimum hop metrics only. One way to overcome this
failure is to extend the routing update message and the routing tables,
with the hop count metric as additional information besides the actual
metric. The RIP-MTI algorithm is executed with this hop count met-
ric only calculating minimal cycles and minimal return routes using
the previously described method. In this case, extending the routing
protocol cannot be avoided.
4. SIMULATING RIP-MTI
1 2
router 1 router 2
192.100.0.0 192.100.20.0
2 192.100.10.0 1
1 2
router 3
1 2
192.100.0.0 192.100.20.0
3 4 192.100.60.0
router 3
192.100.30.0 192.100.40.0
1 2
1 2
192.100.30.0 2 192.100.50.0 1 3
router 4 router 5
700 670
number of routing updates
644 658
638
RIP-MTI
600
RIP
RIP (Infinity=31)
RIP (Infinity=61)
500
400
360
324
300 294 302 304
300
205
200 180 176
153 162
144
100 76 72
48 46 33
18 12 26
0
321 132 45312 54321 12543 13452
router order
Fig.9 shows how many routing updates were needed in the network
in a counting to infinity situation to reach convergence using RIP-MTI
compared to RIP with infinity set to 16, 31 and 61. The numbered
labels on connectors depict two temporary orders in model 1 and four
temporary orders in model 2.
RIP-MTI accelerates convergence by 73 to 83% compared with the
original RIP algorithm. When increasing infinity first to 31 and then to
61 improvements of 85-91% and 92-95% respectively where seen. This is
because an increased value for infinity does not influence convergence in
RIP-MTI. These factors can be transferred to the reduction of network
traffic and to the duration until convergence, because they depend on
the number of routing updates needed.
5. CONCLUSIONS
This paper showed that source loops are the cause of routing loops,
which are responsible for counting to infinity. Therefore two condi-
tions to avoid source loops were given and proven. These conditions
were integrated into the new RIP-MTI algorithm. RIP-MTI is storing
information about cycles between every pair of local interfaces of a
router, which is a new and unique approach. Finally it has been shown
by simulation that RIP-MTI does exactly what has been proven in
theory: routing loops and counting to infinity behavior are eliminated
resulting in much faster convergence with minimal demand for addi-
tional memory and processing power. With RIP-MTI a new, simple
and robust routing algorithm is given which scales better than other
routing algorithms (OSPF and BGP). This gives rise to develop new
intra- and interdomain routing algorithms.
References
1. R. Braden and J. Postel, Requirements for internet gateways, IETF RFC 1009,
USC/Information Sciences Institute, June 1987
2. C. Cheng, R. Riley, S. P. R. Kumar and J .J. Garcia-Luna-Aceves, A loop-
free extended bellman-ford routing protocol without bouncing effect, in ACM
SIGCOMM Symposium Commun. Arch. and Protocols, pp. 224-236, Austin,
Texas
3. J. J. Garcia-Luna-Aceves, A unified approach to loop-free routing using dis-
tance vectors or link states, in ACM SIGCOMM Symposium Commun. Arch.
and Protocols, pp. 212-223, Austin, Texas, Sept. 1989
4. Garcia-Luna-Aceves (1993), Loop-free routing using diffusing computations,
IEEE/ACM Transactions on Networking 1, No. 1, pp. 130-141
5. J. M. Jaffe and F. M. Moss, A responsive routing algorithm for computer
networks, IEEE Transactions on Communications COM-30, No. 7, pp. 1785-
1762, July 1982
6. O. Kandel, RIP-MTI – Simulation des erweiterten RIP-Algorithmus, Diploma
thesis, University of Koblenz-Landau, Institute for Computer Science,
Rheinau 1, 56075 Koblenz, Germany, July 2000 (German), Java Applet:
http://www.uni-koblenz.de/∼steigner/ripmti/
7. B. Rajagopalan and M. Faiman, A new responsive distributed shortest path
routing algorithm, in ACM SIGCOMM Symposium Commun. Arch. and
Protocols, pp. 237-246, Austin, Texas, Sept. 1989
8. G. C. Sackett and C. Metz, ATM and multiprotocol networking, McGraw-Hill,
1996
9. [9] A. J. Schmid, Solution for the counting to infinity problem of distance
vector routing, Research report 7-98, University of Koblenz-Landau, Institute
for Computer Science, Rheinau 1, 56075 Koblenz, Germany, June 1998, URL
http://www.uni-koblenz.de/fb4/publikationen/gelbereihe/RR-7-98.ps.gz