BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks

Total Page:16

File Type:pdf, Size:1020Kb

BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks Rochester Institute of Technology RIT Scholar Works Theses 5-8-2018 BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks Nelson Henry Powell III [email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Powell, Nelson Henry III, "BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks" (2018). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks By: Nelson Henry Powell III Committee Members: Dr. Sumita Mishra Dr. Yin Pan Dr. Andres Kwasinski In partial fulfillment of the requirements for the degree of Master of Science in Computing Security Rochester Institute of Technology B. Thomas Golisano College of Computing & Information Sciences Department of Computing Security May 8th, 2018 Acknowledgments I’d like to take this opportunity to thank my wife, my love, Emilia; for putting up with the deployments, active duty, and working two jobs, all while going back to school to complete this degree. None of this would have been possible without your love and support. You are my motivation for being a better me. To my children, Connor and Iliana, for teaching me to look at the world as if it were for the first time; and for all the snuggles, hugs, and kisses that happily kept me from my school work. You are both my favorite and most important accomplishments in my life. May you both achieve more than me and maintain the fresh outlook on life. I’d like to thank my parents for everything. You’ve both been my number one fans all my life. I wouldn’t be at this point in my life without your guidance, wisdom, and love. Dad, your candor, spirituality, and introspection has giving me the tools to strive to be the best man I can be and learn from my mistakes. I most definitely inherited your curiosity and engineering skills. Mom, thank you for all your nurturing and affection throughout my life, for being my sounding board, and being the driving force in my education. And thank you for coming out of retirement and giving that final critical review. I’d like to thank my co-workers, Dr. Michael Kurdziel for all your support and assistance reviewing my thesis, David Weiss for being the first victim to review my paper and provide valuable feedback, and James Hood for helping me with a last minute save that really pulled the paper together. To Dr. Kwasinski, I’ve enjoyed our discussions over the years, both regarding this thesis as well as other research topics. I appreciate all the help you’ve provided throughout this project and look forward to working with you again. Finally, I’d like to thank Dr. Sumita Mishra. You never gave up on me and ensured I was able to achieve my goals. For your insight and guidance throughout this endeavor; and most of all, for your empathy regarding the challenges of balancing work, family, and education. I admire all that you have accomplished and you gave me the reality check of how attainable this thesis is. i Nelson Henry Powell III Abstract The proliferation of autonomous Wireless Sensor Networks (WSN) has spawned research seeking power efficient communications to improve the lifetime of sensor motes. WSNs are characterized by their power limitations, wireless transceivers, and the converge-cast communications techniques. WSN motes use low-power, lossy radio systems deployed in dense, random topologies, working sympathetically to sense and notify a sink node of the detectable information. In an effort to extend the life of battery powered motes, and hence the life of the network, various routing protocols have been suggested in an effort to optimize converge-cast delivery of sensor data. It is well known that reducing the overhead required to perform converge-cast routing and communications reduces the effects of the primary power drain in the mote, the transceiver. Furthermore, WSNs are not well protected; network security costs energy both in computation and in RF transmission. This paper investigates the use of a Mobile Ad-hoc Networking (MANET) routing protocol known as B.A.T.M.A.N. in WSN. This thesis proposes that the features of B.A.T.M.A.N. in the MANET realm may prove beneficial to the WSN routing domain; and that slight modifications to the routing technique may prove beneficial beyond current protocol technologies. The B.A.T.M.A.N. variant will be compared against the contemporary LEACH WSN routing protocol to discern any potential energy savings. ii Nelson Henry Powell III Table of Contents 1 INTRODUCTION ................................................................................................................. 1 1.1 PROPOSED SOLUTION ........................................................................................................ 2 1.2 PURPOSE ........................................................................................................................... 3 2 BATMAN ROUTING PROTOCOL ................................................................................... 4 2.1 PROTOCOL DESIGN ............................................................................................................ 5 2.2 SIMULATING BATMAN .................................................................................................... 7 3 TEST CASES ....................................................................................................................... 11 4 USING NS-3 TO SIMULATE SENSORS ......................................................................... 24 4.1 PHYSICAL RF MODEL REUSE .......................................................................................... 24 4.2 SENSOR MAC MODULE .................................................................................................. 29 4.3 SENSOR HELPER CLASS ................................................................................................... 31 4.4 POWER DISSIPATION ....................................................................................................... 32 5 THE LEACH PROTOCOL ................................................................................................ 33 5.1 BENEFITS OF LEACH...................................................................................................... 35 5.2 CONVERTING NS-2 BASELINE CODE ............................................................................... 36 5.2.1 Assumption 1 ........................................................................................................... 37 5.2.2 Assumption 2 ........................................................................................................... 38 5.2.3 Assumption 3 ........................................................................................................... 38 5.2.4 Assumption 4 ........................................................................................................... 39 5.2.5 Assumption 5 ........................................................................................................... 41 5.2.6 Assumption 6 ........................................................................................................... 42 5.2.7 Assumption 7 ........................................................................................................... 43 5.2.8 Assumption 8 ........................................................................................................... 43 5.2.9 Assumption 9 ........................................................................................................... 45 5.3 A LEACH PROTOCOL SPECIFICATION ............................................................................ 45 5.3.1 State Machine Description ...................................................................................... 46 5.3.1.1 Initialization State ......................................................................................................................................... 47 5.3.1.2 Advertisement State ...................................................................................................................................... 47 5.3.1.3 Cluster Setup Phase ....................................................................................................................................... 49 5.3.1.4 Schedule Creation Phase ............................................................................................................................... 50 5.3.1.5 Data Transmission Phase .............................................................................................................................. 51 5.3.2 Protocol Timing Analysis ........................................................................................ 52 5.4 LEACH RESULTS ........................................................................................................... 58 5.4.1 Network Death Rate ................................................................................................ 59 5.4.2 Number of Cluster Heads per Round ...................................................................... 63 5.4.3 LEACH Packet Rate per Round .............................................................................. 68 5.5 THE REAL LEACH ........................................................................................................
Recommended publications
  • LEAPING TALL BUILDINGS American Comics SETH KUSHNER Pictures
    LEAPING TALL BUILDINGS LEAPING TALL BUILDINGS LEAPING TALL From the minds behind the acclaimed comics website Graphic NYC comes Leaping Tall Buildings, revealing the history of American comics through the stories of comics’ most important and influential creators—and tracing the medium’s journey all the way from its beginnings as junk culture for kids to its current status as legitimate literature and pop culture. Using interview-based essays, stunning portrait photography, and original art through various stages of development, this book delivers an in-depth, personal, behind-the-scenes account of the history of the American comic book. Subjects include: WILL EISNER (The Spirit, A Contract with God) STAN LEE (Marvel Comics) JULES FEIFFER (The Village Voice) Art SPIEGELMAN (Maus, In the Shadow of No Towers) American Comics Origins of The American Comics Origins of The JIM LEE (DC Comics Co-Publisher, Justice League) GRANT MORRISON (Supergods, All-Star Superman) NEIL GAIMAN (American Gods, Sandman) CHRIS WARE SETH KUSHNER IRVING CHRISTOPHER SETH KUSHNER IRVING CHRISTOPHER (Jimmy Corrigan, Acme Novelty Library) PAUL POPE (Batman: Year 100, Battling Boy) And many more, from the earliest cartoonists pictures pictures to the latest graphic novelists! words words This PDF is NOT the entire book LEAPING TALL BUILDINGS: The Origins of American Comics Photographs by Seth Kushner Text and interviews by Christopher Irving Published by To be released: May 2012 This PDF of Leaping Tall Buildings is only a preview and an uncorrected proof . Lifting
    [Show full text]
  • A Comprehensive Study of Routing Protocols Performance with Topological Changes in the Networks Mohsin Masood Mohamed Abuhelala Prof
    A comprehensive study of Routing Protocols Performance with Topological Changes in the Networks Mohsin Masood Mohamed Abuhelala Prof. Ivan Glesk Electronics & Electrical Electronics & Electrical Electronics & Electrical Engineering Department Engineering Department Engineering Department University of Strathclyde University of Strathclyde University of Strathclyde Glasgow, Scotland, UK Glasgow, Scotland, UK Glasgow, Scotland, UK mohsin.masood mohamed.abuhelala ivan.glesk @strath.ac.uk @strath.ac.uk @strath.ac.uk ABSTRACT different topologies and compare routing protocols, but no In the modern communication networks, where increasing work has been considered about the changing user demands and advance applications become a functionality of these routing protocols with the topology challenging task for handling user traffic. Routing with real-time network limitations. such as topological protocols have got a significant role not only to route user change, network congestions, and so on. Hence without data across the network but also to reduce congestion with considering the topology with different network scenarios less complexity. Dynamic routing protocols such as one cannot fully understand and make right comparison OSPF, RIP and EIGRP were introduced to handle among any routing protocols. different networks with various traffic environments. Each This paper will give a comprehensive literature review of of these protocols has its own routing process which each routing protocol. Such as how each protocol (OSPF, makes it different and versatile from the other. The paper RIP or EIGRP) does convergence activity with any change will focus on presenting the routing process of each in the network. Two experiments are conducted that are protocol and will compare its performance with the other.
    [Show full text]
  • British Library Conference Centre
    The Fifth International Graphic Novel and Comics Conference 18 – 20 July 2014 British Library Conference Centre In partnership with Studies in Comics and the Journal of Graphic Novels and Comics Production and Institution (Friday 18 July 2014) Opening address from British Library exhibition curator Paul Gravett (Escape, Comica) Keynote talk from Pascal Lefèvre (LUCA School of Arts, Belgium): The Gatekeeping at Two Main Belgian Comics Publishers, Dupuis and Lombard, at a Time of Transition Evening event with Posy Simmonds (Tamara Drewe, Gemma Bovary) and Steve Bell (Maggie’s Farm, Lord God Almighty) Sedition and Anarchy (Saturday 19 July 2014) Keynote talk from Scott Bukatman (Stanford University, USA): The Problem of Appearance in Goya’s Los Capichos, and Mignola’s Hellboy Guest speakers Mike Carey (Lucifer, The Unwritten, The Girl With All The Gifts), David Baillie (2000AD, Judge Dredd, Portal666) and Mike Perkins (Captain America, The Stand) Comics, Culture and Education (Sunday 20 July 2014) Talk from Ariel Kahn (Roehampton University, London): Sex, Death and Surrealism: A Lacanian Reading of the Short Fiction of Koren Shadmi and Rutu Modan Roundtable discussion on the future of comics scholarship and institutional support 2 SCHEDULE 3 FRIDAY 18 JULY 2014 PRODUCTION AND INSTITUTION 09.00-09.30 Registration 09.30-10.00 Welcome (Auditorium) Kristian Jensen and Adrian Edwards, British Library 10.00-10.30 Opening Speech (Auditorium) Paul Gravett, Comica 10.30-11.30 Keynote Address (Auditorium) Pascal Lefèvre – The Gatekeeping at
    [Show full text]
  • Download Sin City Volume 5 Family Values 3Rd Edition Pdf Ebook by Frank Miller
    Download Sin City Volume 5 Family Values 3rd Edition pdf ebook by Frank Miller You're readind a review Sin City Volume 5 Family Values 3rd Edition ebook. To get able to download Sin City Volume 5 Family Values 3rd Edition you need to fill in the form and provide your personal information. Book available on iOS, Android, PC & Mac. Gather your favorite books in your digital library. * *Please Note: We cannot guarantee the availability of this book on an database site. Ebook Details: Original title: Sin City Volume 5: Family Values (3rd Edition) 128 pages Publisher: Dark Horse Books; 2nd Revised ed. edition (November 9, 2010) Language: English ISBN-10: 159307297X ISBN-13: 978-1593072971 Product Dimensions:6 x 0.4 x 9 inches File Format: PDF File Size: 3847 kB Description: Frank Millers first—ever original graphic novel is one of Sin Citys nastiest yarns to date! Starring fan—favorite characters Dwight and Miho, this newly redesigned edition sports a brand—new cover by Miller, some of his first comics art in years!Theres a kind of debt you cant ever pay off, not entirely. And thats the kind of debt Dwight owes Gail.... Review: Family Values is the 5th book in the fantastic Sin City series of graphic novels written and illustrated by mad comic book genius Frank Miller. Its a brief and uncharacteristically straightforward jaunt starring Basin Citys premiere anti-hero Dwight and the biggest/smallest bada$z ever to hit the pulp, deadly little Miho. Sin City began once Miller... Ebook File Tags: sin city pdf, yellow bastard pdf, frank miller pdf,
    [Show full text]
  • Routing As a Service
    Routing as a Service Karthik Lakshminarayanan Ion Stoica Scott Shenker Jennifer Rexford University of California, Berkeley Princeton University Abstract configuration, making it difficult to offer meaningful service- level agreements (SLAs) to customers or to identify the AS In Internet routing, there is a fundamental tussle between the responsible for end-to-end performance problems. end users who want control over the end-to-end paths and the An ISP's customers, such as end users, enterprise net- Autonomous Systems (ASes) who want control over the flow works, and smaller ISPs, have even less control over the se- of traffic through their infrastructure. To resolve this tussle lection of end-to-end paths. By connecting to more than one and offer flexible routing control across multiple routing do- ISPs, an enterprise can select from multiple paths [2]; how- mains, we argue that customized route computation should ever, the customer controls only the first hop for outbound be offered as a service by third-party providers. Outsourcing traffic and has (at best) crude influence on incoming traffic. specialized route computation allows different path-selection Yet, some customers need more control over the end-to-end mechanisms to coexist, and evolve over time. path, or at least its properties, to satisfy performance and pol- icy goals. For example, a customer might not want his Web 1 Introduction traffic forwarded through an AS that filters packets based on Interdomain routing has long been based on three pillars: their contents. Alternatively, a customer might need to discard traffic from certain sources to block denial-of-service attacks • Local control: ASes have complete control over routing or protect access to a server storing sensitive data.
    [Show full text]
  • Routing Basics
    CHAPTER 5 Chapter Goals • Learn the basics of routing protocols. • Learn the differences between link-state and distance vector routing protocols. • Learn about the metrics used by routing protocols to determine path selection. • Learn the basics of how data travels from end stations through intermediate stations and on to the destination end station. • Understand the difference between routed protocols and routing protocols. Routing Basics This chapter introduces the underlying concepts widely used in routing protocols. Topics summarized here include routing protocol components and algorithms. In addition, the role of routing protocols is briefly contrasted with the role of routed or network protocols. Subsequent chapters in Part VII, “Routing Protocols,” address specific routing protocols in more detail, while the network protocols that use routing protocols are discussed in Part VI, “Network Protocols.” What Is Routing? Routing is the act of moving information across an internetwork from a source to a destination. Along the way, at least one intermediate node typically is encountered. Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer. The primary difference between the two is that bridging occurs at Layer 2 (the link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways. The topic of routing has been covered in computer science literature for more than two decades, but routing achieved commercial popularity as late as the mid-1980s.
    [Show full text]
  • (“Spider-Man”) Cr
    PRIVILEGED ATTORNEY-CLIENT COMMUNICATION EXECUTIVE SUMMARY SECOND AMENDED AND RESTATED LICENSE AGREEMENT (“SPIDER-MAN”) CREATIVE ISSUES This memo summarizes certain terms of the Second Amended and Restated License Agreement (“Spider-Man”) between SPE and Marvel, effective September 15, 2011 (the “Agreement”). 1. CHARACTERS AND OTHER CREATIVE ELEMENTS: a. Exclusive to SPE: . The “Spider-Man” character, “Peter Parker” and essentially all existing and future alternate versions, iterations, and alter egos of the “Spider- Man” character. All fictional characters, places structures, businesses, groups, or other entities or elements (collectively, “Creative Elements”) that are listed on the attached Schedule 6. All existing (as of 9/15/11) characters and other Creative Elements that are “Primarily Associated With” Spider-Man but were “Inadvertently Omitted” from Schedule 6. The Agreement contains detailed definitions of these terms, but they basically conform to common-sense meanings. If SPE and Marvel cannot agree as to whether a character or other creative element is Primarily Associated With Spider-Man and/or were Inadvertently Omitted, the matter will be determined by expedited arbitration. All newly created (after 9/15/11) characters and other Creative Elements that first appear in a work that is titled or branded with “Spider-Man” or in which “Spider-Man” is the main protagonist (but not including any team- up work featuring both Spider-Man and another major Marvel character that isn’t part of the Spider-Man Property). The origin story, secret identities, alter egos, powers, costumes, equipment, and other elements of, or associated with, Spider-Man and the other Creative Elements covered above. The story lines of individual Marvel comic books and other works in which Spider-Man or other characters granted to SPE appear, subject to Marvel confirming ownership.
    [Show full text]
  • Routing Tables
    Routing Tables A routing table is a grouping of information stored on a networked computer or network router that includes a list of routes to various network destinations. The data is normally stored in a database table and in more advanced configurations includes performance metrics associated with the routes stored in the table. Additional information stored in the table will include the network topology closest to the router. Although a routing table is routinely updated by network routing protocols, static entries can be made through manual action on the part of a network administrator. How Does a Routing Table Work? Routing tables work similar to how the post office delivers mail. When a network node on the Internet or a local network needs to send information to another node, it first requires a general idea of where to send the information. If the destination node or address is not connected directly to the network node, then the information has to be sent via other network nodes. In order to save resources, most local area network nodes will not maintain a complex routing table. Instead, they will send IP packets of information to a local network gateway. The gateway maintains the primary routing table for the network and will send the data packet to the desired location. In order to maintain a record of how to route information, the gateway will use a routing table that keeps track of the appropriate destination for outgoing data packets. All routing tables maintain routing table lists for the reachable destinations from the router’s location.
    [Show full text]
  • Advanced Routing – Cisco (4 Cr.) Course Description
    NVCC COLLEGE-WIDE COURSE CONTENT SUMMARY ITN 250 - Advanced Routing – Cisco (4 cr.) Course Description ITN 250 - Includes instruction focusing on the characteristics of various Routing protocols used in the TCP/IP networking environment, static routing, OSPF, IGRP, EIGRP, IS-IS, BGP, advanced IP addressing, and security. Course content also examines various strategies for optimizing network routing performance. Lecture 4 hours per week. Recommended Pre-requisites Student should: be a Cisco Certified Network Associate (CCNA), or, have successfully completed ITN157 WAN Technologies – Cisco, or have successfully completed TEL251 Internetworking 4, or, have successfully completed CCNA Semester 4 training at a Cisco Network Academy, or, have instructor’s permission. Course Objectives Upon completion of this course, the student will be able to: Selecting and configuring scalable IP addresses Configure the RIP version 2 routing protocol Configure the EIGRP routing protocol Configure Open Shortest Path First protocol in a multi-area environment Configure the IS-IS routing protocol Develop route filtering and policy routing Configure route redistribution Describe the Border Gateway Protocol (BGP) Configure and troubleshoot the BGP routing protocol Course Content Overview of Scalable Internetworks Advanced IP Addressing Management Routing Overview Routing Information Protocol Version 2 EIGRP OSPF IS-IS Route Optimization BGP Student Learning Outcomes Selecting and configuring scalable IP addresses Understand the issues of IP address
    [Show full text]
  • Introduction to Wifi Networking
    Introduction to WiFi Networking Marco Zennaro Ermanno Pietrosemoli Goals The goal of this lecture is to introduce: ‣ 802.11 family of radio protocols ‣ 802.11 radio channels ‣ Wireless network topologies ‣ WiFi modes of operation ‣ Strategies for routing network traffic 2 ISM / UNII bands Most commercial wireless devices (mobile phones, television, radio, etc.) use licensed radio frequencies. Large organizations pay licensing fees for the right to use those radio frequencies. WiFi uses unlicensed spectrum. License fees are not usually required to operate WiFi equipment. The Industrial, Scientific and Medical (ISM) bands allow for unlicensed use of 2.4-2.5 GHz, 5.8 GHz, and many other (non-WiFi) frequencies. 3 802.11 family 4 802.11 family 5 Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. • 802.11a supports up to 54 Mbps using the 5 GHz unlicensed bands. • 802.11b supports up to 11 Mbps using the 2.4 GHz unlicensed band. • 802.11g supports up to 54 Mbps using the 2.4 GHz unlicensed band. • 802.11n supports up to 600 Mbps using the 2.4 GHz and 5 GHz unlicensed bands. • 802.16 (WiMAX) is not 802.11 WiFi! It is a completely different technology that uses a variety of licensed and unlicensed frequencies. 6 Compatibility of standards AP 802.11a 802.11b 802.11g 802.11n 802.16 Yes C 802.11a Yes @5GHz L Yes Yes 802.11b Yes I (slower) @2.4GHz Yes Yes E 802.11g Yes (slower) @2.4GHz N Yes Yes Yes 802.11n Yes T @5GHz @2.4GHz @2.4GHz 802.16 Yes 7 IEEE 802.11 AC Improved performance by means of: • Two or up to 8 Spatial streams (MIMO) • Higher order modulation types (up to 256 QAM) • Wider Channels bandwidth (up to 160 MHz) 8 IEEE 802.11 AC: MIMO 9 IEEE 802.11 AC, 256 constellation 1 0 Data rates Note that the “data rates” quoted in the WiFi specifications refer to the raw radio symbol rate, not the actual TCP/IP throughput rate.
    [Show full text]
  • “The Superman Exists, and He Is American”: Graphic Novel Film Adaptations and Masculine Heroism in Post-9/11 Culture
    Connecticut College Digital Commons @ Connecticut College Film Studies Honors Papers Film Studies Program 2010 “The upS erman Exists, and He is American”: Graphic Novel Film Adaptations and Masculine Heroism in Post-9/11 Culture Richard Charles Abate Connecticut College, [email protected] Follow this and additional works at: http://digitalcommons.conncoll.edu/filmhp Part of the American Film Studies Commons, American Popular Culture Commons, and the Film and Media Studies Commons Recommended Citation Abate, Richard Charles, "“The uS perman Exists, and He is American”: Graphic Novel Film Adaptations and Masculine Heroism in Post-9/11 Culture" (2010). Film Studies Honors Papers. 2. http://digitalcommons.conncoll.edu/filmhp/2 This Honors Paper is brought to you for free and open access by the Film Studies Program at Digital Commons @ Connecticut College. It has been accepted for inclusion in Film Studies Honors Papers by an authorized administrator of Digital Commons @ Connecticut College. For more information, please contact [email protected]. The views expressed in this paper are solely those of the author. “The Superman Exists, and He is American”: Graphic Novel Film Adaptations and Masculine Heroism in Post-9/11 Culture An Honors Thesis presented by Richard Charles Abate to The Department of Film Studies in partial fulfillment of the requirements for Honors in the Major Field Connecticut College New London, Connecticut May 2010 Acknowledgements I would like to thank Professor Nina Martin for advising me throughout this project and for introducing me to the wonderful world of film theory. I would also like to thank my readers, Professor Simon Hay and Professor David Greven, for taking the time to read over drafts of this thesis and for their invaluable comments and constructive criticisms.
    [Show full text]
  • RIP: Routing Information Protocol a Routing Protocol Based on the Distance-Vector Algorithm
    Laboratory 6 RIP: Routing Information Protocol A Routing Protocol Based on the Distance-Vector Algorithm Objective The objective of this lab is to configure and analyze the performance of the Routing Information Protocol (RIP) model. Overview A router in the network needs to be able to look at a packet’s destination address and then determine which of the output ports is the best choice to get the packet to that address. The router makes this decision by consulting a forwarding table. The fundamental problem of routing is: How do routers acquire the information in their forwarding tables? Routing algorithms are required to build the routing tables and hence forwarding tables. The basic problem of routing is to find the lowest-cost path between any two nodes, where the cost of a path equals the sum of the costs of all the edges that make up the path. Routing is achieved in most practical networks by running routing protocols among the nodes. The protocols provide a distributed, dynamic way to solve the problem of finding the lowest-cost path in the presence of link and node failures and changing edge costs. One of the main classes of routing algorithms is the distance-vector algorithm. Each node constructs a vector containing the distances (costs) to all other nodes and distributes that vector to its immediate neighbors. RIP is the canonical example of a routing protocol built on the distance-vector algorithm. Routers running RIP send their advertisements regularly (e.g., every 30 seconds). A router also sends an update message whenever a triggered update from another router causes it to change its routing table.
    [Show full text]