Computing Reviews

RIP :an intra-domain routing protocol
Malkin G., Addison-Wesley Longman Publishing Co., Inc.,Boston, MA,2000. 144 pp.Type:Book
Date Reviewed: 02/01/00

Appropriate illustrations and examples clarify the various concepts presented in this well-written and easy-to-read book. Part 1, “Topologies and Protocols,” which includes chapters 1 through 4, begins with a chapter on network topologies--single-router topology, single path, tree-structured network, single path hierarchical network, multipath topology, and dial-in topologies--each accompanied by appropriate diagrams. The author points out the necessity of these topologies and discusses the advantages and disadvantages associated with each of them. Chapter 2 discusses different layers and their functions in the OSI reference model, explaining the difference between name, address, and route. Common networking terms are defined and discussed. Chapter 3 covers static and dynamic routing. Chapter 4 describes the distance-vector protocol algorithm. This algorithm operates by locally distributing global information. In this case, each router knows the distance and the next hop for every destination. Each router then shares information with each of its neighbors. The author discusses the two most commonly used distance vector routing protocols--routing information protocol (RIP) and interior gateway routing protocol (IGRP)--as well as others, such as XNSRIP, IPXRIP, IGRP, RIP-1, and RIP-2.

Chapters 5 to 7 constitute Part 2, “Configuration and Operation,” which describes the operation of RIP in a networking environment. In chapter 5, the author discusses the configuration parameters of the RIP, some of which are enable/disable, version control, authentication, default routes, and switches and knobs. Chapter 6 discusses system configuration options for a few widely deployed systems, such as the Nortel 5399/RA 8000, the Nortel CVX 1800, and the Cisco 3640. The discussion focuses on system generic parameters, system router parameters, and interfacing routing parameters. In chapter 7, “Operation and Troubleshooting,” the author uses a hypothetical network to illustrate possible problems and the means by which to fix them.

The RIP specification is covered in Part 3, consisting of chapters 8 through 10. Chapter 8 explains the limitations of the RIP-2 protocol (such as maximum diameter, delay, and reliability), and describes the distance vector algorithm and how it adapts to topology changes. Chapter 9 discusses the protocol specification for RIP, with respect to IPv4. Such topics as message formats, addressing considerations, timers, input and output processing, and authentication are covered. Chapter 10 discusses the recent objects of the RIP management information base (MIB), as required by the International Engineering Task Force (IETF), such as global counters, the interface statistics table, the interface configuration table, and the peer table.

The book can be used as a reference by networking professionals or as a textbook in continuing education classes on networking.

Reviewer:  N. K. Swain Review #: CR122741 (0002-0053)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy