EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Routing Protocols Types

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Network Security Tutorial » Routing Protocols Types

Routing Protocols Types

Introduction to Routing Protocols

Routing protocol defines how routers coordinate with each other and distribute information that allows them to choose routes between any two nodes on a computer network. In the basics of networking, a routing protocol is a key factor in today’s world of communication. The protocol is a set of rules for communication and routing is the process of choosing a path for that communication. Thus, Routing Protocol refers to the set of rules used for choosing paths for data transmission in a network.

These rules, i.e. routing protocols are followed by devices such as routers to communicate with each other and transfer incoming or outgoing data from or to devices. Every router has a pre-information of networks that are attached to it which is then shared by the routing protocol with all the devices on the network which makes the information of the whole topology of the network available to the routing protocol. This operation procedure is a factor used to categorize routing protocols further.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

Types of Routing Protocols

Routing protocols are categorized into different groups as per their uses and other qualities such as:

  • Purpose
  • Operation (types of the path chosen, no. of routers falling in between the communication, etc.)
  • Behavior

The major classes of routing protocols which are further categorized into sub-categories:

  • Interior Gateway Protocols (Type 1 & Type 2)
  • Exterior Gateway Protocols

1. Interior Gateway Protocols

Interior Gateway Protocols share routing information within a network controlled by a single administration. Types:

  1. Distance vector routing protocols
  2. Link-state routing protocols
Distance Vector Protocols
  • This is categorized under the class “Interior Gateway Protocol Type 1”.
  • It is a simple routing protocol as compared to other routing protocols
  • These protocols determine routers based on distances. The best route for data is chosen based on distances.
  • The distance is measured by the no. of routers a data packet has to go to one by one. One router is counted as one hop.
  • This protocol mandates that a router should inform all its neighboring routes regularly about the network topology or arrangement.
  • Complete routing tables are shared. duplicate copies of routing tables are shared with the neighboring routers to keep the neighboring routers update with the latest information and changes.
  • The original algorithm of ARPANET was a distance-vector algorithm
  • The version 1 of RIP (Routing Information Protocol) i.e. RIPv1 is the oldest distance-vector protocol and came into existence in 1988
  • RIP can be used in local area networks (LANs) as it is an interior gateway protocol.
  • For wide-area networks
  • Examples of Distance vector protocols are Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), EIGRP (Enhanced Interior Gateway Routing Protocol)

Problem:

  • Each router has to propagate that new information to its neighboring routers, which takes a long time for all routers to have a current accurate view of the network.
  • Frequently the information of network updates is exchanged which is a problem as it creates huge network traffic thus consuming large network bandwidths.
  • These protocols use fixed-length subnet masks that are not scalable.
Link State Protocols
  • This is a complex routing protocol in which every router shares information with other routers about the connection of other networks and the measurements used to reach the other networks in order to determine the best path.
  • These are categorized under the class “Interior Gateway Protocol Type 2”.
  • Each router in the network performs the link-state protocol
  • Each router creates a graph (map of the network connectivity) which shows which router is connected to which router and device.
  • Each router or node individually and independently calculates the next best logical path from itself for data transmission to every possible destination. This collection of best paths then forms the routing table of each node.
  • Unlike Distance vector protocols, in link-state protocols, only the connectivity-related information is shared between routers and not the whole routing table
  • No continuous broadcasting of routing tables is done
  • Only when a change is detected in the network then only the link-state protocol router informs its neighboring routers.
  • Examples of Link state protocols are Open Shortest Path First (OSPF), IS-IS (Intermediate System to Intermediate System)

2. Exterior Gateway Protocols

These are routing protocols used on the Internet for exchanging routing information between autonomous systems like Path Vector Routing Protocol. Big MNCs use EGPs to connect with each other. As far as now only Border Gateway Protocol has been considered as a useful and possible Exterior Gateway Protocol and “Internet” uses BGP as its routing protocol. The exterior routers and border routers on the “Internet” use BGP. These protocols use many factors to determine the shortest path but not the hops i.e. no. of routers.

Popular Course in this category
ASP.NET Training (8 Courses, 19 Projects)8 Online Courses | 19 Hands-on Projects | 105+ Hours | Verifiable Certificate of Completion | Lifetime Access
4.5 (6,060 ratings)
Course Price

View Course

Related Courses
CDN Training (2 Courses)OSPF Training Program (2 Courses)Penetration Testing Training Program (2 Courses)
  • BGP is used in wide area networks (WANs).
  • BGP uses TCP (Transmission Control Protocol) to share information between routers.
  • BGP is used by telecommunication companies and internet service providers (ISPs).

Conclusion

We can conclude that routing protocol is a term that cannot be ignored or avoided as without it the communication of devices or data transfer is impossible. Routing protocol has been found after much research and studies which has proved as a great help in networking and communication. There are many further studies that test the types of protocols and yield that which type of protocol is best like some say EGP is best etc.

Recommended Articles

This is a guide to Routing Protocols Types. Here we discuss the Introduction and Types of Routing Protocols which include, Interior Gateway Protocols, Exterior Gateway Protocols. You may also look at the following articles to learn more –

  1. Dynamic Routing Protocol
  2. Protocol Testing
  3. Types of Network devices
  4. Star Network Topology 

ASP.NET Training (8 Courses, 19 Projects)

8 Online Courses

19 Hands-on Projects

105+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - ASP.NET Training (8 Courses, 19 Projects) Learn More