25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.4.2 R<strong>IP</strong>-2 limitations<br />

Authentication Type This field defines the remaining 16 bytes of the<br />

authentication entry. A value of 0 indicates no<br />

authentication. A value of two indicates the authentication<br />

data field contains password data.<br />

Authentication Data This field contains a 16-byte password.<br />

Route Tag This field is intended to differentiate between internal <strong>and</strong><br />

external routes. Internal routes are learned through R<strong>IP</strong>-2<br />

within the same network or AS.<br />

Subnet Mask This field contains the subnet mask of the referenced<br />

network.<br />

Next Hop This field contains a recommendation about the next hop<br />

the router should use when sending datagrams to the<br />

referenced network.<br />

R<strong>IP</strong>-2 was developed to address many of the limitations observed in R<strong>IP</strong>-1.<br />

However, the path cost limits <strong>and</strong> slow convergence inherent in R<strong>IP</strong>-1 networks<br />

are also concerns in R<strong>IP</strong>-2 environments.<br />

In addition to these concerns, there are limitations to the R<strong>IP</strong>-2 authentication<br />

process. The R<strong>IP</strong>-2 st<strong>and</strong>ard does not encrypt the authentication password. It is<br />

transmitted in clear text. This makes the network vulnerable to attack by anyone<br />

with direct physical access to the environment.<br />

5.5 R<strong>IP</strong>ng for <strong>IP</strong>v6<br />

R<strong>IP</strong>ng was developed to allow routers within an <strong>IP</strong>v6-based network to exchange<br />

information used to compute routes. It is documented in RFC 2080. We provide<br />

additional information regarding <strong>IP</strong>v6 in 9.1, “<strong>IP</strong>v6 introduction” on page 328.<br />

Like the other protocols in the R<strong>IP</strong> family, R<strong>IP</strong>ng is a distance vector protocol<br />

designed for use within a small autonomous system. R<strong>IP</strong>ng uses the same<br />

algorithms, timers, <strong>and</strong> logic used in R<strong>IP</strong>-2.<br />

R<strong>IP</strong>ng has many of the same limitations inherent in other distance vector<br />

protocols. Path cost restrictions <strong>and</strong> convergence time remain a concern in<br />

R<strong>IP</strong>ng networks.<br />

192 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!