Answer:
Minimization of implementation affect decisions to implement RIP:
- Router information protocol works on several design principles. One of which is less implementation. It uses distance as a vector and uses hop count to find out the best path to travel from source to destination.
- It is very simple and easy to understand.
- It reduces the number of implementations
- RIP is considered best for internetwork routing.
- Due to fewer implementations, it is not suitable for a large network with different paths.
- RIP will work better when it is used on a small network that changes frequently.
- One uses RIP timers as the entire routing table is sent after every 30 seconds by default.
- Update intervals can be forced on the routers to update more or less frequently.
- All routers participating in the RIP routing process are marked with the same update interval making the implementation time minimal.
- It is not good for large networks as if a router does not receive an advertisement in 180 seconds, It will mark that route as unreachable
- The time will be expired and removed by the flush timer.
Vulnerability in minimization of implementation:
- New routes can be added by advertising that route with a spoofed RIP message.
- Existing routes can be deleted by advertising a new route with a better metric as compared to the existing route.
- A DoS can be created and all traffic will be redirected to the non-existent router which will even issue ICMP redirects to reroute existing traffic to the black hole.
Step-by-step explanation
Adversarial mindset affecting decisions:
- RIP provides dynamic routing through its various design principles including minimization of implementation.
- Implementation is minimized as it will do all the routing itself.
- For small internetworks, it is a practical and viable dynamic routing protocol solution.
- It will take more time to converge the failures.
- This Mindset will affect the decision as the summarized routes are processed first.
- Child routes on the chosen routes are skipped to reduce the required processing time.
Vulnerability:
- As the implementation is minimized, it overlooks the child routes which can become a threat for the data packets sent over the route having child routes.
- Any attack can be made by the child routes.
REFERENCE:
(2021). Retrieved 5 April 2021, from https://support.huawei.com/enterprise/en/doc/EDOC1000142059/9f0f61f8/rip-principles