Open In App

Route Poisoning and Count to infinity problem in Routing

Last Updated : 30 Sep, 2021
Like Article

The main issue with Distance Vector Routing (DVR) protocols is Routing Loops since Bellman-Ford Algorithm cannot prevent loops. This routing loop in the DVR network causes the Count to Infinity Problem. Routing loops usually occur when an interface goes down or two routers send updates at the same time. 

Counting to infinity problem: 

So in this example, the Bellman-Ford algorithm will converge for each router, they will have entries for each other. B will know that it can get to C at a cost of 1, and A will know that it can get to C via B at a cost of 2. 

If the link between B and C is disconnected, then B will know that it can no longer get to C via that link and will remove it from its table. Before it can send any updates it’s possible that it will receive an update from A which will be advertising that it can get to C at a cost of 2. B can get to A at a cost of 1, so it will update a route to C via A at a cost of 3. A will then receive updates from B later and update its cost to 4. They will then go on feeding each other bad information toward infinity which is called as Count to Infinity problem.  

Solution for Count to Infinity problem:-

Route Poisoning: 
When a route fails, distance vector protocols spread the bad news about a route failure by poisoning the route. Route poisoning refers to the practice of advertising a route, but with a special metric value called Infinity. Routers consider routes advertised with an infinite metric to have failed. Each distance vector routing protocol uses the concept of an actual metric value that represents infinity. RIP defines infinity as 16. The main disadvantage of poison reverse is that it can significantly increase the size of routing announcements in certain fairly common network topologies. 

Split horizon: 
If the link between B and C goes down, and B had received a route from A, B could end up using that route via A. A would send the packet right back to B, creating a loop. But according to the Split horizon Rule, Node A does not advertise its route for C (namely A to B to C) back to B. On the surface, this seems redundant since B will never route via node A because the route costs more than the direct route from B to C. 

Consider the following network topology showing Split horizon- 

  • In addition to these, we can also use split horizon with route poisoning were above both techniques will be used combined to achieve efficiency and less increase the size of routing announcements.
  • Split horizon with Poison reverse technique is used by Routing Information Protocol (RIP) to reduce routing loops. Additionally, Holddown timers can be used to avoid the formation of loops. The hold-down timer immediately starts when the router is informed that the attached link is down. Till this time, the router ignores all updates of the down route unless it receives an update from the router of that downed link. During the timer, If the downlink is reachable again, the routing table can be updated.




Similar Reads

How to Add a Static Route to Windows Routing Table?
A routing table is a part of a computer's operating system. It contains the details of the best way to reach different networks, such as your home or office network. The table helps your computer send data to different networks and devices. Windows uses a routing table to determine the best way to send data to a specific destination. A routing tabl
3 min read
Difference between Classful Routing and Classless Routing
Classful Routing: Classful Routing does not import subnet mask. And in this also subnet mask is provided after the route update. In classful routing, subnet mask is same throughout, does not vary for all devices, we can see it in the given picture. In classful routing, VLSM (Variable Length Subnet Mask) is not supported and also CIDR (Classless Int
2 min read
Difference between Distance vector routing and Link State routing
Prerequisite – Classification of Routing Algorithms Distance Vector Routing - It is a dynamic routing algorithm in which each router computes a distance between itself and each possible destination i.e. its immediate neighbors.The router shares its knowledge about the whole network to its neighbors and accordingly updates the table based on its nei
2 min read
What is Routing Loop and How to Avoid Routing Loop?
Routing is a procedure that helps the packet choose an optimal path to reach its destination as soon as possible. For example, a device can be a router, which is used to handle traffic within networks. Optimal network routing methods help maintain your network operating efficiently at help in some ways i.e. faster data access and preventing overloa
4 min read
Unicast Routing - Link State Routing
Prerequisite: Distance Vector Routing, Dijkstra algorithm Unicast means the transmission from a single sender to a single receiver. It is a point-to-point communication between the sender and receiver. There are various unicast protocols such as TCP, HTTP, etc. TCP is the most commonly used unicast protocol. It is a connection-oriented protocol tha
6 min read
ARP Spoofing and ARP Poisoning
In this article, we will learn about the difference between ARP Spoofing and ARP Poisoning. We will explore them and understand the importance of these two malicious attacks in the context of network security. Before diving into the difference between ARP Spoofing and ARP Poisoning let's understand these topics in detail. What is ARP?ARP or Address
5 min read
DNS Spoofing or DNS Cache poisoning
Prerequisite - Domain Name Server Before Discussing DNS Spoofing, First, discuss what is DNS.A Domain Name System (DNS) converts a human-readable name (such as to a numeric IP address. The DNS system responds to one or more IP-address by which your computer connects to a website (such as by using one of the
3 min read
MITM (Man in The Middle) Attack using ARP Poisoning
Introduction :Man In The Middle Attack implies an active attack where the attacker/Hacker creates a connection between the victims and sends messages between them or may capture all the data packets from the victims. In this case, the victims think that they are communicating with each other, but in reality, the malicious attacker/hacker controls t
5 min read
What Is BGP Poisoning?
Border Gateway Protocol (BGP) is an IETF standard which refers to a gateway protocol that controls how packets get routed from one network to another by exchanging routing and its reachability information between the edge routers and also through exchanging routing information between autonomous systems, as networks interact and depend on each othe
5 min read
How to Avoid ARP Poisoning?
Many cyber-attacks take place by exploiting the weaknesses in the network. ARP poisoning is also one such cyber-attack. It exploits the Address Resolution Protocol (ARP) to attack network traffic. Before we go in-depth to understand the concept of ARP poisoning, let us first understand the ARP protocol. ARP Protocol:In earlier days of computer netw
6 min read
Article Tags :
Practice Tags :