Pages

Braniac Bhai Headline Animator

Search This Blog

May 31, 2011

Task Manager Fix

Task Manager Fix


Problem:

Task manager is grayed out from start bar & Ctrl+Alt+Del and it won’t even work from the run prompt.

If you running XP Home so you don’t have the gpedit.msc.


Solve:

Remove virus ntdetec1.exe will solve the problem.

To remove it, run the following commands at the command prompt:

taskkill /im cmrss.exe
taskkill /im ntdetec1.exe
taskkill /im shell32.exe

Now, make sure you are in the root drive of your system. For example, if your Windows in installed in C:, make sure your prompt

shows C:\>

Now, run the command...

attrib ntdetec1 -s -h /s /d


This will make the folder visible in explorer. Now you can Shift+Delete the folder from explorer. Also, you might need to delete the following registry key (if it is present)

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\ Run\”winlogon” =

“C:\ntdetec1\run.exe”


Problem:

It is due to some kind of virus/ trojan activity which normally disables the task manager. Now due to this problem when ever the user press alt+ctrl+del to launch windows task manager it gives an error saying “Task Manager is being disabled by your administrator”.


Solution:


To Enable the Disabled Task Manager on your system

1. Press window key+r to show run prompt

2. Follow the following steps

1. Enter gpedit.msc in the run prompt and click OK

2. In the Group Policy settings window

3. Select User Configuration

4. Select Administrative Templates

5. Select System

6. Select Ctrl+Alt+Delete options
7. Select Remove Task Manager

8. Double-click the Remove Task Manager option’.

9. Set the property of this item as disabled.

For Those who use Windows XP Home Edition can use the registry to enable Task Manager

1. open start >> run and type regedit

2. Navigate to the following path:

Hive: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

3. You will find a registry key with name DisableTaskMgr of type: REG_DWORD

4. Double click the key with and set the Value to 0

5. Exit the registry and restart to see the effect.

Useful Windows XP Commands

Useful Windows XP Commands



I found these shortcut quiet helpful when I want to run a Windows application. The reason to collect all of these commands because sometimes I need a longer time just to find the shortcut on the menu bar.

The Run Command prompt in XP simplifies those long process by allowing us to run application only by typing the command in the box.

Go to Start Menu > Run… and type in the command to run the application you need. However remembering all commands are not easy. Therefore I keep this list for occasional purpose.

The application list and its command.

Accessibility Controls = access.cpl
Add Hardware Wizard = hdwwiz.cpl

Add/Remove Programs = appwiz.cpl

Administrative Tools = control admintools

Automatic Updates = wuaucpl.cpl

Bluetooth Transfer Wizard = fsquirt

Calculator = calc

Certificate Manager = certmgr.msc

Character Map = charmap

Check Disk Utility = chkdsk

Clipboard Viewer = clipbrd

Command Prompt = cmd

Component Services = dcomcnfg

Computer Management = compmgmt.msc

Date and Time Properties = timedate.cpl

DDE Shares = ddeshare

Device Manager = devmgmt.msc

Direct X Control Panel (If Installed)* = directx.cpl

Direct X Troubleshooter = dxdiag

Disk Cleanup Utility = cleanmgr

Disk Defragment = dfrg.msc

Disk Management = diskmgmt.msc

Disk Partition Manager = diskpart

Display Properties = control desktop/desk.cpl

Dr. Watson System Troubleshooting Utility = drwtsn32

Driver Verifier Utility = verifier

Event Viewer = eventvwr.msc

File Signature Verification Tool = sigverif

Findfast = findfast.cpl

Folders Properties = control folders

Fonts = control fonts

Fonts Folder = fonts

Free Cell Card Game = freecell

Game Controllers = joy.cpl

Group Policy Editor (XP Prof) = gpedit.msc

Hearts Card Game = mshearts

Iexpress Wizard = iexpress

Indexing Service = ciadv.msc

Internet Properties = inetcpl.cpl IP Configuration = ipconfig

Java Control Panel (If Installed) = jpicpl32.cpl
Java Application Cache Viewer (If Installed) = javaws
Keyboard Properties = control keyboard

Local Security Settings = secpol.msc

Local Users and Groups = lusrmgr.msc

Logs You Out Of Windows = logoff

Microsoft Chat = winchat

Minesweeper Game = winmine

Mouse Properties = control mouse

Mouse Properties = main.cpl

Network Connections = control netconnections

Network Connections = ncpa.cpl

Network Setup Wizard = netsetup.cpl

Notepad = notepad

Nview Desktop Manager (If Installed) = nvtuicpl.cpl

Object Packager = packager

ODBC Data Source Administrator = odbccp32.cpl

On Screen Keyboard = osk

Opens AC3 Filter (If Installed) = ac3filter.cpl

Password Properties = password.cpl

Performance Monitor = perfmon.msc

Performance Monitor = perfmon

Phone and Modem Options = telephon.cpl

Power Configuration = powercfg.cpl

Printers and Faxes = control printers

Printers Folder = printers

Private Character Editor = eudcedit

Quicktime (If Installed) = QuickTime.cpl

Regional Settings = intl.cpl

Registry Editor = regedit

Registry Editor = regedit32

Remote Desktop = mstsc

Removable Storage = ntmsmgr.msc

Removable Storage Operator Requests = ntmsoprq.msc

Resultant Set of Policy (XP Prof) = rsop.msc

Scanners and Cameras = sticpl.cpl

Scheduled Tasks = control schedtasks

Security Center = wscui.cpl

Services = services.msc

Shared Folders = fsmgmt.msc

Shuts Down Windows = shutdown

Sounds and Audio = mmsys.cpl

Spider Solitare Card Game = spider

SQL Client Configuration = cliconfg

System Configuration Editor = sysedit

System Configuration Utility = msconfig

System File Checker Utility = sfc

System Properties = sysdm.cpl

Task Manager = taskmgr

Telnet Client = telnet

User Account Management = nusrmgr.cpl

Utility Manager = utilman

Windows Firewall = firewall.cpl

Windows Magnifier = magnify

Windows Management Infrastructure = wmimgmt.msc

Windows System Security Tool = syskey

Windows Update Launches = wupdmgr

Windows XP Tour Wizard = tourstart

Wordpad = write

Windows Registry Hacks

Windows Registry Hacks



To edit your registry: You need a software, a registry editor, which enables you to edit them. Windows has an inbuilt registry editor, called the Regedit. Regedit can be launched from the run command box in the start menu by typing "regedit".

IMPORTANT: It is always advisable to back up your registry before, as editing the registry is very risky and can make a difference of life and death [for your computer]!!

You can do that by: Start>all Programs>Accessories>system tools>Backup.
Select the check-box that mentions "System State Data", so as to back up registry, COM+ class registration database and boot files.


DISABLE SHUTTING DOWN

If you don't want people shutting down your computer, this hack will be useful.
Open regedit. Go to:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

And to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

In both of these locations modify or create the DWORD value, "NoClose" and set it to 1.

To enable shutting down: reset the value to 0.

DISABLE THE DESKTOP CLEANUP WIZARD

Go to:

HKEY_CURRENT_CONFIG\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\CleanupWiz

Modify the DWORD value, "NoRun" to 0.

To 1 if you would like to have it back.

SET UP DEFAULT DOWNLOAD PATH FOR IE

Go to,

HKEY_CURRENT_USER\Software\Internet Explorer


Create or modify the string value called Download Directory and set it to the full URL or path name you want to set.

e.g.: "C:\My Downloads"

You will have to restart your computer for this hack to take effect.

Windows XP Secret Song


Windows XP Secret Song


Go to My Computer.

Open “C:\WINDOWS\system32\oobe\images” and search a file called: "title".

Open the file and enjoy the windows xp secret song.

Show Super Hidden

Show Super Hidden



Click on the Start button and select Run.


Type in regedit in the box and click OK to start up the RegistryEditor.



Once regedit appears, navigate through,

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced



On the right pane Right-click on ShowSuperHidden and select Modify.


Change the value from 0 to 1 and click OK to save your changes.

Restart your PC.
Now you will be able to see all of the files on your computer, including the super hidden system files.
Another Way
Open notepad and copy the Command given below.
Change the notepad extension from *.txt to *.reg.
Save it with any name. (i.e. showsuperhidden.reg)
Right click on it and ‘Merge’ it.
Restart your PC.
Now you will be able to see all of the files on your computer, including the super hidden system files.
Command
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
"ServerAdminUI"=dword:00000000
"Hidden"=dword:00000001
"ShowCompColor"=dword:00000001
"HideFileExt"=dword:00000000
"DontPrettyPath"=dword:00000000
"ShowInfoTip"=dword:00000001
"HideIcons"=dword:00000000
"MapNetDrvBtn"=dword:00000000
"WebView"=dword:00000001
"Filter"=dword:00000000
"SuperHidden"=dword:00000001
"SeparateProcess"=dword:00000000
"ListviewAlphaSelect"=dword:00000001
"ListviewShadow"=dword:00000001
"ListviewWatermark"=dword:00000001
"TaskbarAnimations"=dword:00000001
"StartMenuInit"=dword:00000002
"StartButtonBalloonTip"=dword:00000002
"Start_LargeMFUIcons"=dword:00000001
"Start_MinMFU"=dword:00000003
"Start_ShowControlPanel"=dword:00000002
"Start_EnableDragDrop"=dword:00000001
"StartMenuFavorites"=dword:00000000
"Start_ShowHelp"=dword:00000001
"Start_ShowMyComputer"=dword:00000002
"Start_ShowMyDocs"=dword:00000001
"Start_ShowMyMusic"=dword:00000001
"Start_ShowMyPics"=dword:00000001
"Start_ShowPrinters"=dword:00000000
"Start_ShowRun"=dword:00000001
"Start_ScrollPrograms"=dword:00000000
"Start_ShowSearch"=dword:00000001
"Start_ShowSetProgramAccessAndDefaults"=dword:00000000
"Start_ShowRecentDocs"=dword:00000000
"Start_AutoCascade"=dword:00000001
"Start_NotifyNewApps"=dword:00000001
"Start_AdminToolsRoot"=dword:00000000
"StartMenuAdminTools"=dword:00000000
"TaskbarSizeMove"=dword:00000000
"TaskbarGlomming"=dword:00000000
"NoNetCrawling"=dword:00000000
"FolderContentsInfoTip"=dword:00000001
"FriendlyTree"=dword:00000001
"WebViewBarricade"=dword:00000000
"DisableThumbnailCache"=dword:00000000
"ClassicViewState"=dword:00000000
"PersistBrowsers"=dword:00000000
"ShowSuperHidden"=dword:00000001
"Start_ShowNetConn_ShouldShow"=dword:00000042

Solution of the not opening of gpedit.msc


Solution of the not opening of gpedit.msc
This Problem is often created for various viruses, malwares, etc.
When we tried opening the editor by double clicking the gpedit.msc inside the system32 folder and we got the same error “Access is Denied”.
Solution
Open Registry Editor (regedit.exe) or type “regedit” in run without quote.
Now traverse to HKEY_CLASSES_ROOT\.msc and delete the registry entry on the right side.
After deleting it when you again type gpedit.msc in Run box, it will open an “Open with” dialog.
Now select the second option and browse to get a new option; browse to,
C:\Windows\system32\mmc.exe
A new option Microsoft Management Console” will appear in the window.
Select this option and remember to check the box below to always run the command without doing this again and again. That's it, All .msc extensions will now open.

Complete list of Win XP DOS Command


Complete list of Win XP DOS Command


ADDUSERS - Add or list users to/from a CSV file
ARP - Address Resolution Protocol
ASSOC - Change file extension associations
ASSOCIAT - One step file association
AT - Schedule a command to run at a later time
ATTRIB - Change file attributes
BOOTCFG - Edit Windows boot settings
BROWSTAT - Get domain, browser and PDC info
CACLS - Change file permissions
CALL - Call one batch program from another
CD - Change Directory - move to a specific Folder
CHANGE - Change Terminal Server Session properties
CHKDSK - Check Disk - check and repair disk problems
CHKNTFS - Check the NTFS file system
CHOICE - Accept keyboard input to a batch file
CIPHER - Encrypt or Decrypt files/folders
CleanMgr - Automated cleanup of Temp files, recycle bin
CLEARMEM - Clear memory leaks
CLIP - Copy STDIN to the Windows clipboard.
CLS - Clear the screen
CLUSTER - Windows Clustering
CMD - Start a new CMD shell
COLOR - Change colors of the CMD window
COMP - Compare the contents of two files or sets of files
COMPACT - Compress files or folders on an NTFS partition
COMPRESS - Compress individual files on an NTFS partition
CON2PRT - Connect or disconnect a Printer
CONVERT - Convert a FAT drive to NTFS.
COPY - Copy one or more files to another location
CSVDE - Import or Export Active Directory data
DATE - Display or set the date
Dcomcnfg - DCOM Configuration Utility
DEFRAG - Defragment hard drive
DEL - Delete one or more files
DELPROF - Delete NT user profiles
DELTREE - Delete a folder and all subfolders
DevCon - Device Manager Command Line Utility
DIR - Display a list of files and folders
DIRUSE - Display disk usage
DISKCOMP - Compare the contents of two floppy disks
DISKCOPY - Copy the contents of one floppy disk to another
DNSSTAT - DNS Statistics
DOSKEY - Edit command line, recall commands, and create macros
DSADD - Add user (computer, group..) to active directory
DSQUERY - List items in active directory
DSMOD - Modify user (computer, group..) in active directory
ECHO - Display message on screen
ENDLOCAL - End localisation of environment changes in a batch file
ERASE - Delete one or more files
EXIT - Quit the CMD shell
EXPAND - Uncompress files
EXTRACT - Uncompress CAB files
FC - Compare two files
FDISK - Disk Format and partition
FIND - Search for a text string in a file
FINDSTR - Search for strings in files
FOR /F - Loop command: against a set of files
FOR /F - Loop command: against the results of another command
FOR - Loop command: all options Files, Directory, List
FORFILES - Batch process multiple files
FORMAT - Format a disk
FREEDISK - Check free disk space (in bytes)
FSUTIL - File and Volume utilities
FTP File - Transfer Protocol
FTYPE - Display or modify file types used in file extension associations
GLOBAL - Display membership of global groups
GOTO - Direct a batch program to jump to a labelled line
HELP - Online Help
HFNETCHK - Network Security Hotfix Checker
IF - Conditionally perform a command
IFMEMBER - Is the current user in an NT Workgroup
IPCONFIG - Configure IP
KILL - Remove a program from memory
LABEL - Edit a disk label
LOCAL - Display membership of local groups
LOGEVENT - Write text to the NT event viewer.
LOGOFF - Log a user off
LOGTIME - Log the date and time in a file
MAPISEND - Send email from the command line
MEM - Display memory usage
MD - Create new folders
MODE - Configure a system device
MORE - Display output, one screen at a time
MOUNTVOL - Manage a volume mount point
MOVE - Move files from one folder to another
MOVEUSER - Move a user from one domain to another
MSG - Send a message
MSIEXEC - Microsoft Windows Installer
MSINFO - Windows NT diagnostics
MSTSC - Terminal Server Connection (Remote Desktop Protocol)
MUNGE - Find and Replace text within file(s)
MV - Copy in-use files
NET - Manage network resources
NETDOM - Domain Manager
NETSH - Configure network protocols
NETSVC - Command-line Service Controller
NBTSTAT - Display networking statistics (NetBIOS over TCP/IP)
NETSTAT - Display networking statistics (TCP/IP)
NOW - Display the current Date and Time
NSLOOKUP - Name server lookup
NTBACKUP - Backup folders to tape
NTRIGHTS - Edit user account rights
PATH - Display or set a search path for executable files
PATHPING - Trace route plus network latency and packet loss
PAUSE - Suspend processing of a batch file and display a message
PERMS - Show permissions for a user
PERFMON - Performance Monitor
PING - Test a network connection
POPD - Restore the previous value of the current directory saved by PUSHD
PORTQRY - Display the status of ports and services
PRINT - Print a text file
PRNCNFG - Display, configure or rename a printer
PRNMNGR - Add, delete, list printers set the default printer
PROMPT - Change the command prompt
PsExec - Execute process remotely
PsFile - Show files opened remotely
PsGetSid - Display the SID of a computer or a user
PsInfo - List information about a system
PsKill - Kill processes by name or process ID
PsList - List detailed information about processes
PsLoggedOn - Who's logged on (locally or via resource sharing)
PsLogList - Event log records
PsPasswd - Change account password
PsService - View and control services
PsShutdown - Shutdown or reboot a computer
PsSuspend - Suspend processes
PUSHD - Save and then change the current directory
QGREP - Search file(s) for lines that match a given pattern.
RASDIAL - Manage RAS connections
RASPHONE - Manage RAS connections
RECOVER - Recover a damaged file from a defective disk.
REG - Read, Set or Delete registry keys and values
REGEDIT - Import or export registry settings
REGSVR32 - Register or unregister a DLL
REGINI - Change Registry Permissions
REM - Record comments (remarks) in a batch file
REN - Rename a file or files.
REPLACE - Replace or update one file with another
RD - Delete folder(s)
RDISK - Create a Recovery Disk
RMTSHARE - Share a folder or a printer
ROBOCOPY - Robust File and Folder Copy
ROUTE - Manipulate network routing tables
RUNAS - Execute a program under a different user account
RUNDLL32 - Run a DLL command (add/remove print connections)
SC - Service Control
SCHTASKS - Create or Edit Scheduled Tasks
SCLIST - Display NT Services
ScriptIt - Control GUI applications
SET - Display, set, or remove environment variables
SETLOCAL - Control the visibility of environment variables
SETX - Set environment variables permanently
SHARE - List or edit a file share or print share
SHIFT - Shift the position of replaceable parameters in a batch file
SHORTCUT - Create a windows shortcut (.LNK file)
SHOWGRPS - List the NT Workgroups a user has joined
SHOWMBRS - List the Users who are members of a Workgroup
SHUTDOWN - Shutdown the computer
SLEEP - Wait for x seconds
SOON - Schedule a command to run in the near future
SORT - Sort input
START - Start a separate window to run a specified program or command
SU - Switch User
SUBINACL - Edit file and folder Permissions, Ownership and Domain
SUBST - Associate a path with a drive letter
SYSTEMINFO - List system configuration
TASKLIST - List running applications and services
TIME - Display or set the system time
TIMEOUT - Delay processing of a batch file
TITLE - Set the window title for a CMD.EXE session
TOUCH - Change file timestamps
TRACERT - Trace route to a remote host
TREE - Graphical display of folder structure
TYPE - Display the contents of a text file
USRSTAT - List domain usernames and last login
VER - Display version information
VERIFY - Verify that files have been saved
VOL - Display a disk label
WHERE - Locate and display files in a directory tree
WHOAMI - Output the current UserName and domain
WINDIFF - Compare the contents of two files or sets of files
WINMSD - Windows system diagnostics
WINMSDP - Windows system diagnostics II
WMIC - WMI Commands
XCACLS - Change file permissions
XCOPY - Copy files and folders

May 30, 2011

Basic of routing distance vector protocol problems solutions

Basic of routing


Routing is the process by which a packet gets from one location to another. To route a packet, a router needs to know the destination address and on what interface to send the traffic out .When a packet comes into an interface (in interface) on a router, it looks up the destination IP address in the packet header and compares it with its routing table. The routing table, which is stored in RAM, tells the router which outgoing interface the packet should go out to reach the destination network. There are three ways to control routing decisions on your router:

  • Static routes
  • Default routes
  • Dynamic routes

Static Routes

Use a static route when you want to manually define the path that the packet will take through your network. Static routes are useful in small networks with rarely changing routes, when you have little bandwidth and do not want the overhead of a dynamic routing protocol, or when you want to manually define all of your routes for security reasons. Static routes are created in global configuration mode. The syntax for the static route is as follows:



ip route destination network address [subnet mask]
{next-hop-address | interface] [distance]

Defaults routers

This is the special type of static route, commonly called the gateway of last resort. If the specified destination is not listed in the routing table, the default route can be used to route the packet. A default route has an IP address of 0.0.0.0 and a subnet mask of 0.0.0.0, often represented as 0.0.0.0/0. Default routes are commonly used in small networks on a perimeter router pointing to the directly connected ISP router.

Dynamic Routes

A router learns dynamic routes by running a routing protocol. Routing protocols will learn about routes from other neighboring routers running the same routing protocol. Through this sharing process, a router will eventually learn about all of the reachable network and subnet numbers in the network.

Now be familiar with the terms routing protocol and routed protocol that have two different meanings. A routing protocol learns about routes for a routed protocol.

Routed protocol:

Any network protocol that provides enough information in its network layer address to enable a packet to be forwarded from one host to another host based on the addressing scheme, without knowing the entire path from source to destination. Packets generally are conveyed from end system to end system. IP is an example of a routed protocol.

Routing protocol:

Facilitates the exchange of routing information between networks, enabling routers to build routing tables dynamically. Traditional IP routing stays simple because it uses next-hop (next-router) routing, in which the router needs to consider only where it sends the packet and does not need to consider the subsequent path of the packet on the remaining hops (routers). Routing Information Protocol (RIP) is an example of a routing protocol.

There are two types of routing protocols:

  • Interior Gateway Protocols (IGP): These routing protocols exchange routing information within an autonomous system. Routing Information Protocol version 2 (RIPv2), Enhanced Interior Gateway Routing (EIGRP), and Open Shortest Path First (OSPF) are examples of IGPs.
  • Exterior Gateway Protocols (EGP): These routing protocols are used to route between autonomous systems. Border Gateway Protocol (BGP) is the EGP of choice in networks today.

Metrics

Metrics can be calculated based on a single characteristic of a path. More complex metrics can be calculated by combining several path characteristics. The metrics that routing protocols most commonly use are as follows:

  • Hop count:
    The number of times that a packet passes through the output port of one router
  • Bandwidth:
    The data capacity of a link; for instance, normally, a 10-Mbps Ethernet link is preferable to a 64-kbps leased line
  • Delay:
    The length of time that is required to move a packet from source to destination
  • Load:
    The amount of activity on a network resource, such as a router or link
  • Reliability:
    Usually refers to the bit error rate of each network link
  • Cost:
    A configurable value that on Cisco routers is based by default on the bandwidth of the Interface
Routing ProtocolsMetricDescription
RIPHop countHow many layer 3 hops away from the destination
OSPFCostMeasurement in the inverse of the bandwidth of the links
EIGRPBandwidthThe capacity of the links in Kbps (T1 = 1554)
EIGRPDelayTime it takes to reach the destination
EIGRPLoadThe path with the least utilization
EIGRP MTU The path that supports the largest frame sizes
EIGRP Reliability The path with the least amount of errors or down time

Autonomous Systems

An autonomous system (AS) is a group of networks under a single administrative control, which could be your company, a division within your company, or a group of companies.
Not every routing protocol understands the concept of an AS. Routing protocols that understand the concept of an AS are EIGRP, OSPF, IS-IS, and BGP. RIP doesn’t understand autonomous systems, while OSPF does; but OSPF doesn’t require you to configure the AS number, whereas other protocols, such as EIGRP, do.

Administrative Distance

Administrative distance is the measure of trustworthiness that a router assigns to how a route to a network was learned.
An administrative distance is an integer from 0 to 255. A routing protocol with a lower administrative distance is more trustworthy than one with a higher administrative distance.

Administrative Distance Route Type
0 Connected interface route
1 Static route
90 Internal EIGRP route (within the same AS)
110 OSPF route
120 RIPv1 and v2 route
170 External EIGRP (from another AS)
255 Unknown route (is considered an invalid route and will not be used)

Routing protocols can be further classified into two categories:

  • Distance vector routing protocols
  • Link state routing protocols

Distance Vector Routing Protocols

Distance vector–based routing algorithms (also known as Bellman-Ford-Moore algorithms) pass periodic copies of a routing table from router to router and accumulate distance vectors. (Distance means how far, and vector means in which direction.) Regular updates between routers communicate topology changes.

Sometimes these protocols are referred to as routing by rumor, since the routers learn routing information from directly connected neighbors, and these neighbors might have learned these networks from other neighboring routers. RIP is an example of a routing protocol that is a distance vector.

Advertising Updates

Routers running distance vector protocols learn who their neighbors are by listening for routing broadcasts on their interfaces. No formal handshaking process or hello process occurs to discover who are the neighboring routers. Distance vector protocols assume that through the broadcast process, neighbors will be learned, and if a neighbor fails, the missed broadcasts from these neighbors will eventually be detected

Distance vector algorithms call for each router to send its entire routing table to each of its adjacent or directly connected neighbors. Distance vector routing tables include information about the total path cost (defined by its metric) and the logical address of the first router on the path to each network it knows about.

When a router receives an update from a neighboring router, it compares the update to its own routing table. The router adds the cost of reaching the neighboring router to the path cost reported by the neighbor to establish the new metric. If the router learns about a better route (smaller total metric) to a network from its neighbor, the router updates its own routing table.

Distance Vector Protocol Problems and Solutions

Problem: Convergence

The term convergence refers to the time it takes for all of the routers to understand the current topology of the network. When a router receives an update from a neighboring router, it compares the update to its own routing table. The router adds the cost of reaching the neighboring router to the path cost reported by the neighbor to establish the new metric. If the router learns about a better route (smaller total metric) to a network from its neighbor, the router updates its own routing table. It’s too time consuming process. Because in a 10 router topology last router will know about the network of first router only while all middle router will complete their periodic update. For example if interval timer is set to 60 second then last router will know about first network in 60*8 480 second or 8 minute.

Solution: Change the periodic timer interval

One solution is to change the periodic timer interval. For instance, in an example the timer was set to 60 seconds. To speed up convergence, you might want to set the interval to 10 seconds. Also, by setting the timer to 10 seconds, you are creating six times the amount of routing broadcast traffic, which is not very efficient

A second solution is to implement triggered updates

The distance vector routing protocol would still generate periodic updates; however, whenever a change takes place, the router will immediately generate an update without waiting for the periodic timer to expire. This can decrease convergence times, but it also creates a problem. If you have a flapping route, then an update will be triggered each time the route changes state, which creates a lot of unnecessary broadcast traffic in your network and could cause a broadcast storm.

Problem: Routing Loops

A routing loop is a layer-3 loop in the network. Basically, it is a disagreement about how to reach a destination network. Because distance vector routing protocols trust the next router without compiling a topology map of all networks and routers, distance vector protocols run the risk of creating loops in a network. This is analogous of driving to a location without a map. Instead, you trust what each sign tells you. Trusting the street signs might get you where you want to go, but I've been in some cities where trusting what the signs say will lead you in loops. The same is true with distance vector routing protocols. Simply trusting what the next router tells it can potentially lead the packets to loop endlessly. These loops could saturate a network and cause systems to crash. This, in turn, makes managers very upset and means that you have to work late into the evening to fix it.

Solution: Counting to Infinity Solution: Maximum Hop Count

IP packets have inherent limits via the Time-To-Live (TTL) value in the IP header. In other words, a router must reduce the TTL field by at least 1 each time it gets the packet. If the TTL value becomes 0, the router discards that packet. However, this does not stop the router from continuing to attempt to send the packet to a network that is down. To avoid this prolonged problem, distance vector protocols define infinity as some maximum number. This number refers to a routing metric, such as a hop count.

Solution: Split Horizon

Split horizon states that if a neighboring router sends a route to a router, the receiving router will not propagate this route back to the advertising router on the same interface. Split horizon prevents a router from advertising a route back out the same interface where the router originally learned the route. One way to eliminate routing loops and speed up convergence is through the technique called split horizon. The split horizon rule is that sending information about a route back in the direction from which the original update came is never useful.

Solution: Route Poisoning

Another operation complementary to split horizon is a technique called route poisoning. Route poisoning attempts to improve convergence time and eliminate routing loops caused by inconsistent updates. With this technique, when a router loses a link, the router advertises the loss of a route to its neighbor device. Route poisoning enables the receiving router to advertise a route back toward the source with a metric higher than the maximum. The advertisement back seems to violate split horizon, but it lets the router know that the update about the down network was received. The router that received the update also sets a table entry that keeps the network state consistent while other routers gradually converge correctly on the topology change. This mechanism allows the router to learn quickly of the down route and to ignore other updates that might be wrong for the hold-down period. This prevents routing loops.

A poisoned route has an infinite metric assigned to it. A poison reverse causes the router to break split horizon rule and advertise the poisoned route out all interfaces. When a router detects that one of its connected routes has failed, the router will poison the route by assigning an infinite metric to it. In IP RIP, the route is assigned a hop count of 16 (15 is the maximum), thus making it an unreachable network. When a router advertises a poised route to its neighbors, its neighbors break the rule of split horizon and send back to the originator the same poisoned route, called a poison reverse. This ensures that everyone received the original update of the poisoned route.

Solution:Hold-Down Timers

In order to give the routers enough time to propagate the poisoned route and to ensure that no routing loops occur while propagation is occurring; the routers implement a hold-down mechanism. During this period, the routers will freeze the poisoned route in their routing tables for the period of the hold-down timer, which is typically three times the interval of the routing broadcast update. When hold-down timers are used, a poisoned route will remain in the routing table until the timer expires. However, if a router with a poisoned route receives a routing update from a neighboring router with a metric that is the same or better than the original route, the router will abort the hold-down period, remove the poisoned route, and put the new route in its table. However, if a router receives a worse route from a neighboring router, the router treats this as a suspect route and assumes that this route is probably part of a routing loop, ignoring the update. One of the problems of using hold-down timers is that they cause the distance vector routing protocol to converge slowly—if the hold-down period is 180 seconds, you can’t use a valid alternative path with a worse metric until the hold-down period expires. Therefore, your users will lose their connections to this network for at least three minutes.

Hold-down timers perform route maintenance as follows:

  1. When a router receives an update from a neighbor indicating that a previously accessible network is now inaccessible, the router marks the route as inaccessible and starts a hold-down timer.
  2. If an update arrives from a neighboring router with a better metric than originally recorded for the network, the router marks the network as accessible and removes the hold-down timer.
  3. If at any time before the hold-down timer expires, an update is received from a different neighboring router with a poorer metric, the update is ignored. Ignoring an update with a higher metric when a holddown is in effect enables more time for the knowledge of the change to propagate through the entire network.
  4. During the hold-down period, routes appear in the routing table as “possibly down.”