Distance Vector Routing (DVR) Protocol
Last Updated :
27 Dec, 2024
Distance Vector Routing (DVR) Protocol is a method used by routers to find the best path for data to travel across a network. Each router keeps a table that shows the shortest distance to every other router, based on the number of hops (or steps) needed to reach them. Routers share this information with their neighbors, allowing them to update their tables and find the most efficient routes. This protocol helps ensure that data moves quickly and smoothly through the network.
What is the Distance Vector Routing Algorithm?
The protocol requires that a router inform its neighbors of topology changes periodically. Historically known as the old ARPANET routing algorithm (or known as the Bellman-Ford algorithm).
Bellman-Ford Basics
Each router maintains a Distance Vector table containing the distance between itself and All possible destination nodes. Distances, based on a chosen metric, are computed using information from the neighbors' distance vectors.
Information kept by DV router:
- Each router has an ID
- Associated with each link connected to a router,
there is a link cost (static or dynamic). - Intermediate hops
Distance Vector Table Initialization:- Distance to itself = 0
- Distance to ALL other routers = infinity number.
covers these protocols extensively.
How Distance Vector Algorithm works?
- Arouter transmits its distance vector to each of its neighbors in a routing packet.
- Each router receives and saves the most recently received distance vector from each of its neighbors.
- A router recalculates its distance vector when:
- It receives a distance vector from a neighbor containing different information than before.
- It discovers that a link to a neighbor has gone down.
The DV calculation is based on minimizing the cost to each destination
Dx(y) = Estimate of least cost from x to y
C(x,v) = Node x knows cost to each neighbor v
Dx = [Dx(y): y ? N ] = Node x maintains distance vector
Node x also maintains its neighbors' distance vectors
– For each neighbor v, x maintains Dv = [Dv(y): y ? N ]
Note:
Example :
Consider 3-routers X, Y and Z as shown in figure. Each router have their routing table. Every routing table will contain distance to the destination nodes.

Consider router X , X will share it routing table to neighbors and neighbors will share it routing table to it to X and distance from node X to destination will be calculated using bellmen- ford equation.
Dx(y) = min { C(x,v) + Dv(y)} for each node y ? N
As we can see that distance will be less going from X to Z when Y is intermediate node(hop) so it will be update in routing table X.

Similarly for Z also -

Finally the routing table for all -

Applications of Distance Vector Routing Algorithm
The Distance Vector Routing Algorithm has several uses:
- Computer Networking : It helps route data packets in networks.
- Telephone Systems : It's used in some telephone switching systems.
- Military Applications : It has been used to route missiles.
Advantages of Distance Vector routing
- Shortest Path : Distance Vector Routing finds the shortest path for data to travel in a network.
- Usage : It is used in local, metropolitan, and wide-area networks.
- Easy Implementation : The method is simple to set up and doesn't require many resources.
Disadvantages of Distance Vector Routing Algorithm
- It is slower to converge than link state.
- It is at risk from the count-to-infinity problem.
- It creates more traffic than link state since a hop count change must be propagated to all routers and processed on each router. Hop count updates take place on a periodic basis, even if there are no changes in thenetwork topology , so bandwidth -wasting broadcasts still occur.
- For larger networks, distance vector routing results in larger routing tables than link state since each router must know about all other routers. This can also lead to congestion onWAN links.
Conclusion
In conclusion, Distance Vector Routing (DVR) Protocol is a simple and efficient method for finding the shortest path for data in various types of networks. Its ease of implementation and quick adjustment to network changes make it a valuable tool for ensuring data travels quickly and efficiently. DVR Protocol helps maintain smooth network operations by constantly updating and optimizing routes.
GATE CS Corner Questions
Practicing the following questions will help you test your knowledge. All questions have been asked in GATE in previous years or in GATE Mock Tests. It is highly recommended that you practice them.
Similar Reads
Collision Avoidance in wireless networks We take a close look at so-called WiFi which is also known as IEEE standard 802.11 Consider the situation depicted in the figure, where each of the four nodes is able to send and receive signals that reach just the nodes to its immediate left and right. For example, B can exchange frames with A and
6 min read
Difference between Unicast, Broadcast and Multicast in Computer Network The cast term here signifies some data(stream of packets) is being transmitted to the recipient(s) from the client(s) side over the communication channel that helps them to communicate. Let's see some of the "cast" concepts that are prevailing in the computer networks field. What is Unicast?This typ
5 min read
Collision Domain and Broadcast Domain in Computer Network Prerequisite - Network Devices, Transmission Modes The most common network devices used are routers and switches. But we still hear people talking about hubs, repeaters, and bridges. Do you ever wonder why these former devices are preferred over the latter ones? One reason could be: 'because they ar
5 min read
Introduction of Classful IP Addressing An IP address is an address that has information about how to reach a specific host, especially outside the LAN. An IP address is a 32-bit unique address having an address space of 232.Classful IP addressing is a way of organizing and managing IP addresses, which are used to identify devices on a ne
11 min read
IPv4 Datagram Header IP stands for Internet Protocol and v4 stands for Version Four (IPv4). IPv4 was the primary version brought into action for production within the ARPANET in 1983. IP version four addresses are 32-bit integers which will be expressed in decimal notation. In this article, we will discuss about IPv4 da
4 min read
Fragmentation at Network Layer In computer networks, data is sent in small units called packets or datagrams. Sometimes, these datagrams are too large to pass through a network with a smaller size limit. To handle this, the datagram is broken into smaller parts is called fragmentation.IPv4 datagram can be as large as 65,535 bytes
7 min read
Internet Protocol version 6 (IPv6) The Internet Protocol version 6, or IPv6, is the latest version of the Internet Protocol (IP), which is the system used for identifying and locating computers on the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the problem of IPv4 exhaustion. IPv6 is a 128-
7 min read
Classless Addressing in IP Addressing The Network address identifies a network on the internet. Using this, we can find a range of addresses in the network and total possible number of hosts in the network. Mask is a 32-bit binary number that gives the network address in the address block when AND operation is bitwise applied on the mas
7 min read
Supernetting in Network Layer Supernetting is the opposite of Subnetting. In subnetting, a single big network is divided into multiple smaller subnetworks. In Supernetting, multiple networks are combined into a bigger network termed a Supernetwork or Supernet. In this article, we'll explore the purpose and advantages of supernet
4 min read
Longest Prefix Matching in Routers What is Forwarding? Forwarding is moving incoming packets to the appropriate interface. Routers use a forwarding table to decide which incoming packet should be forwarded to which next hop. What is an IP prefix? IP prefix is a prefix of IP address. All computers on one network have the same IP prefi
3 min read