As we can see today, the new technology provides many facilities and fast communication, such as the Internet. We must think about how this information transfers from the source to the destination. Due to the fact that a device called a router does managing the transfer operation, this device explores the path from the source to the destination at a low cost. Furthermore, in this paper, we present one of the most popular algorithms used in routing, is the Distance Vector (DV) algorithm, which is the basis of the well-known Routing Information Protocol (RIP). Therefore, we will explain how this protocol works and what is the problem when implementing it in the weird network and shows how can this protocol manage this problem and solve it. Besides, show where this protocol is used. As a result, the discussion part will explain the purpose of using this protocol and make a comparison with other routing protocols to see the efficiency of this protocol. Thus, during this paper, we will find the accuracy of this algorithm.

1.
Z. G.
Al-Mekhlafi
, and
R.
Hassan
, “
Evaluation study on routing information protocol and dynamic source routing in Ad-Hoc network
,” In
2011 7th International Conference on Information Technology in Asia
. (
IEEE
,
2011
, July), pp.
1
4
.
2.
A. K. M.
Al-Qurabat
,
Z. A.
Mohammed
and
Z. J.
Hussein
,
Wireless Personal Communications
120
(
3
),
2227
2258
(
2021
).
3.
K. M.
Awan
,
P. A.
Shah
,
K.
Iqbal
,
S.
Gillani
,
W.
Ahmad
and
Y.
Nam
,
Wireless Commun. Mobile Comput.
2019
(
2019
).
4.
Q.
Guan
,
F.
Ji
,
Y.
Liu
,
H.
Yu
and
W.
Chen
,
IEEE Internet Things J.
6
(
2
),
3831
3839
(
2019
).
5.
A.
Mahmood
, (
2020
).
6.
B. P.
Maratha
,
T. R.
Sheltami
and
K.
Salah
,
Arabian Journal for Science and Engineering
42
(
8
),
3115
3126
(
2017
).
7.
A. C.
Nastase
,
G.
Predusca
,
D. C.
Puchianu
,
L. D.
Circiumarescu
, and
N.
Angelescu
,
Simulation Based of Comparative Study of Routing Protocols for Real Time Applications
. In
2019 22nd International Conference on Control Systems and Computer Science (CSCS)
(
IEEE
,
2019
, May), pp.
531
535
.
8.
J.
Papán
,
P.
Segeč
,
M.
Moravčík
,
M.
Kontšek
,
L. u.
Mikus
and
J.
Uramová
,
presented at the 2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA
),
2018
(unpublished).
9.
D.
Pei
,
D.
Massey
and
L.
Zhang
, “
Detection of invalid routing announcements in rip protocol
,” In
GLOBECOM’03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489)
(Vol.
3
, (
IEEE
,
2003
, December), pp.
1450
1455
.
10.
S. K.
Sahoo
,
2014
.
11.
S. K.
Singh
,
M.
Singh
and
D. K.
Singh
,
International Journal of Computer Science and Engineering Survey (IJCSES)
1
(
2
),
63
83
(
2010
).
12.
T.
Wan
,
E.
Kranakis
and
P. C. V.
Oorschot
, “
A secure distance vector routing protocol
,” In
International Conference on Applied Cryptography and Network Security
(
Springer
,
Berlin, Heidelberg
,
2004
), pp.
103
119
.
13.
J.
Wang
,
Y.
Gao
,
W.
Liu
,
A. K.
Sangaiah
and
H.-J.
Kim
,
Sensors
19
(
7
),
1494
(
2019
).
14.
Z.
Xu
,
S.
Dai
and
J.
Garcia-Luna-Aceves
, “
A more efficient distance vector routing algorithm
,” In
MILCOM 97 MILCOM 97 Proceedings
(
IEEE
,
1997
, November), pp.
993
997
.
15.
S.
Zafar
,
A.
Bashir
and
S. A.
Chaudhry
,
Ieee Access
7
,
20394
20403
(
2019
).
This content is only available via PDF.
You do not currently have access to this content.