22.1 Network Layer Delivery, Forwarding, and Routing.

Slides:



Advertisements
Similar presentations
Network Layer Delivery Forwarding and Routing
Advertisements

Unicast and Multicast Routing:
Delivery and Forwarding of
1 Chapter 22 Network layer Delivery, Forwarding and Routing.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Multicasting And Multicast.
TCP/IP Protocol Suite 1 Chapter 15 Upon completion you will be able to: Multicasting and Multicast Routing Protocols Differentiate between a unicast, multicast,
Routing So how does the network layer do its business?
Unicast Routing Protocols: RIP, OSPF, and BGP
Delivery, Forwarding, and Routing
MULTICASTING Network Security.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 14 Multicasting And Multicast Routing Protocols.
INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
Multicasting  A message can be unicast, multicast, or broadcast.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Computer Networks22-1 Chapter 22. Network Layer: Delivery, Forwarding, and Routing 21.1 Delivery 21.2 Forwarding 21.3 Unicast Routing Protocols 21.4 Multicast.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
18-WAN Technologies and Dynamic routing Dr. John P. Abraham Professor UTPA.
Copyright © Lopamudra Roychoudhuri
Delivery, Forwarding, and Routing of IP Packets
Dr. Clincy1 Chapter 6 Delivery & Forwarding of IP Packets Lecture #4 Items you should understand by now – before routing Physical Addressing – with in.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 6 Delivery and Routing of IP Packets.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Chapter 15 Multicasting and Multicast Routing
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 6 Delivery and Routing of IP Packets.
1 Routing Table  The seven fields Mask: for finding (sub)network address of the destination l Host-specific routing: (/32) l Default routing:
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
Delivery, Forwarding, and Routing of IP Packets
© J. Liebeherr, All rights reserved 1 Multicast Routing.
Introduction to Multicast Routing Protocols
1 Kyung Hee University Chapter 6 Delivery Forwarding, and Routing of IP Packets.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 14 Multicasting And Multicast Routing.
Information and Communication engineering (ICE) MUT ITEC4610 Network Switching and Routing ดร. ประวิทย์ ชุมชู หัวหน้าสาขาวิชาวิศวกรรมสารสนเทศและการสื่อสาร.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Chapter 21 Multicast Routing
TCP/IP Protocol Suite 1 Chapter 14 Upon completion you will be able to: Unicast Routing Protocols: RIP, OSPF, and BGP Distinguish between intra and interdomain.
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Ch 22. Routing Direct and Indirect Delivery.
1 INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is referred.
CS4500CS4500 Dr. Clincy1 Continuing Chapter 11 Unicast Routing Protocols (RIP, OSPF, BGP) (How the routers’ tables are filled in) Lecture 6.
Delivery and Forwarding Chapter 18 COMP 3270 Computer Networks Computing Science Thompson Rivers University.
Powerpoint Templates Computer Communication & Network Week # 14.
TCP/IP Protocol Suite 1 Multicasting and Multicast Routing Protocols Differentiate between a unicast and a multicast message Understand multicast link.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
(How the routers’ tables are filled in)
COMP 3270 Computer Networks
Chapter 6 Delivery & Forwarding of IP Packets
Delivery, Forwarding, and Routing
Chapter 6 Delivery & Forwarding of IP Packets
UNIT III ROUTING.
(How the routers’ tables are filled in)
Delivery, Forwarding, and Routing
Multicasting and Multicast Routing Protocols
Subject Name: Computer Communication Networks Subject Code: 10EC71
UNICAST ROUTING PROTOCOLS
Delivery, Forwarding, and Routing of IP Packets
Delivery and Forwarding of
18-WAN Technologies and Dynamic routing
Delivery, Forwarding, and Routing of IP Packets
Chapter 12 Multicasting And Multicast Routing Protocols
Example 9 (Continued) 1. The first mask (/26) is applied to the destination address. The result is , which does not match the corresponding network.
Figure 6.11 Configuration for Example 4
Figure 6.6 Default routing
Presentation transcript:

22.1 Network Layer Delivery, Forwarding, and Routing

DELIVERY The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct Versus Indirect Delivery Topics discussed in this section:

22.3 Figure 22.1 Direct and indirect delivery

22.4 FORWARDING FORWARDING Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table. When a host has a packet to send or when a router has received a packet to be forwarded, it looks at this table to find the route to the final destination. Forwarding Techniques Forwarding Process Routing Table Topics discussed in this section:

22.5 Figure 22.2 Route method versus next-hop method

22.6 Figure 22.3 Host-specific versus network-specific method

22.7 Figure 22.4 Default method

22.8 Figure 22.5 Simplified forwarding module in classless address

22.9 In classless addressing, we need at least four columns in a routing table. Note

22.10 Make a routing table for router R1, using the configuration in Figure Example 22.1 Solution Table 22.1 shows the corresponding table.

22.11 Figure 22.6 Configuration for Example 22.1

22.12 Table 22.1 Routing table for router R1 in Figure 22.6

22.13 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address Example 22.2 Solution The router performs the following steps: 1. The first mask (/26) is applied to the destination address. The result is , which does not match the corresponding network address. 2. The second mask (/25) is applied to the destination address. The result is , which matches the corresponding network address. The next-hop address and the interface number m0 are passed to ARP for further processing.

22.14 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address Example 22.3 Solution The router performs the following steps: 1. The first mask (/26) is applied to the destination address. The result is , which does not match the corresponding network address. 2. The second mask (/25) is applied to the destination address. The result is , which does not match the corresponding network address (row 2).

22.15 Example 22.3 (continued) 3. The third mask (/24) is applied to the destination address. The result is , which matches the corresponding network address. The destination address of the packet and the interface number m3 are passed to ARP.

22.16 Show the forwarding process if a packet arrives at R1 in Figure 22.6 with the destination address Example 22.4 Solution This time all masks are applied, one by one, to the destination address, but no matching network address is found. When it reaches the end of the table, the module gives the next-hop address and interface number m2 to ARP. This is probably an outgoing package that needs to be sent, via the default router, to someplace else in the Internet.

22.17 Figure 22.7 Address aggregation

22.18 Figure Common fields in a routing table

22.19 One utility that can be used to find the contents of a routing table for a host or router is netstat in UNIX or LINUX. The next slide shows the list of the contents of a default server. We have used two options, r and n. The option r indicates that we are interested in the routing table, and the option n indicates that we are looking for numeric addresses. Note that this is a routing table for a host, not a router. Although we discussed the routing table for a router throughout the chapter, a host also needs a routing table. Example 22.6

22.20 Example 22.6 (continued) The destination column here defines the network address. The term gateway used by UNIX is synonymous with router. This column actually defines the address of the next hop. The value shows that the delivery is direct. The last entry has a flag of G, which means that the destination can be reached through a router (default router). The Iface defines the interface.

22.21 UNICAST ROUTING PROTOCOLS UNICAST ROUTING PROTOCOLS A routing table can be either static or dynamic. A static table is one with manual entries. A dynamic table is one that is updated automatically when there is a change somewhere in the Internet. A routing protocol is a combination of rules and procedures that lets routers in the Internet inform each other of changes. Optimization Intra- and Interdomain Routing Distance Vector Routing and RIP Link State Routing and OSPF Path Vector Routing and BGP Topics discussed in this section:

22.22 Figure Autonomous systems

22.23 Figure Popular routing protocols

22.24 Figure Distance vector routing tables

22.25 Figure Initialization of tables in distance vector routing

22.26 In distance vector routing, each node shares its routing table with its immediate neighbors periodically and when there is a change. Note

22.27 Figure Updating in distance vector routing

22.28 Figure Two-node instability

22.29 Figure Three-node instability

22.30 Figure Example of a domain using RIP

22.31 Figure Concept of link state routing

22.32 Figure Link state knowledge

22.33 Figure Dijkstra algorithm

22.34 Figure Example of formation of shortest path tree

22.35 Table 22.2 Routing table for node A

22.36 Figure Areas in an autonomous system

22.37 Figure Types of links

22.38 Figure Point-to-point link

22.39 Figure Transient link

22.40 Figure Stub link

22.41 Figure Example of an AS and its graphical representation in OSPF

22.42 Figure Initial routing tables in path vector routing

22.43 Figure Stabilized tables for three autonomous systems

22.44 Figure Internal and external BGP sessions

22.45 MULTICAST ROUTING PROTOCOLS MULTICAST ROUTING PROTOCOLS In this section, we discuss multicasting and multicast routing protocols. Unicast, Multicast, and Broadcast Applications Multicast Routing Routing Protocols Topics discussed in this section:

22.46 Figure Unicasting

22.47 In unicasting, the router forwards the received packet through only one of its interfaces. Note

22.48 Figure Multicasting

22.49 In multicasting, the router may forward the received packet through several of its interfaces. Note

22.50 Figure Multicasting versus multiple unicasting

22.51 Emulation of multicasting through multiple unicasting is not efficient and may create long delays, particularly with a large group. Note

22.52 In unicast routing, each router in the domain has a table that defines a shortest path tree to possible destinations. Note

22.53 Figure Shortest path tree in unicast routing

22.54 In multicast routing, each involved router needs to construct a shortest path tree for each group. Note

22.55 Figure Source-based tree approach

22.56 In the source-based tree approach, each router needs to have one shortest path tree for each group. Note

22.57 Figure Group-shared tree approach

22.58 In the group-shared tree approach, only the core router, which has a shortest path tree for each group, is involved in multicasting. Note

22.59 Figure Taxonomy of common multicast protocols

22.60 Multicast link state routing uses the source-based tree approach. Note

22.61 Flooding broadcasts packets, but creates loops in the systems. Note

22.62 RPF eliminates the loop in the flooding process. Note

22.63 Figure Reverse path forwarding (RPF)

22.64 Figure Problem with RPF

22.65 Figure RPF Versus RPB

22.66 RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy of the packet. Note

22.67 Figure RPF, RPB, and RPM

22.68 RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes. Note

22.69 Figure Group-shared tree with rendezvous router

22.70 Figure Sending a multicast packet to the rendezvous router

22.71 In CBT, the source sends the multicast packet (encapsulated in a unicast packet) to the core router. The core router decapsulates the packet and forwards it to all interested interfaces. Note

22.72 PIM-DM is used in a dense multicast environment, such as a LAN. Note

22.73 PIM-DM uses RPF and pruning and grafting strategies to handle multicasting. However, it is independent of the underlying unicast protocol. Note

22.74 PIM-SM is used in a sparse multicast environment such as a WAN. Note

22.75 PIM-SM is similar to CBT but uses a simpler procedure. Note

22.76 Figure Logical tunneling

22.77 Figure MBONE