ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Advertisements

Project3 Malabika Das Prajna Setty Preeti Rao. Assumptions and Address Scheme Assumptions End hosts can only connect to one router and knows which router.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 6/14/ :27 CS575Internetworking & Routers1 Rivier College CS575: Advanced LANs Chapter 13: Internetworking & Routers.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
IP Addressing: introduction
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
ECE 544 Project 3 Content Based Routing Neelakantan Nurani Krishnan Shikha Kakkar Suja Srinivasan.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
ECE 544 Project3 Team member. Assumptions and Address Scheme Assumptions End hosts can only connect to routers Same content available at multiple end.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit.
Routing and Routing Protocols
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
TCP/IP Illustracted Vol1. 제목 : IP Routing ( 수 ) 한 민 규
Content Routing Protocol Design Karthikeyan Ganesan Shruti Venkatesh Rafay Zamir.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
ECE 544 Project3 Ali Rostami Mohsen Ghassemi Mahmoud Ramezani-Mayiami.
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
ECE 544 Protocol Design Project 2016 Nirali Shah Thara Philipson Nithin Raju Chandy.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
ECE 544 Project3 Parishad Karimi Mehrnaz Tavan Sai Teja Lingam.
+ Dynamic Routing Protocols 2 nd semester
Introduction to Networks
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 CPSC 335 Data Communication.
Dynamic Routing Protocols II OSPF
Instructor Materials Chapter 5: Dynamic Routing
Routing Information Protocol (RIP)
ECE 544 Protocol Design Project 2016
Internet Networking recitation #4
Introduction to Networking
Single-Area OSPF (Open Shortest Path First Protocol)
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Routing.
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
ECE 544 Project3 Team member.
ECE 544 Protocol Design Project 2016
by Saltanat Mashirova & Afshin Mahini
Anup Mathur Anusha Sheelavant Prakhar Srivastava
ECE 544 Protocol Design Project 2016
Vidur Nayyar Xueting Wang Weicong Zhao
Link-State Routing Protocols
Intradomain Routing Outline Introduction to Routing
ECE 544 Group Project : Routing
Dynamic Routing and OSPF
Aayush Patidar Ashwin Ramakrishnan Manoj Juneja
Viet Nguyen Jianqing Liu Yaqin Tang
Christopher Beyer Hajar Mahdavi-Doost Tony Thayil
ECE 544 Project III Description and Timeline March 23, 2018
Link-State Routing Protocols
ECE 544 Project3 Team member.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing.
Lecture 4a Mobile IP 1.
ECE 544 Project3 Dheeraj Medikonda Ravi Chandra Godavarthi 1.
Presentation transcript:

ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1

Assumptions and Address Scheme End hosts can only connect to one router Same content available at multiple end nodes the path cost between adjacent router is 1. Host and content can move at any time Naming scheme and eventual address scheme Router ID (statically assigned, range 0~255) End hosts ID (statically assigned, range 0~255) Content ID (statically assigned, range 0~255) 2 2

Our Goal Keep it simple 3 3

We Don't care How to assign a Address to a Host How to assign a Address to a Router How to generate a ID for a Content 4 4

How to build a forwarding table We Do care How to forward a packet How to build a forwarding table 5 5

Forwarding Table (@ R1) ID (Content or Host) Interface C1 1 H1 C3 2 C2

Scenario 1: @host_H1: get (content_C2) Forwarding Table@R1 ID (Content or Host) Interface C1 1 H1 C2 2 C3 H2 Forwarding Table @R2 ID (Content or Host) Interface C1 1 H1 C3 3 C2 2 H2 H3 Packet Forwarding Table @R5 ID (Content or Host) Interface C1 2 H1 C3 C2 1 H2 H3 Src Dest H1 C2 File Packet Src Dest C2 H2 C2 H2 C2 H1 1 C1 R5 2 C3 H1 2 1 2 1 3 R1 R2 R3 R4 H3 H1 C2 7 7

Then … ... How to build a Forwarding table? 8 8

Resource Table maintained at each router contains the location information regarding host and content when ID is content, owner ID is a list of hosts. when ID is host, owner ID is its directly connected router. Resource table @ R1 ID (Content or Host) Owner ID C1 H1 self H2 R5 C2 H3 C3 R4 H2 C1 C2 R5 C3 H1 2 1 2 1 3 R1 R2 R3 R4 H3

Routing Table need not to be computed every time unless something changed in link-state table Destination Next Hop Cost R2 1 R3 2 R4 3 R5 H2 C1 C2 R5 C3 H1 2 1 2 1 3 R1 R2 R3 R4 H3

Then … ... How to build a Routing table? 11 11

Routing Table (shortest path) need not to be computed every time unless something changed in link-state table (for example: @R2) Destination Next Hop Cost R1 port 1 1 R3 port 3 R4 2 R5 port 2 H2 R5 2 2 1 3 R1 R2 R3 R4 12

Link-State Table ( the same at each router ) remain unchanged after routers boot up unless some new router is added or failure of some router is detected. Connected? R1 R2 R3 R4 R5 - T F R5 2 2 1 3 R1 R2 R3 R4 13

Router Bootstrapping and Discovery Each Router find its directly connected neighbors Exchange the information of neighbors Each router would have the same view of the global topology Each router can computes its shortest path to reach other router 14 14

Neighbor Neighbor of R2 Router ID Interface R5 2 R3 3 R1 1 R5 2 2 1 3 15

Neighbor @ R5 Router Neighbor R2 R5 R3 R1 R4 Router Neighbor R2 R5 R3 RID Port R2 2 C1 R5 C2 C3 1 2 H1 1 1 2 1 2 2 3 R1 R2 R3 R4 H3 RID Port R2 2 RID Port R5 2 R3 3 R1 1 RID Port R2 1 R4 2 RID Port R3 1

Loop-free Note that we includes the complete paths as a enumerated list of routers when flooding the message. As long as a router finds itself included in the path, it would ignore this message to avoid path loop. When R1 receives the message sent by R2 that <R1 is neighbor of @R2, PATH: R1- R2>, R1 no longer relays the message. R5 2 2 1 3 R1 R2 R3 R4 17

Then … ... How to build a Resource table? 18 18

Host Bootstrapping and Discovery Consider H1 that first gets configured in R1 Resource table @ R1 ID (Content or Host) Owner ID H1 self R5 R5 H1 H1 2 2 1 1 2 2 1 1 2 3 3 R1 R1 R2 R2 R3 R3 R4 R4 19 19

Resource table in each router resource table @ R2 ID (Content or Host) Owner ID H1 R1 resource table @ R3 ID (Content or Host) Owner ID H1 R1 resource table @ R4 ID (Content or Host) Owner ID H1 R1 R5 R5 H1 H1 2 2 1 1 2 2 1 1 2 3 3 R1 R1 R2 R2 R3 R3 R4 R4 20

Disconnection of host X Do it in the same way! R5 R5 H1 H1 2 2 1 2 2 1 3 3 R1 R1 R2 R2 R3 R3 R4 R4 21

Content Bootstrapping and Discovery Use the same approach as host advertisement resource table ID (Content or Host) Owner ID C1 H1 H2 H2 C1 R5 R5 H1 H1 2 2 1 1 2 2 1 1 2 1 3 3 R1 R1 R2 R2 R3 R3 R4 R4 H3 H3

One forwarding table does all !!! For every packet, the destination is either Host ID or Content ID. The router always find the next-hop from the forwarding table. 23 23

Packet format Header Extension Payload

Header format All packets have the same header structure! Header | Version 3 bit | Type 5 bits | | Dest ID 8 bits | | Src ID 8 bits | | Type: Heartbeat: monitor the liveness of router and host Neighbor: exchange the neighbor info. Host Discovery: host actively joins or leaves the network Content Discovery: content adds to or withdraw from the network Get Content Request Get Content Respond: reply with content data ACK

Data Transfer and Reliability Message Forward Not support Multicast ARQ Scheme receive windows timeout for each data request packet ACK for routing information packet NO ACK for data packet 26 26

Scenario 2: @host_H1: get (content_C2) 27

X Scenario 3: @host_H1: get (content_C1) H1 H2 H3 Send C1 H4 Send C1 28

Advantages and Disadvantages Pros Simple and Scalable Efficient: can choose the nearest provider Automatically forward a packet to other provider if the original one unavailable. Cons Throughput is not perfect by using timeout scheme for data packet. 29

Content Request Packet | Version 3 bit | Request | | Content ID 8 bits | | Src Host ID 8 bits | | offset 16 bits | | size 16 bits | Header extension

Content Respond Packet | Version 3 bit | Respond | | Dest Host ID 8 bits | | Content ID 8 bits | | offset 16 bits | | size 16 bits | | Flags | | Payload | Header extension

Host Discovery Packet | Version 3 bit | Host Discovery | | R2 | | R1 | | random seq 16 bits | | Add / DEL | | HOST ID = H1 | | Owner ID =R1 | | Len of PATH=1 | | R1 | Header extension

Content Discovery Packet | Version 3 bit |Content Discovery | | R2 | | R1 | | random seq 16 bits | | Add / DEL | | HOST ID = C1 | | Owner ID = H1 | | Len of PATH=1 | | R1 | Header extension