4/12/2015© 2009 Raymond P. Jefferis IIILect 08 - 1 Internet Protocol - Continued.

Slides:



Advertisements
Similar presentations
CSE 561 – Bridging and Routing David Wetherall Spring 2000.
Advertisements

Chapter 4 Distributed Bellman-Ford Routing
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Courtesy: Nick McKeown, Stanford
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
1 Switching and Forwarding Bridges and Extended LANs.
1 Comnet 2010 Communication Networks Recitation 6 Routing.
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
MULTICASTING Network Security.
1 Switching and Forwarding Bridges and Extended LANs.
CSCI 4550/8556 Computer Networks Comer, Chapter 13: WAN Technologies and Routing.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
INTRA- AND INTERDOMAIN ROUTING Routing inside an autonomous system is referred to as intradomain routing. Routing between autonomous systems is.
Delivery, Forwarding and
Link State Routing Protocols Last Update Copyright Kenneth M. Chipps Ph.D.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
1 Transparent Bridging Advanced Computer Networks.
10/13/2015© 2008 Raymond P. Jefferis IIILect 07 1 Internet Protocol.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
RIP2 (Routing Information Protocol) Team Agile. Routing Protocols Link State – OSPF – ISIS Distance vector – RIP (version 1 and 2) – IGRP (Cisco Proprietary)
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Chapter 15 Multicasting and Multicast Routing
Distance-vector Multicast Routing Protocol (DVMRP)
Lecture 17 November 8Intra-domain routing November 13Internet routing 1 November 15Internet routing 2 November 20End-to-end protocols 1 November 22End-to-end.
Networking and internetworking devices. Repeater.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
OSPF Open Shortest Path First. Table of Content  IP Routes  OSPF History  OSPF Design  OSPF Link State  OSPF Routing Table  OSPF Data Packets.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Internet routing protocols m RIP m OSPF m IGRP m BGP r Router architectures r IPv6 Today: r IPv6.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Network-Layer Routing Routing tasks are methods of finding the paths for packet from their sources to their destinations. Routers are responsible mainly.
Distance Vector Routing
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
4. Interconnecting Networks: Routers. © Tallal Elshabrawy 2 Bridges Vs Routers BRIDGES DO WELL IN SMALL (FEW HUNDRED HOSTS) WHILE ROUTERS USED IN LARGE.
6/12/2016© 2010 Raymond P. Jefferis IIILect The Network Layer.
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
22.1 Network Layer Delivery, Forwarding, and Routing.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Prof. Alfred J Bird, Ph.D., NBCT Office – McCormick 3rd floor 607 Office Hours – Monday 3:00 to 4:00 and.
+ Dynamic Routing Protocols 2 nd semester
Network Layer Routing Networks: Routing.
Routing Jennifer Rexford.
(How the routers’ tables are filled in)
Routing Protocols and Concepts
COMP 3270 Computer Networks
WAN Technologies and Routing
THE NETWORK LAYER.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing in Packet Networks Shortest Path Routing
Intradomain Routing Outline Introduction to Routing
Communication Networks NETW 501
Network Layer Routing Networks: Routing.
Chapter 22. Network Layer: Routing
Communication Networks
Communication Networks
Bridges Neil Tang 10/10/2008 CS440 Computer Networks.
Chapter 4: Network Layer
Network Layer Routing.
OSPF Protocol.
Presentation transcript:

4/12/2015© 2009 Raymond P. Jefferis IIILect Internet Protocol - Continued

4/12/2015© 2009 Raymond P. Jefferis IIILect Networks with Loops Learning strategies can fail, causing packets to circulate until maximum hop count Need method to generate a spanning tree –touches every node only once –has no closed loops

4/12/2015© 2009 Raymond P. Jefferis IIILect Perlman Spanning Tree Algorithm Developed for LAN bridges Each bridge blocks redundant ports Deleted ports unblocked upon link failure Algorithm –node with lowest identifier is “root” –root node forwards through all ports –each LAN has designated port “nearest” root –smallest identifier breaks ties

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network The network has two loops –one through the “60” network –one through the “80” network Root distances to networks are as follows: –“10” (d=0)– “60” (d=2, 3) –“20” (d=1) – “70” (d=3) –“30” (d=2)– “80” (d=1, 3) –“50” (d=2)

4/12/2015© 2009 Raymond P. Jefferis IIILect Procedure The longer route to the “60” network through B4 is “pruned” by designating Port 3 as the route from B3. The longer route to the “80” network through B4 is “pruned” by designating Port 3 as the route from B1. Ports 3 and 4 of B4 are blocked

4/12/2015© 2009 Raymond P. Jefferis IIILect Spanning Tree of Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Routing Table for B1

4/12/2015© 2009 Raymond P. Jefferis IIILect Distance Vector Routing Typically used with RIP protocol Bellman-Ford algorithm

4/12/2015© 2009 Raymond P. Jefferis IIILect Bellman-Ford Algorithm Find the shortest paths to the source vertex, given metric = 1 Assign cost to node(s) contacted Find next shortest path, to unassigned node and assign cost to it Continue until all nodes have costs assigned

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Initial Routing Table for R1

4/12/2015© 2009 Raymond P. Jefferis IIILect New Routing Information

4/12/2015© 2009 Raymond P. Jefferis IIILect Path of Length =1

4/12/2015© 2009 Raymond P. Jefferis IIILect Path of Length =2

4/12/2015© 2009 Raymond P. Jefferis IIILect Path of Length =3

4/12/2015© 2009 Raymond P. Jefferis IIILect Path of Length =4

4/12/2015© 2009 Raymond P. Jefferis IIILect Link State Routing Typically used with OSPF Dijkstra algorithm

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra’s Algorithm Computes shortest path from “root” node to all other nodes (routers) Method: –maintain list U of nodes with shortest paths assigned –maintain list V of neighbors of U list (1-hop) –choose shortest path from V and move to U

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra Algorithm - Step 1

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra Algorithm - Step 2

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra Algorithm - Step 3

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra Algorithm - Step 4

4/12/2015© 2009 Raymond P. Jefferis IIILect Example Network

4/12/2015© 2009 Raymond P. Jefferis IIILect Dijkstra Algorithm - Step 4

4/12/2015© 2009 Raymond P. Jefferis IIILect Reverse Path Forwarding Assumptions –each router stores shortest paths to all nodes –each router stores next-hop to all nodes Algorithm –source broadcasts multicast packet –each router retransmits packets on all outgoing ports except incoming only if incoming packet was from next-hop node to source

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect Example

4/12/2015© 2009 Raymond P. Jefferis IIILect RPF Tree from R1