CECS 474 Computer Network Interoperability WAN Technologies & Routing

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Network Layer – Routing 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Routing: Cores, Peers and Algorithms
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
IP: The Internet Protocol
CSCI 4550/8556 Computer Networks Comer, Chapter 25: Internet Routing.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets, 5e By Douglas E. Comer Lecture PowerPoints.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 12 Introduction to Networks and the Internet.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Delivery, Forwarding, and Routing
CSCI 4550/8556 Computer Networks Comer, Chapter 13: WAN Technologies and Routing.
1 Chapter 10 Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
WAN Technologies.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
WAN Technologies & Topologies Lecture 8 October 4, 2000.
Chapter 13: WAN Technologies and Routing 1. LAN vs. WAN 2. Packet switch 3. Forming a WAN 4. Addressing in WAN 5. Routing in WAN 6. Modeling WAN using.
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Packet-Switching Networks Routing in Packet Networks.
1 Chapter Wide Area Networks (WANs), Routing, and Shortest Paths.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
18-WAN Technologies and Dynamic routing Dr. John P. Abraham Professor UTPA.
G64INC Introduction to Network Communications
Day 12 Chapter 13 WAN Technologies and Routing. Classification of Networks LAN – spans a single building or campus MAN – Spans a city WAN – Spans multiple.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 WAN Technologies and Routing. 2 Motivation Connect multiple computers Span large geographic distance Cross public right-of-way –Streets –Buildings –Railroads.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Internet Protocol: Routing IP Datagrams Chapter 8.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Internetworking, WANs, and Dynamic Routing.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
SEPT, 2005CSI Part 3.1 Wide Area Networks (WANs), Routing, and Shortest Paths Robert L. Probert, SITE, University of Ottawa.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
SEPT, 2003CSI Part 1.3 Wide Area Networks (WANs), Routing, and Shortest Paths Robert L. Probert, SITE, University of Ottawa.
18-WAN Technologies and Dynamic routing Dr. John P. Abraham Professor UTPA.
Distance Vector and Link State Routing Pragyaditya Das.
WAN Technologies. 2 Large Spans and Wide Area Networks MAN networks: Have not been commercially successful.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
COMPUTER NETWORKS CS610 Lecture-17 Hammad Khalid Khan.
+ Dynamic Routing Protocols 2 nd semester
The Underlying Technologies
Ch 13 WAN Technologies and Routing
WAN Technologies and Routing
THE NETWORK LAYER.
18-WAN Technologies and Dynamic routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Wide Area Networks (WANs), Routing, and Shortest Paths
Wide Area Networks (WANs), Routing, and Shortest Paths
Wide Area Networks (WANs), Routing, and Shortest Paths
Wide Area Networks (WANs), Routing, and Shortest Paths
COMPUTER NETWORKS CS610 Lecture-16 Hammad Khalid Khan.
Presentation transcript:

CECS 474 Computer Network Interoperability WAN Technologies & Routing CHAPTER 18 WAN Technologies & Routing Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science California State University, Long Beach Notes for Douglas E. Comer, Computer Networks and Internets (5th Edition)

Large Networks and Wide Areas   LANs Usually span a single building. Limited by size (unless connected by satellite bridges) => Limited scalability WANs Can span large geographic distances. Can cross public right-of-ways (streets, buildings, railroads). Deliver high (or reasonable) performance for many users. KEY ADVANTAGE => Scalability A WAN must be able to grow as needed to connect many sites spread across large geographic distances. A technology is not classified as a WAN unless it can deliver reasonable performance for a large scale network. WANs are constructed out of: Point-to-point long-distance connections Packet Switches

Packet Switches Packet switches are: Hardware devices   Packet switches are: Hardware devices They connect to other packet switches or computers They forward packets They use destination IP addresses for forwarding Packet switches are special-purpose computer systems consisting of: CPU Memory I/O interfaces Firmware   Two types of I/O devices are used: High speed -- to connect to other packet switches Lower speed -- to connect to individual computers

Modern WAN Architecture

Forming a WAN   WANs are formed by placing one or more packet switches at each site. Switches are interconnected using: LAN technology for local connections. Leased digital circuits for long-distance connections. The switches can be connected asymmetrically.   The number and type of interconnections depend on: The estimated traffic. The reliability needed. The cost of the link.

Physical Addressing in a WAN Store and Forward   Store and forward is the basic paradigm used in packet switched networks. Each Packet: Is sent from the source computer. Travels from switch-to-switch across the network. Is delivered to the destination. At Each Switch: Packets are “stored” in memory. The packet’s destination address is examined. The packet is forwarded toward the destination. Physical Addressing in a WAN WANs require: A unique address for each computer An efficient forwarding scheme. A two-part address is used with: A packet switch number. Specific computer on that switch.

Illustration of WAN Addressing The figure shows the two-part addresses.   In practice, the addresses are encoded as a single binary value with: The high-order bits for the switch number. The low-order bits for the computer number. Users and application programs can treat the address as a single integer, they do not need to know that addresses are assigned hierarchically.

Next-Hop Forwarding Next-hop forwarding is Performed by packet switches Uses a table of routes (Called a Forwarding Table and created by a routing algorithm) The table gives the next hop

Source Independence and Hierarchical Routing   Defn: Source independence means that Next-hop forwarding does not depend on the packet’s original source or on any paths the packet has taken before it arrives at a particular switch. Source independence allows the forwarding on switches to be compact and efficient. Defn: A forwarding table is the table of next-hop information stored in a switch. When forwarding a packet to another switch, a switch examines only the first part of the hierarchical address. A switch needs to look at the second part of the hierarchical address only if the destination machine is attached to that switch. Condensing the entries improves efficiency.

Routing in a WAN There are two sources of routing table information:   There are two sources of routing table information: 1. Manual (seldom used) The table is created by hand Useful in small networks Useful if routes never change 2. Automatic routing Software creates/updates the tables Needed in large networks Software changes routes when failures occur

Routing and Graph Theory Model a network as a graph with: Each switch as a node Each connection as an edge

Default Routes A large WAN may contain hundreds of duplicate entries.   A large WAN may contain hundreds of duplicate entries. A default route is a mechanism that allows a single entry in a forwarding table to replace a long list of entries that have the same next-hop value. only one default entry is allowed in a forwarding table the default route has lower priority than other entries If the forwarding mechanism does not find an explicit entry for a given destination it uses the default.

Shortest Path Computation   Shortest paths through the network can be computed using: Algorithms from graph theory Distributed computation (no central authority) A switch: Must learn the route to each destination Only communicates directly with attached neighbors For the above graph, the label on each edge represents the “distance” metric Geographic distance Economic cost Inverse of capacity

Algorithms for Computing the Shortest Paths   Both of these approaches are used in practice to compute the shortest paths: Distance Vector (DV) Switches exchange information with their neighbors and then use the Distance Vector algorithm. Use the Bellman-Ford Algorithm. Link-State Switches exchange link status information and then use Dijkstra’s algorithm. Broadcasting information. The Distance Vector Algorithm Periodically, exchange data between neighboring switches giving your information about the paths of the network. During the exchange, the switches send: List of pairs giving the (destination, distance) of connections The receiving switch: --Compares each item in the switch to local routes --Changes the routes if a better path exists

Distance Vector Intuition   Let N be the neighbor that sent the routing message V be the destination in the pair D be the distance in the pair C be D plus the cost to reach the sender If no local route to V exists, or if the local route has a greater cost than C, install a route with next hop N and cost C. Else ignore the pair. Example for Distance Vector Routing Note: In DV Routing, the information that is passed from one node to another, takes time to propagate through the entire network. “Good news travels quickly” but “Bad news travels slowly” Consider transmission of one DV message: Node 2 sends to 3, 5 and 6 Node 6 installs cost 8 for route 2 Later 3 sends update to 6 6 changes route to make 3 the next-hop for destination 2

Dijkstra’s Shortest Path Algorithm Link-State Routing   Overcomes some of the instabilities of Distance Vector Routing. Pairs of switches periodically: Test the link between them Broadcast a link status message Each switch: Receives the status message Computes new routes Uses Dijkstra’s algorithm Dijkstra’s Shortest Path Algorithm   Input: • Graph with weighted edges Node, n Output: • Set of shortest paths from n to each node Cost of each path Called the Shortest Path First (SPF) algorithm.

Dijskra’s Algorithm Intuition   Start with self as the source node Move outward At each step: Find node u such that it Has not been considered Is “closest” to the source Compute Distance from u to each neighbor v If the distance is shorter than what is currently recorded, make a path from u go through v Example: Routes from node 6: To node 3: next hop = 3, cost = 2 To node 2: next hop = 3, cost = 5 To node 7: next hop = 7, cost = 5 To node 4: next hop = 7, cost = 8 To node 5: next hop = 3, cost = 11 To node 1: next hop = 3, cost = 20