Advance Computer Networks Lecture#08 Instructor: Engr. Muhammad Mateen Yaqoob.

Slides:



Advertisements
Similar presentations
Data and Computer Communications
Advertisements

Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Network Layer4-1 Hierarchical Routing scale: with 200 million destinations: r can’t store all dest’s in routing tables! r routing table exchange would.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
Path Vector Routing NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
Lecture 8 Overview. Graph abstraction u y x wv z Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v),
4a-1 CSE401: Computer Networks Hierarchical Routing & Routing in Internet S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
Computer Networks The Data Link / Network Layer Functions: Routing
Teknik Routing Pertemuan 20 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
14 – Inter/Intra-AS Routing
Routing Algorithms & Routing Protocols  Shortest Path Routing  Flooding  Distance Vector Routing  Link State Routing  Hierarchical Routing  Broadcast.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Data Communications & Computer Networks
Lecture 10 Overview. Border Gateway Protocol(BGP) De facto standard for Internet inter-AS routing allows subnet to advertise its existence to rest of.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
14 – Inter/Intra-AS Routing Network Layer Hierarchical Routing scale: with > 200 million destinations: can’t store all dest’s in routing tables!
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
Shortest Path. Dijkstra’s Algorithm finds the shortest path from the start vertex to every other vertex in the network. We will find the shortest path.
Chapter 12 Routing in Switched Networks. Routing in Packet Switched Network  key design issue for (packet) switched networks  select route across network.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Introduction 1 Lecture 21 Network Layer (Routing Activity) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
RSC Part II: Network Layer 6. Routing in the Internet (2 nd Part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
Introduction 1 Lecture 19 Network Layer (Routing Protocols) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
CS 3830 Day 29 Introduction 1-1. Announcements r Quiz 4 this Friday r Signup to demo prog4 (all group members must be present) r Written homework on chapter.
10-1 Last time □ Transitioning to IPv6 ♦ Tunneling ♦ Gateways □ Routing ♦ Graph abstraction ♦ Link-state routing Dijkstra's Algorithm ♦ Distance-vector.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Routing in the Internet The Global Internet consists of Autonomous Systems (AS) interconnected with eachother: Stub AS: small corporation Multihomed AS:
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Advance Computer Networks Lecture#08 Instructor: Engr. Muhammad Mateen Yaqoob.
1 Mao W07 Interdomain Routing Broadcast routing EECS 489 Computer Networks Z. Morley Mao Monday Feb 12, 2007.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
William Stallings Data and Computer Communications 7th Edition
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Network Layer4-1 Routing Algorithm Classification Global or decentralized information? Global: r all routers have complete topology, link cost info r “link.
Advance Computer Networks Lecture#07 to 08 Instructor: Engr. Muhammad Mateen Yaqoob.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Routing in the Internet
14 – Inter/Intra-AS Routing
Homework 4 Out: Fri 2/24/2017 In: Fri 3/10/2017.
Chapter 4: Network Layer
CS 5565 Network Architecture and Protocols
Homework 4 Out: Fri 2/26/2016 In: Fri 3/11/2016.
Chapter 4: Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides:
Shortest Path.
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4: Network Layer
Shortest Path.
Chapter 4: Network Layer
Computer Networks Protocols
Network Layer: Internet Inter-Domain Routing
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

Advance Computer Networks Lecture#08 Instructor: Engr. Muhammad Mateen Yaqoob

Network Information Source and Update Timing routing decisions usually based on knowledge of network (not always) ◦distributed routing ◦using local knowledge, info from adjacent nodes, info from all nodes on a potential route ◦central routing ◦collect info from all nodes issue of update timing ◦when is network info held by nodes updated ◦fixed - never updated ◦adaptive - regular updates MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Routing Strategies - Fixed Routing use a single permanent route for each source to destination pair determined using a least cost algorithm route is fixed ◦at least until a change in network topology ◦hence cannot respond to traffic changes advantage is simplicity disadvantage is lack of flexibility MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Routing Strategies - Flooding packet sent by node to every neighbor eventually multiple copies arrive at destination no network info required each packet is uniquely numbered so duplicates can be discarded need some way to limit incessant retransmission ◦nodes can remember packets already forwarded to keep network load in bounds ◦or include a hop count in packets MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Properties of Flooding all possible routes are tried ◦very robust at least one packet will have taken minimum hop count route ◦can be used to set up virtual circuit all nodes are visited ◦useful to distribute information (eg. routing) disadvantage is high traffic load generated MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Routing Strategies - Random Routing simplicity of flooding with much less load node selects one outgoing path for retransmission of incoming packet selection can be random or round robin a refinement is to select outgoing path based on probability calculation no network info needed but a random route is typically neither least cost nor minimum hop MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Routing Strategies - Adaptive Routing used by almost all packet switching networks routing decisions change as conditions on the network change due to failure or congestion requires info about network disadvantages: ◦decisions more complex ◦tradeoff between quality of network info and overhead ◦reacting too slowly means info may be irrelevant MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Adaptive Routing - Advantages improved performance aid congestion control but since is a complex system, may not realize theoretical benefits ◦cf. outages on many packet-switched nets MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Classification of Adaptive Routing Startegies based on information sources ◦local (isolated) ◦route to outgoing link with shortest queue ◦can include bias for each destination ◦Rarely used - does not make use of available info ◦adjacent nodes ◦takes advantage on delay / outage info ◦distributed or centralized ◦all nodes ◦like adjacent MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm finds shortest paths from given source node s to all other nodes by developing paths in order of increasing path length algorithm runs in stages each time adding node with next shortest path algorithm terminates when all nodes processed by algorithm (in set T) MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm finds the shortest path from the start vertex to every other vertex in the network. We will find the shortest path from A to G A C D B F E G MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm 1.Label the start vertex with permanent label 0 and order label 1 2Assign temporary labels to all the vertices that can be reached directly from the start 3Select the vertex with the smallest temporary label and make its label permanent. Add the correct order label. 4Put temporary labels on each vertex that can be reached directly from the vertex you have just made permanent. The temporary label must be equal to the sum of the permanent label and the direct distance from it. If there is an existing temporary label at a vertex, it should be replaced only if the new sum is smaller. 5Select the vertex with the smallest temporary label and make its label permanent. Add the correct order label. 6Repeat until the finishing vertex has a permanent label. 7To find the shortest paths(s), trace back from the end vertex to the start vertex. Write the route forwards and state the length. MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm Order in which vertices are labelled. Distance from A to vertex Working A C D B F E G Label vertex A 1 as it is the first vertex labelled MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to A with a ‘working value’ for its distance from A. 1 0 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G Vertex C is closest to A so we give it a permanent label 3. C is the 2 nd vertex to be permanently labelled. 1 0 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm We update each vertex adjacent to C with a ‘working value’ for its total distance from A, by adding its distance from C to C’s permanent label of A C D B F E G < 7 so replace the t-label here MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is B, so make this label permanent. B is the 3 rd vertex to be permanently labelled. 3 4 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to B with a ‘working value’ for its total distance from A, by adding its distance from B to B’s permanent label of < 6 so replace the t-label here MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is D, so make this label permanent. D is the 4 th vertex to be permanently labelled. 4 5 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to D with a ‘working value’ for its total distance from A, by adding its distance from D to D’s permanent label of 5. 7 < 8 so replace the t-label here < 8 so replace the t-label here 7 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G The vertices with the smallest temporary labels are E and F, so choose one and make the label permanent. E is chosen - the 5 th vertex to be permanently labelled. 5 7 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to E with a ‘working value’ for its total distance from A, by adding its distance from E to E’s permanent label of 7. 9 < 12 so replace the t-label here 9 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is F, so make this label permanent.F is the 6 th vertex to be permanently labelled MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to F with a ‘working value’ for its total distance from A, by adding its distance from F to F’s permanent label of > 9 so do not replace the t-label here MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G G is the final vertex to be permanently labelled. 7 9 MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra’s Algorithm A C D B F E G To find the shortest path from A to G, start from G and work backwards, choosing arcs for which the difference between the permanent labels is equal to the arc length. The shortest path is ABDEG, with length 9. MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Dijkstra's ◦each node needs complete topology ◦must know link costs of all links in network ◦must exchange information with all other nodes MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Evaluation dependent on ◦processing time of algorithms ◦amount of information required from other nodes implementation specific under static topology and costs resulting to same solution as other algorithms if link costs change, algs attempt to catch up if link costs depend on traffic, which depends on routes chosen, may have feedback instability MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Hierarchical routing scale: with 600 million destinations: can’t store all dest’s in routing tables! routing table exchange would swamp links! administrative autonomy  internet = network of networks  each network admin may want to control routing in its own network our routing study thus far - idealization  all routers identical  network “flat” … not true in practice

Hierarchical routing aggregate routers into regions, “autonomous systems” (AS) routers in same AS run same routing protocol ◦“intra-AS” routing protocol ◦routers in different AS can run different intra-AS routing protocol gateway router: at “edge” of its own AS has link to router in another AS MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b Intra-AS Routing algorithm Inter-AS Routing algorithm Forwarding table 3c Interconnected ASs  forwarding table configured by both intra- and inter-AS routing algorithm  intra-AS sets entries for internal dests  inter-AS & intra-AS sets entries for external dests

Inter-AS tasks  suppose router in AS1 receives datagram destined outside of AS1:  router should forward packet to gateway router, but which one? AS1 must: 1.learn which dests are reachable through AS2, which through AS3 2.propagate this reachability info to all routers in AS1 job of inter-AS routing! MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks

Distance vector algorithm Bellman-Ford equation (dynamic programming) let d x (y) := cost of least-cost path from x to y then d x (y) = min {c(x,v) + d v (y) } MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE v cost to neighbor v min taken over all neighbors v of x cost from neighbor v to destination y

MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE Bellman-Ford example u y x wv z clearly, d v (z) = 8, d x (z) = 3, d w (z) = 5 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 8, 1 + 3, 5 + 5} = 4 node achieving minimum is next hop in shortest path, used in forwarding table B-F equation says:

MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE RIP (Routing Information Protocol) included in BSD-UNIX distribution in 1982 distance vector algorithm ◦distance metric: # hops (max = 15 hops), each link has cost 1 ◦DVs exchanged with neighbors every 30 sec in response message (aka advertisement) ◦each advertisement: list of up to 25 destination subnets (in IP addressing sense) D C BA u v w x y z subnet hops u 1 v 2 w 2 x 3 y 3 z 2 from router A to destination subnets:

RIP: link failure, recovery if no advertisement heard after 180 sec --> neighbor/link declared dead  routes via neighbor invalidated  new advertisements sent to neighbors  neighbors in turn send out new advertisements (if tables changed)  link failure info quickly (?) propagates to entire network MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

OSPF (Open Shortest Path First) “open”: publicly available uses link state algorithm ◦LS packet dissemination ◦topology map at each node ◦route computation using Dijkstra’s algorithm OSPF advertisement carries one entry per neighbor advertisements flooded to entire AS ◦carried in OSPF messages directly over IP (rather than TCP or UDP IS-IS routing protocol: nearly identical to OSPF MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

OSPF “advanced” features (not in RIP) security: all OSPF messages authenticated (to prevent malicious intrusion) multiple same-cost paths allowed (only one path in RIP) for each link, multiple cost metrics for different TOS (e.g., satellite link cost set “low” for best effort ToS; high for real time ToS) integrated uni- and multicast support: ◦Multicast OSPF (MOSPF) uses same topology data base as OSPF hierarchical OSPF in large domains. MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Internet inter-AS routing: BGP BGP (Border Gateway Protocol): the de facto inter-domain routing protocol ◦BGP uses two primary modes of information exchange, internal BGP (IBGP) and external BGP (EBGP), to communicate with internal and external peers, respectively BGP provides each AS a means to: ◦eBGP: obtain subnet reachability information from neighboring ASs. ◦iBGP: propagate reachability information to all AS-internal routers. ◦determine “good” routes to other networks based on reachability information and policy. allows subnet to advertise its existence to rest of Internet: “I am here” MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

BGP basics when AS3 advertises a prefix to AS1: ◦AS3 promises it will forward datagrams towards that prefix ◦AS3 can aggregate prefixes in its advertisement AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks  BGP session: two BGP routers (“peers”) exchange BGP messages:  advertising paths to different destination network prefixes (“path vector” protocol)  exchanged over semi-permanent TCP connections BGP message

BGP basics: distributing path information  using eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1.  1c can then use iBGP do distribute new prefix info to all routers in AS1  1b can then re-advertise new reachability info to AS2 over 1b-to-2a eBGP session  when router learns of new prefix, it creates entry for prefix in its forwarding table. MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE AS3 AS2 3b 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks eBGP session iBGP session

Path attributes and BGP routes advertised prefix includes BGP attributes ◦prefix + attributes = “route” two important attributes: ◦AS-PATH: contains ASs through which prefix advertisement has passed: e.g., AS 67, AS 17 ◦NEXT-HOP: indicates specific internal-AS router to next-hop AS. (may be multiple links from current AS to next-hop-AS) gateway router receiving route advertisement uses import policy to accept/decline ◦e.g., never route through AS x ◦policy-based routing MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

BGP route selection  router may learn about more than 1 route to destination AS, selects route based on: 1.local preference value attribute: policy decision 2.shortest AS-PATH 3.closest NEXT-HOP router: hot potato routing 4.additional criteria MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE

Why different Intra-, Inter-AS routing ? policy: inter-AS: admin wants control over how its traffic routed, who routes through its net. intra-AS: single admin, so no policy decisions needed scale: hierarchical routing saves table size, reduced update traffic performance: intra-AS: can focus on performance inter-AS: policy may dominate over performance MATEEN YAQOOB DEPARTMENT OF COMPUTER SCIENCE