Advance Computer Networks Lecture#07 to 08 Instructor: Engr. Muhammad Mateen Yaqoob.

Slides:



Advertisements
Similar presentations
Network Layer4-1 Hierarchical Routing scale: with 200 million destinations: r can’t store all dest’s in routing tables! r routing table exchange would.
Advertisements

Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 22 Omar Meqdadi Department of Computer Science and Software Engineering University.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
13 –Routing Protocols Network Layer4-1. Network Layer4-2 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd.
Lecture 8 Overview. Graph abstraction u y x wv z Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v),
4a-1 CSE401: Computer Networks Hierarchical Routing & Routing in Internet S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
Data Communication and Networks Lectures 8 and 9 Networks: Part 2 Routing Algorithms and Routing Protocols October 26, November 2, 2006.
0 TDTS41 Computer Networks Lecture 4: Network layer I Claudiu Duma, IISLAB/IDA Linköpings universitet.
Network Layer4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 Routing Principles 4.3 Hierarchical Routing 4.4 The Internet (IP) Protocol.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 Lecture 12: Routing Slides adapted from: Computer Networks: A Systems Approach (Peterson and Davis) Computer Networking: A Top Down Approach Featuring.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
Routing Algorithms and Routing in the Internet
CPSC441: Routing1 Instructor: Anirban Mahanti Office: ICT Class Location: ICT 121 Lectures: MWF 12:00 – 12:50 hours.
Network Layer4-1 Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross.
14 – Inter/Intra-AS Routing
Routing Algorithms & Routing Protocols  Shortest Path Routing  Flooding  Distance Vector Routing  Link State Routing  Hierarchical Routing  Broadcast.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 18.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
14 – Inter/Intra-AS Routing Network Layer Hierarchical Routing scale: with > 200 million destinations: can’t store all dest’s in routing tables!
Advance Computer Networks Lecture#08 Instructor: Engr. Muhammad Mateen Yaqoob.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Introduction 1 Lecture 21 Network Layer (Routing Activity) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
RSC Part II: Network Layer 6. Routing in the Internet (2 nd Part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
Introduction 1 Lecture 19 Network Layer (Routing Protocols) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
Network Layer4-1 Chapter 4 Network Layer Part 3: Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March.
10-1 Last time □ Transitioning to IPv6 ♦ Tunneling ♦ Gateways □ Routing ♦ Graph abstraction ♦ Link-state routing Dijkstra's Algorithm ♦ Distance-vector.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 The slides are adaptation.
13 – Routing Algorithms Network Layer.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Routing in the Internet The Global Internet consists of Autonomous Systems (AS) interconnected with eachother: Stub AS: small corporation Multihomed AS:
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
Advance Computer Networks Lecture#08 Instructor: Engr. Muhammad Mateen Yaqoob.
1 Mao W07 Interdomain Routing Broadcast routing EECS 489 Computer Networks Z. Morley Mao Monday Feb 12, 2007.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Introduction 1 Lecture 19 Network Layer (Routing Algorithms) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 20 Omar Meqdadi Department of Computer Science and Software Engineering University.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Chapter4_3.
CS 4284 Systems Capstone Godmar Back Networking. CS 4284 Spring 2013 Summary Basics of Network Layer –Routing (path selection) vs Forwarding (switching)
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Network Layer4-1 Routing Algorithm Classification Global or decentralized information? Global: r all routers have complete topology, link cost info r “link.
CS 1652 The slides are adapted from the publisher’s material All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Jack Lange.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
4: Network Layer4a-1 Distance Vector Routing Algorithm iterative: r continues until no nodes exchange info. r self-terminating: no “signal” to stop asynchronous:
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Network Layer4-1 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol.
Routing in the Internet
14 – Inter/Intra-AS Routing
Homework 4 Out: Fri 2/24/2017 In: Fri 3/10/2017.
Chapter 4: Network Layer
CS 5565 Network Architecture and Protocols
Homework 4 Out: Fri 2/26/2016 In: Fri 3/11/2016.
Chapter 4: Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides:
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

Advance Computer Networks Lecture#07 to 08 Instructor: Engr. Muhammad Mateen Yaqoob

Mateen Yaqoob Department of Computer Science u y x wv z graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v), (u,x), (v,x), (v,w), (x,w), (x,y), (w,y), (w,z), (y,z) } Graph abstraction aside: graph abstraction is useful in other network contexts, e.g., P2P, where N is set of peers and E is set of TCP connections

Mateen Yaqoob Department of Computer Science Graph abstraction: costs u y x wv z c(x,x’) = cost of link (x,x’) e.g., c(w,z) = 5 cost could always be 1, or inversely related to bandwidth, or inversely related to congestion cost of path (x 1, x 2, x 3,…, x p ) = c(x 1,x 2 ) + c(x 2,x 3 ) + … + c(x p-1,x p ) key question: what is the least-cost path between u and z ? routing algorithm: algorithm that finds that least cost path

Mateen Yaqoob Department of Computer Science Routing algorithm classification Q: global or decentralized information? global:  all routers have complete topology, link cost info  “link state” algorithms decentralized:  router knows physically- connected neighbors, link costs to neighbors  iterative process of computation, exchange of info with neighbors  “distance vector” algorithms Q: static or dynamic? static:  routes change slowly over time dynamic:  routes change more quickly  periodic update  in response to link cost changes

Mateen Yaqoob Department of Computer Science A Link-State Routing Algorithm Dijkstra’s algorithm  net topology, link costs known to all nodes  accomplished via “link state broadcast”  all nodes have same info  computes least cost paths from one node (‘source”) to all other nodes  gives forwarding table for that node  iterative: after k iterations, know least cost path to k dest.’s notation:  c(x,y): link cost from node x to y; = ∞ if not direct neighbors  D(v): current value of cost of path from source to dest. v  p(v): predecessor node along path from source to v  N': set of nodes whose least cost path definitively known

Dijkstra’s Algorithm finds the shortest path from the start vertex to every other vertex in the network. We will find the shortest path from A to G A C D B F E G Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm Order in which vertices are labelled. Distance from A to vertex Working A C D B F E G Label vertex A 1 as it is the first vertex labelled Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to A with a ‘working value’ for its distance from A. 1 0 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G Vertex C is closest to A so we give it a permanent label 3. C is the 2 nd vertex to be permanently labelled. 1 0 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm We update each vertex adjacent to C with a ‘working value’ for its total distance from A, by adding its distance from C to C’s permanent label of A C D B F E G < 7 so replace the t-label here Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is B, so make this label permanent. B is the 3 rd vertex to be permanently labelled. 3 4 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to B with a ‘working value’ for its total distance from A, by adding its distance from B to B’s permanent label of < 6 so replace the t-label here Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is D, so make this label permanent. D is the 4 th vertex to be permanently labelled. 4 5 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to D with a ‘working value’ for its total distance from A, by adding its distance from D to D’s permanent label of 5. 7 < 8 so replace the t-label here < 8 so replace the t-label here 7 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G The vertices with the smallest temporary labels are E and F, so choose one and make the label permanent. E is chosen - the 5 th vertex to be permanently labelled. 5 7 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to E with a ‘working value’ for its total distance from A, by adding its distance from E to E’s permanent label of 7. 9 < 12 so replace the t-label here 9 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G The vertex with the smallest temporary label is F, so make this label permanent.F is the 6 th vertex to be permanently labelled Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G We update each vertex adjacent to F with a ‘working value’ for its total distance from A, by adding its distance from F to F’s permanent label of > 9 so do not replace the t-label here Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G G is the final vertex to be permanently labelled. 7 9 Mateen Yaqoob Department of Computer Science

Dijkstra’s Algorithm A C D B F E G To find the shortest path from A to G, start from G and work backwards, choosing arcs for which the difference between the permanent labels is equal to the arc length. The shortest path is ABDEG, with length 9. Mateen Yaqoob Department of Computer Science

Dijkstra's  Dijkstra's  each node needs complete topology  must know link costs of all links in network  must exchange information with all other nodes Mateen Yaqoob Department of Computer Science

Distance vector algorithm Bellman-Ford equation (dynamic programming) let d x (y) := cost of least-cost path from x to y then d x (y) = min {c(x,v) + d v (y) } v cost to neighbor v min taken over all neighbors v of x cost from neighbor v to destination y

Mateen Yaqoob Department of Computer Science Bellman-Ford example u y x wv z clearly, d v (z) = 5, d x (z) = 3, d w (z) = 3 d u (z) = min { c(u,v) + d v (z), c(u,x) + d x (z), c(u,w) + d w (z) } = min {2 + 5, 1 + 3, 5 + 3} = 4 node achieving minimum is next hop in shortest path, used in forwarding table B-F equation says:

Mateen Yaqoob Department of Computer Science Distance vector algorithm  D x (y) = estimate of least cost from x to y  x maintains distance vector D x = [D x (y): y є N ]  node x:  knows cost to each neighbor v: c(x,v)  maintains its neighbors’ distance vectors. For each neighbor v, x maintains D v = [D v (y): y є N ]

Mateen Yaqoob Department of Computer Science key idea:  from time-to-time, each node sends its own distance vector estimate to neighbors  when x receives new DV estimate from neighbor, it updates its own DV using B-F equation: D x (y) ← min v {c(x,v) + D v (y)} for each node y ∊ N  under minor, natural conditions, the estimate D x (y) converge to the actual least cost d x (y) Distance vector algorithm

Mateen Yaqoob Department of Computer Science iterative, asynchronous: each local iteration caused by:  local link cost change  DV update message from neighbor distributed:  each node notifies neighbors only when its DV changes  neighbors then notify their neighbors if necessary wait for (change in local link cost or msg from neighbor) recompute estimates if DV to any dest has changed, notify neighbors each node: Distance vector algorithm

Mateen Yaqoob Department of Computer Science Comparison of LS and DV algorithms message complexity  LS: with n nodes, E links, O(nE) msgs sent  DV: exchange between neighbors only  convergence time varies speed of convergence  LS: O(n 2 ) algorithm requires O(nE) msgs  may have oscillations  DV: convergence time varies  may be routing loops  count-to-infinity problem robustness: what happens if router malfunctions? LS:  node can advertise incorrect link cost  each node computes only its own table DV:  DV node can advertise incorrect path cost  each node’s table used by others error propagate thru network

Mateen Yaqoob Department of Computer Science Hierarchical routing scale: with 600 million destinations:  can’t store all dest’s in routing tables!  routing table exchange would swamp links! administrative autonomy  internet = network of networks  each network admin may want to control routing in its own network our routing study thus far - idealization  all routers identical  network “flat” … not true in practice

Mateen Yaqoob Department of Computer Science  aggregate routers into regions, “autonomous systems” (AS)  routers in same AS run same routing protocol  “intra-AS” routing protocol  routers in different AS can run different intra- AS routing protocol gateway router:  at “edge” of its own AS  has link to router in another AS Hierarchical routing

Mateen Yaqoob Department of Computer Science 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b Intra-AS Routing algorithm Inter-AS Routing algorithm Forwarding table 3c Interconnected ASes  forwarding table configured by both intra- and inter-AS routing algorithm  intra-AS sets entries for internal dests  inter-AS & intra-AS sets entries for external dests

Mateen Yaqoob Department of Computer Science Inter-AS tasks  suppose router in AS1 receives datagram destined outside of AS1:  router should forward packet to gateway router, but which one? AS1 must: 1. learn which dests are reachable through AS2, which through AS3 2. propagate this reachability info to all routers in AS1 job of inter-AS routing! AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks

Mateen Yaqoob Department of Computer Science Intra-AS Routing  also known as interior gateway protocols (IGP)  most common intra-AS routing protocols:  RIP: Routing Information Protocol  OSPF: Open Shortest Path First  IGRP: Interior Gateway Routing Protocol (Cisco proprietary)

Mateen Yaqoob Department of Computer Science RIP ( Routing Information Protocol)  included in BSD-UNIX distribution in 1982  distance vector algorithm  distance metric: # hops (max = 15 hops), each link has cost 1  DVs exchanged with neighbors every 30 sec in response message (aka advertisement)  each advertisement: list of up to 25 destination subnets (in IP addressing sense) D C BA u v w x y z subnet hops u 1 v 2 w 2 x 3 y 3 z 2 from router A to destination subnets:

Mateen Yaqoob Department of Computer Science RIP: link failure, recovery if no advertisement heard after 180 sec --> neighbor/link declared dead  routes via neighbor invalidated  new advertisements sent to neighbors  neighbors in turn send out new advertisements (if tables changed)  link failure info quickly (?) propagates to entire net  poison reverse used to prevent ping-pong loops (infinite distance = 16 hops)

Mateen Yaqoob Department of Computer Science RIP table processing  RIP routing tables managed by application-level process called route- d (daemon)  advertisements sent in UDP packets, periodically repeated physical link network forwarding (IP) table transport (UDP) routed physical link network (IP) transprt (UDP) routed forwarding table

Mateen Yaqoob Department of Computer Science OSPF (Open Shortest Path First)  “open”: publicly available  uses link state algorithm  LS packet dissemination  topology map at each node  route computation using Dijkstra’s algorithm  OSPF advertisement carries one entry per neighbor  advertisements flooded to entire AS  carried in OSPF messages directly over IP (rather than TCP or UDP  IS-IS routing protocol: nearly identical to OSPF

Mateen Yaqoob Department of Computer Science OSPF “advanced” features (not in RIP)  security: all OSPF messages authenticated (to prevent malicious intrusion)  multiple same-cost paths allowed (only one path in RIP)  for each link, multiple cost metrics for different TOS (e.g., satellite link cost set “low” for best effort ToS; high for real time ToS)  integrated uni- and multicast support:  Multicast OSPF (MOSPF) uses same topology data base as OSPF  hierarchical OSPF in large domains.

Mateen Yaqoob Department of Computer Science Hierarchical OSPF boundary router backbone router area 1 area 2 area 3 backbone area border routers internal routers

Mateen Yaqoob Department of Computer Science  two-level hierarchy: local area, backbone.  link-state advertisements only in area  each nodes has detailed area topology; only know direction (shortest path) to nets in other areas.  area border routers: “summarize” distances to nets in own area, advertise to other Area Border routers.  backbone routers: run OSPF routing limited to backbone.  boundary routers: connect to other AS’s. Hierarchical OSPF

Mateen Yaqoob Department of Computer Science Internet inter-AS routing: BGP  BGP (Border Gateway Protocol): the de facto inter-domain routing protocol  “glue that holds the Internet together”  BGP provides each AS a means to:  eBGP: obtain subnet reachability information from neighboring ASs.  iBGP: propagate reachability information to all AS- internal routers.  determine “good” routes to other networks based on reachability information and policy.  allows subnet to advertise its existence to rest of Internet: “I am here”

Mateen Yaqoob Department of Computer Science BGP basics  when AS3 advertises a prefix to AS1:  AS3 promises it will forward datagrams towards that prefix  AS3 can aggregate prefixes in its advertisement AS3 AS2 3b 3c 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks  BGP session: two BGP routers (“peers”) exchange BGP messages:  advertising paths to different destination network prefixes (“path vector” protocol)  exchanged over semi-permanent TCP connections BGP message

Mateen Yaqoob Department of Computer Science BGP basics: distributing path information AS3 AS2 3b 3a AS1 1c 1a 1d 1b 2a 2c 2b other networks other networks  using eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1.  1c can then use iBGP do distribute new prefix info to all routers in AS1  1b can then re-advertise new reachability info to AS2 over 1b-to- 2a eBGP session  when router learns of new prefix, it creates entry for prefix in its forwarding table. eBGP session iBGP session

Mateen Yaqoob Department of Computer Science Path attributes and BGP routes  advertised prefix includes BGP attributes  prefix + attributes = “route”  two important attributes:  AS-PATH: contains ASs through which prefix advertisement has passed: e.g., AS 67, AS 17  NEXT-HOP: indicates specific internal-AS router to next- hop AS. (may be multiple links from current AS to next- hop-AS)  gateway router receiving route advertisement uses import policy to accept/decline  e.g., never route through AS x  policy-based routing