4.5 Routing Algorithms

Size: px
Start display at page:

Download "4.5 Routing Algorithms"

Transcription

1 4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit fields to the segment, and encapsulates the resulting paload in an ordinar IP datagram. (It s actuall a little more complicated than this, as e ll see in Chapter 8.) The sending host then sends the datagram into the Internet, hich transports it to the destination host. There, IPsec decrpts the segment and passes the unencrpted segment to the transport laer. The services provided b an IPsec session include: Crptographic agreement. Mechanisms that allo the to communicating hosts to agree on crptographic algorithms and kes. Encrption of IP datagram paloads. When the sending host receives a segment from the transport laer, IPsec encrpts the paload. The paload can onl be decrpted b IPsec in the receiving host. Data integrit. IPsec allos the receiving host to verif that the datagram s header fields and encrpted paload ere not modified hile the datagram as en route from source to destination. Origin authentication. When a host receives an IPsec datagram from a trusted source (ith a trusted ke see Chapter 8), the host is assured that the source IP address in the datagram is the actual source of the datagram. When to hosts have an IPsec session established beteen them, all TCP and UDP segments sent beteen them ill be encrpted and authenticated. IPsec therefore provides blanket coverage, securing all communication beteen the to hosts for all netork applications. A compan can use IPsec to communicate securel in the nonsecure public Internet. For illustrative purposes, e ll just look at a simple example here. Consider a compan that has a large number of traveling salespeople, each possessing a compan laptop computer. Suppose the salespeople need to frequentl consult sensitive compan information (for example, pricing and product information) that is stored on a server in the compan s headquarters. Further suppose that the salespeople also need to send sensitive documents to each other. Ho can this be done ith IPsec? As ou might guess, e install IPsec in the server and in all of the salespeople s laptops. With IPsec installed in these hosts, henever a salesperson needs to communicate ith the server or ith another salesperson, the communication session ill be secure. 4.5 Routing Algorithms So far in this chapter, e ve mostl explored the netork laer s forarding function. We learned that hen a packet arrives to a router, the router indexes a forarding table and determines the link interface to hich the packet is to be directed. We also learned that routing algorithms, operating in netork routers, exchange and

2 364 CHAPTER 4 THE NETWORK LAYER compute the information that is used to configure these forarding tables. The interpla beteen routing algorithms and forarding tables as shon in Figure 4.2. Having explored forarding in some depth e no turn our attention to the other major topic of this chapter, namel, the netork laer s critical routing function. Whether the netork laer provides a datagram service (in hich case different packets beteen a given source-destination pair ma take different routes) or a VC service (in hich case all packets beteen a given source and destination ill take the same path), the netork laer must nonetheless determine the path that packets take from senders to receivers. We ll see that the job of routing is to determine good paths (equivalentl, routes), from senders to receivers, through the netork of routers. Tpicall a host is attached directl to one router, the default router for the host (also called the first-hop router for the host). Whenever a host sends a packet, the packet is transferred to its default router. We refer to the default router of the source host as the source router and the default router of the destination host as the destination router. The problem of routing a packet from source host to destination host clearl boils don to the problem of routing the packet from source router to destination router, hich is the focus of this section. The purpose of a routing algorithm is then simple: given a set of routers, ith links connecting the routers, a routing algorithm finds a good path from source router to destination router. Tpicall, a good path is one that has the least cost. We ll see, hoever, that in practice, real-orld concerns such as polic issues (for example, a rule such as router x, belonging to organization Y, should not forard an packets originating from the netork oned b organization Z ) also come into pla to complicate the conceptuall simple and elegant algorithms hose theor underlies the practice of routing in toda s netorks. A graph is used to formulate routing problems. Recall that a graph G = (N,E) is a set N of nodes and a collection E of edges, here each edge is a pair of nodes from N. In the context of netork-laer routing, the nodes in the graph represent routers the points at hich packet-forarding decisions are made and the edges connecting these nodes represent the phsical links beteen these routers. Such a graph abstraction of a computer netork is shon in Figure To vie some graphs representing real netork maps, see [Dodge 202, Chesick 2000]; for a discussion of ho ell different graph-based models model the Internet, see [Zegura 997, Faloutsos 999, Li 2004]. As shon in Figure 4.27, an edge also has a value representing its cost. Tpicall, an edge s cost ma reflect the phsical length of the corresponding link (for example, a transoceanic link might have a higher cost than a short-haul terrestrial link), the link speed, or the monetar cost associated ith a link. For our purposes, e ll simpl take the edge costs as a given and on t orr about ho the are determined. For an edge (x,) in E, e denote c(x,) as the cost of the edge beteen nodes x and. If the pair (x,) does not belong to E, e set c(x,) =. Also, throughout e consider onl undirected graphs (i.e., graphs hose edges do not have a direction), so that edge (x,) is the same as edge (,x) and that c(x,) = c(,x). Also, a node is said to be a neighbor of node x if (x,) belongs to E.

3 4.5 ROUTING ALGORITHMS u 3 v x z Figure 4.27 Abstract graph model of a computer netork Given that costs are assigned to the various edges in the graph abstraction, a natural goal of a routing algorithm is to identif the least costl paths beteen sources and destinations. To make this problem more precise, recall that a path in a graph G = (N,E) is a sequence of nodes (x, x 2,..., x p ) such that each of the pairs (x,x 2 ), (x 2,x 3 ),...,(x p-,x p ) are edges in E. The cost of a path (x,x 2,..., x p ) is simpl the sum of all the edge costs along the path, that is, c(x,x 2 ) + c(x 2,x 3 ) c(x p-,x p ). Given an to nodes x and, there are tpicall man paths beteen the to nodes, ith each path having a cost. One or more of these paths is a least-cost path. The least-cost problem is therefore clear: Find a path beteen the source and destination that has least cost. In Figure 4.27, for example, the least-cost path beteen source node u and destination node is (u, x,, ) ith a path cost of 3. Note that if all edges in the graph have the same cost, the least-cost path is also the shortest path (that is, the path ith the smallest number of links beteen the source and the destination). As a simple exercise, tr finding the least-cost path from node u to z in Figure 4.27 and reflect for a moment on ho ou calculated that path. If ou are like most people, ou found the path from u to z b examining Figure 4.27, tracing a fe routes from u to z, and someho convincing ourself that the path ou had chosen had the least cost among all possible paths. (Did ou check all of the 7 possible paths beteen u and z? Probabl not!) Such a calculation is an example of a centralized routing algorithm the routing algorithm as run in one location, our brain, ith complete information about the netork. Broadl, one a in hich e can classif routing algorithms is according to hether the are global or decentralized. A global routing algorithm computes the least-cost path beteen a source and destination using complete, global knoledge about the netork. That is, the algorithm takes the connectivit beteen all nodes and all link costs as inputs. This then requires that the algorithm someho obtain this information before actuall performing the calculation. The calculation itself can be run at one site

4 366 CHAPTER 4 THE NETWORK LAYER (a centralized global routing algorithm) or replicated at multiple sites. The ke distinguishing feature here, hoever, is that a global algorithm has complete information about connectivit and link costs. In practice, algorithms ith global state information are often referred to as link-state (LS) algorithms, since the algorithm must be aare of the cost of each link in the netork. We ll stud LS algorithms in Section In a decentralized routing algorithm, the calculation of the least-cost path is carried out in an iterative, distributed manner. No node has complete information about the costs of all netork links. Instead, each node begins ith onl the knoledge of the costs of its on directl attached links. Then, through an iterative process of calculation and exchange of information ith its neighboring nodes (that is, nodes that are at the other end of links to hich it itself is attached), a node graduall calculates the least-cost path to a destination or set of destinations. The decentralized routing algorithm e ll stud belo in Section is called a distance-vector (DV) algorithm, because each node maintains a vector of estimates of the costs (distances) to all other nodes in the netork. A second broad a to classif routing algorithms is according to hether the are static or dnamic. In static routing algorithms, routes change ver slol over time, often as a result of human intervention (for example, a human manuall editing a router s forarding table). Dnamic routing algorithms change the routing paths as the netork traffic loads or topolog change. A dnamic algorithm can be run either periodicall or in direct response to topolog or link cost changes. While dnamic algorithms are more responsive to netork changes, the are also more susceptible to problems such as routing loops and oscillation in routes. A third a to classif routing algorithms is according to hether the are loadsensitive or load-insensitive. In a load-sensitive algorithm, link costs var dnamicall to reflect the current level of congestion in the underling link. If a high cost is associated ith a link that is currentl congested, a routing algorithm ill tend to choose routes around such a congested link. While earl ARPAnet routing algorithms ere load-sensitive [McQuillan 980], a number of difficulties ere encountered [Huitema 998]. Toda s Internet routing algorithms (such as RIP, OSPF, and BGP) are load-insensitive, as a link s cost does not explicitl reflect its current (or recent past) level of congestion The Link-State (LS) Routing Algorithm Recall that in a link-state algorithm, the netork topolog and all link costs are knon, that is, available as input to the LS algorithm. In practice this is accomplished b having each node broadcast link-state packets to all other nodes in the netork, ith each link-state packet containing the identities and costs of its attached links. In practice (for example, ith the Internet s OSPF routing protocol, discussed in Section 4.6.) this is often accomplished b a link-state broadcast

5 4.5 ROUTING ALGORITHMS 367 algorithm [Perlman 999]. We ll cover broadcast algorithms in Section 4.7. The result of the nodes broadcast is that all nodes have an identical and complete vie of the netork. Each node can then run the LS algorithm and compute the same set of least-cost paths as ever other node. The link-state routing algorithm e present belo is knon as Dijkstra s algorithm, named after its inventor. A closel related algorithm is Prim s algorithm; see [Cormen 200] for a general discussion of graph algorithms. Dijkstra s algorithm computes the least-cost path from one node (the source, hich e ill refer to as u) to all other nodes in the netork. Dijkstra s algorithm is iterative and has the propert that after the kth iteration of the algorithm, the least-cost paths are knon to k destination nodes, and among the least-cost paths to all destination nodes, these k paths ill have the k smallest costs. Let us define the folloing notation: D(v): cost of the least-cost path from the source node to destination v as of this iteration of the algorithm. p(v): previous node (neighbor of v) along the current least-cost path from the source to v. N : subset of nodes; v is in N if the least-cost path from the source to v is definitivel knon. The global routing algorithm consists of an initialization step folloed b a loop. The number of times the loop is executed is equal to the number of nodes in the netork. Upon termination, the algorithm ill have calculated the shortest paths from the source node u to ever other node in the netork. Link-State (LS) Algorithm for Source Node u Initialization: 2 N = {u} 3 for all nodes v 4 if v is a neighbor of u 5 then D(v) = c(u,v) 6 else D(v) = 7 8 Loop 9 find not in N such that D() is a minimum 0 add to N update D(v) for each neighbor v of and not in N : 2 D(v) = min( D(v), D() + c(,v) ) 3 /* ne cost to v is either old cost to v or knon 4 least path cost to plus cost from to v */ 5 until N = N

6 368 CHAPTER 4 THE NETWORK LAYER VideoNote Dijkstra s algorithm: discussion and example As an example, let s consider the netork in Figure 4.27 and compute the least-cost paths from u to all possible destinations. A tabular summar of the algorithm s computation is shon in Table 4.3, here each line in the table gives the values of the algorithm s variables at the end of the iteration. Let s consider the fe first steps in detail. In the initialization step, the currentl knon least-cost paths from u to its directl attached neighbors, v, x, and, are initialized to 2,, and 5, respectivel. Note in particular that the cost to is set to 5 (even though e ill soon see that a lesser-cost path does indeed exist) since this is the cost of the direct (one hop) link from u to. The costs to and z are set to infinit because the are not directl connected to u. In the first iteration, e look among those nodes not et added to the set N and find that node ith the least cost as of the end of the previous iteration. That node is x, ith a cost of, and thus x is added to the set N. Line 2 of the LS algorithm is then performed to update D(v) for all nodes v, ielding the results shon in the second line (Step ) in Table 4.3. The cost of the path to v is unchanged. The cost of the path to (hich as 5 at the end of the initialization) through node x is found to have a cost of 4. Hence this loer-cost path is selected and s predecessor along the shortest path from u is set to x. Similarl, the cost to (through x) is computed to be 2, and the table is updated accordingl. In the second iteration, nodes v and are found to have the least-cost paths (2), and e break the tie arbitraril and add to the set N so that N no contains u, x, and. The cost to the remaining nodes not et in N, that is, nodes v,, and z, are updated via line 2 of the LS algorithm, ielding the results shon in the third ro in the Table 4.3. And so on.... When the LS algorithm terminates, e have, for each node, its predecessor along the least-cost path from the source node. For each predecessor, e also step N D(v),p(v) D(),p() D(x),p(x) D(),p() D(z),p(z) 0 u 2,u 5,u,u ux 2,u 4,x 2,x 2 ux 2,u 3, 4, 3 uxv 3, 4, 4 uxv 4, 5 uxvz Table 4.3 Running the link-state algorithm on the netork in Figure 4.27

7 4.5 ROUTING ALGORITHMS 369 have its predecessor, and so in this manner e can construct the entire path from the source to all destinations. The forarding table in a node, sa node u, can then be constructed from this information b storing, for each destination, the next-hop node on the least-cost path from u to the destination. Figure 4.28 shos the resulting least-cost paths and forarding table in u for the netork in Figure What is the computational complexit of this algorithm? That is, given n nodes (not counting the source), ho much computation must be done in the orst case to find the least-cost paths from the source to all destinations? In the first iteration, e need to search through all n nodes to determine the node,, not in N that has the minimum cost. In the second iteration, e need to check n nodes to determine the minimum cost; in the third iteration n 2 nodes, and so on. Overall, the total number of nodes e need to search through over all the iterations is n(n + )/2, and thus e sa that the preceding implementation of the LS algorithm has orst-case complexit of order n squared: O(n 2 ). (A more sophisticated implementation of this algorithm, using a data structure knon as a heap, can find the minimum in line 9 in logarithmic rather than linear time, thus reducing the complexit.) Before completing our discussion of the LS algorithm, let us consider a patholog that can arise. Figure 4.29 shos a simple netork topolog here link costs are equal to the load carried on the link, for example, reflecting the dela that ould be experienced. In this example, link costs are not smmetric; that is, c(u,v) equals c(v,u) onl if the load carried on both directions on the link (u,v) is the same. In this example, node z originates a unit of traffic destined for, node x also originates a unit of traffic destined for, and node injects an amount of traffic equal to e, also destined for. The initial routing is shon in Figure 4.29(a) ith the link costs corresponding to the amount of traffic carried. When the LS algorithm is next run, node determines (based on the link costs shon in Figure 4.29(a)) that the clockise path to has a cost of, hile the counterclockise path to (hich it had been using) has a cost of + e. Hence s Destination Link U V X W Y Z v x z (u, v) (u, x) (u, x) (u, x) (u, x) Figure 4.28 Least cost path and forarding table for nodule u

8 370 CHAPTER 4 THE NETWORK LAYER + e 2 + e 0 z e x z x + e 0 0 e e a. Initial routing b. x, detect better path to, clockise 0 z x e c. x,, z detect better path to, counterclockise e 2+ e 2 + e z x + e 0 0 d. x,, z, detect better path to, clockise e 0 Figure 4.29 Oscillations ith congestion-sensitive routing least-cost path to is no clockise. Similarl, x determines that its ne least-cost path to is also clockise, resulting in costs shon in Figure 4.29(b). When the LS algorithm is run next, nodes x,, and z all detect a zero-cost path to in the counterclockise direction, and all route their traffic to the counterclockise routes. The next time the LS algorithm is run, x,, and z all then route their traffic to the clockise routes. What can be done to prevent such oscillations (hich can occur in an algorithm, not just an LS algorithm, that uses a congestion or dela-based link metric)? One solution ould be to mandate that link costs not depend on the amount of traffic carried an unacceptable solution since one goal of routing is to avoid

9 4.5 ROUTING ALGORITHMS 37 highl congested (for example, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution, since e ould hope that even if routers ran the LS algorithm ith the same periodicit, the execution instance of the algorithm ould not be the same at each node. Interestingl, researchers have found that routers in the Internet can self-snchronize among themselves [Flod Snchronization 994]. That is, even though the initiall execute the algorithm ith the same period but at different instants of time, the algorithm execution instance can eventuall become, and remain, snchronized at the routers. One a to avoid such selfsnchronization is for each router to randomize the time it sends out a link advertisement. Having studied the LS algorithm, let s consider the other major routing algorithm that is used in practice toda the distance-vector routing algorithm The Distance-Vector (DV) Routing Algorithm Whereas the LS algorithm is an algorithm using global information, the distancevector (DV) algorithm is iterative, asnchronous, and distributed. It is distributed in that each node receives some information from one or more of its directl attached neighbors, performs a calculation, and then distributes the results of its calculation back to its neighbors. It is iterative in that this process continues on until no more information is exchanged beteen neighbors. (Interestingl, the algorithm is also self-terminating there is no signal that the computation should stop; it just stops.) The algorithm is asnchronous in that it does not require all of the nodes to operate in lockstep ith each other. We ll see that an asnchronous, iterative, self-terminating, distributed algorithm is much more interesting and fun than a centralized algorithm! Before e present the DV algorithm, it ill prove beneficial to discuss an important relationship that exists among the costs of the least-cost paths. Let d x () be the cost of the least-cost path from node x to node. Then the least costs are related b the celebrated Bellman-Ford equation, namel, d x () = min v {c(x,v) + d v ()}, (4.) here the min v in the equation is taken over all of x s neighbors. The Bellman-Ford equation is rather intuitive. Indeed, after traveling from x to v, if e then take the least-cost path from v to, the path cost ill be c(x,v) + d v (). Since e must begin b traveling to some neighbor v, the least cost from x to is the minimum of c(x,v) + d v () taken over all neighbors v. But for those ho might be skeptical about the validit of the equation, let s check it for source node u and destination node z in Figure The source node u

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router

More information

4.5.2 The Distance-Vector (DV) Routing Algorithm

4.5.2 The Distance-Vector (DV) Routing Algorithm 4.5 ROUTING ALGORITHMS 371 highl congested (for eample, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution,

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding 0/6/08 Interpla between routing and forwarding Routing Algorithms Link State Distance Vector BGP routing routing algorithm local forwarding table header value output link 000 00 0 00 value in arriving

More information

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 9. Network Layer (cont d) Network Layer 1-1 Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest

More information

Computer Networks. Instructor: Niklas Carlsson

Computer Networks. Instructor: Niklas Carlsson Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and

More information

Chapter 4: Network Layer, partb

Chapter 4: Network Layer, partb Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local

More information

CSC 4900 Computer Networks: Routing Algorithms

CSC 4900 Computer Networks: Routing Algorithms CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4. introduction 4. irtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IP4 addressing ICMP IP6 4.5 routing algorithms link state

More information

Chapter IV: Network Layer

Chapter IV: Network Layer Chapter IV: Network Laer UG3 Computer Communications & Networks (COMN) Mungjin Lee mungjin.lee@ed.ac.uk Slides copright of Kurose and Ross IP addresses: how to get one? Q: How does a host get IP address?

More information

Network Layer: Control Plane 5-2

Network Layer: Control Plane 5-2 Network Laer: Control Plane EECS34 8-03-05 4- Chapter 5: network laer control plane chapter goals: understand principles behind network control plane traditional routing algorithms SDN controlllers Internet

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 56: Adanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 0 Fall 06 A-term Some slides are originall from the course materials of the tetbook Computer

More information

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic? Routing 9: Intro to Routing lgorithms Last Modified: // :: PM : Netork Layer a- IP Routing each router is supposed to send each IP datagram one step closer to its Ho do they do that? Static Routing Hierarchical

More information

Routing Algorithm Classification. A Link-State Routing Algorithm

Routing Algorithm Classification. A Link-State Routing Algorithm Routing Algorithm lassification Global or decentralied information? Global: All routers have complete topolog, link cost info Link state algorithms Decentralied: Router knows phsicallconnected neighbors,

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network

More information

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20

CMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20 CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 0 Announcements Final exam: June 7 th at 4pm. Comprehensive. Photo id required.

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 3-bit address space soon to be completel allocated. Additional motivation: Header format helps speed processing/forwarding Header changes to facilitate QoS (service classes) Reduction

More information

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions: Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message

More information

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical Network layer transport segment from sending to receiving host on sending side encapsulates segments into datagrams on receiving side, delivers segments to transport layer network layer protocols in every

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March

More information

Chapter 4: Network Layer: Part II

Chapter 4: Network Layer: Part II 4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format

More information

Initialization: Loop until all nodes in N

Initialization: Loop until all nodes in N Routing Routing lgorithm classification Routing protocol Goal: determine good path (sequence of routers) thru netork from source to dest. Graph abstraction for routing s: graph nodes are routers graph

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 13 CMPE 50/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 3 Lab3 online Due March 4 th. Introduction -2 IP addresses: how to get one? Q: how does network

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,

More information

Agenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms

Agenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms Agenda v DNS assignment Q&A v Routing Algorithms distance-vector (what ou invented last Frida) hierarchical routing routing in the Internet Network Laer 4- Chapter 4 Network Laer A note on the use of these

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 56: Adanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 0 Fall 07 A-term Some slides are originall the course materials of the tetbook Computer Networking:

More information

Interplay tra routing e forwarding

Interplay tra routing e forwarding Interpla tra routing e forwarding routing algorithm local forwarding table header value output link 000 00 0 00 value in arriving packet s header 0 Network Laer 4- Grafi Grafo: G = (N,E) u v w N = insieme

More information

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to. Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and

More information

Computer Networking. Rou1ng Algorithms. Rou1ng Algorithms. Interplay between rou1ng, forwarding. routing algorithm

Computer Networking. Rou1ng Algorithms. Rou1ng Algorithms. Interplay between rou1ng, forwarding. routing algorithm Computer Networking Interpla between roung, forwarding routing algorithm local forwarding table header alue output link 000 00 0 00 alue in arriing packet s header 0 Graph abstracon Graph: G = (N,E) u

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 6 Network Architecture and Protocols Lecture 8 Godmar Back Project A due Apr 8 (toda) Project B due in parts: Apr 9 and Ma 6 See link to NY Times article on RFC Project B Project B Highlevel

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and

More information

Chapter 5 Network Layer: The Control Plane

Chapter 5 Network Layer: The Control Plane Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you

More information

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Laer A note on the use of these ppt slides: The notes used in this course are substantiall based on powerpoint slides developed and coprighted b J.F. Kurose and K.W. Ross, 1996-2007 Computer

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes. Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar

More information

Chapter 5: Network Layer Control Plane. understand principles behind network control plane : traditional routing algorithms

Chapter 5: Network Layer Control Plane. understand principles behind network control plane : traditional routing algorithms Introduction to Computer Networking Gu Leduc Chapter 5 Network Laer: The Control Plane Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesle, April 06. From Computer

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Intra- AS Rou-ng h0p://kcd.com/85/ Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Network layer: Overview. Network layer functions Routing IP Forwarding

Network layer: Overview. Network layer functions Routing IP Forwarding Network layer: Overview Network layer functions Routing IP Forwarding Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

Course on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5)

Course on Computer Communication and Networks. Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5) Course on Computer Communication and Networks Lecture 7 Network Layer, Chapter 4 (6/e) - Part B (7/e Ch5) EDA344/DIT 420, CTH/GU Based on the book Computer Networking: A Top Down Approach, Jim Kurose,

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Protocoles et Interconnexions

Protocoles et Interconnexions Protocoles et Interconneions Course Overview and Introduction Dario Vieira Department of Computer Science EFREI Routing Protocol BGP TCP Computer Networking Preliminaries Transport Laer Network Laer Introduction

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)

More information

CSCE 463/612 Networks and Distributed Processing Spring 2017

CSCE 463/612 Networks and Distributed Processing Spring 2017 CSCE 46/6 Networks and Distributed Processing Spring 07 Network Layer III Dmitri Loguinov Texas A&M University April, 07 Original slides copyright 996-004 J.F Kurose and K.W. Ross Homework #4 Grading Default

More information

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:

More information

End-to-end path: route

End-to-end path: route Multi-hop Wireless Netorks CMU CS 15-829: Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale:

More information

CSC 8560 Computer Networks: Control Plane

CSC 8560 Computer Networks: Control Plane CSC 8560 Computer Networks: Control Plane Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:

More information

y = f(x) x (x, f(x)) f(x) g(x) = f(x) + 2 (x, g(x)) 0 (0, 1) 1 3 (0, 3) 2 (2, 3) 3 5 (2, 5) 4 (4, 3) 3 5 (4, 5) 5 (5, 5) 5 7 (5, 7)

y = f(x) x (x, f(x)) f(x) g(x) = f(x) + 2 (x, g(x)) 0 (0, 1) 1 3 (0, 3) 2 (2, 3) 3 5 (2, 5) 4 (4, 3) 3 5 (4, 5) 5 (5, 5) 5 7 (5, 7) 0 Relations and Functions.7 Transformations In this section, we stud how the graphs of functions change, or transform, when certain specialized modifications are made to their formulas. The transformations

More information

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network Layer. Chapter goals:

Chapter 4: Network Layer. Chapter 4 Network Layer. Chapter 4: Network Layer. Network Layer. Chapter goals: Chapter 4 Network Laer A note on the use of these ppt slides: The notes used in this course are substantiall based on powerpoint slides developed and coprighted b J.F. Kurose and K.W. Ross, 996-7 Computer

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

Announcement. Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online

Announcement. Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online Announcement Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online Outline Introduction and Network Service Models Routing Principles Link

More information

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan Internet Protocol: Routing Algorithms Srinidhi Varadarajan Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction for routing algorithms:

More information

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet

5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7

More information

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class Computer Network Homework#3 COMPUTER NETWORK Homework #3 Due Date: May 22, 2017 in class Question 1 Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

CS321: Computer Networks Unicast Routing

CS321: Computer Networks Unicast Routing CS321: Computer Networks Unicast Routing Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Introduction The goal of the network layer is deliver a datagram from

More information

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University Routing Algorithms Daniel Zappala CS 460 Computer Networking Brigham Young University Routing 2/20 How does the Internet determine which path to use from the source to the destination? Challenges need

More information

Homework 3 assignment for ECE374 Posted: 03/15/13 Due: 03/29/13

Homework 3 assignment for ECE374 Posted: 03/15/13 Due: 03/29/13 ECE74: Homework 1 Homework assignment for ECE74 Posted: 0/1/1 Due: 0/9/1 Note: In all written assignments, please show as much of our work as ou can. Even if ou get a wrong answer, ou can get partial credit

More information

Dept. of Computing Science & Math

Dept. of Computing Science & Math Lecture 4: Multi-Laer Perceptrons 1 Revie of Gradient Descent Learning 1. The purpose of neural netor training is to minimize the output errors on a particular set of training data b adusting the netor

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

15.4 Constrained Maxima and Minima

15.4 Constrained Maxima and Minima 15.4 Constrained Maxima and Minima Question 1: Ho do ou find the relative extrema of a surface hen the values of the variables are constrained? Question : Ho do ou model an optimization problem ith several

More information

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane

EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane EC441 Fall 2018 Introduction to Computer Networking Chapter 5: Network Layer Control Plane This presentation is adapted from slides produced by Jim Kurose and Keith Ross for their book, Computer Networking:

More information

Routing Algorithms. 1 Administrivia. Tom Kelliher, CS 325. Apr. 25, Announcements. Assignment. Read 4.6. From Last Time. IP protocol.

Routing Algorithms. 1 Administrivia. Tom Kelliher, CS 325. Apr. 25, Announcements. Assignment. Read 4.6. From Last Time. IP protocol. Routing Algorithms Tom Kelliher, CS 325 Apr. 25, 2008 1 Administrivia Announcements Assignment Read 4.6. From Last Time IP protocol. Outline 1. Introduction. 2. Link state routing. 3. Distance vector routing.

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Industrial Data Communications - Fundamentals

Industrial Data Communications - Fundamentals Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were

More information

Routing Algorithms : Fundamentals of Computer Networks Bill Nace

Routing Algorithms : Fundamentals of Computer Networks Bill Nace Routing Algorithms 4-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Recall from Last Time Routing Algorithm

More information

Dynamic Routing. The Protocols

Dynamic Routing. The Protocols Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Routing. Advanced Computer Networks: Routing 1

Routing. Advanced Computer Networks: Routing 1 Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s

More information

Chapter 4: Network Layer

Chapter 4: Network Layer hapter 4: Network Layer hapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, multicast instantiation and implementation

More information

EE 122: Intra-domain routing

EE 122: Intra-domain routing EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level

More information

Fast and Scalable Conflict Detection for Packet Classifiers

Fast and Scalable Conflict Detection for Packet Classifiers Fast and Scalable Conflict Detection for Packet Classifiers Florin Baboescu, George Varghese Dept. of Computer Science and Engineering University of California, San Diego 95 Gilman Drive La Jolla, CA9293-4

More information

Multi-Stage Fault Attacks on Block Ciphers

Multi-Stage Fault Attacks on Block Ciphers Multi-Stage Fault Attacks on Block Ciphers Philipp Jovanovic, Martin Kreuer, Ilia Polian Fakultät für Informatik und Mathematik Universität Passau 94032 Passau, German {Philipp.Jovanovic, Martin.Kreuer,

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,

More information

COM-208: Computer Networks - Homework 6

COM-208: Computer Networks - Homework 6 COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each

More information

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks 1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University

More information

Interplay Between Routing, Forwarding

Interplay Between Routing, Forwarding Internet Routing 1 Interplay Between Routing, Forwarding routing algorithm local forwarding table header value output link 0100 0101 0111 1001 3 1 value in arriving packet s header 0111 3 1 Graph Abstraction

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information