Lesson 5-2: Open Shortest Path First Protocol
|
|
- Veronica Jefferson
- 6 years ago
- Views:
Transcription
1 Unit 5: Intradomain and Interdomain Routing Protocols Lesson 5-2: Open Shortest Path First Protocol At a Glance The Open Shortest Path First (OSPF) protocol was developed to answer problems that RIP could not resolve. By the mid-1980 s, RIP was unable to adequately serve large differentiated internetworks. OSPF is based on Dijkstra s algorithm, named for its creator E.W. Dijkstra, and can operate in large hierarchical networks. What You Will Learn After completing this lesson, you will be able to do the following: Briefly compare distance-vector and link-state protocols. Diagram the three OSPF phases. Describe the advantages of link-state routing. Tech Talk Dijkstra s Algorithm A routing algorithm created by E.W. Dijkstra that calculates the shortest path for delivery of a packet across a network. Hello Packet Messages broadcast across a network by a node to itself to the other nodes and to indicate that the node is still operational Interdomain Routing Protocols Routing protocols that operate within and between domains. Link-state Update Message Message issued by an OSPF router informing neighboring routers of a path change in the network. OSPF's Flooding Protocol The process of forwarding update messages across the network to all the OSPF routers. ST A 203
2 Lesson 5-2: Open Shortest Path First Protocol Link-State Routing Link-state routing differs from distance-vector routing in that each router in the network maintains a complete model of the entire network. Where distance-vector protocols keep only two pieces of information about a network, its distance and the next hop towards its destination, link-state protocols keep information about every single node in the network, and the states of every link between them. Using this information they can compute the shortest path to any destination, and from that they can infer a next hop. Instead of distributing the selection of the shortest path between two points across all the routers in the network, link-state protocols force each router to compute the shortest path between itself and every other node. From experience, the network managers know that link-state protocols scale much better than their distance-vector protocols. While RIP may still be the most popular routing protocol on local networks, link-state protocols are used more often in larger networks. The most common link-state protocol is the Open Shortest Path First (OSPF) protocol. 204 ST A Routing
3 Unit 5: Intradomain and Interdomain Routing Protocols Open Shortest Path First Protocol As stated previously, the Open Shortest Path First (OSPF) protocol is the most common link-state protocol. It is a member of the TCP/IP family. The OSPF algorithm has three phases. The first phase is finding neighbors. To do this, OSPF sends a "Hello" packet to each neighbor. Among the things in this packet is a list of neighbors from which the sender has recently received a Hello. In the illustration below, for instance, Router B is turned on for the first time. It sends a Hello packet to Router A. Router A Router C Hello B 2nd Step Hello Router B 1st Step Router D Hello Packets Are Exchanged Shortly after that, Router A will, in the normal course of events, send a Hello to Router B, which lists Router B as a neighbor from whom it has heard recently. Router B is then assured that it has an adjacency to Router A. The routers continue to send periodic Hello packets to their neighbors, to verify the states of their links. ST A 205
4 Lesson 5-2: Open Shortest Path First Protocol In the second phase of the OSPF process, a new router obtains a complete copy of its neighbor's link-state database. This is a complex and careful process that goes to considerable length to be certain that the new router has an exact copy of the existing routers database. New Router Received Complete Link-State Database Router A Router C Router B Router D New Router Router E Router D s Link-State Database 206 ST A Routing
5 Unit 5: Intradomain and Interdomain Routing Protocols The third and final phase of the OSPF protocol is the normal state for a running OSPF router. The fully initialized router sends and accepts updated describing changes in the states of network links. This process is accomplished with OSPF's "flooding" protocol. Flooding Router A Router C Router B Router D Updates (Receives) (Sends) Updates Router E Router D s Link-State Database ST A 207
6 Lesson 5-2: Open Shortest Path First Protocol Suppose the link between Router A and Router B fails in the network previously illustrated. Router A and Router B will both notice the failure and immediately broadcast Link-state Update messages to Routers C and D, respectively. These messages will indicate a change in a particular record in the shared database. Since Routers A and B have identical databases, they will both identify the same record. Link-state Update Messages 2nd Router A Updates Router C 1st Break 2nd Router B Updates Router D Router E Routers C and D, upon receiving the message will compare the serial number for the newly arrived record to the serial number for the existing record in their databases. Based on this comparison they will take one of three actions: If the new serial number is the same as the old, they will discard the message If the new serial number is less than the old, they will discard the new message, and send a Link-state update message containing the record from the local database back to the originator. If the new serial number is greater than the old, they update their local databases, and forward the update to all neighbors, except the one from which they received it. 208 ST A Routing
7 Unit 5: Intradomain and Interdomain Routing Protocols In the example, then, Router C will forward the update to Router D. Router D will forward to Routers C and E. At that point, since Routers C and D have both already seen the update, they do not forward it further. All routers have now been informed of the failure of the link between Routers A and B. Link-state Update Messages Are Forwarded Router A Router C Router B Updates Updates Router D Updates Router E Router D s Link-State Database ST A 209
8 Lesson 5-2: Open Shortest Path First Protocol Check Your Understanding Given the scenario in the diagram below, outline how OSPF would update the routers on the network of the conditions in the diagram. What is the most likely path to deliver packets to Router E in this diagram? Router A Router C Router B BREAK!! Router D Router E 210 ST A Routing
9 Unit 5: Intradomain and Interdomain Routing Protocols Advantages of Link-State Routing The description of the OSPF protocol above is considerably simplified. The document that specifies OSPF is more that 100 pages of fine type, and more that five times the length of the specification for RIP. Why, then, do most large networks use link-state routing, instead of the simpler distancevector protocols? There are three main reasons: Fast convergence Concise, multiple metrics Support for multiple paths Fast Convergence RIP's primary flaw is the amount of time it takes all of the routers in a network to adapt to a change in the network. In general transients particularly affect distance-vector routing protocols because they distribute the computation of new routes across the whole network. It may take several exchanges of information before a group of routers finally agrees on the new topology. In link-state protocols, on the contrary, in the time it takes a packet to cross the network, all routers know exactly what has changed, and has an accurate new database. ST A 211
10 Lesson 5-2: Open Shortest Path First Protocol Multiple, Concise Metrics Because of the counting-to-infinity problem, it is difficult for a distancevector protocol to support concise metrics. RIP uses only integers from 0 to 16. In a network that is differentiated between four different line speeds, assigning them weights of 1 to 4, the maximum distance between two routers might have to be no more than 3 physical hops. In the diagram below, the distance from Router A to Router F, using the weighted hop counts indicated, is 16. These two routers would be unreachable from each other, using RIP. RIP s Counting to Infinity Router A Router C Router E 4 Router B Router D 4 4 Router F (Total = 16!) Since link-state protocols specify the exact information about a link, it is possible to include very precise specification of metrics. It is even possible to include several kinds of metrics: delay, reliability, and price. With this information a router can route a packet based on the particular type of service it requests. 212 ST A Routing
11 Unit 5: Intradomain and Interdomain Routing Protocols Support for Multiple Paths Consider the network shown below. There are two paths, ACDE, and ABDE, of equal cost, from Router A to Router E. Suppose the vast majority of traffic on this network is from Router A to Router E. Using a distance-vector routing protocol, Router A will choose one or the other of those two paths, arbitrarily, and use it for all of the traffic to Router E. For instance, it might choose the path through Router C, and never use the path through Router B. This would waste half of the network's bandwidth from Router A to Router E. Link-state Algorithm Maps the Entire Network Router A 1 Router C 3 Router B 2 4 Router D 1 Router E Since a link-state algorithm has an entire map of the network, it has the information necessary to compute alternative paths. ST A 213
12 Lesson 5-2: Open Shortest Path First Protocol Try It Out What s My Topology? In this activity you will discover the topology of the network drawn in advance by your teacher. Materials Needed: Topology handout for drawing the network Link-state Routing Table to record node locations Dijkstra's Algorithm Worksheet Teams of three students, each team representing a node Pen/Pencil and Paper Part One: The Game Rules: 1. To start the game, all teams must name their node and take their starting link table to an assigned location. Your teacher will tell you the locations of your neighbors, and when to start. 2. You may send a runner any number of times to any adjacent neighbor and request their link state data (names of their neighbors, their neighbors neighbors, and so on). 3. The runner must return to his/her home site and update their link table with the new information. 4. When you update your table, draw the emerging topology. 5. A team member must be available at your home site to answer requests from other runners. 6. If you arrive at a node when an update is in progress, wait for it to complete before getting the link table. 7. The game is over when all teams have announced to their site administrator (your teacher) that they have discovered the topology and drawn it. 8. Gather together with the rest of the teams Compare your topologies with the other teams and choose the topology that is correct for the network designed by your teacher. ST A Routing
13 Unit 5: Intradomain and Interdomain Routing Protocols Part Two: Dijkstra s Algorithm 1. Using the Dijkstra s algorithm worksheet, fill in the routing table for your node according to the rules of the algorithm. Were there problems using the algorithm to map your topology? If so, why? Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Enthusiastic and cooperative participation 50 Correct network topology diagram 25 Correct Dijkstra s algorithm routing table 25 TOTAL 100 Developed by Nancy Ishihara, Blake Meike, Deborah Muscella, and John Zinky for the Connecting Communities Project, TERC. Copyright 1996 by TERC. Reprinted with permission. ST A 215
14 Lesson 5-2: Open Shortest Path First Protocol What s My Topology? Master Link Table for Node Team Members: Location Neighbor Locations Links: From: (Node Name) To: (Node Name) 216 ST A Routing
15 Unit 5: Intradomain and Interdomain Routing Protocols What s My Topology? Runner Link Table Node (name of node visited) has links: From: (Node Name) To: (Node Name) ST A 217
16 Lesson 5-2: Open Shortest Path First Protocol What s My Topology? Dijkstra s Algorithm For finding the shortest path to all nodes follow these steps: 1. Mark yourself as length 0 2. Look at the length 0 node for length 1 nodes 3. Mark the length 1 nodes 4. Look at length 1 nodes for length 2 nodes 5. Mark the length 2 nodes 6. Look at length 2 nodes for length 3 nodes 7. Mark the length 3 nodes Routing Table for Node: To Toward Length A B C D E F G H 218 ST A Routing
17 Unit 5: Intradomain and Interdomain Routing Protocols Stretch Yourself Body Routing In this activity you will deliver all the messages to their destinations and return an acknowledgement to the originating node. Materials Needed: Tape Complete routing table for each node (developed in Try It Out) One log/node to record messages sent and received Node signs Message tags Rules to post at node Pen/Pencil and Paper Players: 2 students/node are Nodes All other students are Messages One adult/node One game facilitator to visit nodes and answer questions and facilitate communication. Rules: 1. Use the topology from the Try It Out with the names filled in. 2. All nodes must choose and announce their names. 3. Decide what the destination of your messages will be and fill in the tags with the appropriate information. 4. Messages are not intelligent. They need to follow the instructions of the Nodes. Each node has an equal number of messages. 5. Nodes handle messages as follows: a. If you are the destination of the Message (TO:). Check the RECEIVED box. Cross out TO: and FROM: nodes. Rewrite TO: as FROM: and FROM: as TO: (message is now on its return trip) and return the message to its originator (now TO:) ST A 219
18 Lesson 5-2: Open Shortest Path First Protocol b. If you are the originator of the Message (you are the original FROM: and RECEIVED is checked), mark it as RECEIVED in your log. This message has been successfully sent and acknowledged and is no longer in play. c. Otherwise, look up the TO: node of the Message in your table and send it Towards the corresponding node. 6. There is only one wire. Messages may not pass each other (congestion). When 2 messages meet going in opposite directions (collisions) the Nodes must decide on a rule to get the Messages where they need to go. 7. To start the game: Messages will be given a FROM: and TO: Node address on their tag and started at the FROM: node. Nodes will be stationed at their nodes. 8. The game is over when all the messages have gotten to their destination and returned. As a team, write a summary of your experiences in this game. What problems occurred? What were the solutions? Relate the game to what you have learned about routing algorithms. How well does the game simulate the algorithms? If you were creating a game, what would you do differently? Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Attentive and cooperative participation 50 Successful delivery of all Messages 25 Insightful summary of experiences and critique of the game TOTAL Developed by Nancy Ishihara, Blake Meike, Deborah Muscella, and John Zinky for the Connecting Communities Project, TERC. Copyright 1996 by TERC. Reprinted with permission. 220 ST A Routing
19 Unit 5: Intradomain and Interdomain Routing Protocols Body Routing Team Members: Message Log for Node Body Routing TO FROM RECEIVED TO: MESSAGE: FROM: REPLY: RECEIVED TO: MESSAGE: FROM: REPLY: RECEIVED ST A 221
20 Lesson 5-2: Open Shortest Path First Protocol Network Wizards Design Your Own Algorithm A routing algorithm can be calculated using many different metrics (parameters or values). Each algorithm that has been written for routing has been designed on multiple types of metrics. Some algorithms use only one metric; for example, RIP uses hop count, other use multiple metrics. These algorithms did not just appear. They were written by network designers as a means to create ever more efficient routing procedures. In this activity you will discover the topology of the network drawn in advance by your teacher. Materials Needed: Windows 95 PC Internet Connection Any Word Processor (e.g., MS Word) Pen/Pencil and Paper 1. Research other routing algorithms over the Internet and any other source you feel appropriate. Reference at least five resources. 2. Design an algorithm (name it after yourself, of course) that can be used for creating routing tables and assuring efficient delivery of packets across a network. 3. It is entirely possible that your algorithm will have problems, perhaps problems that are not self-evident. Try using your algorithm with a team of students. 4. Write a clear and concise description of your algorithm, including each step. With your description, write a summary of the success of your algorithm based on the trial simulation you conducted with your team. Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Thorough research including five resources 25 Creative algorithm reflecting quality analysis 50 Clear and concise description and critique of algorithm TOTAL ST A Routing
21 Unit 5: Intradomain and Interdomain Routing Protocols Summary In this lesson, you learned the following: The comparison between distance-vector and link-state protocols. How to diagram the three OSPF phases. The advantages of link-state routing. Review Questions Name Lesson 5-2: Open Shortest Path First Protocol Part A 1. Compare the basic features of distance-vector and link-state routing protocols. Part B 1. Diagram the three OSPF phases in building a link-state routing table. Part C 1. Describe the advantages of link-state routing. ST A 223
22 Lesson 5-2: Open Shortest Path First Protocol Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Your Score Part A: Briefly compare distance-vector and link-state protocols 25 Part B: Diagram the three OSPF phases 50 Part C: Describe the advantages of link-state routing TOTAL 100 Try It Out 100 Stretch Yourself 100 Network Wizards 100 FINAL TOTAL Resources Comer, D. E. (1995). Internetworking With TCP/IP : Principles, Protocols, and Architecture 3rd edition, Prentice Hall, Upper Saddle River, New Jersey. Perlman, R. (1992). Interconnections: Bridges and Routers, Addison-Wesley Publishing Co.,Reading, MA. Stevens, W. R.(1994). TCP/IP Illustrated, Volume 1: The Protocols, Addison-Wesley Publishing Co., Reading, MA. Tannenbaum, A.S. (1996). Computer Networks, Prentice Hall, Upper Saddle River, New Jersey. 224 ST A Routing
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing
More informationModule 8. Routing. Version 2 ECE, IIT Kharagpur
Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and
More informationC13b: Routing Problem and Algorithms
CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationHow Routing Algorithms Work
How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007
More informationICS 351: Today's plan. distance-vector routing game link-state routing OSPF
ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More information5.2 Routing Algorithms
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More informationWhy dynamic route? (1)
Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update
More informationNetwork Layer: Routing
Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:
More informationBLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS
BLM696 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (7 th Week) 7. Routing 7.Outline Routing in Packet-Switching Networks Examples: Routing in ARPANET Internet Routing Protocols
More informationComputer Networks. Routing Algorithms
Computer Networks Routing Algorithms Topics Routing Algorithms Shortest Path (Dijkstra Algorithm) Distance Vector Routing Count to infinity problem Solutions for count to infinity problem Link State Routing
More informationTelecommunication Protocols Laboratory Course. Lecture 3
Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationETSF05/ETSF10 Internet Protocols. Routing on the Internet
ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The
More informationRouting Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of
Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationICS 351: Today's plan. OSPF BGP Routing in general
ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an
More informationWilliam Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing
William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route
More informationAlternate Routing Diagram
68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches
More informationCCNA 3 (v v6.0) Chapter 5 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-5-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationETSF05/ETSF10 Internet Protocols Routing on the Internet
ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing
More informationRouting Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001
Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which
More informationRouting with a distance vector protocol - EIGRP
Routing with a distance vector protocol - EIGRP Introducing Routing and Switching in the Enterprise Chapter 5.2 Copyleft 2012 Vincenzo Bruno (www.vincenzobruno.it) Released under Crative Commons License
More informationCHAPTER 4: ROUTING DYNAMIC. Routing & Switching
CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table
More informationWe will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing
In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationChapter 7: Routing Dynamically. Routing & Switching
Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source
More informationHelsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper
Helsinki University of Technology Telecommunications Laboratory OSPF Routing Protocol Licenciate course seminar paper Shkumbin I. Hamiti, 08.10.1996 Communications Laboratory, TKK-HUT email: bini#tiltu.hut.fi
More informationDistance Vector Routing Protocols
Distance Vector Routing Protocols Routing Protocols and Concepts Chapter 4 Version 4.0 1 Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process
More informationIntroduction to IP Routing. Geoff Huston
Introduction to IP Routing Geoff Huston Routing How do packets get from A to B in the Internet? A Internet B Connectionless Forwarding Each router (switch) makes a LOCAL decision to forward the packet
More informationLecture 9. Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1
Lecture 9 Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2 Basic
More informationCOM-208: Computer Networks - Homework 6
COM-208: Computer Networks - Homework 6. (P22) Suppose you are interested in detecting the number of hosts behind a NAT. You observe that the IP layer stamps an identification number sequentially on each
More informationInter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley
Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:
More informationNetwork Layer, Part 2 Routing. Terminology
Network Layer, Part Routing These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and print a single
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationTwo types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs).
Introduction Dynamic routing is when protocols are used to find networks and update routing tables on routers. True, this is easier than using static or default routing, but it ll cost you in terms of
More informationRouting Algorithms. CS158a Chris Pollett Apr 4, 2007.
Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing
More informationRouting. Advanced Computer Networks: Routing 1
Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationRedes de Computadores. Shortest Paths in Networks
Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are
More informationHomework 3 Discussion
Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local
More informationExam Questions 4A0-101
Exam Questions 4A0-101 Alcatel-Lucent Interior Routing Protocols and High Availability https://www.2passeasy.com/dumps/4a0-101/ 1.When a router receives an IP packet, but does not find a match in the routing
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationIP Routing. Bharat S. Chaudhari International Institute of Information Technology Pune, India
IP Routing Bharat S. Chaudhari International Institute of Information Technology Pune, India June 21, 2005 Network Devices: Ø The networking and internetworking devices are divided in the following categories:
More informationTDC 363 Introduction to LANs
TDC 363 Introduction to LANs OSPF Greg Brewster DePaul University TDC 363 Greg Brewster, DePaul University 1 OSPF Link State Routing Algorithms Open Shortest Path First (OSPF) Message Types Operations
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationRouting Protocol comparison
Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate
More informationOverview. Information About Layer 3 Unicast Routing. Send document comments to CHAPTER
CHAPTER 1 This chapter introduces the basic concepts for Layer 3 unicast routing protocols in Cisco NX-OS. This chapter includes the following sections: Information About Layer 3 Unicast Routing, page
More informationVI. ROUTING. - "routing protocol" nodes exchange information to ensure consistent understanding of paths
(a) General Concepts VI. ROUTING - "routing" determination of suitable (i.e., least cost) path from a source to every destination (i.e., which nodes/switches/routers are in path) - "routing protocol" nodes
More informationTopology. Youki Kadobayashi NAIST. Outline. Routing system: its function. Gateway Model Revisited. Routing system: its structure
Information Network 1 Routing (1) Topology Topology 1: 2a (1): a branch of mathematics concerned with those properties of geometric configurations (as point sets) which are unaltered by elastic deformations
More informationOpen Shortest Path First (OSPF)
CHAPTER 42 Open Shortest Path First (OSPF) Background Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationFINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions
First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1
More informationFinish Network Layer Start Transport Layer. CS158a Chris Pollett Apr 25, 2007.
Finish Network Layer Start Transport Layer CS158a Chris Pollett Apr 25, 2007. Outline OSPF BGP IPv6 Transport Layer Services Sockets Example Socket Program OSPF We now look at routing in the internet.
More informationIn this edition of HowStuffWorks, we'll find out precisely what information is used by routers in determining where to send a packet.
How Routing Algorithms Work by Roozbeh Razavi If you have read the HowStuffWorks article How Routers Work, then you know that a router is used to manage network traffic and find the best route for sending
More informationUnicast Routing. Information About Layer 3 Unicast Routing CHAPTER
CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul
More informationBasic Idea. Routing. Example. Routing by the Network
Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More information9.1. Routing Protocols
9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the
More information2008 NDP Lectures 7 th Semester
2008 NDP Lectures 7 th Semester Neeli R. Prasad, Associate Professor Head of Wireless Security and Sensor Networks Group Networking and Security Aalborg University Niels Jernes Vej 12, 9220 Aalborg East,
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationCHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL
CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks
More informationRouting by the Network
Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationConfiguring OSPF. Cisco s OSPF Implementation
Configuring OSPF This chapter describes how to configure OSPF. For a complete description of the OSPF commands in this chapter, refer to the OSPF s chapter of the Network Protocols Reference, Part 1. To
More informationBTEC Level 3 Extended Diploma
BTEC Level 3 Extended Diploma Unit 9 Computer Network Routing and Routing Protocols BTEC Level 3 Extended Diploma Introduction to Routing Routing is the process that a router uses to forward packets toward
More informationAlcatel-lucent EXAM - 4A Alcatel-Lucent Interior Routing Protocols and High Availability. Buy Full Product.
Alcatel-lucent EXAM - 4A0-101 Alcatel-Lucent Interior Routing Protocols and High Availability Buy Full Product http://www.examskey.com/4a0-101.html Examskey Alcatel-lucent 4A0-101 exam demo product is
More informationUNIT 2 ROUTING ALGORITHMS
UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity
More informationChapter 12. Routing and Routing Protocols 12-1
Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone
More informationFXT - Foundations of Telematic Networks
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2017 205 - ESEIAAT - Terrassa School of Industrial, Aerospace and Audiovisual Engineering 744 - ENTEL - Department of Network Engineering
More informationUser Datagram Protocol (UDP):
SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation
More informationRouting Unicast routing protocols
Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type
More informationTCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02
TCPIP Protocol Suite & Utilities Revision no.: PPT/2K403/02 Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model Comparing the TCP/IP protocol Suite, the OSI Model, and the DoD Model (contd.)
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationLinux System Administration
IP Addressing Subnetting Objective At the conclusion of this module, the student will be able to: Describe how packets are routed from one network to another Describe the parts and classes of IPv4 address
More informationICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing
ICS 451: Today's plan Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing Virtual Circuits: Motivation Implementing the routing table in hardware can be expensive to make it
More informationRouting Protocols of IGP. Koji OKAMURA Kyushu University, Japan
Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source
More informationChapter 6 Reading Organizer
Name Date Chapter 6 Reading Organizer After completion of this chapter, you should be able to: Describe and plan a network using OSPF Design and configure a network using single-area OSPF Work with multi-protocol
More informationRouting Protocols. Autonomous System (AS)
Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?
More informationRouting. Jens A Andersson Communication Systems
Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Homework 3 Out: 11/19 Due: 11/26 Instructions 1. Turn in a physical copy at the beginning of the class on 11/26 2. Ensure the HW cover page has the following information clearly
More informationIntra-domain Routing
Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm CS 640 1 Goal Build router forwarding tables in an internetwork using intra-domain routing protocols High level approach Distributed
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationChapter 4 Network Layer
Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationNetwork Routing Protocol using Genetic Algorithms
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:0 No:02 40 Network Routing Protocol using Genetic Algorithms Gihan Nagib and Wahied G. Ali Abstract This paper aims to develop a
More informationPerformance Analysis of Routing Techniques in Networks
International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Performance Analysis of Routing Techniques in Networks J.Mahesh, M.Antony Kumar P.M.R.Engineering College
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationREDDIG II Computer Networking Training
REDDIG II Computer Networking Training JM SANCHEZ / PH RASSAT -20/06/2012 Invierno 2011 Capacitacion en fabrica - CORPAC Dynamic Routing Dynamic Routing Function(s) of Dynamic Routing Protocols: Dynamically
More informationEECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.
EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect
More information