Distributed Algorithms in Networks EECS 122: Lecture 17

Size: px
Start display at page:

Download "Distributed Algorithms in Networks EECS 122: Lecture 17"

Transcription

1 istributed lgorithms in Networks EES : Lecture 7 epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley Network Protocols often have unintended effects TP Eample TP connections detect congestion after it has happened May cause packet drops from uncongested well behaved flows Non congested flows back off Eample Two TP flows sharing the same router get uneven bandwidths because one has a much smaller RTT than the other Routing Oscillation and countless other pathologies It is very difficult to avoid these unintended effects March, 00 KP: EES Lecture 7 The Internet is a HUGE istributed System Nodes are local processors Messages are echanged over various kinds of links Nodes contain sensors which sense local changes Nodes control the network jointly Method for doing this is a distributed algorithm Eample: Routing Time taken to solve the problem has two components: omputation time taken for local processing ommunication time for messages to be received over the links Today Focus on protocol design issues How to move from entralized to istributed lg. Synchronous and synchronous computation Why does the synchronous ellman Ford converge? Selfish behavior distributed systems March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 Solving Global Problems in a istributed Setting Eamples: Minimum Spanning Tree Shortest Path Leader Election Topology roadcast Much easier to think in terms of centralized algorithms reativity needed to convert to the distributed case The Network is Heterogeneous Speed ialup to terabit fiber Reliability Hosts: istributed Server farms to 8 P Links: Noisy wireless to virtually error free fiber ongestion Trustworthiness What is a general enough model to cover all of this? March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7

2 onsensus over an Unreliable Link and in a connection over an unreliable link They both want to terminate the connection only if they are certain that no more packets will arrive from the other user messages to all their neighbors who then flood. won t terminate unless it knows that knows it is about to terminate. won t terminate unless it knows that knows it is about to terminate slow link March, 00 KP: EES Lecture 7 7 March, 00 KP: EES Lecture 7 0 onsensus Problem Suppose tells it can terminate and receives this message, say M can terminate, but will never know if actually received M and so it can t terminate neighbors who then flood. fails sends K(M) to, but then needs to makes sure that received this message, so it must wait for K(K(M)) never terminates. In fact, NO protocol eists to solve this problem! Worth convincing yourself of this fact. March, 00 KP: EES Lecture 7 8 March, 00 KP: EES Lecture 7 Link model Error correction ssume that errors can eventually corrected Propagation elay Fied. fails marks the link down Variable but no more than d Variable with no upper bound Other components of delay Queueing elay Transmission elay Packet order FIFO an be delivered in arbitrary order March, 00 KP: EES Lecture 7 9 March, 00 KP: EES Lecture 7

3 . fails marks the link down. comes back up msg lost This can be fied with sequence numbers, but then other problems emerge. fails marks the link down. comes back up marks the link up. marks the link down. fails message lost thinks is down when it is actually up! March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7. fails marks the link down. comes back up Synchronous v/s synchronous lgorithms Synchronous algorithms can be described in terms of global iterations. The time taken for a given iteration is the time taken for the slowest processor to complete that iteration: time driven E.g. TM or SONET synchronous algorithms eecute at a processor based on received messages and internal state: event driven E.g. IP protocols which must run over heterogeneous systems March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 7 Slotted Time. fails marks the link down. comes back up marks the link up. marks the link down Slotted system,,, ll nodes agree on slot boundaries Have access to a global clock Helps to co-ordinate the nodes Every node can run the same algorithm Proving correctness is generally tractable if the centralized algorithm is analyzable Easier to understand the sequence of communication between nodes March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 8

4 Synchronous ellman-ford (SF) Every node runs the same algorithm Time is slotted and in every tick each node sends its distance vector. t time h, node i has as an estimate of the shortest path to node that has <= h+ hops h+ (I,j) = min kεn(i) { h (k,j) + c(i,k)} Synchronization Penalty Slow nodes can create a penalty as well Node Node Node Penalty can be huge! March, 00 KP: EES Lecture 7 9 March, 00 KP: EES Lecture 7 Synchronous Timing Great when links are reliable and similar Node Implementing a Synchronous lgorithm Suppose the slowest process can complete an iteration in time T p Node Link delay is always less than T l Then a slot size of T p +T l or more is sufficient ut most processors may be most of the time What if T p and or T l are not known? March, 00 KP: EES Lecture 7 0 March, 00 KP: EES Lecture 7 Synchronous Timing ut what when some links are much faster? Node Node Node Node suffers synchronization penalty Locally Synchronous omputation Forget about fied slots When a node has received all round k- messages from its neighbors, it computes and sends out its round k message Worst-case: s slow as synchronous computation Generally much faster ny synchronous algorithm that isn t using time as a part of the computation will also work when run in a locally synchronous manner. March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7

5 Local Synchronization Send update k after you ve heard update k- from all neighbors. Node Node Node Why bother with synchronous lgorithms To reduce the synchronization penalty ifficult to get the synchronous algorithm to start The network is dynamic Flows Topology Think of the algorithm having to restart with a new set of initial conditions, every time there is a failure hanges create events which may or may not have global impact Event-driven algorithms better suited March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 8 ompare with Synchronous Slot size is affected by the slow node Node Node Node synchronous ellman Ford (F) on t even wait to hear from all neighbors! Use most recent information to compute new distance vectors i.e. use last received values of () and d Whenever ready, each node i computes (i) = min k ε N(i) [(k) + c(i,k)] Sends the result to each of its neighbors No notion of global iterations In general, nodes are using different and possibly inconsistent estimates March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 9 synchronous computation No notion of slot size at all! Node Node Node Why should this work? synchronous ellman Ford Regardless of how asynchronous the nodes are, the algorithm will eventually converge to the shortest path Links can go down and come up but as long as the topology is fied after some time t, the algorithm will eventually converge to the shortest path Why? There s some hope because the (j) can only go up if one of j s neighbors estimates has gone up. March, 00 KP: EES Lecture 7 7 March, 00 KP: EES Lecture 7 0

6 Idea Trustworthiness There are too many different runs of F, so lets try to bound the range of distance estimates of (j) over time o this by two different runs of Synchronous F Set different initial estimates One run U, uses the familiar ones, i.e. estimate is infinity if no edge The other, L, uses -if no edge! One bounds the estimates from above, one from below and both find the correct the shortest paths eventually For every iteration k of the two SF runs L k (j) L k+ (j) *(j) U k+ (j) U k (j) For any asynchronous run,, it is possible to show that for any k, there is a time t such that L k (j) L k+ (j) t (j) U k+ (j) U k (j) Since both lower and upper runs converge to the optimal, so will F eventually Three levels Honest: lways in conformance of the protocol Selfish: May lie to get better performance out of the protocol (GP) Malicious: Unpredictable Internet Protocols (for the most part) assume Honest protocol agents Unreliable infrastructure Infrastructure has gotten more reliable, and agents have gotten less honest raess s Parado: Eample of how Greediness and distributed algorithms can lead to suboptimality March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 Soft State ongestion Sensitive Routing State with Time-Out Eample: host joins a group by sending a join message to a host manager. The manager adds the host to the group for the net T seconds. If the host wants to stay in the group it must send a refresh message within T seconds to the manager. Otherwise it is dropped. dvantage: Manager robust to host failure isadvantage: Too many messages Most internet protocols use this way of communicating Trades of simplicity of correctness with compleity of communication epends on traffic S R Q T Weights are delays/bit unit of traffic from s to t u bits on the upper path -u bits on the lower path March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 The nature of asynchronous distributed protocols Generally non-intuitive Limited theory to work with orrectness etremely hard to prove Robustness hard to analyze Networking gurus have a vast knowledge of special cases that can lead to strange behaviors Misconfiguration is a big cause of errors Soft state helps a lot, but wastes many messages! What about just broadcasting topology information accurately so that these problems go away Each Node is Greedy epends on traffic S R Q T Weights are delays/bit unit of traffic from s to t u bits on the upper path -u bits on the lower path Node S minimizes Total delay = u(u+) + (-u)(-u) = (u^ u +) elay minimized at u=. So Total elay =. s March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7

7 Greediness leads to suboptimality S still sends. on each path. R Weights are delays/bit unit of traffic from s to t S 0 T u bits on the upper path -u bits on the lower path. Q RESS S PROX R is greedy R diverts all. units on to the new link Now total delay is! March, 00 KP: EES Lecture 7 7 onclusions istributed lgorithms are not intuitive There is no systematic way to design them ctive research area is making some progress Until then use Hacking bilities Simulation ontrol Theory Optimization Graph Theory Game Theory. Greedy and malicious users complicate the protocol design problem even more nother active research area making progress This is why it is hard to build networks March, 00 KP: EES Lecture 7 8 7

Distributed Routing. EECS 228 Abhay Parekh

Distributed Routing. EECS 228 Abhay Parekh Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors

More information

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern

More information

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table

More information

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet

More information

EE 122: Intra-domain routing

EE 122: Intra-domain routing EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level

More information

Final Overview EECS 122

Final Overview EECS 122 The Network ore Final Overview EES epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley any interconnected subs any different architectures dvertises a service to the

More information

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion

More information

Distance Vector Routing

Distance Vector Routing ÉOL POLYTHNIQU FÉÉRL LUSNN istance Vector Routing Jean Yves Le oudec 20 ontents. Routing in General 2. istance vector: theory 3. istance vector: practice (RIP) 4. Software efined Networking (SN) Textbook

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Advanced Computer Networks

Advanced Computer Networks istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

Distance-Vector Routing: Distributed B-F (cont.)

Distance-Vector Routing: Distributed B-F (cont.) istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path

More information

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now. Let s focus on clarifying questions I love the degree of interaction in this year s class More Routing all Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

WAN Technology and Routing

WAN Technology and Routing PS 60 - Network Programming WN Technology and Routing Michele Weigle epartment of omputer Science lemson University mweigle@cs.clemson.edu March, 00 http://www.cs.clemson.edu/~mweigle/courses/cpsc60 WN

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Internet Architecture I EECS 122: Lecture 2

Internet Architecture I EECS 122: Lecture 2 Back to a simple Internet rchitecture I EECS 122: Lecture 2 C E epartment of Electrical Engineering and Computer Sciences University of California Berkeley B eview: Hosts connect to specialized devices

More information

More on Network Routing and Internet Protocol

More on Network Routing and Internet Protocol omputer Networks //03 More on Network Routing and Internet Protocol Kai Shen Network Routing Link state routing: ijkstra s algorithm efficient approach to calculate least cost routes all routers need complete

More information

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the

More information

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e

More information

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks

Routing Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks Advanced Computer Networks Khanna and Zinky, The Revised ARPANET Routing Metric, Proc. of ACM SIGCOMM '89, 19(4):45 46, Sep. 1989 Routing Metric Distributed route computation is a function of link cost

More information

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,

More information

Announcements. Ethernet. Goals of Today s Lecture. Three Ways to Share the Media. Random Access Protocols. Key Ideas of Random Access

Announcements. Ethernet. Goals of Today s Lecture. Three Ways to Share the Media. Random Access Protocols. Key Ideas of Random Access Ethernet EE 1: Intro to ommunication Networks Fall 00 (WF -:0 in ory ) Vern Paxson Ts: Lisa Fowler, aniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee1/ nnouncements Solutions for Homework

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks OMP/ELE 49/6 Introduction to omputer Networks Intra-domain routing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

(Refer Slide Time: 01:08 to 01:25min)

(Refer Slide Time: 01:08 to 01:25min) COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Routing in Ad-hoc Networks

Routing in Ad-hoc Networks 0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

Deployment of IGRP/EIGRP

Deployment of IGRP/EIGRP 1 eployment of IGRP/EIGRP Session 2 Presentation_I.scr 1 Understanding EIGRP Understanding and deploying EIGRP is like driving a car 3 genda Fundamentals of EIGRP UL Summarization and Load alancing EIGRP/IGRP

More information

Missing Pieces of the Puzzle

Missing Pieces of the Puzzle Missing Pieces of the Puzzle EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

Introduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing

Introduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing Introduction to Communication Networks Spring 007 Unit 5 Internetworking (cont) Routing EECS SPRING 007 Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several

More information

4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing

4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing //1 The Problem: istributed Methods for Finding Paths in Networks L 1.0 Spring 01 Lecture #0 addressing, forwarding, routing liveness, advertisements, integration distance-vector routing link-state routing

More information

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to. Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Third Generation Routers

Third Generation Routers IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

4.5.2 The Distance-Vector (DV) Routing Algorithm

4.5.2 The Distance-Vector (DV) Routing Algorithm 4.5 ROUTING ALGORITHMS 371 highl congested (for eample, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution,

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

QoS in Frame relay networks

QoS in Frame relay networks Frame Relay ndrea ianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

QoS in Frame relay networks

QoS in Frame relay networks QoS in Frame Relay ndrea ianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ omputer Networks esign and Management - 1 Frame Relay: characteristics Packet

More information

CCNA IP ROUTING. Revision no.: PPT/2K605/03

CCNA IP ROUTING. Revision no.: PPT/2K605/03 CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016 estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra

More information

Internet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009

Internet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009 omputer Networks 9//9 Network Layer Overview Kai Shen Internet rchitecture ottom-up: : electromagnetic signals on the wire : data transfer between neighboring elements encoding, framing, error correction,

More information

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing Local & Metropolitan rea Networks OE3 Lecture 6 Routing r. L. hristofi Overview The main function of the network layer is routing packets from the source to the destination machine. The only exception

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking Lecture : Networking istributed Systems ehzad ordbar School of omputer Science, University of irmingham, UK Recap rchitecture, what? and why? Tiered rchitecture Various software layer: middleware client/server

More information

More Routing. EE122 Fall 2012 Scott Shenker

More Routing. EE122 Fall 2012 Scott Shenker More Routing EE Fall 0 Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley Let s focus

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Initial Assumptions. Modern Distributed Computing. Network Topology. Initial Input

Initial Assumptions. Modern Distributed Computing. Network Topology. Initial Input Initial Assumptions Modern Distributed Computing Theory and Applications Ioannis Chatzigiannakis Sapienza University of Rome Lecture 4 Tuesday, March 6, 03 Exercises correspond to problems studied during

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6 estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the

More information

Chapter 4 Network Layer. Network Layer 4-1

Chapter 4 Network Layer. Network Layer 4-1 Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

Research paper Measured Capacity of an Ethernet: Myths and Reality

Research paper Measured Capacity of an Ethernet: Myths and Reality Research paper Measured apacity of an Ethernet: Myths and Reality Theoretical work seems to suggest that Ethernet works saturate at 7%. Realistic networks can offer higher throughputs Lessons learnt Don

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

ECE 158A: Lecture 5. Fall 2015

ECE 158A: Lecture 5. Fall 2015 8: Lecture Fall 0 Routing ()! Location-ased ddressing Recall from Lecture that routers maintain routing tables to forward packets based on their IP addresses To allow scalability, IP addresses are assigned

More information

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing

ICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing ICS 451: Today's plan Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing Virtual Circuits: Motivation Implementing the routing table in hardware can be expensive to make it

More information

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel? Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

From Routing to Traffic Engineering

From Routing to Traffic Engineering 1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept //8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8

More information

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic? Routing 9: Intro to Routing lgorithms Last Modified: // :: PM : Netork Layer a- IP Routing each router is supposed to send each IP datagram one step closer to its Ho do they do that? Static Routing Hierarchical

More information

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging) S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

Chapter 4: Network Layer

Chapter 4: Network Layer hapter 4: Network Layer hapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, multicast instantiation and implementation

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Switching and Forwarding

Switching and Forwarding Switching and Forwarding Outline Store-and-Forward Switches ridges and Extended LNs ell Switching Segmentation and Reassembly Scalable Networks Switch forwards packets from input port to output port port

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Main Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored

Main Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored Main hallenge ind where a particular file is stored : Peer-to-Peer Networks Ion Stoica (and righten Godfrey) Ts: Lucian Popa, avid Zats and Ganesh nanthanarayanan http://inst.eecs.berkeley.edu/~ee/ (Materials

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 9. Network Layer (cont d) Network Layer 1-1 Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest

More information

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013 CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information