Routing. Information Networks p.1/35

Size: px
Start display at page:

Download "Routing. Information Networks p.1/35"

Transcription

1 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual circuits or datagrams connections In a datagram network two successive packets between the same pair of source and destination nodes may travel along different routes and routing decisions is made for each individual packet In virtual circuit network, a routing decision is made when each virtual circuit connection is set up Information Networks p.1/35

2 Routing Routing requires coordination between all the nodes of the subnet, rather than just the nodes sharing a common media such as in multiaccess protocols The routing system must cope with link and node failures, redirecting traffic and updating the databases maintained by the system To achieve high performance the routing algorithm may need to modify its routes when some areas within the network become congested We will mainly focus on selecting routes to achieve high performance and broadcasting routing-related information Information Networks p.2/35

3 Routing The two main functions performed by a routing algorithm are the selection of routes for various source and destination pairs of nodes and the delivery of packets to their correct destination once the routes are selected This second function is performed by using a variety of protocols and data structures (routing tables) We will focus on how to select routes and how it affects network performance The main performance measures that are affected by the routing algorithm is the throughput and average packet delay Information Networks p.3/35

4 Routing Routing interacts with flow control in determining these performance measures, as good routing keeps the delay low the flow control allows more traffic into the network The effect of good routing is to increase throughput for same value of average delay under high offered load and to decrease average delay per packet under low and moderate load In centralized algorithms all route choices are made at a central node, while in distributed algorithms the computation of routes is shared among the network nodes with information exchanged between them as necessary Information Networks p.4/35

5 Routing In static routing the path used by sessions of each source-destination pair is fixed regardless of traffic conditions, the routes only change in response to link or node failure In adaptive routing the paths used to route traffic between source-destination pairs change occasionally in response to congestion To inform nodes about changes in network topology due to link failures and repairs it is necessary to transmit this to the entire network using a broadcast Broadcasts can also be used as a primitive form of routing packets from a single transmitter to a subset of receivers (or possibly just one receiver) Information Networks p.5/35

6 Broadcasting, flooding algorithm Broadcasting is generally rather inefficient but may be sensible because it s simple or because the receivers location within the network is unknown A widely used broadcasting method is flooding, the source node sends its packet to its neighbours, the neighbours relay it to their neighbours, and so on until the packet has reached all nodes in the network To limit the number of transmissions a node will not relay the packet back to the node from which the packet was obtained, and a node will send the packet to its neighbours at most once; this can be ensured by including in the packet the origin node ID and a sequence number Information Networks p.6/35

7 Broadcasting, flooding algorithm The sequence number is increased with each new packet issued by the origin node By storing the highest sequence number received for each origin node, and not relaying packets with sequence numbers less than or equal to the one stored a node can avoid transmitting the same packet more than once The total number of packet transmissions per packet broadcast lies between L and 2L, where L is the number of bidirectional links in the network There is a problem with using sequence numbers when portions of the network become disconnected or malfunctions Information Networks p.7/35

8 Broadcasting, flooding algorithm When a complete or partial network reinitialization takes place (perhaps following a crash of one or more nodes) it may be necessary to reset the sequence numbers to 0, since a node may not remember the sequence number it was using before the crash Also the sequence number could be altered in a node due to malfunction or erroneous transmission Some way to reinitialize sequence numbers is needed, one way to do this is to include age field in the broadcast packet, thus each node can calculate the age of the information about the sequence number and use a timeout to supersede aged messages with recent ones regardless of sequence value Information Networks p.8/35

9 Broadcasting, flooding algorithm Aging information in combination with periodic updates guarantees that up-to-date information will be available eventually The age field indicates how long the broadcast packet has been circulating in the network, a packet whose age exceeds some limit are not transmitted further It is also possible to use broadcast without sequence numbers by using an algorithm that updates the topology concurrently with the information in the broadcast packet in a manner similar to methods we will describe for updating nodes with shortest path information (network topology) Information Networks p.9/35

10 Broadcasting, spanning tree Another broadcast method is to use a spanning tree, which is a connected subgraph of the network that includes all nodes and has no cycles Broadcasting on a spanning tree is more efficient than flooding, it requires N 1 packet transmissions per packet broadcast, where N is the number of nodes The price is that we need to maintain and update the spanning tree of the network Given a spanning tree one can perform selective broadcasting, that is, transmission from a source to a limited set of destinations, given that each node knows which of its spanning tree links lead to any given destination Information Networks p.10/35

11 Shortest path routing Many routing algorithms are based on a notion of shortest path between two nodes Each communication link is assigned a positive number called its length, a link can have different length in each direction Each path (sequence of links) has a length equal to the sum of the lengths of its links A shortest path routing algorithm routes each packet along a minimum length path between the source and destination nodes The simplest possibility is for each link to have unit length, in which shortest path is minimum number of links (min-hop path) Information Networks p.11/35

12 Shortest path routing The length of a link may depend on its transmission capacity and its projected traffic load, the idea is that a shortest path should contain relatively few and uncongested links We may let the length of each link change over time and depend on the current congestion level of the link, then shortest path may adapt to temporary overloads and route packets around points of congestion A problem with this is that it introduces a feedback leading to instability of routing and oscillation of selected routes Information Networks p.12/35

13 Shortest path routing It is possible to damp these oscillations by adding a positive constant to the link lengths, this constant is known as a bias factor If the bias factor is large enough relative to the range of link lengths, the shortest path will be the min-hop path which is a static routing and cannot exhibit any oscillation and is totally insensitive to traffic congestion A possibility is to set the bias to the sum of average packet transmission time, processing delay and propagation delay of a link Another possibility is to damp oscillations by averaging link lengths over a longer period than shortest path updates Information Networks p.13/35

14 Interconnected Network Routing When interconnecting networks various interface devices are used, in the case of wide-area networks they are called gateways The gateways perform fairly sophisticated network tasks including routing and operate at the Internet sublayer of the network layer When interconnecting local area networks (LAN) it is possible to do it at the MAC sublayer with a primitive form of routing, these devices are called bridges LANs can also be connected with each other or wide area networks using more sophisticated devices called routers Information Networks p.14/35

15 Interconnected Network Routing Routers provide fairly advanced routing functions at network layer, possibly including adaptive and multiple-path routing One may view an interconnected network of subnets as a single large network where the interfaces (gateways, bridges, routers) are just additional nodes connected to two or more subnets Routing based on this model is called nonhierarchical and similar to routing in a wide area network It is also possible to view each subnet as a single node connected to interface nodes, this model is called hierarchical and consists of at least two levels Information Networks p.15/35

16 Hierarchical Routing At the lowest level there is a separate routing algorithm for each subnet that handles local subnet traffic and directs internetwork traffic to the subnets interface with the other subnets At the higher level there is a routing algorithm that decides the sequence of subnets and interface nodes that each internetwork packet must follow In nonhierarchical routing each node has a unique entry in its routing table for every destination, thus the size of the routing tables is equal to the total number of nodes in the network, the size of routing tables and calculations to update them may soon become excessive Information Networks p.16/35

17 Bridged LANs As we saw when analyzing multiaccess protocols the performance tends to degrade as the number of users increases In Ethernet-based LANs the performance also degrades as the ratio of propagation delay to transmission capacity increases A solution is to interconnect several LANs so that a larger geographical area and many users can be handled without severe performance degradation All nodes, including the interface node hears all traffic on a LAN Information Networks p.17/35

18 Bridged LANs A bridge listens to all packets transmitted within two or more LANs through connections called ports The bridge then selectively relays some packets from one LAN to another, packets can travel from source to destination going through a sequence of LANs and bridges The resulting internetwork is nonhierarchical and can be viewed as a single network called the extended LAN Bridges uses some special routing techniques, the two most common are spanning tree routing and source routing Information Networks p.18/35

19 Bridged LANs Each node in the extended LAN has a unique ID, but the ID need not contain information about which LAN it is connected to The location of a node is assumed unknown to allow nodes to be turned on and off and to be moved from one LAN to another at will In spanning tree method, the bridge uses a spanning tree to determine whether and to which LAN it should relay a packet The spanning tree consists of a subset of ports that connect all LANs into a network with no cycles, each link separates the tree into two parts, this yields a unique path from every LAN to every other LAN on the spanning tree Information Networks p.19/35

20 Bridged LANs The ports on the spanning tree are called designated or active ports, and the unique paths between ports are used for all communication between LANs Each bridge can communicate with any given node through a unique active port, so it is sufficient for the bridge to keep a list of nodes for each active port, this is called the forwarding database (FDB) of the port When a packet is heard on the LAN corresponding to an active port A of a bridge, if the destination ID is included in the FDB of an active port B different from A the packet is transmitted on the LAN connected to B Information Networks p.20/35

21 Bridged LANs If the packet is included on the FDB of port A it is discarded by the bridge The updating of the FDBs are done with bridge learning, each active port adds to its FDB the source ID of packets transmitted on the corresponding LAN Also each active port deletes from its FDB the ID of nodes whose packets haven t been transmitted on the corresponding LAN for a while When the destination ID is unknown at each of the bridges active ports the bridge relays the packet on all other active ports Information Networks p.21/35

22 Bridged LANs To build the spanning tree usually a shortest path from every LAN and bridge to a particular destination (root) is used The bridges can have unique IDs and the one with smallest ID can be selected to be root A bridge must periodically initiate a spanning tree construction algorithm if it views itself as root, to cope with failure of the root node bridges periodically broadcast a special hello message to other bridges Source routing is an alternative, the idea is to discover a route and include the route explicitly on the header of each packet Information Networks p.22/35

23 Undirected Graphs A graph G = (N, A) is a finite nonempty set N of nodes and a collection A of arcs consisting of pairs of distinct nodes from N A walk in G is a sequence of nodes (n 1, n 2,..., n l ) such that each of the pairs (n i, n i+1 ), i = 1,..., l 1 are arcs of G A walk with no repeated nodes are a path A walk (n 1, n 2,..., n l ) with n 1 = n l, l > 3 and no repeated nodes other that n 1 = n l is a cycle A graph is connected if for each node i there is a path (i = n 1, n 2,..., n l = j) to each other node j Information Networks p.23/35

24 Undirected Graphs If G is a connected graph and S any nonempty strict subset of the set N of nodes of G then at least one arc (i, j) exists with i S and j S If G = (N, A ) and G == (N, A) are graphs and N N and A A then we say that G is a subgraph of G A tree is a connected graph that contains no cycles A spanning tree of a graph G is a subgraph of G that is a tree and includes all nodes of G We can construct a spanning tree by starting with an arbitrary node and no arcs and successively adding an arc from the nodes added so far to a new node and also that new node Information Networks p.24/35

25 Undirected Graphs The spanning tree of a connected graph G has N nodes and N 1 arcs if G has N nodes, and N 1 is the least number of arcs for a connected subgraph of G, and any connected graph with N nodes and N 1 arcs is a tree, if G has more than N 1 arcs then G contains a cycle and is not a tree If we have weights w ij for each arc (i, j) we can consider a minimum weight spanning tree (MST) which is a spanning tree with minimum sum of arc weights If the arc weights represent the cost of sending a packet along the link corresponding to an arc in either direction then the total spanning tree weight represents the cost of broadcasting a message to all nodes along the spanning tree Information Networks p.25/35

26 MST algorithms Any subtree of a MST is called a fragment, this includes a node by itself with no arcs An arc having one node in a fragment and the other node not in this fragment is called an outgoing arc from the fragment If F is a fragment and α = (i, j) is a minimum weight outgoing arc from F, where j is not in F, then F extended by arc α and node j is a fragment This fact can be used for making MST construction algorithms Prim-Dijkstra algorithm starts with an arbitrarily selected single node as a fragment and enlarges the fragment successively by adding a minimum weight outgoing arc Information Networks p.26/35

27 MST algorithms Kruskal s algorithm starts with each node being a single node fragment and then successively combines two of the fragments by using the arc with minimum weight of those that when added do not form a cycle If there is a unique MST we can add minimum weight outgoing arcs simultaneously to each fragment in a distributed manner, it is not even necessary that the procedure for arc addition is synchronized for all fragments (as long as the arc added is indeed a minimum weight outgoing arc from for one of the fragments joined) What is needed is a scheme for the nodes and arcs of a fragment to determine the minimum weight outgoing arc Information Networks p.27/35

28 MST algorithms If all arc weights are distinct there exists a unique MST, but we can make arc weights distinct by including the node numbers of the arc in comparing the weight If arcs (i, j) and (k, l) with i < j and k < l have same weight we say that (i, j) has lower weight if i < k or if i = k and j < l and otherwise (k, l) has lower weight Information Networks p.28/35

29 Digraphs A directed graph or digraph G = (N, A) is a finite nonempty set N of nodes and a collection A of directed arcs consisting of ordered pairs of distinct nodes from N To each digraph there is an associated undirected graph G = (N, A ) where N = N and (i, j) A if either (i, j) A or (j, i) A, or both We say that (n 1, n 2,..., n l ) is a walk, path or cycle in a digraph if it is a walk, path or cycle in the associated graph Further (n 1, n 2,..., n l ) is a directed walk in a digraph G if (n i, n i+1 ) is a directed arc in G for i = 1,..., l 1 Information Networks p.29/35

30 Digraphs A directed path is a directed walk with no repeated nodes, and a directed cycle is a directed walk when l > 2 and n 1 = n l but no other repeated nodes A digraph is strongly connected if for each pair of nodes i and j there is a directed path from i to j A digraph is connected if the associated graph is connected For a digraph G in which each directed arc (i, j) is assigned some length d ij the length of a directed path p = (i, j, k,..., l, m) is d ij + d jk d lm, and the length of a directed walk or cycle is defined analogously Information Networks p.30/35

31 Shortest paths Given any two nodes i, m of a digraph the shortest path problem is finding a minimum length directed path from i to m If d ij is the cost of using a link (i, j) then the shortest path from i to m is the minimum cost route over which to send data If d ij is average packet delay across the link the shortest path is the minimum delay route, unfortunately the average delay of a link depends on the traffic load carried by the link which depends on the routes selected If p ij is the probability that arc (i, j) is usable, and each arc is usable independent of all the other arcs then shortest path with d ij = log p ij is the most reliable path Information Networks p.31/35

32 Bellman-Ford algorithm We suppose that node 1 is the destination and consider the problem of finding a shortest path from every node to node 1 We denote d ij = if (i, j) is not an arc of the graph, with this convention we can assume that there is an arc between any pair of nodes A shortest walk from node i to node 1 subject to the constraint that the walk contains at most h arcs and goes through node 1 only once is the shortest ( h) walk and its length is denoted D h i We let D h 1 = 0 for all h Information Networks p.32/35

33 Bellman-Ford algorithm We can generate D h i recursively by D h+1 i starting from D 0 i = min j [d ij + D h j ], for all i 1 = for all i 1 The algorithm terminates after h iterations if D h i = Dh 1 i for all i The algorithm terminates after a finite number of steps if and only if all cycles not containing 1 have nonnegative length. If the algorithm terminates it does so after at most h N iterations Information Networks p.33/35

34 Dijkstra s algorithm This algorithm requires that all arc lengths are nonnegative, it s worst case computational requirements are less than for Bellman-Ford We label each node with a tentative distance D i of the shortest path length, and call the nodes permanently labeled when the tentative distance becomes certain Start with P = {1}, D 1 = 0, D j = d j1 for j 1 Find closest node i P such that D i = min j P D j Set P := P {i}, if P contains all nodes we are done Otherwise we update the labels by for all j P set D j := min[d j, d ji + D i ] and repeat finding closest node Information Networks p.34/35

35 Floyd-Warshall algorithm Computes shortest path between all pairs of nodes, like Bellman-Ford arc distances can be positive or negative but there can be no negative-length cycles This algorithm iterates on the set of nodes that are allowed as intermediate Let Dij n be the shortest path length from node i to j using only nodes 1, 2,..., n as intermediate nodes on paths Initially D 0 ij = d ij for all i, j, i j For n = 0, 1,..., N 1 let Dij n+1 = min[dij n, Dn i(n+1) + Dn (n+1)j] for all i j Information Networks p.35/35

Lecture 19. Broadcast routing

Lecture 19. Broadcast routing Lecture 9 Broadcast routing Slide Broadcast Routing Route a packet from a source to all nodes in the network Possible solutions: Flooding: Each node sends packet on all outgoing links Discard packets received

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007.

Routing Algorithms. CS158a Chris Pollett Apr 4, 2007. Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis TOM 50: Networking Theory & undamentals Lecture pril 6, 2003 Prof. Yannis. Korilis 2 Topics Routing in ata Network Graph Representation of a Network Undirected Graphs Spanning Trees and Minimum Weight

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

Review of Graph Theory. Gregory Provan

Review of Graph Theory. Gregory Provan Review of Graph Theory Gregory Provan Overview Need for graphical models of computation Cloud computing Data centres Telecommunications networks Graph theory Graph Models for Cloud Computing Integration

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009 Solving Shortest Path Problem: Dijkstra s Algorithm October 23, 2009 Outline Lecture 18 Focus on Dijkstra s Algorithm Importance: Where it has been used? Algorithm s general description Algorithm steps

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the

More information

Algorithm Design (8) Graph Algorithms 1/2

Algorithm Design (8) Graph Algorithms 1/2 Graph Algorithm Design (8) Graph Algorithms / Graph:, : A finite set of vertices (or nodes) : A finite set of edges (or arcs or branches) each of which connect two vertices Takashi Chikayama School of

More information

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of

Routing Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

What is Network Layer?

What is Network Layer? UNIT III NETWORK LAYER 10 Internetworks Packet Switching and Datagram approach IP addressing methods Subnetting Routing Distance Vector Routing Link State Routing Routers. What is Network Layer? The network

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

Chapter 12. Routing and Routing Protocols 12-1

Chapter 12. Routing and Routing Protocols 12-1 Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone

More information

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive

Routing Strategies. Fixed Routing. Fixed Flooding Random Adaptive Routing Strategies Fixed Flooding Random Adaptive Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Introduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing

Introduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing Introduction to Communication Networks Spring 007 Unit 5 Internetworking (cont) Routing EECS SPRING 007 Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several

More information

NET2-2 Internet Protocol and Routing Network Science Certificate George Mason University

NET2-2 Internet Protocol and Routing Network Science Certificate George Mason University NEC/NSC-NET2 NET2-2 Internet Protocol and Routing - - - Network Science Certificate 0 George Mason University The author of these slides is Dr. Mark Pullen of George Mason University s NEC program. Students

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

of optimization problems. In this chapter, it is explained that what network design

of optimization problems. In this chapter, it is explained that what network design CHAPTER 2 Network Design Network design is one of the most important and most frequently encountered classes of optimization problems. In this chapter, it is explained that what network design is? The

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Lecture on Computer Networks

Lecture on Computer Networks Lecture on Computer Networks Historical Development Copyright (c) 28 Dr. Thomas Haenselmann (Saarland University, Germany). Permission is granted to copy, distribute and/or modify this document under the

More information

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks

More information

Lecture 4 Wide Area Networks - Routing

Lecture 4 Wide Area Networks - Routing DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched

More information

The Network Layer. Network Layer Design Objectives

The Network Layer. Network Layer Design Objectives 1 next CITS3002 help3002 CITS3002 schedule The Network Layer The Data Link Layer had the responsibility of reliably transmitting frames across along a single wire (or wireless,...) link. The Network Layer's

More information

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing

We will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output

More information

Computer Networks. Routing

Computer Networks. Routing Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding

More information

Data and Computer Communications. Chapter 12 Routing in Switched Networks

Data and Computer Communications. Chapter 12 Routing in Switched Networks Data and Computer Communications Chapter 1 Routing in Switched Networks Routing in Packet Switched Network Select route between end nodes Characteristics required: Correctness Simplicity Robustness Stability

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

ETSF05/ETSF10 Internet Protocols Routing on the Internet

ETSF05/ETSF10 Internet Protocols Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet 2014, (ETSF05 Part 2), Lecture 1.1 Jens Andersson Circuit switched routing 2014 11 05 ETSF05/ETSF10 Internet Protocols 2 Packet switched Routing

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee

CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS 18.1 (1) The communications network may only accept blocks of data up to a certain size. (2) Error control may be more efficient with a smaller PDU size.

More information

Understanding Issues Related to Inter VLAN Bridging

Understanding Issues Related to Inter VLAN Bridging Understanding Issues Related to Inter VLAN Bridging Document ID: 11072 Contents Introduction Prerequisites Requirements Components Used Conventions Spanning Tree Topology Concerns Recommended Use of Hierarchical

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS BLM696 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Prof. Dr. Hasan Hüseyin BALIK (7 th Week) 7. Routing 7.Outline Routing in Packet-Switching Networks Examples: Routing in ARPANET Internet Routing Protocols

More information

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Lecture 7 Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Thursday, September 15 CS 475 Networks - Lecture 7 1 Outline Chapter

More information

CMPE 150: Introduction to Computer Networks

CMPE 150: Introduction to Computer Networks CMPE 50: Introduction to Computer Networks Dr. Chane L. Fullmer chane@cse.ucsc.edu Spring 003 UCSC cmpe50 Homework Assignments Homework assignment #3 Chapter Four Due by May Spring 003 UCSC cmpe50 CMPE

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes

CS 421: Computer Networks SPRING MIDTERM II May 5, minutes CS 4: Computer Networks SPRING 004 MIDTERM II May 5, 004 0 minutes Name: Student No: ) a) (8 pts) List the reasons why Internet has a hierarchical routing architecture. (Use at most four sentences) b)

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013

Computer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013 Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity.

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

UNIT III NETWORK LAYER 1. What are the network support layers and the user support layers? Network support layers: The network support layers are Physical layer, Data link layer and Network layer. These

More information

ICMP, ARP, RARP, IGMP

ICMP, ARP, RARP, IGMP Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols

More information

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

ETSF05/ETSF10 Internet Protocols. Routing on the Internet ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks

More information

Internetwork Protocols

Internetwork Protocols Internetwork Protocols Background to IP IP, and related protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection of communications

More information

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies:

UNIT 5 GRAPH. Application of Graph Structure in real world:- Graph Terminologies: UNIT 5 CSE 103 - Unit V- Graph GRAPH Graph is another important non-linear data structure. In tree Structure, there is a hierarchical relationship between, parent and children that is one-to-many relationship.

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

Configuring IP Services

Configuring IP Services This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To

More information

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Auxiliary protocols IP is helped by a number of protocols that perform specific tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Multicasting

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 3. Packet Switching Networks Switching and Forwarding Virtual Circuit and Datagram Networks ATM and Cell Switching X.25 and Frame Relay Routing

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

COSC 6377 Mid-Term #2 Fall 2000

COSC 6377 Mid-Term #2 Fall 2000 Name: SSN: Signature: Open book, open notes. Your work must be your own. Assigned seating. Test time: 7:05pm to 8:05pm. You may not use a calculator or PalmPilot to calculate subnetting/host/netid information.

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI. Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6301 PROGRAMMING DATA STRUCTURES II Anna University 2 & 16 Mark Questions & Answers Year / Semester: II / III

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs OSPF Greg Brewster DePaul University TDC 363 Greg Brewster, DePaul University 1 OSPF Link State Routing Algorithms Open Shortest Path First (OSPF) Message Types Operations

More information