Chapter 4 Network Layer
|
|
- Clement Ferguson
- 5 years ago
- Views:
Transcription
1 Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato al libo Compute Netwoking: A Top Down Appoach, 5th edition. All mateial copyight J.F Kuose and K.W. Ross, All Rights Reseved Thanks also to Antonio Capone, Politecnico di Milano, Giuseppe Bianchi and Fancesco LoPesti, Un. di Roma To Vegata Netwok Laye 4-1
2 Pevious lectue. Summay: Distibuted Belman Fod Based on Distibuted Bellman Fod Equation Cost associated to the (X,Z) link X D (Y,Z) = = distance fom X to Y, via Z as next hop Z c(x,z) + min {D (Y,w)} w D x (Y,Z) ecomputed: Upon eception of updates fom the neighbos Upon link cost change min z D X (Y,Z) communicated to the neighbos wheneve its value changes, o peiodically Netwok Laye 4-2
3 Distance Vecto Routing: oveview Iteative, asynchonous: each local iteation caused by: local link cost change message fom neighbo: its least cost path change fom neighbo Distibuted: each node notifies neighbos only when its least cost path to any destination changes m neighbos then notify thei neighbos if necessay Each node: wait fo (change in local link cost of msg fom neighbo) ecompute distance table if least cost path to any dest has changed, notify neighbos Netwok Laye 4-3
4 Distibuted Bellman Fod coectness Completely asynchonous Stating fom abitay estimates of the cost of the best oute fom node i to the destination, if: m m m links weights ae constant fo enough time fo the potocol to convege stale info expie afte a while once in a while updated info ae sent fom a node to its neighbos the Distibuted Bellman Fod algoithm conveges, i.e. each node coectly estimates the cost of the best oute to the destination Netwok Laye 4-4
5 Bellman-Fod Given a gaph G=(N,A) and a node s finds the shotest path fom s to evey node in N. A shotest walk fom s to i subject to the constaint that the walk contains at most h acs and goes though node s only once, is denoted shotest(<=h) walk and its length is D h i. Bellman-Fod ule: Initiatilization D h s =0, fo all h; w i,k = infinity if (i,k) NOT in A; w k,k =0; D 0 i =infinity fo all i!=s. Iteation: D h+1 i =min k [w i,k + Dh k ] Assumption: non negative cycles (this is the case in a netwok!!) The Bellman-Fod algoithm fist finds the one-ac shotest walk lengths, then the two-ac shotest walk length, then the thee-ac etc. distibuted vesion used fo outing Netwok Laye 4-5
6 Pevious lectue. Summay: Distibuted Belman Fod Based on Distibuted Bellman Fod Equation X D (Y,Z) Cost associated to the (X,Z) link = = distance fom X to Y, via Z as next hop Z c(x,z) + min {D (Y,w)} w D x (Y,Z) ecomputed: Upon eception of updates fom the neighbos Upon link cost change min z D X (Y,Z) communicated to the neighbos wheneve its value changes, o peiodically How long does it take fo the algoithm to convege? good news tavel fast, bad news may not count to infinity Netwok Laye 4-6
7 Distance Vecto: link cost changes Subtitle: Distibuted Bellman Fod conveges but how fast? Link cost changes: node detects local link cost change updates distance table (line 15) if cost change in least cost path, notify neighbos (lines 23,24) 1 X 4 Y 50 1 Z good news tavels fast algoithm teminates Ydetects change infoms neighbos Z eceives update ppdates table, new least Cost infoms neighbos Y eceives new least cost; no modification in the outing table, Netwok Laye 4-7 No updates sent
8 Distance Vecto: link cost changes Link cost changes: good news tavels fast Y bad news tavels slow - count 4 1 to infinity poblem! X Z algoithm continues on! Y detects link cost Incease but think can Reach X though Z at a total cost of 6 (wong!!) The path is Y-Z-Y-X Netwok Laye 4-8
9 Count-to-infinity an eveyday life example Which is the poblem hee? the info exchanged by the potocol!! the best oute to X I have has the following cost (no additional info on the oute) A Roman example -assumption: thee is only one oute going fom Colosseo to Altae della Patia: Via dei Foi Impeiali. Let us now conside a netwok, whose nodes ae Colosseo., Altae della Patia, Piazza del Popolo Colosseo 1 Km 1 Km Altae Patia Piazza del Popolo Netwok Laye 4-9
10 Count-to-infinity eveyday life example (2/2) 1Km 1Km Colosseo Al.Patia P.Popolo The Colosseo. and Alt. Patia nodes exchange the following info Colosseo says the shotest oute fom me to P. Popolo is 2 Km Alt. Patia says the shotest path fom me to P. Popolo is 1Km Based on this exchange fom Colosseo you go to Al. Patia, and fom thee to Piazza del Popolo OK Now due to the big dig they close Via del Coso (Al. Patia P.Popolo) Al. Patia thinks I have to find anothe oute fom me to P.Popolo. Look thee is a oute fom Colosseo to P.Popolo that takes 2Km, I can be at Colosseo in 1Km I have found a 3Km oute fom me to P.Popolo!! Communicates the new cost to Colosseo that updates OK I can go to P.Popolo via Al. Patia in 4Km VERY WRONG!! Why is it so? I didn t know that the oute fom Colosseo to P.Popolo was going though Via del Coso fom Al.Patia to P.Popolo (which is closed)!! Netwok Laye 4-10
11 Distance Vecto: poisoned evese If Z outes though Y to get to X : Z tells Y its (Z s) distance to X is infinite (so Y won t oute to X via Z) will this completely solve count to infinity poblem? 60 X 4 Y 50 1 Z algoithm teminates Infinity is advetized by Y (poisoned evese) Netwok Laye 4-11
12 Split hoizon poison evese failue A C D B Line CD goes down 1) because of split hoizon ule, A and B tell C that dist(d)=inf 2) C concludes that D is uneachable and epots this to A and B 3) but A knows fom B that dist(d)=2, and sets its dist=3 4) similaly, B knows fom A distance fom D C estimates new value 4; A and B again though C estimate a value of 5.then again 1) etc until distance = infinite Regadless the hack used, thee is always a netwok topology that makes the tick fail! Netwok Laye 4-12
13 Compaison of LS and DV algoithms Message complexity LS: global exchange of infomation DV: exchange between neighbos only m convegence time vaies Speed of Convegence LS: O(n 2 ) algoithm m may have oscillations DV: convegence time vaies m may be outing loops m count-to-infinity poblem Robustness: what happens if oute malfunctions? LS: DV: m node can advetise incoect link cost m each node computes only its own table m DV node can advetise incoect path cost m each node s table used by othes eo popagate thu netwok Netwok Laye 4-13
14 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-14
15 Hieachical Routing Ou outing study thus fa - idealization all outes identical netwok flat not tue in pactice scale: with 200 million destinations: can t stoe all dest s in outing tables! outing table exchange would swamp links! administative autonomy intenet = netwok of netwoks each netwok admin may want to contol outing in its own netwok Netwok Laye 4-15
16 Hieachical Routing aggegate outes into egions, autonomous systems (AS) outes in same AS un same outing potocol m inta-as outing potocol m outes in diffeent AS can un diffeent inta- AS outing potocol Gateway oute Diect link to oute in anothe AS Netwok Laye 4-16
17 Inteconnected ASes 3c 3a 3b AS3 1a 1c 1d 1b Inta-AS Routing algoithm AS1 Fowading table Inte-AS Routing algoithm 2a 2c AS2 2b fowading table configued by both inta- and inte-as outing algoithm m inta-as sets enties fo intenal dests m inte-as & inta-as sets enties fo extenal dests Netwok Laye 4-17
18 Inte-AS tasks suppose oute in AS1 eceives datagam destined outside of AS1: m oute should fowad packet to gateway oute, but which one? AS1 must: 1. lean which dests ae eachable though AS2, which though AS3 2. popagate this eachability info to all outes in AS1 Job of inte-as outing! 3c 3a 3b AS3 1a 1c 1d 1b AS1 2a 2c AS2 2b Netwok Laye 4-18
19 Example: Setting fowading table in oute 1d suppose AS1 leans (via inte-as potocol) that subnet x is eachable via AS3 (gateway 1c) but not via AS2. inte-as potocol popagates eachability info to all intenal outes. oute 1d detemines fom inta-as outing info that its inteface I is on the least cost path to 1c. m installs fowading table enty (x,i) 3c 3a 3b AS3 1a 1c 1d x 1b AS1 2a 2c 2b AS2 Netwok Laye 4-19
20 Example: Choosing among multiple ASes now suppose AS1 leans fom inte-as potocol that subnet x is eachable fom AS3 and fom AS2. to configue fowading table, oute 1d must detemine towads which gateway it should fowad packets fo dest x. m this is also job of inte-as outing potocol! 3c 3a 3b AS3 1a 1c 1d x 1b AS1 2a 2c AS2 2b Netwok Laye 4-20
21 Example: Choosing among multiple ASes now suppose AS1 leans fom inte-as potocol that subnet x is eachable fom AS3 and fom AS2. to configue fowading table, oute 1d must detemine towads which gateway it should fowad packets fo dest x. m this is also job of inte-as outing potocol! hot potato outing: send packet towads closest of two outes. Lean fom inte-as potocol that subnet x is eachable via multiple gateways Use outing info fom inta-as potocol to detemine costs of least-cost paths to each of the gateways Hot potato outing: Choose the gateway that has the smallest least cost Detemine fom fowading table the inteface I that leads to least-cost gateway. Ente (x,i) in fowading table Netwok Laye 4-21
22 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-22
23 Inta-AS Routing also known as Inteio Gateway Potocols (IGP) most common Inta-AS outing potocols: m RIP: Routing Infomation Potocol m OSPF: Open Shotest Path Fist m IGRP: Inteio Gateway Routing Potocol (Cisco popietay) Netwok Laye 4-23
24 Chapte 4: Netwok Laye 4. 1 Intoduction 4.5 Routing algoithms 4.2 Vitual cicuit and datagam netwoks 4.3 What s inside a oute 4.4 IP: Intenet Potocol m Datagam fomat m IPv4 addessing m ICMP m IPv6 m Link state m Distance Vecto m Hieachical outing 4.6 Routing in the Intenet m RIP m OSPF m BGP 4.7 Boadcast and multicast outing Netwok Laye 4-24
25 RIP ( Routing Infomation Potocol) distance vecto algoithm included in BSD-UNIX Distibution in 1982 distance metic: # of hops (max = 15 hops) Fom oute A to subnets: z u A C B D v y w x destination hops u 1 v 2 w 2 x 3 y 3 z 2 Netwok Laye 4-25
26 RIP advetisements distance vectos: exchanged among neighbos evey 30 sec via Response Message (also called advetisement) each advetisement: list of up to 25 destination subnets within AS Netwok Laye 4-26
27 RIP: Example w x y A D B z Destination Netwok C Next Route Num. of hops to dest. w A 2 y B 2 z B 7 x Routing/Fowading table in D Netwok Laye 4-27
28 RIP: Example Dest Next hops w - 1 x - 1 z C Advetisement fom A to D w x y A D B z Destination Netwok C Next Route Num. of hops to dest. w A 2 y B 2 z B A 7 5 x Routing/Fowading table in D Netwok Laye 4-28
29 Diffeences wt Bellman Fod Since count to infinity not solved uppe bound on the netwok size Info on the cost of going though destination X though neighbo Z is maintained ONLY IF the path though Z is the cuent best (min cost) path m Diffeent way of updating costs Suppose cuent oute to dest has cost D and goes though G if an update aives fom X!=G then updates oute ONLY IF cost is <D if an update aives fom G always update oute cost PROBLEM: what if the oute we go though cashes? Route cost aging MUST be adopted Cost is maintained fo each subnetwok (athe than node) Peiodic exchange of messages Netwok Laye 4-29
30 The RIP algoithm (fom RFC) - Keep a table with an enty fo evey possible destination in the system. The enty contains the distance D to the destination, and the fist oute G on the oute to that netwok. Conceptually, thee should be an enty fo the entity itself, with metic 0, but this is not actually included. - Peiodically, send a outing update to evey neighbo. The update is a set of messages that contain all of the infomation fom the outing table. It contains an enty fo each destination, with the distance shown to that destination. - When a outing update aives fom a neighbo G', add the cost associated with the netwok that is shaed with G'. (This should be the netwok ove which the update aived.) Call the esulting distance D'. Compae the esulting distances with the cuent outing table enties. If the new distance D' fo N is smalle than the existing value D, adopt the new oute. That is, change the table enty fo N to have metic D' and oute G'. If G' is the oute fom which the existing oute came, i.e., G' = G, then use the new metic even if it is lage than the old one. Netwok Laye 4-30
31 RIP: Link Failue and Recovey If no advetisement head afte 180 sec --> neighbo/link declaed dead m outes via neighbo invalidated m new advetisements sent to neighbos m neighbos in tun send out new advetisements (if tables changed) m link failue info quickly (?) popagates to entie net m poison evese used to pevent ping-pong loops (infinite distance = 16 hops) Netwok Laye 4-31
32 Diffeences with Bellman Fod Split Hoizon m with Poison Revese m Simple split hoizon (omits cost of eaching destination when advetising though the oute it goes though) Clea implementation with point to point links. But conside the possibility that A and C ae connected by a boadcast netwok such as an Ethenet, and thee ae othe outes on that netwok. Is it a poblem? m If A has a oute though C, it should indicate that D is uneachable when talking to any othe oute on that netwok. The othe outes on the netwok can get to C themselves. They would neve need to get to C via A. m If A's best oute is eally though C, no othe oute on that netwok needs to know that A can each D. This is fotunate, because it means that the same update message that is used fo C can be used fo all othe outes on the same netwok. Thus, update messages can be sent by boadcast. Netwok Laye 4-32
33 An additional way to speed up convegence Tiggeed updates m Wheneve a oute changes the metic fo a oute it is equied to send update messages almost immediately must be implemented fo deleted outes Netwok Laye 4-33
34 RIP Table pocessing RIP outing tables managed by application-level pocess called oute-d (daemon) m pot numbe 520 advetisements sent in UDP packets, peiodically epeated outed outed Tanspt (UDP) netwok fowading (IP) table link physical fowading table Tanspt (UDP) netwok (IP) link physical Netwok Laye 4-34
35 Packet fomat Netwok Laye 4-35
# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationLast time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm
Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost
More informationChapter 3 Transport Layer
Chapte 3 Tanspot Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationShortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli
Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli Dipartimento di Informatica Rome University La Sapienza G205: Fundamentals of Computer Engineering
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationChapter IV: Network Layer
Chapter IV: Network Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Hierarchical routing our routing study thus far - idealization
More informationChapter 4: Network Layer, partb
Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationChapter 4 Network Layer
Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,
More informationHierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice
Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationInternet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst
Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G
More informationInternet Protocol: Routing Algorithms. Srinidhi Varadarajan
Internet Protocol: Routing Algorithms Srinidhi Varadarajan Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction for routing algorithms:
More informationNetwork Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture
Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction
More informationCSC 4900 Computer Networks: Routing Protocols
CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do
More informationCS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013
CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat
More informationChapter 4: Network Layer
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4.5 Routing algorithms
More informationChapter 4: Network Layer
Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationChapter 4: outline. Network Layer 4-1
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link
More informationChapter 4: Network Layer. Lecture 12 Internet Routing Protocols. Chapter goals: understand principles behind network layer services:
NET 331 Computer Networks Lecture 12 Internet Routing Protocols Dr. Anis Koubaa Reformatted slides from textbook Computer Networking a top-down appraoch, Fifth Edition by Kurose and Ross, (c) Pearson Education
More informationAgenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms
Agenda v DNS assignment Q&A v Routing Algorithms distance-vector (what ou invented last Frida) hierarchical routing routing in the Internet Network Laer 4- Chapter 4 Network Laer A note on the use of these
More informationCSc 450/550 Computer Networks Internet Routing
CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms
More informationChapter 5 Network Layer: The Control Plane
Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.15 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007
More informationCSC 4900 Computer Networks: Routing Algorithms
CSC 4900 Computer Networks: Routing Algorithms Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationNetwork Layer: Routing
Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring
More informationNetwork Layer: Routing. Routing. Routing protocol. Graph abstraction for routing algorithms: graph nodes are routers graph edges are physical links
Network Layer: Routing A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationRouting. Outline. Algorithms Scalability
Routing Outline Algorithms Scalability 1 Internetworking What is internetwork An arbitrary collection of networks interconnected to provide some sort of host-host to packet delivery service A simple internetwork
More informationChapter 4 Network Layer. Network Layer 4-1
Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationCS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016
9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:
More information! "# $ $ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved 5: DataLink Layer 5-1
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationComputer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)
Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP
More information5.1 introduction 5.5 The SDN control 5.2 routing protocols plane. Control Message 5.3 intra-as routing in Protocol the Internet
Chapter 5: outline 5.1 introduction 5.5 The SDN control 5.2 routing protocols plane link state 5.6 ICMP: The Internet distance vector Control Message 5.3 intra-as routing in Protocol the Internet t 5.7
More informationInter-AS routing and BGP. Network Layer 4-1
Inter-AS routing and BGP Network Layer 4-1 Review: intra-as routing v Also known as interior gateway protocols (IGP) v Most common intra-as routing protocols: RIP: Routing Information Protocol, distance
More informationIn order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions.
In ode to lean which questions have been answeed coectly: 1. Pint these pages. 2. Answe the questions. 3. Send this assessment with the answes via: a. FAX to (212) 967-3498. O b. Mail the answes to the
More informationCMPE 80N: Introduction to Networking and the Internet. Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 20
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 0 Announcements Final exam: June 7 th at 4pm. Comprehensive. Photo id required.
More informationCS 43: Computer Networks. 24: Internet Routing November 19, 2018
CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.
Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar
More informationRouting Unicast routing protocols
Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type
More informationChapter 4: Network Layer
Mecanismes d Echange d Informations Chapter 4 Network Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint
More informationCS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017
CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in
More informationCSC 8560 Computer Networks: Control Plane
CSC 8560 Computer Networks: Control Plane Professor Henry Carter Fall 2017 Last Time Subnets provide granularity for address assignment and ease management. What is 192.168.8.0? 192.168.32.0? 192.168.8.0:
More informationNetwork layer: Overview. Network layer functions Routing IP Forwarding
Network layer: Overview Network layer functions Routing IP Forwarding Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationRouting. Jens A Andersson Communication Systems
Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data
More informationIP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs
IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationCS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy
CS555, Spring 2005 April 12, 2005 No classes attend Senior Design Projects conference Network Layer 4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What
More informationChapter 4: Network Layer
Chapter 4: Network Layer Chapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, mobility instantiation and implementation
More informationInterplay between routing, forwarding
Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state
More informationChapter 4: Network Layer: Part II
4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms
Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce
More informationdc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc
- CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish
More informationLecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining
More informationInter-AS routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley
Inter-AS routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved Chapter 4:
More informationCOMP211 Chapter 5 Network Layer: The Control Plane
COMP211 Chapter 5 Network Layer: The Control Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith
More informationLecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms
Announcements CS 6 Network Architecture and Protocols Lecture 8 Godmar Back Project A due Apr 8 (toda) Project B due in parts: Apr 9 and Ma 6 See link to NY Times article on RFC Project B Project B Highlevel
More informationIS-IS Protocol Hardware Implementation for VPN Solutions
IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box
More informationEE 122: Intra-domain routing
EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationLecture 9. Network Layer (cont d) Network Layer 1-1
Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest
More informationChapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP
Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link
More informationRouting in the Internet
Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes
More informationFault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs
Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,
More informationComputer Networks. Instructor: Niklas Carlsson
Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and
More informationWormhole Detection and Prevention in MANETs
Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationComputer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica
Dipartimento di Informatica e Sistemistica Computer Networks II RIP Routing Information Protocol Luca Becchetti Luca.Becchetti@dis.uniroma1.it A.A. 2009/2010 RIP RIP is a Distance Vector Routing Protocol
More information(Refer Slide Time: 01:08 to 01:25min)
COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will
More informationChapter 4: Network Layer. TDTS06 Computer networks. Subnets. Subnets. Subnets. IP Addressing: introduction
hapter 4: Network Layer TDTS06 omputer s Lecture 6: Network layer III Routing in the Internet Jose M. Peña, jospe@ida.liu.se ID/DIT, LiU 2009-09-16 4. 1 Introduction 4.2 Virtual circuit and datagram s
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationLecture 12. Introduction to IP Routing. Why introduction? Routing
Lecture. Introduction to IP Routing Why introduction? Routing: very complex issue need in-depth study entire books on routing our scope: give a flavour of basic routing structure and messaging give an
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationTDC 363 Introduction to LANs
TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow
More informationLecture 19: Network Layer Routing in the Internet
Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F
More informationDynamic Routing. The Protocols
Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence
More informationLecture 4. The Network Layer (cont d)
Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols
More informationCSC 401 Data and Computer Communications Networks
CSC 40 Data and Computer Communications Networks Network Layer NAT, Routing, Link State, Distance Vector Prof. Lina Battestilli Fall 07 Chapter 4 Outline Network Layer: Data Plane 4. Overview of Network
More informationReview: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues
Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table
More informationIntroduction To Pipelining. Chapter Pipelining1 1
Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More information