If the distance-vector algorithm is used :

Size: px
Start display at page:

Download "If the distance-vector algorithm is used :"

Transcription

1 An Experimental tudy of Asymmetric Routing Manish Karir y karir@isr.umd.edu University of Maryland College Park, MD Yongguang Zhang ygz@hrl.com HRL Laboratories Malibu, CA Abstract Traditionally, most routing protocol designs and their implementations assume that every link is bidirectional. This assumption is no longer true with direct broadcast satellite and other one-way communication link technology. In this research, we study the problems of dynamic asymmetric routing in an experimental approach. We have developed and implemented a method to adapt existing routing protocols and routing software to support networks with unidirectional links. 1 Introduction Recent advances in communication technologies has allowed the use of direct broadcast satellites (D) as a new networking media for the Internet. D has many unique benets: large geography coverage, high bandwidth, broadcast in nature, and low cost per terminal. It is especially suitable for applications that require rapid deployable infrastructure and/or oneto-many communications [8, 9]. everal commercial oerings have already been using D to provide internet connectivity, such as in the notable example of Hughes DirecPC network 1. Nevertheless, D brings unconventional networking characteristics to the Internet. Traditionally, communication links in the Internet are duplex and bidirectional. However, D is a one-way unidirectional media: communication can take place only from a small subset of nodes (called feeds) to rest of the nodes (called receivers). Feeds are equipped with large ground terminals that have adequate power to transmit data to the satellite for broadcast. Receivers only have small receive-only antenna; they can receive broadcast signal from the satellite but do not have the physical means to send signals back to the feeds. uch communication network is unidirectional in nature. We call such network link a UniDirectional Link (UDL). esides D, certain cable modem systems are also UDLs. y This work was performed under an Internship program at Hughes Research Labs (now HRL Labs), ummer UDL can be integrated into the Internet as a subnet technology, if there already exist other paths in the Internet from the receivers to the feeds. Internet routers can be congured to use the UDL to deliver IP datagrams in one direction and use the alternative path for the other direction. End-to-end Internet applications will not be aected because they need not know how the IP datagrams are delivered and what paths are used. We called such routing scenario asymmetric routing. As described in literatures [3, 8], asymmetric routing is not compatible with the current dynamic routing infrastructure in the Internet. In this paper, we will describe our experience in supporting dynamic routing in an asymmetric routing environment. We will demonstrate that a small x in the current routing software may be sucient to support asymmetric routing. 2 Problems with Dynamic Asymmetric Routing Most dynamic routing protocol implementations make the assumption that links are bidirectional. If a node receives a routing information packet on one interface, the routing software often assumes the source (sender of the packet) is automatically reachable via that same interface. This assumption breaks down in a network with UDLs. In a network with UDLs, a packet containing the routing information might be received via one link but it might not be possible to transmit packets on that link. 2.1 Unicast Many unicast routing protocols in the Internet use a distance-vector algorithm to compute dynamic routes [6]. efore this algorithm can be applied to a network with UDLs, special care must be taken to propagate the routing information. Figure 1 illustrates this implication using a simple 3-node network with a UDL. Router A receives routing information from both and C, however, router only receives routing messages from node C. As shown in 1

2 A 2 1 C If the distance-vector algorithm is used : A s route table : interface 1: dist=1 C: interface 2: dist=1 s route table A: interface 5: dist=2 C: interface 5: dist=1 C s route table A: interface 3: dist=1 : interface 4: dist=1 wrong sub-optimal Figure 1: Applying distance-vector to UDL the gure, the route tables computed by the distancevector algorithm are either incorrect or sub-optimal. The route table at A contains an incorrect entry for destination as no packets can be sent out of interface 1 (the receive-only interface of the UDL receiver). Moreover, the route table at contains a sub-optimal entry for destination A, via the regular bidirectional network which makes A two hops away, while the actual shortest path to A from is via interface 6 (the send-only interface of the UDL feed). Therefore the rst problem involving unicast routing in a network with UDLs is that of sending packets out of the UDL send-only interface at the UDL sender. As that interface does not receive any routing packets, it will conclude that no networks can be reached via that interface. This is incorrect as all networks on the UDL receiver side of the network are in fact reachable via that interface and the link. The second problem arises for packets sent from the UDL receiver to networks on the UDL sender side of the network. The UDL receiver receives routing information via the UDL. Therefore, it concludes that the shortest path back to the UDL sender, or any other network beyond the UDL sender is only one hop away and can be reached via the UDL receive-only interface. However, it is not possible to transmit packets from that interface as it is receive only. Therefore, all networks on the UDL sender side of the network become unreachable from all networks on the UDL receiver side of the network. The correct route table in the context of the unidirectional link would be one that causes packets sent from the UDL receiver to the UDL sender to go via the bi-directional network and packets sent from the UDL sender to the UDL receiver to go via the UDL. 2.2 Multicast everal multicast routing protocols in the Internet use reverse path forwarding [1] to derive their multicast forwarding tables. Their reliance on unicast routing to aid multicast forwarding makes the multicast routing protocols vulnerable to the same problems as unicast routing protocols. Figure 2 illustrates the problems with incorrect multicast routing in a network with UDLs. In the rst scenario, the multicast source is either at the UDL receiver, or on a network downstream to the UDL receiver. The shortest reverse path from the multicast receiver at the UDL sender or on a network upstream to the UDL feed, is via the UDL link. However, as the multicast data cannot be forwarded from the source to the receiver C via the UDL, therefore, the multicast receiver, will not be able to receive any multicast packets from the the multicast source. imilarly, in the second scenario where the multicast source is at the UDL sender or on a network upstream to the UDL sender, and the multicast receiver is downstream on the UDL receiver side, the shortest reverse path from the multicast receiver to the multicast sender will be via the bi-directional network, although the most ecient forwarding path for the multicast trac from the source to the receiver is via the UDL. Therefore in both cases, using the shortest reverse path scheme results in incorrect multicast forwarding tables. The correct multicast route table in the context of the unidirectional would forward multicast packets via the bidirectional network in the rst scenario and via the UDL in the second scenario. 3 Approach Over the past two years, several methods have been proposed to x the problems. For example, INRIA proposed a change to the routing protocols RIP and DVMRP to remove the protocol dependency on the bidirectionality of a link [3]. This however may require changes to all routers. Our approach to the problems is to hide the asymmetry by creating a virtual symmetric network. Figure 3 gives a high-level concept illustration. We use tunnels to create an illusion of a virtual bi-directional network for routing purposes. Therefore each UDL receiver, establishes a tunnel to the UDL feed via the existing bi-directional network. This tunnel carries encapsulated routing information directly from 2

3 Example network: The correct multicast tree from source should be: Receiver routing daemon virtual symmetric network UDL tunnel Internet (bi-directional) Feed routing daemon Figure 3: Approaching the UDL problem with a tunneling mechanism ut, the actual tree built by reverse path forwarding: A C (ecause the shortest path from C to is through, RPF stops C from accepting multicast from A) cenario 1: source at downstream UDL Example network: The optimal multicast tree from source should be: ut, the actual tree built by reverse path forwarding: A (ecause the shortest path from A to is actually through, RPF stops A from accepting multicast from ) cenario 2: source at upstream UDL Figure 2: Applying reverse path forwarding to UDL the UDL receiver back to the UDL feed. In this way the UDL sender and the UDL feed now have a virtual symmetric link between them through which they can exchange routing information. The data packets themselves do not ow through the tunnel, only the packets containing routing information go through the tunnel. 4 Experiments and Results We have implemented our approach towards asymmetric routing in Linux operating system. We have developed a set of procedures to adapt existing routing software to support networks with UDLs. We use a routing software system called GateD [4] to test out unicast routing with RIP protocol [5]. We use another routing software system called Mrouted [1] to test out multicast routing with DVMRP protocol [7]. The solution requires additional network setup at UDL feeds and receivers, new congurations for the GateD and Mrouted, and a minor modication of the Mrouted software. The procedures have been tested successfully using an experimental UDL network at HRL Labs. 4.1 The UDL Network Testbed Figure 4 describes the base network topology of our experimental network for dynamic asymmetric routing. It consists of many PCs acting as routers/hosts and several Ethernet segments to connect them. The base network setup consists of a UDL subnet among three routers (A,, C). Router C on the UDL has send-only capability and it is referred to as the UDL feed, Router A and router are on the receiveonly side of the UDL and they are referred to as the UDL receivers. Router C is on the send-only side of UDL and it is referred to as the UDL feed. In the example network setup, Router A's receive-only 3

4 the UDL network tunnels E (u).2 (u).3 (v) C A H Ethernet hub F (b).1 (b).4 (u).5 (v).2 G D.3 (b) Higher metrics emulates multi-hop Host/Router Figure 4: Testbed network conguration interface is denoted as A.u ( ), router 's receive-only interface is.u ( ), and router C's send-only interface is C.u ( ). As the UDL subnet is implemented by a bidirectional ethernet segment, we emulate the UDL feature by running rewall utility on each UDL receiver (A and ). The rewalls are congured to prevent any packets from being sent out of the the UDL receive-only interfaces (A.u and.u), which in eect provides us with a UDL where packets can only be sent from a UDL feed to a UDL receiver. In addition, router A,, C all have other bidirectional interfaces, denoted as A.b ( ),.b ( ), and C.b ( ) respectively. Router D acts as our emulated multihop bidirectional network. Router/host E, F, G, H are nodes that communicate with one other over this internetwork. All PCs run Linux They also run GateD (gated, version 3.5) and Mrouted (mrouted, version 3.8) software for dynamic routing purpose. In addition to the base topology shown in the gure, we can add and remove hosts and routers as required to demonstrate the various network topologies that we are interested in. We also supply articial routes in the edge routers (E, F, G, H) to observe their propagation in a network with UDLs. 4.2 The IP-Tunnel Device The cornerstone of our approach is the IP tunnel from a UDL receiver to a UDL feed. The routing software (such as GateD and Mrouted) will use this tunnel to pass routing information. The goal is to make the tunnel as transparent as possible, so that we make little change to the routing software operation. Fortunately, many Unix operating systems include some type of virtual network devices call IP tunnels. They behave like normal network device (such as Ethernet) but deliver IP datagrams by IP-in-IP encapsulation with congurable destination address in the outer packet. In Linux, we use the tunl0 device. In the example of our UDL test network (Figure 4), we need to create a virtual tunnel interface from router A to router C, and another one from router to router C. For example, the following Linux commands in router A establish the tunnel: A> ifconfig tunl0 inet A.v -pointopoint \ allmulti up A> route add -host C.u gw C.b dev tunl0 where A.v denotes the IP address assigned to the tunnel device ( ). The rst line sets up the network interface, the second line instructs that the route to UDL feed (C.u) is via the tunnel (tunl0) to UDL feed's bidirectional interface (C.b). oth lines create a one-way tunnel from the UDL receiver to the feed. The IP address assigned to the tunnel device should be from the same subnet as the UDL receiver interface, so that logically they can be treated as the same by the UDL feed. For example, when the routing software (at router A) sends out a message to the UDL feed (router C), it will carry the tunnel device IP address (A.v) as the source address. If the feed's routing software uses this address (A.v) to reply, the reply messages will go out the UDL send-only interface (C.u) because both are from the same subnet. However, the reply address (A.v) has no MAC entry 4

5 because the virtual tunnel interface is not a physical device (unlike the receive-only interface A.u). To amend this, we set up an articial ARP entry at the UDL feed so that the tunnel IP address (A.v) has the same MAC address as its physical counterpart (A.u). Any messages from the UDL feed to the UDL receiver using the tunnel IP address (A.v) will be received by the physical receive-only interface (A.u). This task can be easily accomplished via a simple script at router C: C> arp -s A.v `arp A.u` C> arp -s.v `arp.u` During the implementation, we did run into a minor problem with the TTL semantics in IPIP encapsulation. In Linux, TTL of an outer IPIP datagram is copied from the inner IP packet. This may not be desirable in all cases. Many routing software communicates with their immediate neighbors only; they sends out routing information messages with TTL value 1. When these messages are sent using the tunnel device, the outer encapsulation datagrams also have a TTL value of 1. They will always get dropped at the next hop router, never making to the tunnel endpoint (because the tunnel from UDL receiver to UDL feed through the bidirectional path is always longer than one hop). To overcome this deciency, we modied the Linux tunnel driver to implement a dierent semantics: when TTL of the inner datagram is 1, the outer TTL is set to MAXTTL (256). This ensures that the routing messages will get to the other end of the tunnel irrespective of the number of intermediate routers that the tunneled packet has to go through. 4.3 Experiments with RIP (GateD) The RIP implementation in GateD works as follows. GateD periodically sends routing update messages on all interfaces. The routing update is in form of \distance-vector" { the number of hops to reach each stub network in the Internet. Mrouted maintains a unicast route table detailing the next hop address for each such stub network. When GateD receives a routing update message from another GateD, it adds the cost metric of the receiving interface (usually 1) to the distance-vector and merges it into the its unicast route table. GateD then updates the kernel route table Unicast from feed to receiver In order to create the illusion of a virtual bidirectional network around the UDL, we have to use the tunnel to carry RIP routing updates from the UDL receiver to the UDL feed so that they arrive with unmodied route metrics. With a tunnel set up as described above, GateD can recognize the tunnel interface and send out RIP protocol messages on the interface. The following line is added to gated.conf at router A so that the RIP messages are addressed from A.v to C.u: sourcegateways C.u These messages will be automately encapsulated by the tunnel interface in IPIP packets from A.b to C.b. They will appear at the UDL feed with unmodied metrics as desired. Upon receiving the RIP messages, the UDL feed (router C) will recognize that the shortest path to hosts downstream the UDL receiver side of the network is via the RIP message sender (i.e. A.v). The UDL feed (Router C) will then start forwarding IP datagrams downstream UDL, using A.v as the next hop. Using the ARP entry as described previously, we map these packets to the correct actual interface (A.u) that these packets must arrive. With the setup above the route table obtained at the UDL feed will be correct in the UDL context, and packet from the UDL feed to the UDL receiver will be forwarded via the UDL Unicast from receiver to feed Normally, when a UDL receiver receives RIP routing update messages with a small metrics via the UDL interface, it concludes that the UDL receive-only interface would be used to reach back to the UDL feed and some upstream networks. To prevent this wrongful setting, the GateD at the UDL feed must use a large metrics when it send RIP update messages to the UDL subnet. This metrics should be larger than the sum along the bidirectional path from the UDL feed to the UDL receiver, so that the UDL receiver can logically conclude that the best path to the UDL feed or upstream networks is through the bidirectional network interface. This can be implemented easily by changing the metrics value in UDL feed's GateD conguration le, for example, the following line at router C's gated.conf: interface C.u... metricout 15 In practice, one can also instruct UDL feed's GateD not to send out RIP information for the UDL subnet. With this minor conguration setup, the GateD were able to generate correct route tabls at all routers, and we were able to receive packets at 5

6 the UDL feed, from the UDL receiver, via the bidirectional network. 4.4 Experiments with DVMRP (Mrouted) Multicast routing in Mrouted works as follows. First, Mrouted relies on the exchange of periodic DVMRP probe messages to discover neighboring multicast enabled routers. Once it receives probes from such neighbors on one of its interface, it will send them periodic routing update messages. The routing update is in form of \distance-vector" { the number of hops to reach each stub network in the Internet. Mrouted maintains a unicast route table (independent from other unicast routing software such as GateD, or the Unix kernel unicast route table). When it receives a distance-vector from one interface, it adds the cost metric of this interface (usually 1) to the distancevector and merges it into the unicast route table. To forward a multicast datagram of a given source, Mrouted rst performs the \reverse path forwarding" algorithm { consulting its unicast route table to identify the interface leading to the shortest path to the source. Mrouted then inserts the interface into the kernel multicast forwarding table { from now on the kernel will accept multicast datagrams of that source from that particular interface and from that interface only. However, this multicast forwarding procedure and the above neighbor discovery procedure have a few problems in the UDL network Neighbor discovery in a UDL network For a UDL feed to recognize a UDL receiver as a neighboring multicast router, the UDL feed must receive DVMRP probes from the UDL receiver via the UDL interface. For this purpose we use the same virtual tunnel device (tunl0) as described previously. Mrouted at the UDL receiver will recognize this device as a separate interface and it will start generating probe messages on the interface. These messages will be automatically tunneled by the interface to the UDL feed. Upon receiving the DVMRP messages, Mrouted at the UDL feed will conclude that it has a peer on the UDL receiver at the UDL subnet. It will start generating DVMRP routing update messages on the UDL send-only interface. On the other direction, the UDL feed sends probe messages on its send-only interface. Upon receiving the probe and recognizing the UDL feed as a peer, a UDL receiver will send DVMRP routing update messages to the UDL feed. These messages will also be automatically tunneled to the feed by the same tunnel interface Multicast from feed to receiver When a source upstream the UDL subnet sends multicast to a host downstream the UDL subnet, multicast datagrams may be forwarded by the UDL feed on to the UDL subnet and accepted by the UDL receivers for further routing downstream. However, a glitch in the current Mrouted implementation prevents such multicast datagrams to be accepted by the UDL receivers. In a UDL receiver, Mrouted considers the tunnel interface a separate interface from the UDL receiveonly interface. When Mrouted determines that the shortest path to the source is through the UDL feed, it wrongfully determines that the virtual tunnel interface is the one that leads to the feed, according to the unicast route table and our tunneling set up. Therefore, Mrouted will set a wrong entry in kernell's multicast forwarding table, causing it to reject the multicast datagram from the UDL receive-only interface. To correct this problem, Mrouted must instruct the kernel to accept multicast from the receive-only interface when the reverse path points to the tunnel interface. To accomplish this we introduce a new construct called udlints in Mrouted's conguration le (mrouted.conf). It associates the tunnel interface with the receive-only interface. For example, the following line is added to mrouted.conf at router A: udlints A.u A.v A minor modication to the Mrouted source code allows it to add the proper setting in the kernel multicast forwarding table. Multicast datagrams on the UDL subnet sent by the UDL feed are now accepted at the UDL receive-only interface for further routing by the UDL receiver Multicast from receiver to feed When a source downstream the UDL subnet sends multicast to a host upstream the UDL subnet, multicast datagrams may pass both a UDL receiver and the feed, through a path over the bidirectional internetwork. Great care must be taken in both the UDL receiver and the UDL feed so that the virtual tunnel interface will not be used for actual multicast trac. 6

7 In the UDL feed, DVMRP routing updates are received at both interfaces: from the UDL send-only subnet (through tunneling), and from the normal bidirectional network. However, if DVMRP routes received from the tunnel carries a smaller metric, the UDL feed may consider that the shortest path to a source downstream the UDL subnet is at the UDL send-only interface. In this case, the UDL feed will wrongfully reject the multicast datagrams coming from the bidirectional network. To correct this problem, we need to set a large metric at UDL feed's UDL send-only interface. This metrics should be larger than the sum along the bidirectional path from the UDL receiver to the UDL feed. For example, we use the following denition in the mrouted.conf le in UDL feed (router C): phyint C.u metric Conclusion We have implemented our tunneling approach towards asymmetric routing in Linux operating system, and tested it in an experimental UDL network. The results show that, with the help of a virtual IPtunneling interface, existing routing protocols and routing software can be easily adapted to support a network with unidirectional links. This tunneling approach has been adopted by IETF (Internet Engineering Task Force) UDLR (Unidirectional Link Routing) working group as the short term solution towards the asymmetric routing problem in the Internet [2]. [4] Gate Daemon, [5] C. L. Hedrick. Routing information protocol, June RFC 1058, the Internet Engineering Task Force. [6] Christian Huitema. Routing in the Internet. Prentice Hall, [7] D. Waitzman, C. Partridge, and. Deering. Distance vector multicast routing protocol, November RFC 1075, the Internet Engineering Task Force. [8] Yongguang Zhang and on Dao. Integrating direct broadcast satellite with wireless local access. In Proceedings of the First International Workshop on atellite-based Information ervices, pages 24{29, November [9] Yongguang Zhang, Dante DeLucia, o Ryu, and on Dao. atellite communications in the global Internet: Issues, pitfalls, and potential. In INET'97, June References [1]. Deering and D. Cheriton. Multicast routing in datagram internetworks and extended LANs. ACM Transactions on Computer ystems, 8(2):85{110, May [2] E. Duros, W. Dabbous, H. Izumiyama, N. Fujii, and Y. Zhang. A link layer tunneling mechanism for unidirectional links, IETF internet-draft, [3] Emmanuel Duros and Walid Dabbous. upporting unidirectional links in the Internet. In Proceedings of the First International Workshop on atellite-based Information ervices, November

SATELLITE NETWORK REGULAR CONNECTIONS

SATELLITE NETWORK REGULAR CONNECTIONS Supporting unidirectional links in the Internet Emmanuel Duros eduros@sophia.inria.fr I.N.R.I.A. Sophia Antipolis http://www.inria.fr/rodeo/personnel/eduros/ Walid Dabbous dabbous@sophia.inria.fr I.N.R.I.A.

More information

Configuring IP Multicast over Unidirectional Links

Configuring IP Multicast over Unidirectional Links Configuring IP Multicast over Unidirectional Links IP multicast requires bidirectional communication, yet some networks include broadcast satellite links, which are unidirectional. Unidirectional link

More information

Configuring IP Multicast over Unidirectional Links

Configuring IP Multicast over Unidirectional Links Configuring IP Multicast over Unidirectional Links Last Updated: December 16, 2011 IP multicast requires bidirectional communication, yet some networks include broadcast satellite links, which are unidirectional.

More information

The Internet. Internet. Agent. MBone. Satellite Gateway. Data Redistribution Center. Multicast Group Requests. Tunneled. Multicast Data.

The Internet. Internet. Agent. MBone. Satellite Gateway. Data Redistribution Center. Multicast Group Requests. Tunneled. Multicast Data. Extensions of DBS and Hybrid Internet 1,2 Manish Karir Vijay Bharadwaj Keith Holleman Narin Suphasindhu Spyro Papademetriou John S. Baras Center for Satellite & Hybrid Communication Networks University

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols Auxiliary Protocols IP serves only for sending packets with well-known addresses. Some questions however remain open, which are handled by auxiliary protocols: Address Resolution Protocol (ARP) Reverse

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing

REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing REIHE INFORMATIK 1/2000 Protocol Independent Multicast and Asymmetric Routing Thomas T. Fuhrmann Praktische Informatik IV University of Mannheim 68131 Mannheim, Germany February 1, 2000 1 2 Protocol Independent

More information

UDLR Unidirectional Link Routing overview and examples

UDLR Unidirectional Link Routing overview and examples UDLR Unidirectional Link Routing overview and examples ourse Number Presentation_ID 1999, isco Systems, Inc. 1 UDLR Tunnels UDLR simulates a bi-directional link by tunneling over the return path Supports

More information

Connecting to the Network

Connecting to the Network Connecting to the Network Networking for Home and Small Businesses Chapter 3 1 Objectives Explain the concept of networking and the benefits of networks. Explain the concept of communication protocols.

More information

Multicast Quick Start Configuration Guide

Multicast Quick Start Configuration Guide Multicast Quick Start Configuration Guide Document ID: 9356 Contents Introduction Prerequisites Requirements Components Used Conventions Dense Mode Sparse Mode with one RP Sparse Mode with Multiple RPs

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

MULTICAST EXTENSIONS TO OSPF (MOSPF)

MULTICAST EXTENSIONS TO OSPF (MOSPF) MULTICAST EXTENSIONS TO OSPF (MOSPF) Version 2 of the Open Shortest Path First (OSPF) routing protocol is defined in RFC-1583. It is an Interior Gateway Protocol (IGP) specifically designed to distribute

More information

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP

Expires May 26, File: draft-ietf-rsvp-routing-01.ps November RSRR: A Routing Interface For RSVP Internet Draft Daniel Zappala Expires May 26, 1997 USC/ISI File: draft-ietf-rsvp-routing-01.ps November 1996 RSRR: A Routing Interface For RSVP Status of Memo November 26, 1996 This document is an Internet-Draft.

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

Network Working Group Request for Comments: 3077 Category: Standards Track INRIA Sophia-Antipolis H. Izumiyama N. Fujii WIDE Y. Zhang HRL March 2001

Network Working Group Request for Comments: 3077 Category: Standards Track INRIA Sophia-Antipolis H. Izumiyama N. Fujii WIDE Y. Zhang HRL March 2001 Network Working Group Request for Comments: 3077 Category: Standards Track E. Duros UDcast W. Dabbous INRIA Sophia-Antipolis H. Izumiyama N. Fujii WIDE Y. Zhang HRL March 2001 A Link-Layer Tunneling Mechanism

More information

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Topic: Multicast routing

Topic: Multicast routing Topic: Multicast routing What you will learn Broadcast routing algorithms Multicasting IGMP Multicast routing algorithms Multicast routing in the Internet Multicasting 1/21 Unicasting One source node and

More information

Multicast routing protocols

Multicast routing protocols Multicast routing protocols IGMP IP Group Management Protocol PIM Protocol Independent Multicast MOSPF Multicast OSPF DVMRP DV Multicast Routing Protocol E7310-Multicast-2/Comnet 1 Multicast in local area

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

IP over Huge Scale Broadcast Media

IP over Huge Scale Broadcast Media IP over Huge Scale Broadcast Media Masataka OHTA (mohta@necom830.hpcl.titech.ac.jp) Computer Center, Tokyo Institute of Technology, Japan Manolo SOLA (sola@jet.es) Graduate School of Science and Engineering,

More information

Homework 3 Discussion

Homework 3 Discussion Homework 3 Discussion Address Resolution Protocol (ARP) Data Link Layer Network Layer Data Link Layer Network Layer Protocol Data Unit(PDU) Frames Packets Typical Device Switch/Bridge Router Range Local

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions Tuomo Karhapää tuomo.karhapaa@otaverkko.fi Otaverkko Oy Why multicast? The concept of multicast Multicast groups Multicast addressing Multicast routing protocols MBONE Multicast applications Conclusions

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Multicast Communications

Multicast Communications Multicast Communications Multicast communications refers to one-to-many or many-tomany communications. Unicast Broadcast Multicast Dragkedja IP Multicasting refers to the implementation of multicast communication

More information

Internet and Satellite 1/9/2003

Internet and Satellite 1/9/2003 Internet and Satellite 1/9/2003 JSAT Co./WIDE Project Jun TAKEI takei@csm.jcsat.co.jp Day1 Agenda Satellite communication fundamentals The history of satellite communications and internet Day2 Satellite

More information

IPv6 Operation for WAVE - Wireless Access in Vehicular Environments

IPv6 Operation for WAVE - Wireless Access in Vehicular Environments IPv6 Operation for WAVE - Wireless Access in Vehicular Environments Emmanuel Baccelli INRIA, France Email: Emmanuel.Baccelli@inria.fr Thomas Clausen Hipercom@LIX Ecole Polytechnique, France Email: thomas@thomasclausen.org

More information

IP Multicast: PIM Configuration Guide, Cisco IOS Release 12.4T

IP Multicast: PIM Configuration Guide, Cisco IOS Release 12.4T IP Multicast: PIM Configuration Guide, Cisco IOS Release 12.4T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

IP Multicast. What is multicast?

IP Multicast. What is multicast? IP Multicast 1 What is multicast? IP(v4) allows a host to send packets to a single host (unicast), or to all hosts (broadcast). Multicast allows a host to send packets to a subset of all host called a

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Computer Networks II IPv4 routing

Computer Networks II IPv4 routing Dipartimento di Informatica e Sistemistica Computer Networks II IPv4 routing Luca Becchetti Luca.Becchetti@dis.uniroma1.it A.A. 2009/2010 NEXT WEEK... 2 exercise classes on topics covered so far Please

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Why dynamic route? (1)

Why dynamic route? (1) Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update

More information

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis

Internet Protocols Fall Lectures Inter-domain routing, mobility support, multicast routing Andreas Terzis Internet Protocols Fall 2006 Lectures 11-12 Inter-domain routing, mobility support, multicast routing Andreas Terzis Outline Inter-domain Internet Routing BGP Routing for mobile nodes Multicast routing

More information

Advanced Network Training Multicast

Advanced Network Training Multicast Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent

More information

Auxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets

Auxiliary Protocols. Internet Layer. Address Resolution Protocol. Delivery of IP Packets Internet Layer Auxiliary Protocols aw division into three tasks: Data transfer over a global network oute decision at the sub-nodes Control of the network or transmission status outing Protocols outing

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks

More information

Lecture 6. TCP/IP Network Layer (4)

Lecture 6. TCP/IP Network Layer (4) Lecture 6 TCP/IP Network Layer (4) Outline (Network Layer) Principles behind network layer services: Virtual circuit and datagram networks Routing algorithms Link State Distance Vector Hierarchical Routing

More information

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15S

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15S First Published: November 05, 2012 Last Modified: July 30, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

IP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast

IP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast Falko Dressler Regionales Rechenzentrum falko.dressler@rrze.uni-erlangen.de 1 Agenda Basics Principles of IP multicast, addressing, TTL Internet Group Management Protocol (IGMP) IGMPv1, v2, v3 Layer-2

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer V Dmitri Loguinov Texas A&M University April 17, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross Chapter 4:

More information

IP: Addressing, ARP, Routing

IP: Addressing, ARP, Routing IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing CHAPTER 46 This chapter describes how to configure IP multicast routing on the Catalyst 3750-E or 3560-E switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient:

Broadcast Routing. Multicast. Flooding. In-network duplication. deliver packets from source to all other nodes source duplication is inefficient: Broadcast Routing Multicast deliver packets from source to all other nodes source duplication is inefficient: duplicate duplicate creation/transmission duplicate source duplication in-network duplication

More information

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998.

Supporting IP Multicast for Mobile Hosts. Yu Wang Weidong Chen. Southern Methodist University. May 8, 1998. Supporting IP Multicast for Mobile Hosts Yu Wang Weidong Chen Southern Methodist University fwy,wcheng@seas.smu.edu May 8, 1998 Abstract IP Multicast is an ecient mechanism of delivering a large amount

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15M&T

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15M&T First Published: 2012-11-21 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing CHAPTER 45 This chapter describes how to configure IP multicast routing on the Catalyst 3750 Metro switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Exercises to Communication Systems

Exercises to Communication Systems Exercises to Communication Systems IP Multicast Additional Slides Dr.-Ing. Falko Dressler Department of Computer Science 7 University of Erlangen ÜKS, WS 05/06 1 IP Multicast Introduction Internet Group

More information

An Adaptive Routing Scheme for Wireless Mobile Computing

An Adaptive Routing Scheme for Wireless Mobile Computing An Adaptive Routing Scheme for Wireless Mobile Computing Ruixi Yuan C&C Software Technology Center, NEC Systems Laboratory, Inc. 1901 Gateway Drive, Irving, TX 75038 yuan@syl.dl.nec.com Abstract This paper

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

IP Multicast: PIM Configuration Guide

IP Multicast: PIM Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees

Chapter 4 roadmap. CS555, Spring /14/2005. WMU-CS, Dr. Gupta 1. Multicast Routing: Problem Statement. Approaches for building mcast trees Chapter 4 roadmap 4. Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What s Inside a Router 4.4 The Internet (IP) Protocol 4.5 Routing Algorithms 4.6 Routing in the Internet 4.7

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Configuring Bidirectional PIM

Configuring Bidirectional PIM Configuring Bidirectional PIM This chapter describes how to configure the Bidirectional PIM (bidir-pim) feature. Bidir-PIM is a variant of the Protocol Independent Multicast (PIM) suite of routing protocols

More information

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15SY

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15SY First Published: October 15, 2012 Last Modified: February 12, 2013 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

IP Multicast: PIM Configuration Guide

IP Multicast: PIM Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

CMPE 151 Routing. Marc Mosko

CMPE 151 Routing. Marc Mosko CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3S

IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3S First Published: 2012-11-05 Last Modified: 2018-01-10 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information

A Circuit-based Approach for Routing in Unidirectional Links Networks

A Circuit-based Approach for Routing in Unidirectional Links Networks INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE A Circuit-based Approach for Routing in Unidirectional Links Networks Thierry Ernst & Walid Dabbous N 3292 October 1997 THÈME 1 apport de

More information

Exercises to Communication Systems

Exercises to Communication Systems Exercises to Communication Systems IP Multicast Dr.-Ing. Falko Dressler Kai-Steffen Hielscher Department of Computer Science 7 University of Erlangen Group Communication Multiple partners communicate in

More information

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme Mesh Network Kiran Mathews (kmathews@rhrk.uni-kl.de) Seminar: Verteilte und vernetzte Systeme February 8, 2016 Outline 1 Why Mesh Networks? Existing System imesh 2 Architectural Overview Frame Structure

More information

Configuring IPv4 Broadcast Packet Handling

Configuring IPv4 Broadcast Packet Handling Configuring IPv4 Broadcast Packet Handling This module explains what IPv4 broadcast packets are, when they are used, and how to customize your router s configuration for situations when the default behavior

More information

IP Multicast Load Splitting across Equal-Cost Paths

IP Multicast Load Splitting across Equal-Cost Paths IP Multicast Load Splitting across Equal-Cost Paths This module describes how to load split IP multicast traffic from different sources, or from different sources and groups, over Equal Cost Multipath

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes:

IPv6 PIM. Based on the forwarding mechanism, IPv6 PIM falls into two modes: Overview Protocol Independent Multicast for IPv6 () provides IPv6 multicast forwarding by leveraging static routes or IPv6 unicast routing tables generated by any IPv6 unicast routing protocol, such as

More information

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad Default & Static Routes and Routing Information Protocol Presented by : Mohammed Hamad When a device has multiple paths to reach a destination, it always selects one path by preferring it over others.

More information

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) Internet Control Message Protocol (ICMP) 1 Overview The IP (Internet Protocol) relies on several other protocols to perform necessary control and routing functions: Control functions (ICMP) Multicast signaling

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Configuring IPv4 Broadcast Packet Handling

Configuring IPv4 Broadcast Packet Handling Configuring IPv4 Broadcast Packet Handling Finding Feature Information Configuring IPv4 Broadcast Packet Handling Last Updated: April 12, 2011 This module explains what IPv4 broadcast packets are, when

More information

netkit lab bgp: transit as Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab bgp: transit as Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab bgp: transit as Version Author(s) E-mail Web Description 1.7.1 (compact) Luca Cittadini,

More information

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Auxiliary protocols IP is helped by a number of protocols that perform specific tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Multicasting

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 20 Pu+ng ALL the Pieces Together Spring 2018 Rachit Agarwal What is a computer network? A set of network elements connected together, that implement

More information

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding. Integrated Services An architecture for streaming multimedia Aimed at both unicast and multicast applications An example of unicast: a single user streaming a video clip from a news site An example of

More information

Request for Comments: June A MAPOS version 1 Extension - Switch-Switch Protocol

Request for Comments: June A MAPOS version 1 Extension - Switch-Switch Protocol Network Working Group Request for Comments: 2174 Category: Informational K. Murakami M. Maruyama NTT Laboratories June 1997 Status of this Memo A MAPOS version 1 Extension - Switch-Switch Protocol This

More information

Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast

Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast U.Raghunath Reddy, K.Sekhar, P.Prabhavathi Dept of Information Technology, G.Pullaiah College of Engineering & Technology

More information

Table of Contents 1 PIM Configuration 1-1

Table of Contents 1 PIM Configuration 1-1 Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM

More information

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo

Request for Comments: 2004 Category: Standards Track October Minimal Encapsulation within IP. Status of This Memo Network Working Group C. Perkins Request for Comments: 2004 IBM Category: Standards Track October 1996 Status of This Memo Minimal Encapsulation within IP This document specifies an Internet standards

More information

Table of Contents. Cisco TCP/IP

Table of Contents. Cisco TCP/IP Table of Contents TCP/IP Overview...1 TCP/IP Technology...1 TCP...1 IP...2 Routing in IP Environments...4 Interior Routing Protocols...5 RIP...5 IGRP...6 OSPF...6 Integrated IS IS...6 Exterior Routing

More information

Asymmetric Satellite Services. Introduction and Background. Transmit Interface Command. Agenda. Asymmetric Satellite Services

Asymmetric Satellite Services. Introduction and Background. Transmit Interface Command. Agenda. Asymmetric Satellite Services 1 Agenda Introduction and Background Transmit Interface Command Asymmetric Satellite s Point to Point Example Point to Multipoint Example Other Considerations UDLR 2 Asymmetric Satellite s Introduction

More information

Network Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2

Network Layer II. Getting IP addresses. DHCP client-server scenario. DHCP client-server scenario. C compiler. You writing assignment 2 Network Layer II Still chapter 4 in the textbook C compiler You writing assignment 2 Getting IP addresses ARP is the simplest way, which we will barely discuss (now) It s a mapping between Ethernet MAC

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

draft-ietf-idmr-pim-sm-guidelines-00.ps 2 Abstract This document provides guidelines and recommendations for the incremental deployment of Protocol In

draft-ietf-idmr-pim-sm-guidelines-00.ps 2 Abstract This document provides guidelines and recommendations for the incremental deployment of Protocol In 1 Protocol Independent Multicast-Sparse Mode (PIM-SM): Deployment Guidelines Deborah Estrin Ahmed Helmy David Thaler Liming Wei Computer Science Dept/ISI University of Southern Calif. Los Angeles, CA 90089

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

IP Protocols. ALTTC/Oct

IP Protocols. ALTTC/Oct IP Protocols Internet or IP technology over the years has emerged as the most prominent data communication technology. TCP/IP protocol has become de-facto data comm standard throughout the world. It can

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols 1 Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information