Routing Protocols. Recap & Concepts
|
|
- Reginald Miles
- 5 years ago
- Views:
Transcription
1 Routing Protocols Recap & Concepts Before we start to look at routing protocols, let s review what we know so far. Each interface connects to a link: The most common link technology today is an Ethernet, a multi-access link. There can be many hosts and routers connected to the link. To send an IP packet to another system on the same link, the packet must be wrapped in a frame with the appropriate link addresses. A multi-access link connected to an interface is commonly referred to as the directly connected network or local network for that interface. This usage comes about because a network id 1 is used to recognise whether an IP address belongs to a system connected to the same multi-access link. If the destination host for a packet is not connected to the same local network as the sender, the packet must be sent to a router connected to the local network, commonly called the first-hop router. The first-hop router will forward the packet towards the destination using a link connected to some other interface of the gateway. The packet will be forwarded by intermediate routers until it eventually reaches the last-hop router, which has an interface connected to the same multi-access link as the destination. We ve described the forwarding mechanism used in the Internet: Every router and host has a forwarding table (also called a routing table), with entries that specify an address prefix, a mask (to isolate the prefix in an IP destination address), an interface to transmit frames, and (if necessary) a first-hop router to forward the packet towards its destination. To determine how to send a packet, a router or host uses the IP forwarding algorithm. The destination address D is extracted from the IP packet. 1 We can correctly say network id here because, for directly connected systems, the forwarding prefix really is the network portion of the IP address, for both IPv4 and IPv6. 1 July, 2014
2 For each entry in the forwarding table, we form the logical AND of the entry s mask with D and test whether the result matches the address prefix contained in the entry. We use the forwarding table entry associated with the longest such match. The packet will be sent using the interface specified in this entry. The link-layer (MAC) address will be the link-layer address of the destination, if the destination is directly connected to the local network, or the link-layer address of the first-hop router. To forward the packet, the packet is wrapped in a frame (an Ethernet frame, for example) with the link-layer destination address set as specified in the previous step. The frame is transmitted from the interface selected in the previous step. How do entries get into the forwarding table? The answer depends on whether the system is a router or a host. Typically, hosts do not participate in routing protocols. The initial entries in a host s forwarding table are placed there during configuration of the interface. What might we see? An entry for link-local addresses. In IPv6, this entry will specify the linklocal address prefix fe80::/10. In IPv4, this entry will specify the address prefix /16, reserved for dynamic configuration. A default entry, to be used when no other entry matches. For IPv6, this entry will specify the prefix ::/0. For IPv4, this entry will specify the prefix /0. Typically, this entry contains the IP address of a router used to forward IP packets to destinations off the local network. If the systems connected to the local network have routable IP addresses 2 in addition to link-local addresses, there must be an entry with a prefix and mask matching the IP addresses of systems directly connected to the interface. In IPv4, this information is obtained from a DHCP server or from information in configuration files 3 added by a human. In IPv6, information about on-link prefixes can also be obtained from Router Advertisements. 2 Either globally routable, or selected from the IPv6 unique-local block fc00:/7 or the IPv4 private-use IP blocks /8, /12, and /16 that are routable within an organisation. 3 The details of the configuration file structure will vary from system to system. For linux systems, /etc/sysctl.conf controls global properties like forwarding and acceptance of redirects. Configuration of individual interfaces may be in a single file (e.g., /etc/network/interfaces on an Ubuntu system) or in a collection of files in a 2 July, 2014
3 In environments with multiple routers attached to the local network, it may be useful to have explicit entries for address prefixes that specify off-link destinations so that hosts can choose the correct router to forward a packet. In IPv4, this information can be obtained from a DHCP server or specified in configuration files added by a human 4. In IPv6, information about off-link prefixes can also be obtained from Router Advertisements. Multicast addresses may be subsumed by the default entry, or there may be explicit entries. IPv4 multicast addresses have a prefix of /4. For IPv6, the multicast prefix is ff00::/8. Subsequently, routers may use ICMP redirect messages to add information to a host s forwarding table 5. System administrators can also manipulate the forwarding tables using the command line tools and configuration GUIs provided by the system. In the common case, there will be one IP network mapped onto a link, and the address prefix and mask in the forwarding table entry match the network id portion of an IP address. It s possible, though uncommon, to map multiple IP networks onto a single physical link. There may be a single forwarding table entry with an address prefix that covers all of the network ids, or there may be multiple entries with distinct prefixes. Static routes are well and good, but as the number of connected networks within an organization grows and the intranet becomes complicated and dynamic 6 it s better to automate the process of determining routes. With dynamic directory (e.g., /etc/sysconfig/network-scripts/ifcfg-dev on a Fedora system). These files are processed by the scripts or programs that initialise interfaces and the network protocol stack. 4 Specifying forwarding table entries with information in configuration files is often referred to as static routing. 5 Implementations may maintain a cache of forwarding information, with each entry in the cache labelled with a full IP address. This avoids working through the full IP forwarding algorithm for frequently used destinations. Depending on the implementation, an ICMP redirect message may result in a new entry in the forwarding table or it may result in an entry in the forwarding cache only. 6 It s useful to recall how an internet becomes dynamic as it grows. One source is planned change corresponding to organisational change. Networks come and go to match changes in the organisation s structure. Another source is unplanned change due to equipment failure. Size matters. Individual pieces (networks and components) may be stable over periods of years, but if there are 10 s of thousands of pieces, change will occur somewhere every few hours. 3 July, 2014
4 routing, routers exchange routing information using routing protocols and use this information to continuously recalculate the best routes and update their forwarding tables. Before proceeding further into routing protocols, we need to define the concept of an autonomous system and use it to distinguish two broad groups of routing protocols. An autonomous system (AS) is a group of networks (more specifically, a group of routers) under the control of a single administrative authority. It is assumed that this will result in all routers in the autonomous system using a coordinated set of routing policies. To route packets within an AS, routers will communicate information using an interior gateway protocol (IGP), which generally determines the best routes based on some measurable routing metric (most commonly hop count, but often incorporating notions of transmission time). To route packets between ASs, routers will communicate information using an exterior gateway protocol (EGP), which has provisions for defining and ranking routes based on fairly arbitrary policy issues. The underlying assumption is that within a single region of administrative control (a single AS) the only consideration is to move packets from source to destination as efificiently as possible. Once a packet begins to move between autonomous systems, political and administrative considerations become dominant, and nothing moves without explicit negotiated agreements. Company A may not want its packets to pass through a network controlled by rival Company B, or it might prefer to use ISP C because it offers a cheaper rate than ISP D. To communicate routing information, routers use routing protocols. These can be divided into three classes, based on the type of routing algorithm that is used. Distance-vector routing exchanges information in the form of {destination, metric} pairs. The metric is a property of the entire route to the destination. When a router receives news of a better route, it replaces its entry. When it receives news that a route no longer exists, it deletes the entry. No one router has any notion of the full network topology, and each believes what its neighbour says about the destinations the neighbour can reach. Link-state routing exchanges information in the form of a list of direct connections to neighbours. Each router publishes a list of {neighbour, metric} pairs which are flooded to all other routers. The metric is a property of the direct link to the immediate neighbour. Each router builds a directed 4 July, 2014
5 graph model of the full network based on this information, and then runs a shortest path calculation to determine how to reach other destinations. This procedure avoids a number of pitfalls inherent in distance-vector routing. Path-vector routing exchanges information in the form of path attributes, which provide information about characteristics of the path that a packet will traverse as it travels from the source host to the destination host. This is not the same as specifying a route. Path attributes convey qualitative information, as opposed to detailed directions. Distance-vector and link-state routing algorithms are used for interior routing protocols. Path-vector routing is used for exterior routing protocols. Distance-vector routing is disappearing. It has persisted in use in spite of its limitations, because it came first, and because it performs adequately on smallto medium-sized systems which are reasonably stable. 5 July, 2014
6 Routing Information Protocol The Routing Information Protocol () was originally defined in RFC 1058 in 1988 but was in wide use prior to publication of the standard. The de facto standard was the implementation of routed distributed as part of Berkely Unix. We re going to go directly to -2, documented in RFC 2453, Version supports only IPv4. It s essentially -1 with support for CIDR (i.e., it includes a prefix and mask as part of the information for a route). Because -2 is an incremental improvement in capability, -1 and -2 are mostly compatible if care is taken to conform to the classful addressing scheme. While we re citing RFCs, it s important to mention RFC 1812, Requirements for IP Version 4 Routers, which collects in one document a wealth of information about the implementation of an Internet router. Recall that the basic operation in a distance-vector protocol goes like this: When a route update arrives, check it against the current routing database 7. If the update came from the router that s listed as the first-hop router in the current entry for the route, use the update, even if the new metric is worse than the old one. Otherwise, if the metric included in the update is better than the metric for the existing entry for the route, replace the existing entry with the contents of the update. This will change the first-hop router for the route. If there s no existing entry for the route, add the new route. Seems simple enough. What can go wrong? Lots of things, unfortunately, unless we take some care in the implementation. Recall the count to infinity problem from Cmpt 371. The classic configuration is shown to the right. Initially, R1 can reach N in one hop, and R2 can reach N through R1 in two hops. Assume the link {R1,N} fails. R1 updates its routing table to indicate that the route to N is unusable by setting the metric to infinity. 7 Any routing algorithm will maintain data structures appropriate for the information exchanged by the algorithm and the calculations it performs on that information. Eventually, the final result of the algorithm will be used to update the forwarding table. Rather than write this out in detail for each algorithm, the notes may simply refer to the routing database. R2 R1 N 6 July, 2014
7 Then, just in time to save the day, an update arrives from R2 claiming that it can reach N in two hops. R1 happily installs the new route to N through R2, giving it a metric of three hops. When R1 sends out its next update, it claims it can reach N in three hops. R2 notices, and since its route to N is through R1, bumps its metric for the route to four hops. And sends this information to R1... This cycle will not end until R1 and R2 have counted to infinity. To guarantee finite termination, is declared to be some suitably small integer. In the case of, = 16. To avoid this count to infinity scenario between a pair of routers, the protocol requires the use of the split horizon rule when sending routing updates. The rule is don t advertise a route to the first-hop router for the route. In the more general context of a multi-access link (such as Ethernet) with multiple routers advertising on the link, the rule becomes don t advertise a route out the interface that s used by the route (i.e., the interface where the routing update arrived). A stronger technique is called split horizon with poison reverse. If router R1 uses router R2 as the first hop for a route to net N, router R1 should advertise to R2 a route to net N with a cost of. (I.e., R1 should not simply omit any mention of net N in updates to R2. It should explicitly advertise to R2 that it cannot reach net N.) The rationale for poison reverse is that if router R2 should somehow come to the mistaken belief that it can reach net N through R1, poison reverse will cause the route to be immediately discarded. Note that in an environment with many individual routes, this can result in a dramatic increase in the size of routing update messages. The explanation of poison reverse in the text is incorrect. See 3.4.3, 3.4.4, and 3.8 of RFC 2453, Version 2. For recommendations on how to implement poison reverse, see RFC 1812, F.2.2. The explanation of poison reverse is most often given in terms of a pair of routers connected by a point-to-point link. It works just as well on a multiaccess link like Ethernet, where several routers may be listening. Any router that has a viable alternative route will be advertising a reasonable metric, and that route will be adopted by all other routers. 7 July, 2014
8 Unfortunately, split horizon is not sufificient to avoid count-toinfinity if more than two routers are involved. The example from RFC 2453 is shown in the figure to the right. Suppose the network has been stable for a while, and R1 and R3 have entries in their routing table specifying a route to N using R2 as the first-hop router. (R2 will then use the link between R2 and R4 to forward packets to N, but this is not known by any router other than R2. Remember that in no router has a complete picture of the network.) R1 1 R2 1 1 R R4 1 N Suppose link {R2,R4} fails. What we d like to see happen is a quick changeover to use link {R3,R4}, previously unattractive because of its high cost. R2 will notice immediately that the link has gone down, and will change its own routing table to reflect this. But R1 and R3 will continue to advertise routes to N to each other. Since they got these routes from R2, split horizon is no help. And neither R1 or R3 are aware that R2 is in the other s route. Table 1 shows the sequence of routing updates. The first line shows the situation before link {R2, R4} fails. The second line shows the situation immediately after the failure of the link. Assume that R2 sends out updates to each neighbour at a regular interval, and that the time for an update message to R1 arrives. The third line shows the situation after R1 processes this update. The trouble really starts between the third and fourth lines. Assume that the time comes for R3 to send an update to R1, and it sends the update before it receives an update from R2. The fourth line shows the situation after R1 has processed the update from R3. A count-to-infinity cycle is inevitable at this point, even if R2 gets off an update to R3 as shown in the fifth line. The remainder of the lines follow the count-to-infinity cycle as updates flow between the routers. (For simplicity, the remaining lines assume an order where R1 updates R2, R2 updates R3, R3 updates R1,...) All through the above, router R4 has been advertising to R3 a route to N with cost 11. The cycle ends when the cost of the route through R2 exceeds the cost of the route through R4. R3 adopts the route through R4. Subsequent updates from R3 will be accepted by R1 and R2, resulting in the situation shown on the last line of the table. 8 July, 2014
9 R1 R2 R3 Dest Gate Hops Dest Gate Hops Dest Gate Hops N R2 3 N R4 2 N R2 3 initial stable state N R2 3 N R4 N R2 3 {R2,R4} fails N R2 N R4 N R2 3 R2 updates R1 N R3 4 N R4 N R2 3 R3 updates R1 N R3 4 N R4 N R2 R2 updates R3 N R3 4 N R1 5 N R2 R1 updates R2 N R3 4 N R1 5 N R2 6 R2 updates R3 N R3 7 N R1 5 N R2 6 R3 updates R1 N R3 7 N R1 8 N R2 6 R1 updates R2 N R3 7 N R1 8 N R2 9 R2 updates R3 N R3 10 N R1 8 N R2 9 R3 updates R1 N R3 10 N R1 11 N R2 9 R1 updates R2 N R3 10 N R1 11 N R4 11 R3 prefers route through R4 N R3 12 N R3 12 N R4 11 R1 and R2 now route through R3 Table 1: Routing updates for count-to-infinity example from RFC 2453 To minimise the possibility of a count-to-infinity cycle, uses a technique called triggered update. Triggered update counts on the rule that says a router must use an update from the router listed as the first hop for the route. The aim is to get the bad news to neighbours as soon as possible. Normally, routers using broadcast routing update messages every 30 seconds, plus/minus a small random delay to avoid synchronisation. The count-to-infinity problem arises when a router propagates stale information about a route. To combat the problem, triggered update requires that whenever a router changes the metric on a route, it must send out an update immediately. In the previous example, if R2 had managed to get updates to R1 and R3 before one of them updated the other, the count-to-infinity loop would have been avoided. In essence, the bad news propagates out as a tree from the router connected 9 July, 2014
10 to the failed link. Propagation ends when a router is encountered which has a route that comes from somewhere else, or when the update reaches a router where the route is absent or already has a metric of. The hope is that propagating up-to-date information immediately will minimise the number of count-to-infinity cycles that develop from propagating second-hand outdated information. Note: minimise, not eliminate. With bad timing, count-to-infinity cycles can still occur. To further reduce the chance of using an untimely update, we can apply holddown. For a fixed amount of time (on the order of 60 seconds) after receiving an update that says a route has disappeared, routers should ignore updates which offer alternative routes. This gives still more time for correct routing updates to propagate. Legitimate alternate routes will survive, because at some point they will originate from a different source. Note that neither RFC 2453 or RFC 1812 mention holddown for the protocol. It is an extension used in some implementations. All of the above problems make fairly inefificient. There can be lots of trafific once a routing change starts to propagate, and we can still have convergence problems in spite of all the effort put into minimising the time window where a count-to-infinity cycle can start. On the plus side, is simple. If an intranet is simple, fairly static, and the routers don t have to interact with routers running other routing protocols, may be adequate. That covers the basic techniques let s look at the details. -2 runs over UDP, using the well-known UDP port 520. Routers running -2 belong to two multicast groups related to routing: is all routers running -2, and is all routers on this subnet (synonymous with all routers on the local network). Each message consists of a one-word header followed by up to 25 route descriptions (called entries in the RFCs). The format of the header is command (8) version (8) must be 0 (16) The command can be one of request, reply, or several other specialpurpose commands used for router control and debugging. The version can be either 1 or 2. An explicit message length field is not necessary the length can be calculated from the size field in the UDP header. 10 July, 2014
11 The format of a entry is address family identifier (16) route tag (16) IP address (32) subnet mask (32) next hop (32) metric (32) The address family identifier specifies the protocol family of this routing entry. -1 was designed to be capable of supporting protocol families other than IP, but this has been compromised in entries included only an address and a metric, which allowed the address to occupy up to 12 bytes. IP addresses require only 4 bytes, and -2 uses the extra space for the address prefix mask ( subnet mask ) and next hop address. The route tag was intended to allow routers to distinguish between routes inside an autonomous system and routes outside the autonomous system, or more generally routes circulating within the group of routers exchanging messages vs. routes imported from outside the group. The original standard left room for various uses. The IP address and matching subnet mask are just what you d expect. The next hop field allows one router to report routes on behalf of other routers. This is intended for use in a network where distinct groups of routers exchange routing information amongst themselves, but contact between groups is limited to a set of designated routers. (For example, consider an Ethernet backbone with routers connecting to many subnetworks. A technique to reduce the amount of network trafific consumed by routing updates is to separate the routers into groups, with designated routers exchanging information between the groups. The designated router can specify that packets be sent to another router in its group, since all are on the same link.) The metric is the cost associated with the route. Traditionally, this is a hop count, but the protocol does not require this. The only restriction it imposes is that the metric be a value between 1 and = 16. In normal operation, we can identify five situations that trigger action: initialisation, request received for full routing table, update received, transmit regular update, and transmit triggered update. 11 July, 2014
12 A final situation, a request for a specific routing table entry, is intended for debugging and management. When the process initialises, it transmits a request over each active interface asking for any routers to send their complete routing tables. This request is multicast if possible using the -2 routers multicast address, By definition, a request containing a single entry with the address family field set to 0 and the metric set to 16 is a request for a router s entire routing table. Routers receiving this message should respond by sending their entire routing table. Split horizon processing is applied the requesting router could be recovering from a crash and the responding router may have routes which it obtained from the requesting router before the crash. When an update is received, the receiving router updates its tables according to the rules described previously: Use the new route information if it s an update from the first-hop router for the existing route. Use the new route if it s better than the previous known route, or if it s an entirely new route. Otherwise, ignore it. The protocol specification does suggest that if the receiving router has suspicions about the current route (i.e., the expiry timer is well along, indicating that the router that supplied the route is overdue to send an update) it might want to take preemptive action and switch to a new route. One possible result of an update message is that the metric for a route will be set to, triggering the route deletion process: When the metric is changed to, a garbage collection timer is set (typically 120 seconds, four times the 30 second update interval). The route is no longer used but is still included in update messages until the garbage collection timer expires, at which point it is purged from the routing table. 12 July, 2014
13 Every 30 seconds, routers are supposed to multicast a regular update message which includes the entire routing table, subject to the rules of split horizon processing. This is an important aspect of the protocol, because it works with a timeout mechanism to provide a way of purging dead routes. If a router does not receive an update for a route within 180 seconds, the route is marked for deletion and the route deletion process just described is initiated. A triggered update is sent as required, in response to a change in the metric for a route. Like a regular update, a triggered update is multicast if possible. As mentioned, the primary intent here is to immediately propagate correct information when a route goes down or the metric becomes worse. But appearance of a new route or a change for the better in the route metric can also trigger an update. RFC 1812 states that a triggered update is mandatory for bad news, and highly recommended for good news. In contrast to a regular update, only changed routes need to be included in a triggered update message. This implies that the protocol implementation should associate a change flag with each routing table entry, which is set when the entry is updated and cleared once all necessary triggered update messages have been sent. When a router receives a request for specific routing table entries, it responds by constructing a reply with the route information for the requested prefix, if present, setting the metric to 16 if it has no route. A request for a specific routing table entry will have the address family field set to the code for IPv4 and the address field set to the desired address. The responding router does not apply split horizon rules in response to a request for a specific route because it is assumed that this type of query is used for debugging and management. We don t want to be hiding information. Some loose ends to close out the discussion: -2 has provision for authentication; when it s used, the first entry is overloaded. The address family field is set to 0xffff and the route tag field is used to specify the type of authentication. The remaining 16 bytes 13 July, 2014
14 of the entry contain an authentication cookie. The standard defines only plain-text password authentication. More recent implementations provide encrypted authentication of various sorts. -2 applies random variations to its time delays to avoid router synchronisation. For example, when a route changes, you don t want the network flooded with triggered update messages. When a triggered update is sent, a random delay of 1 5 seconds is enforced before the router is allowed to send another update. The 30 second time delay between regularly scheduled updates is also adjusted with a random value between -5 and +5 seconds to prevent synchronization. An extension of for IPv6, ng, is described in RFC There are some changes that attempt to minimise the number of IPv6 addresses contained in a routing update. Otherwise, the algorithms and operation are unchanged. 14 July, 2014
Basic Idea. Routing. Example. Routing by the Network
Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationRouting by the Network
Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationRIP Version 2. The Classless Brother
RIP Version 2 The Classless Brother (C) Herbert Haas 2005/03/11 1 Why RIPv2 Need for subnet information and VLSM Need for Next Hop addresses for each route entry Need for external route tags Need for multicast
More informationDistance vector and RIP
DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4
More informationRFC Compliance Test Report. Release 3.0
.2 Type FRR FRR FRR FRR FRR FRR Commit ID 3e71b5d 5cf0c43 f633dc2 6289215 36a7e78 30283fd Commit Date 2017-04-02 2017-10-14 2017-11-08 2017-11-08 2017-11-08 ANVL-RIP-1.1 RFC 2453 s3.6 p20 Message Format
More informationRouting Information Protocol. RIP application. RIP version 1
Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/01 13:00:45) Friday, March 3, 2017 RIP version 1 Origin and
More informationRouting Information Protocol
Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 18.2, 2018/11/21 13:11:09) Friday, November 23, 2018 Karst Koymans (UvA)
More informationTDC 363 Introduction to LANs
TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow
More informationInternet Control Message Protocol
Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.
More information(Refer Slide Time: 01:08 to 01:25min)
COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will
More informationROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP
IP ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP Peter R. Egli 1/37 Contents 1. IP Routing 2. Routing Protocols 3. Fragmentation in the IP Layer 4. Proxy ARP 5. Routing and IP forwarding
More informationRIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers
Table of Contents RIP Configuration 1 RIP Overview 1 Operation of RIP 1 Operation of RIP 2 RIP Version 2 RIP Message Format 3 Protocols and Standards 4 Configuring RIP Basic Functions 5 Configuration Prerequisites
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationEECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.
EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationRouting Information Protocol
Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 24, 2008 dr. C. P. J. Koymans (UvA) Routing Information Protocol
More informationTable of Contents 1 Static Routing Configuration RIP Configuration 2-1
Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-1 Configuring a Static Route 1-2 Configuration Prerequisites
More informationFINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions
First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1
More informationRouting Information Protocol. RIP application. RIP version 1
Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:38:50) Wednesday, February 24, 2010 RIP version
More informationRouting Protocols Classification
Routing Protocols Classification Petr Grygárek rek 1 Classification criteria Internal (IGP) / External (EGP) number of handled routes possibilities of routing politics specification Convergence Time Distance-vector
More informationRouting Unicast routing protocols
Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationRouting Protocols --- Exterior Gateway Protocol
Content Routing Protocols --- Exterior Gateway Protocol Linda Wu (CMPT 471 23-3) Limiting router interaction Autonomous system BGP protocol BGP messages Other issues on BGP Reference: chapter 15 Notes-13
More informationRouting Information Protocol. A simple distance vector scheme
Routing Information Protocol A simple distance vector scheme RIP version 1 RFC 1058 Charles Hedrick, Rutgers University, 1988 Based on Bellman-Ford distance vector Also used as ARPANET routing protocol
More informationJune Document a protocol and algorithms that are currently in wide use for routing, but which have never been formally documented.
Network Working Group Request for Comments: 1058 C. Hedrick Rutgers University June 1988 Routing Information Protocol Status of this Memo This RFC describes an existing protocol for exchanging routing
More informationUnicast Routing. TCP/IP class
Unicast Routing TCP/IP class Routing Protocols intro RIP and son of RIP OSPF BGP odd bodkins NAT TCP/IP Internetworking Protocols 2 divide routing world into 3 parts topology IETF ISO/OSI same link or
More informationTopics for This Week
Topics for This Week Routing Protocols in the Internet OSPF, BGP More on IP Fragmentation and Reassembly ICMP Readings Sections 5.6.4-5.6.5 1 Hierarchical Routing aggregate routers into regions, autonomous
More informationRouting. Jens A Andersson Communication Systems
Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing
ICS 351: Today's plan netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing Netmask exercises how many bits in this netmask: 255.128.0.0 using this netmask and the
More informationOperation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents Chapter 1 Static Routing Configuration... 1-1 1.1 Introduction... 1-1 1.1.1 Static Route... 1-1 1.1.2 Default Route... 1-1 1.1.3 Application Environment of Static Routing...
More informationDefault & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad
Default & Static Routes and Routing Information Protocol Presented by : Mohammed Hamad When a device has multiple paths to reach a destination, it always selects one path by preferring it over others.
More informationCS118 Discussion Week 7. Taqi
CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to
More informationCSCD 330 Network Programming Spring 2018
CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network
More informationCMPE 151 Routing. Marc Mosko
CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007
More informationRouting Protocols. The routers in an internet are responsible for receiving and. forwarding IP datagrams through the interconnected set of
Routing Protocols MITA DUTTA The routers in an internet are responsible for receiving and forwarding IP datagrams through the interconnected set of sub-networks from source to destination. Routing protocols
More informationLast time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm
Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy
More informationETSF05/ETSF10 Internet Protocols. Routing on the Internet
ETSF05/ETSF10 Internet Protocols Routing on the Internet Circuit switched routing ETSF05/ETSF10 - Internet Protocols 2 Routing in Packet Switching Networks Key design issue for (packet) switched networks
More informationIP: Addressing, ARP, Routing
IP: Addressing, ARP, Routing Network Protocols and Standards Autumn 2004-2005 Oct 21, 2004 CS573: Network Protocols and Standards 1 IPv4 IP Datagram Format IPv4 Addressing ARP and RARP IP Routing Basics
More informationCS 43: Computer Networks. 24: Internet Routing November 19, 2018
CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationIP Routing Volume Organization
IP Routing Volume Organization Manual Version 20091105-C-1.03 Product Version Release 6300 series Organization The IP Routing Volume is organized as follows: Features IP Routing Overview Static Routing
More informationROUTING CONSORTIUM TEST SUITE
ROUTING CONSORTIUM TEST SUITE Routing Information Protocol (RIP) Over Internet Protocol Version 6 Technical Document Version 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824
More informationRouting in a network
Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost
More informationIPv4 to IPv6 Transition Mechanisms
IPv4 to IPv6 The mechanisms for the changeover from IPv4 to IPv6 are described in RFC 4213, updating the original mechanisms described in RFC 2893. As mentioned in the notes for IP, a portion of the IPv6
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationInternet Routing Protocols Tuba Saltürk
Internet Routing Protocols 15505068 Tuba Saltürk Outline Internet Routers Routing Protocol Interior Gateway Protocol (IGP) Distance- Vector Routing Protocol Routing Information Protocol (RIP) Interior
More informationNetwork Systems ( / ), Test 3 March 24, 2017, 13:45 15:15
Network Systems (201600146/201600197), Test 3 March 24, 2017, 13:45 15:15 This is an open-book exam: you are allowed to use the book by Peterson & Davie and the reader that belongs to this module. Furthermore,
More informationICMP, ARP, RARP, IGMP
Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols
More informationNetwork Working Group. Obsoletes: 1723, 1388 November 1998 STD: 56 Category: Standards Track
Network Working Group G. Malkin Request for Comments: 2453 Bay Networks Obsoletes: 1723, 1388 November 1998 STD: 56 Category: Standards Track Status of this Memo RIP Version 2 This document specifies an
More informationRouting Protocols of IGP. Koji OKAMURA Kyushu University, Japan
Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside
More information9.1. Routing Protocols
9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the
More informationConfiguring RIP. RIP Configuration Task List
Configuring RIP This chapter describes how to configure RIP. For a complete description of the RIP commands that appear in this chapter, refer to the RIP s chapter of the Network Protocols Reference, Part
More informationComputer Networks II. RIP Routing Information Protocol. Dipartimento di Informatica e Sistemistica
Dipartimento di Informatica e Sistemistica Computer Networks II RIP Routing Information Protocol Luca Becchetti Luca.Becchetti@dis.uniroma1.it A.A. 2009/2010 RIP RIP is a Distance Vector Routing Protocol
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationNetwork layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationNetwork layer: Overview. Network Layer Functions
Network layer: Overview Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing 1 Network Layer Functions Transport packet from sending to receiving hosts Network layer protocols in every
More informationPUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R
PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.
More informationRouting Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols
Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms
Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce
More informationChapter 7 Routing Protocols
Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals
More informationCCNA IP ROUTING. Revision no.: PPT/2K605/03
CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.
More informationNortel Ethernet Routing Switch 5000 Series Configuration IP Routing Protocols. Release: 6.1 Document Revision:
Configuration IP Routing Protocols Release: 6.1 Document Revision: 05.01 www.nortel.com NN47200-503. . Release: 6.1 Publication: NN47200-503 Document release date: 25 May 2009 While the information in
More informationComputer Networks ICS 651. IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery
Computer Networks ICS 651 IP Routing RIP OSPF BGP MPLS Internet Control Message Protocol IP Path MTU Discovery Routing Information Protocol DV modified with split horizon and poisoned reverse distance
More informationBGP. BGP Overview. Formats of BGP Messages. I. Header
Overview Three early versions of are -1 (RFC1105), -2 (RFC1163) and -3 (RFC1267). The current version in use is -4 (RFC1771). -4 is rapidly becoming the defacto Internet exterior routing protocol standard
More informationRouting Information Protocol
Network Working Group C. Request for Comments: 1058 Rutgers University June Routing Information Protocol Status of this Memo This RFC describes an existing protocol for exchanging routing information among
More informationIP Routing & Bridging
CHAPTER 2 TCP/IP Routing: Ethernet Dialog Box To access this dialog box (Figure 2-1), select Ethernet/TCP/IP Routing from the Device View. Figure 2-1 TCP/IP Routing: Ethernet Configuration Dialog Box If
More informationInter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...
1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol
More informationLecture 12. Introduction to IP Routing. Why introduction? Routing
Lecture. Introduction to IP Routing Why introduction? Routing: very complex issue need in-depth study entire books on routing our scope: give a flavour of basic routing structure and messaging give an
More informationCS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017
CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in
More information8. Refer to the exhibit. The ORL router is unable to form a neighbor relationship with the JAX router. What is a possible cause of this problem?
1. Refer to the exhibit. A new PC was deployed in the Sales network. It was given the host address of 192.168.10.31 with a default gateway of 192.168.10.17. The PC is not communicating with the network
More informationIP Addressing & Interdomain Routing. Next Topic
IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability
More informationCS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.
CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.
More informationRouting Protocols. Autonomous System (AS)
Routing Protocols Two classes of protocols: 1. Interior Routing Information Protocol (RIP) Open Shortest Path First (OSPF) 2. Exterior Border Gateway Protocol (BGP) Autonomous System (AS) What is an AS?
More informationVorlesung Kommunikationsnetze
Picture 15 13 Vorlesung Kommunikationsnetze Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCS475 Networks Lecture 8 Chapter 3 Internetworking. Ethernet or Wi-Fi).
Assignments Reading for Lecture 9: Section 3.3 3.2 Basic Internetworking (IP) Bridges and LAN switches from last section have limited ability CS475 Networks Lecture 8 Chapter 3 Internetworking is a logical
More informationIPv6 Neighbor Discovery
The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local
More informationOccasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.
RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go
More informationIntroduction to routing in the Internet
Introduction to routing in the Internet Internet architecture IPv4, ICMP, ARP Addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Internet Architecture Principles End-to-end principle by
More informationRouting Architecture. Objectives. Module 2 Routing Fundamentals. Author: Rolf Augstein January 2006
Routing Architecture Module 2 Routing Fundamentals Basic Problems Principles, Classification Operation Author: Rolf Augstein raugstein@rolfaugstein.com January 2006 Feel free to use this publication for
More informationFiberstoreOS IP Routing Configuration Guide
FiberstoreOS IP Routing Configuration Guide Contents 1 Configuring IP Unicast-Routing... 6 1.1 Overview...6 1.2 Topology... 6 1.3 Configuration... 6 1.4 Validation... 8 2 Configuring RIP... 10 2.1 Overview...10
More informationNetwork Working Group Request for Comments: 2080 Category: Standards Track Ipsilon Networks January 1997
Network Working Group Request for Comments: 2080 Category: Standards Track G. Malkin Xylogics R. Minnear Ipsilon Networks January 1997 RIPng for IPv6 Status of this Memo This document specifies an Internet
More informationRouting in the Internet
Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes
More informationChapter 5. RIP Version 1 (RIPv1) CCNA2-1 Chapter 5
Chapter 5 RIP Version 1 (RIPv1) CCNA2-1 Chapter 5 RIP Version 1 RIPv1: Distance Vector, Classful Routing Protocol CCNA2-2 Chapter 5 Background and Perspective RIP evolved from the Xerox Network System
More informationRouting Protocol comparison
Routing Protocol comparison Introduction to routing Networks allow people to communicate, collaborate, and interact in many ways. Networks are used to access web pages, talk using IP telephones, participate
More informationBuilding the Routing Table. Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles
Building the Routing Table Introducing the Routing Table Directly Connected Networks Static Routing Dynamic Routing Routing Table Principles Introducing the Routing Table R1# show ip route Codes: C - connected,
More informationHelsinki University of Technology Telecommunications Laboratory. OSPF Routing Protocol Licenciate course seminar paper
Helsinki University of Technology Telecommunications Laboratory OSPF Routing Protocol Licenciate course seminar paper Shkumbin I. Hamiti, 08.10.1996 Communications Laboratory, TKK-HUT email: bini#tiltu.hut.fi
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able
More informationRouting Overview. Information About Routing CHAPTER
21 CHAPTER This chapter describes underlying concepts of how routing behaves within the ASA, and the routing protocols that are supported. This chapter includes the following sections: Information About
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationTeldat Router. RIP Protocol
Teldat Router RIP Protocol Doc. DM518-I Rev. 8.00 July, 1999 INDEX Chapter 1 Introduction... 3 1. Introduction to the RIP...4 2. Routing Information Protocol...5 3. RIP Configuration...7 Chapter 2 RIP
More informationDetermining IP Routes. 2000, Cisco Systems, Inc. 9-1
Determining IP Routes, Cisco Systems, Inc. 9- Objectives Upon completion of this chapter, you will be able to complete the following tasks: Distinguish the use and operation of static and dynamic routes
More information15-441: Computer Networks Spring 2017 Homework 3
15-441: Computer Networks Spring 2017 Homework 3 Assigned: Feb 15, 2018 Due: Mar 19, 2018 Lead TA: M.Ahmed Shah 1. Chapter 3: Exercise 41, page 294 2. Chapter 3: Exercise 43, page
More informationFiberstoreOS IP Routing Command Line Reference
FiberstoreOS IP Routing Command Line Reference Contents 1 IP Unicast-Routing Commands...6 1.1 ip address...6 1.2 ip icmp error-interval...7 1.3 ip redirects... 8 1.4 ip unreachables...9 1.5 ip verify unicast
More informationNetwork Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1
Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local
More informationOverview 4.2: Routing
Overview 4.2: Routing Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph A 6 1
More informationOverview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load
Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C
More information