Distance Vector Routing

Size: px
Start display at page:

Download "Distance Vector Routing"

Transcription

1 ÉOL POLYTHNIQU FÉÉRL LUSNN istance Vector Routing Jean Yves Le oudec 20

2 ontents. Routing in General 2. istance vector: theory 3. istance vector: practice (RIP) 4. Software efined Networking (SN) Textbook Section.., The control plane 2

3 . Introduction Why were routing protocols invented IP assumes routing tables are maintained at hosts and routers used by Packet Forwarding Routing = control method maintain routing tables automatically in routers Packet Forwarding for every packet done in real time Routing computation of routing tables or data structures for unicast and possibly multicast normally only between routers non real time: latency up to 2 minutes uses dedicated protocols (RIP, OSPF, IGRP (isco) for unicast and VMRP, M OSPF, PIM) Routing tables in hosts are normally derived from configuration info 3

4 What a routing protocol does find reachable destinations find best paths towards destinations best = distance to destination is minimal istance = computed using some metric Static metric does not depend on the network state; for example: number of hops link capacity and static delay dministrative cost ynamic metric depend on the network state link load current delay see end of section 4

5 How routing protocols work There are many different ways, which can be classified as istance Vector: very router knows only: its neighbours + distances to all destination (used inside domains interior routing) this module and lab 4 Link State: very router has a detailed map of entire network (used inside domains interior routing) module link state Path vector very router knows only: its neighbours + paths to all destination (used between domains exterior routing) module GP and lab 6 Source routing s an alternative to routing protocols it is also possible to configure routing tables using manual configuration (see lab )

6 6 Source Routing S RI data IS IS IS IS 4 3 source writes route into packet header (IP header extension) router reads next hop from packet header, moves pointer route discovered by the source, flooding with IP, this is called strict source routing : not used in the Internet but used in some ad hoc networks

7 2. istance Vector: Theory What it does: it computes shortest paths to all destinations ost of a path = sum of the cost of network links along the path ost of a link is setup by configuration Shortest path = path whose cost is minimal istance from node to node = cost of a shortest path from to How it works uses the istributed ellman Ford algorithm Fully distributed Using as only information the distances from self to all destinations 7

8 8 2. The entralized ellman Ford lgorithm lgorithm F input: a directed graph with links costs (, ); assume (, )>0 and when nodes iand j are not connected. output: vector s.t. ( )= cost of best path from node to node for for until return( ) do for

9 9 xample: shortest paths to node : run F for 0 F k= k= k= k= k= k= 6 2 2

10 Message Passing Interpretation of ellman Ford k= k=2 3 0 With F it is as if : at iteration, node receives from neighbors their previous costs and updates own cost by picking the best F can be interpreted as a synchronous message passing algorithm synchronous = nodes wait until iteration is finished before starting iteration 0

11 xample: shortest paths to node : run F, 0 F k= k= k= k= k= k= 6 2 2

12 2 t which does the algorithm stop? (i.e. what is the smallest such that?). k = 2. k = 2 3. k = 3 4. k = 4. k = 6. k 6 7. I don t know 60% 33% k= 0% 0% k=2 k=3 k=4 k= 4% 0% I don t know 2%

13 3 Solution: algorithm stops at 0 0 k= k= k= k= k= p()=4 p()= p()= p()=3 p()=3

14 4 orrectness of F Theorem. If the network is fully connected, F stops at the latest at (where number of nodes) and outputs the distance along shortest path from to, for all is the distance from to in at most hops 3. The next hop along a shortest path from to is found by nexthop(i) rgmin j i

15 omputation of shortest path tree When algorithm has converged, the next hop of node is obtained by looking for that minimizes 4 k=

16 2.2 ssume we start from other initial conditions. What will happen? replaced by values on graph k= %. The algorithm converges to the correct distances 2. The algorithm does not converge 3. The algorithm converges but not to the correct distances 4. I don t know The algorithmconverges to 27% The algorithmdoes not con 7% The algorithmconverges but I don t know 2% 6

17 7 Run F with bizarre initial conditions the value of is k= k= % 30%? 7. I don t know 2 3 2% 4 2% 2% I don t know 0%

18 8 Solution: Run F with bizarre initial conditions F k= k= k= k= k= On this example, algorithm F converges to the correct values in spite of abnormal initial conditions

19 ssume we break some links and start from these initial conditions. What will happen? replaced by values on graph 40% 4 49% The algorithm converges to the correct distances 2. The algorithm does not converge 3. The algorithm converges but not to the correct distances 4. I don t know The algorithm converges to... The algorithm does not con... The algorithm converges but... % I don t know 0% 9

20 20 Run F with disconnected network the value of is k= k= %? 7. I don t know 8% % 2 0% 0% 3 8% 6% 4 I don t know

21 2 Solution: F with disconnected network F 4 2 k= k= k= k= k=4 0 On this example, algorithm F converges to the correct values at and and counts to at and

22 22 orrectness of F with arbitrary initial condition and arbitrary network any nonnegative value Theorem 2. If there is a path from to, then for large enough where is the distance from to. It follows that if the network is fully connected, F with arbitrary initial conditions terminates and eventually computes the correct distances. However, in general, when is small is not the distance from to in hops. 2. If there is no path from to then lim. It follows that if the network is not fully connected, F does not terminate ( count to infinity ).

23 Proof We do the proof assuming all nodes are connected.. Let p k be the vector p k [i], i=2,. Let be the mapping that transforms an array x[i] i=2 into the array x defined for i by x[i]=min j i, j [(i,j) + x(j)] Let b be the array defined for i by b[i]= (i,) The algorithm can be rewritten in vector form as () p k = p k b where is the pointwise minimum 2. q () is a min plus linear equation and the operator satisfies (x y)= x y. Thus, q() can be solved using min plus algebra into (2) p k = k p 0 k b b b 3. efine the array e for i by e[i]=. Let p 0 =e. q (2) becomes (3) p k = k b b b. Now we have the ellman Ford algorithm with classical initial conditions, thus, by Theorem : (4) for k n : k b b b = q where q[i] is the distance from i to. 4. We can rewrite q(2) for k n as () p k = k p 0 q. k p 0 [i] can be written as [i,i ]+ [i,i 2 ]+ + [i k,i k ]+ p[i k ] thus (6) k p 0 [i] k a, where a is the minimum of all [i,j]. Thus k p 0 [i] tends to when k grows. Thus for k large enough, k p 0 is larger than q and can be ignored in q(). In other words, for k large enough : (6) p k = q 23

24 2.3 istributed ellman Ford F can be used to compute p(i) i.e. find the shortest path. However, this is not its main interest, because there is a better algorithm (ijkstra) that can be used in a centralized way. ut: it can be distributed as follows. istributed ellman Ford lgorithm, F prelim node maintains an estimate of the true distance to node ; node also keeps a record of latest values for all neighbors initial conditions are arbitrary but 0 at all steps; from time to time, i sends its value to all neighbours when receives an updated value from neighbor, node recomputes : eq () min i, j q j nexthop(i) is set to a value of j that achieves the min in eq() This is asynchronous message passing, i.e. nodes do not wait for complete rounds of iteration to be performed. 24

25 2 orrectness of F prelim Theorem: ssume at least one message is reliably sent to all neighbors by every node every time units and the network is fully connected. F prelim converges to the same result as the centralized version F (i.e. to the correct distances) in time units, where is the number of steps performed by F with same initial conditions. istributed ellman Ford lgorithm, F prelim node maintains an estimate of the true distance to node ; node also keeps a record of latest values for all neighbors initial conditions are arbitrary but 0 at all steps; from time to time, i sends its value to all neighbours when receives an updated value from neighbor, node recomputes : eq () min i, j q j nexthop(i) is set to a value of j that achieves the min in eq()

26 26 istributed ellman Ford F prelim possible run of algorithm F prelim. The table shows the successive values of q(i) 0 > 0 > 0 3 > > > > > > > onverged!

27 27 Super uper ellman Ford F prelim requires a node to remember all estimates q(j) received from all neighbors, even for not on the shortest path to destination; can we do better? possible modification would be to replace eq() by Super uper ellman Ford: when receives an updated value from neighbor, node recomputes : eq (s) min,, Node i now needs to store only its own estimate Q. does this work?

28 28 Is Super uper ellman Ford correct? 38% when receives an updated value from 3% neighbor, node recomputes : eq (s) min,,. Yes, regardless of initial condition 2. Only if initial conditions are and at time 0 3. It may fail, even with initial conditions as in I don t know Yes, regardless of initial con... Only if initial conditions are.. It may fail, even with initial... 22% % I don t know

29 29 Solution Super uper can only decrease. So if we start from initial conditions as in example «Impact of Initial onditions», the algorithm will not converge to the right value. It gets «stuck» with a low value. It is possible to show that it works if all initial conditions are above the final values, for example and initially. ut even then, it will not work if there is a topology change, since this is equivalent to starting from different initial conditions. Indeed, requiring that initial conditions are correct means that we are able to reset the entire network whenever there is a topology change (which is not feasible in practice).

30 30 istributed ellman Ford, the true version Requires only to remember distance from self to destination + the best neighbor (nexthop( )) and works for all initial conditions istributed ellman Ford lgorithm, F node maintains an estimate of the distance to node ; node remembers the best neighbor nexthop(i) initial conditions are arbitrary but 0 at all steps; from time to time, i sends its value to all neighbors when receives an updated value from, node recomputes : eq (2) if nexthop then, else min,, if eq(2) causes to be modified, nexthop

31 3 6 2 istributed ellman Ford F possible run of algorithm F. The table shows the successive values of and nexthop > > > > > >

32 32 istributed ellman Ford F, cont d nexthop 3 0 possible run of algorithm F. The table shows the successive values of > > > > > > > > > > > >

33 orrectness of F Theorem: ssume at least one message is reliably sent to all neighbors by every node every time units and the network is fully connected. F converges to the same result as the centralized version F (i.e. to the correct distances) in time units, where is the number of steps performed by F with same initial conditions. omment: The main difference with F prelim is that eq(2) replaces eq(). ssume we use F, and we start from a condition such that q(i) is indeed equal to the minimum given by eq () (which is what, intuitively, is true most of the time). When j is not equal to nexthop(i), both eq() and eq(2) have the same effect: the new value of q(i) is the same in both cases. In contrast, if j == nexthop(i), then eq (2) sets q(i) to the new value (i,j)+q(j), whereas eq() sets it to min jneighbor ((i,j)+q(j)). q(2) provides an upper bound on eq(), in this case. It turns out that the algorithm still works, by the same mechanism that makes the algorithm work even when the initial conditions are arbitrary. Indeed, node i will send its new value to all remaining neighbors, who will in turn do an update and eventually, node i will receive values of q(j) that will correct the problem. In other words, if the new value of q(i) is too high (compared to what would be obtained with eq ()), this is repaired in one round of exchanges with the neighbors. 33

34 Take Home Message ellman Ford, istributed (F ), allows a node to compute distances to one destination Stored information is: Next hop to destination istance to destination F works by message passing: every node informs its neighbors of its current distance F works even when initial conditions are not as expected (which occurs due to topology changes) If destination is unreachable (distance algorithms counts to infinity. ) then the 34

35 3. istance Vector routing in practice istance vector routing = based on F F is run in all routers for all possible destination prefixes Router i computes shortest path and next hop for all network prefixes n that it heard of. Initially: (i,n) = if i directly connected to n and implicitly (i,n) = + for any n that was never heard of. Node i receives from neighbour k latest values of (k,n) for all n (this is the distance vector). Node i computes the best estimates according to algorithm F c(i,) (,n) i c(i,k) k (k,n) n c(i,m) m (m,n) 3

36 Periodic Updates Updates are sent periodically (e.g. every 30 sec) If neighbour k is no longer present, node i will no longer receive hello messages, and after a timeout, this has the same effect as if node i would receive the message from k: for all n. Then algorithm F is run: It follows that if was the next hop to, then declares unreachable. c(i,) (,n) i c(i,k) k (k,n) n c(i,m) m (m,n) 36

37 37 ll link costs = xample net dist nxt n n, n4 n4, net dist nxt n n, n2 n2, n net dist nxt n4 m3 n3 n2 m m2 net dist nxt n3 n3, n4 n4, m3 m3, n2 n2, n3 n3, m m, m2 m2,

38 38 ll link costs = xample net dist nxt n n, n4 n4, from n n4 net dist nxt n n, n2 n2, n4 2 n, n net dist nxt n3 n3, n4 n4, m3 m3, n4 m3 n3 n2 m from n3 0 n4 0 m3 0 m2 net dist nxt n2 n2, n3 n3, m m, m2 m2, n4 2 n3, m3 2 n3,

39 39 ll link costs = xample net dist nxt net dist nxt n n, n4 n4, n n, n2 n2, n3 2 n2, n4 2 n, m 2 n2, m2 2 n2, m3 3 n2, net dist nxt n3 n3, n4 n4, m3 m3, n4 m3 n n3 n2 m from n2 n3 m m2 m2 n4 2 m3 2 net dist nxt n2 n2, n3 n3, m m, m2 m2, n4 2 n3, m3 2 n3,

40 40 xample Final net dist nxt n n, n2 2 n, n3 2 n4, n4 n4, m 3 n4, m2 3 n4, m3 2 n4, net dist nxt n n, n2 n2, n3 2 n2, n4 2 n, m 2 n2, m2 2 n2, m3 3 n2, n net dist nxt n 2 n4, n2 2 n3, n3 n3, n4 2 n4, m 2 n3, m2 2 n3, m3 m3, m3 n4 n3 n2 m m2 net dist nxt n 2 n2, n2 n2, n3 n3, m m, m2 m2, n4 2 n3, m3 2 n3,

41 4 ll link costs = xample Router Failure net dist nxt We show only the router in the next hop field n n2 n3 2 n4 2 m 2 m2 2 m3 3 n net dist nxt n 2 n2 2 n3 n4 m 2 m2 2 m3 n4 m3 n3 n2 m m2 net dist nxt n 2 n2 n3 m m2 n4 2 m3 2

42 42 ll link costs = xample Failure net dist nxt n n2 n3 2 n4 2 m 2 m2 2 m3 3 timeout n timeout net dist nxt n 2 n2 2 n3 n4 m 2 m2 2 m3 n4 m3 n3 n2 m m2 net dist nxt n 2 n2 n3 m m2 n4 2 m3 2

43 ll link costs = xample Failure net dist nxt n n2 n3 2 m 2 m2 2 m3 3 n net dist nxt n 3 n2 2 n3 n4 m 2 m2 2 m3 m3 n4 From : n 2 n2 n3 m m2 n4 2 m3 2 n3 n2 m m2 net dist nxt n 2 n2 n3 m m2 n4 2 m3 2 43

44 44 ll link costs = xample fter Failure net dist nxt n n2 n3 2 n4 3 m 2 m2 2 m3 3 n net dist nxt n 3 n2 2 n3 n4 m 2 m2 2 m3 n4 m3 n3 n2 m m2 net dist nxt n 2 n2 n3 m m2 n4 2 m3 2

45 xample : onclusion xample illustrates how ellman Ford is mapped to the network concepts how topology changes are taken into account most recent announcement replaces previous ones non refreshed announcements become obsolete how distance vector carries reachability information 4

46 ssume algorithm has converged a local b l 2 c l 3 d l3 2 e l3 3 ll link costs = a l3 2 b l3 3 c l6 3 d local e l6 2 l3 l4 a l 2 b local c l2 2 d l4 3 e l4 2 l2 l a l6 3 b l4 2 c l 2 d l6 2 e local xample 2 a l2 3 b l2 2 c local d l 3 e l 2 46

47 Links l and l6 fail simultaneously, detects failure a local b l 2 c l 3 d l3 2 e l3 3 ll link costs = a l3 2 b l3 3 c NR d local e NR l3 l4 a l 2 b local c l2 2 d l4 3 e l4 2 l2 l a l6 3 b l4 2 c l 2 d l6 2 e local xample 2 a l2 3 b l2 2 c local d l 3 e l 2 47

48 xample 2 : Zoom on and a local b l 2 c l 3 d l3 2 e l3 3 ll link costs = from : dest cost a b,d 2 c,e 3 a l3 2 b l3 3 c l3 4 d local e l3 4 l3 detects failure of a local b NR c NR d l3 2 e l3 3 a l3 2 b l3 3 c l3 4 d local e l3 4 l3 a local b l3 c l3 d l3 2 e l3 from : dest cost d a 2 b 3 c,e 4 a l3 2 b l3 3 c l3 d local e l3 l3 48

49 ll link costs = fter processing this update, a local b l3 c l3 d l3 2 e l3 from : dest cost a d 2 b 4 c,e a l3 2 b l3 3 c l3 d local e l3 l3 what is the distance at to e? I don t know 34% 2% 0% 0% % 6% 4% 6 I don t know 49

50 0 Solution a local b l3 c l3 d l3 2 e l3 from : dest cost a d 2 b 4 c,e a l3 2 b l3 3 c l3 d local e l3 l3 t : istributed ellman Ford (F ) update is received from next hop to e therefore new distance is accepted sets distance to e to

51 ount to Infinity ll link costs = a local b l3 c l3 d l3 2 e l3 a local b l3 6 c l3 7 d l3 2 e l3 7 a local b l3 6 c l3 7 d l3 2 e l3 7 from : dest cost a d 2 b 4 c,e l3 from : dest cost a d 2 b 4 c,e l3 from : dest cost a d 2 b 6 c,e 7 l3 a l3 2 b l3 c l3 6 d local e l3 6 a l3 2 b l3 c l3 6 d local e l3 6 a l3 2 b l3 7 c l3 8 d local e l3 8

52 onclusion from xample 2 The costs to b,c,e grow unbounded ount to Infinity the true costs are infinite this is the expected behaviour of ellman Ford In practice, we enforce convergence by setting large number e.g. RIP: ut we can do better 2

53 3 Route poisoning and Split Horizon Two practical heuristics in order to Prevent count to infinity Prevent ping pong loops Route poisoning : if detects that route to x is not reachable, immediately sends «distance to x =» to neighbours Further, when a distance = is received for x, any further update about x is ignored for some time (holddown timer) Split Horizon : if routes packets to x via, does not announce this route to

54 xample 2 with Route Poisoning and Split Horizon a local b l 2 c l 3 d l3 2 e l3 3 ll link costs = from : d c, e: a l3 2 b l3 3 c NR d local e NR l3 l4 a l 2 b local c l2 2 d l4 3 e l4 2 l2 l a l6 3 b l4 2 c l 2 d l6 2 e local a l2 3 b l2 2 c local d l 3 e l 2 detects failure immediately sends update to with poisoned routes ( distances) Routes to a and b are not advertized (split horizon)

55 fter processing this update, what are the a local b l 2 c l 3 d l3 2 e l3 3 ll link costs = from : d c, e: a l3 2 b l3 3 c NR d local e NR distances at to c and e? l3. None of the above 6. I don t know $$$$=3, $$$$ 0% 2% 9% 24% Noneof theabov 0% I don t know %

56 6 Solution a local b l 2 c l 3 d l3 2 e NR from : d c, e: a l3 2 b l3 3 c NR d local e NR l3 applies F : is not the next hop to c, therefore computes distance is 3, no change is the next hop to e, therefore computes distance is, i.e. e is unreachable

57 xample 2 with Route poisoning and Split Horizon a local b l 2 c l 3 d l3 2 e NR ll link costs = from : d c, e: a l3 2 b l3 3 c NR d local e NR l3 detects failure a local b NR c NR d l3 2 e NR from : a b,c,e a l3 2 b NR c NR d local e NR l3 No count to infinity fter some time, the distances are removed by timeout 7

58 RIP (Routing Information Protocol) Implements F ost of one link is by default osts are unidirectional, it is possible to have,, 6; therefore network span limited to Split horizon and route poisoning UP port 20 and multicast address / ff02::9 Sends distance vector update every 30 seconds (by default) or when change is detected ( triggered update ) Route not announced during 3 minutes becomes invalid RIP keeps a database of all best paths, called Routing Information ase (RI), which is different (superset of) forwarding table unlike slides in part theory this is to allow several different processes to update the forwarding table ; example: manual configuration + RIP uthentication in RIPv2 by M (shared secret) RIP for IPv4, RIPng for IPv6 8

59 IGRP (nhanced Interior Gateway Routing Protocol) Proprietary protocol by ISO Metric that estimates the global delay Maintains several routes of similar cost load sharing No limit of number of routers included in messages roadcast every 90 sec Typically one process for IPv4 and one process for IPv6 9

60 Metric example Metric Trans = /andwidth (time to send 0 Kb) delay = (sum of elay)/0 m = [K *Trans + (K 2 *Trans )/(26 load) + K 3 *delay] default: K=, K2=0, K3=, K4=0, K=0 if K 0, m = m * [K /(Reliability + K 4 )] andwidth in Kb/s, elay in s t Venus: Route for 72.7/6: Metric = /784 + ( )/0 = 48 t Saturn: Route for 2./8: Metric = /224 + ( )/0 =

61 In a fully connected network, say what is true :. F converges to the correct distances whatever the initial conditions 2. F converges to the correct distances whatever the initial conditions 3. and 2 4. None. I don t know 0% 0% 0% 0% 0% F converges to the correct... F converges to the correc... and 2 None I don t know 6

62 4. Per Flow Forwarding In principle, an IP router uses the destination address and longest prefix match to decide where to send a packet Some networks want more control; e.g. handle mission critical traffic with high priority; e.g. ban non HTTP traffic This is why some routers can be configured with per flow forwarding rules When a packet has to be forwarded, such a router does: Look for a rule match in the list of (priority ordered) perflow forwarding rules (also called flow table) if one or several matches exist, follow the rule with highest priority If no rule matches, go to the IP forwarding table and do longest prefix match Same can be used in switches (per flow tables then complement the M forwarding table) 62

63 63 Which way at R for packets from Lisa and. Lisa:, Homer:. Lisa:, Homer: 2. Lisa:2, Homer:. Lisa:2, Homer: 2. None of above F. I don t know 72% Homer to nterprise server? Lisa.H Homer.H Flow table at R Flow spec action prio input=0; dest=.* output 2 0 dest=..* drop 0 IP Forwarding table at R to output to output * 2 *..* 2.* 0.* 3.* router R router R2 2 3 nterprise server..h2 Lisa:, Homer: % Lisa:, Homer: 2 0% Lisa:2, Homer: 6% Lisa:2, Homer: 2 % None of above I don t know 2% to output *.* 2 router R4 2 IP Forwarding table

64 Solution nswer Packets from Lisa to enterprise server match the two flow rules; the first one has higher priority and is applied. Packets are forwarded to port 2. Since there is a match in flow table, the IP forwarding table is not used. Packets from Homer to enterprise server match the second flow rule and are dropped by R. The combined effect of the flow table and the IP forwarding table at R is such that. all traffic to..* is killed except if arriving on input 0 2. traffic to..* that is not killed is forwarded to output 2 3. traffic to.* and not..* is forwarded to output 64

65 Software efined Networking Local controller Local controller Local controller entral controller router R router R2 router R3 Local controller router R4 What? Manage the flow tables in a collection of routers or switches from a central application How? central controller decides rules and communicates them to local controllers on routers Local controller writes the per flow tables on router Protocol between local controller and central controller is e.g. OpenFlow, over TP connections. 6

66 o we need RIP (or another routing protocol) if we have SN?. No because flow tables can replace IP forwarding tables. Yes because flow tables cannot replace IP forwarding tables. Yes because the central controller needs a way to communicate with local controllers 8% 8% 63% 0%. I don t know No because flowtables can Yes because flowtables can Yes because the central con I don t know 66

67 67 Solution nswer The central controller communicates with the local controllers in routers over TP connections. This needs that IP forwarding tables are functional, which in turn requires RIP or some other routing protocol.

68 68 onclusion istance vector is smart Fully distributed, little information stored Simple ut: relatively slow Not suited for large and complex networks Link State protocols should be used instead Routing tables can be complemented with flow tables, controlled by an outside application (SN)

Distance Vector Routing

Distance Vector Routing ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Routing in General Distance Vector Routing Jean Yves Le Boudec Fall 22 Contents. Routing in General 2. Distance vector: theory. Distance vector: practice 4. Dynamic

More information

Advanced Computer Networks

Advanced Computer Networks istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

Distance-Vector Routing: Distributed B-F (cont.)

Distance-Vector Routing: Distributed B-F (cont.) istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path

More information

Distance vector and RIP

Distance vector and RIP DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4

More information

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain

More information

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern

More information

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet

More information

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016 9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:

More information

Routing Information Protocol. A simple distance vector scheme

Routing Information Protocol. A simple distance vector scheme Routing Information Protocol A simple distance vector scheme RIP version 1 RFC 1058 Charles Hedrick, Rutgers University, 1988 Based on Bellman-Ford distance vector Also used as ARPANET routing protocol

More information

Routing in the Internet

Routing in the Internet ÉOLE POLYTEHNIQUE FÉÉRLE E LUSNNE Routing in the Internet Jean-Yves Le oudec 1 ontents. Introduction. Unicast Routing: istance Vector. Unicast Routing: Link State. Multicast Routing E. The Spanning Tree

More information

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub

Contents. Bridging. Transparent Bridging (TB) 1. Transparent Bridging Bridging in General. hub Contents ÉCOLE POLYTECHNIQUE FÉÉRLE E LUSNNE Bridging Jean-Yves Le Boudec Fall 007!.Transparent bridging!. Spanning Tree Protocol (STP) "#specification $#an exotic version of Bellman-Ford %#the STP protocol,

More information

EE 122: Intra-domain routing

EE 122: Intra-domain routing EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level

More information

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion

More information

TDC 363 Introduction to LANs

TDC 363 Introduction to LANs TDC 363 Introduction to LANs Routing Protocols and RIP Greg Brewster DePaul University TDC 363 1 Dynamic Routing Routing Protocols Distance Vector vs. Link State Protocols RIPv1 & RIPv2 RIP Problems Slow

More information

COMP 3331/9331: Computer Networks and Applications

COMP 3331/9331: Computer Networks and Applications OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

Routing Information Protocol. RIP application. RIP version 1

Routing Information Protocol. RIP application. RIP version 1 Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:38:50) Wednesday, February 24, 2010 RIP version

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Distributed Algorithms in Networks EECS 122: Lecture 17

Distributed Algorithms in Networks EECS 122: Lecture 17 istributed lgorithms in Networks EES : Lecture 7 epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley Network Protocols often have unintended effects TP Eample TP connections

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Distance Vector Routing Protocols

Distance Vector Routing Protocols Distance Vector Routing Protocols Routing Protocols and Concepts Chapter 4 Version 4.0 1 Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process

More information

Third Generation Routers

Third Generation Routers IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry

More information

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Jean-Yves Le Boudec Fall Contents Bridging ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Jean-Yves Le Boudec Fall 0 Algorhyme I think that I shall never see a graph more lovely than a tree. A tree whose crucial property is loop-free connectivity.

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

Routing Information Protocol

Routing Information Protocol Routing Information Protocol A simple distance vector scheme dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 24, 2008 dr. C. P. J. Koymans (UvA) Routing Information Protocol

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1

Determining IP Routes. 2000, Cisco Systems, Inc. 9-1 Determining IP Routes, Cisco Systems, Inc. 9- Objectives Upon completion of this chapter, you will be able to complete the following tasks: Distinguish the use and operation of static and dynamic routes

More information

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to. Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and

More information

The Problem: Finding Paths Spring 2011 Lecture #19. Forwarding. Shortest Path Routing

The Problem: Finding Paths Spring 2011 Lecture #19. Forwarding. Shortest Path Routing The Problem: Finding Paths 1 6.02 Spring 20 Lecture # addressing, forwarding, routing liveness, advertisements, integration distance-vector routing routing loops, counting to infinity 6.02 Spring 20 Lecture,

More information

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics.

EECS 122, Lecture 16. Link Costs and Metrics. Traffic-Sensitive Metrics. Traffic-Sensitive Metrics. Static Cost Metrics. EECS 122, Lecture 16 Kevin Fall kfall@cs.berkeley.edu edu Link Costs and Metrics Routing protocols compute shortest/cheapest paths using some optimization criteria Choice of criteria has strong effect

More information

Routing Information Protocol. RIP application. RIP version 1

Routing Information Protocol. RIP application. RIP version 1 Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/01 13:00:45) Friday, March 3, 2017 RIP version 1 Origin and

More information

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing Local & Metropolitan rea Networks OE3 Lecture 6 Routing r. L. hristofi Overview The main function of the network layer is routing packets from the source to the destination machine. The only exception

More information

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now. Let s focus on clarifying questions I love the degree of interaction in this year s class More Routing all Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion

More information

Routing Information Protocol

Routing Information Protocol Routing Information Protocol A simple distance vector scheme Karst Koymans Informatics Institute University of Amsterdam (version 18.2, 2018/11/21 13:11:09) Friday, November 23, 2018 Karst Koymans (UvA)

More information

Chapter 4: Network Layer, partb

Chapter 4: Network Layer, partb Chapter 4: Network Layer, partb The slides are adaptations of the slides available by the main textbook authors, Kurose&Ross Network Layer 4-1 Interplay between routing, forwarding routing algorithm local

More information

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

RIP Version 2. The Classless Brother

RIP Version 2. The Classless Brother RIP Version 2 The Classless Brother (C) Herbert Haas 2005/03/11 1 Why RIPv2 Need for subnet information and VLSM Need for Next Hop addresses for each route entry Need for external route tags Need for multicast

More information

Chapter 7: Routing Dynamically. Routing & Switching

Chapter 7: Routing Dynamically. Routing & Switching Chapter 7: Routing Dynamically Routing & Switching The Evolution of Dynamic Routing Protocols Dynamic routing protocols used in networks since the late 1980s Newer versions support the communication based

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

CCNA IP ROUTING. Revision no.: PPT/2K605/03

CCNA IP ROUTING. Revision no.: PPT/2K605/03 CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.

More information

CMPE 151 Routing. Marc Mosko

CMPE 151 Routing. Marc Mosko CMPE 151 Routing Marc Mosko Talk Outline Routing basics Why segment networks? IP address/subnet mask The gateway decision based on dest IP address default gateway and static routing gateway discovery (DHCP,

More information

Dynamic Routing. The Protocols

Dynamic Routing. The Protocols Dynamic Routing The Protocols Desirable Characteristics of Dynamic Routing Automatically detect and adapt to topology changes Provide optimal routing Scalability Robustness Simplicity Rapid convergence

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source

More information

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016 estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1

Network Protocols. Routing. TDC375 Autumn 03/04 John Kristoff - DePaul University 1 Network Protocols Routing TDC375 Autumn 03/04 John Kristoff - DePaul University 1 IPv4 unicast routing All Internet hosts perform basic routing for local net destinations, forward to local host for non-local

More information

Routing Unicast routing protocols

Routing Unicast routing protocols Routing Unicast routing protocols Jens A Andersson Electrical and Information Technology R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 10 R5 1 Router A router is a type

More information

Deployment of IGRP/EIGRP

Deployment of IGRP/EIGRP 1 eployment of IGRP/EIGRP Session 2 Presentation_I.scr 1 Understanding EIGRP Understanding and deploying EIGRP is like driving a car 3 genda Fundamentals of EIGRP UL Summarization and Load alancing EIGRP/IGRP

More information

Chapter 7 Routing Protocols

Chapter 7 Routing Protocols Chapter 7 Routing Protocols Nonroutable Protocols In the early days of networking, networks were small collections of computers linked together For the purposes of sharing information and expensive peripherals

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2017

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. Link State Routing. Jean Yves Le Boudec 2017 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean Yves Le Boudec 2017 1 Contents 1. Routing in General 2. Link state routing, OSPF Single Area 3. Dijkstra s algorithm 4. Equal Cost Multipath

More information

IP Routing Volume Organization

IP Routing Volume Organization IP Routing Volume Organization Manual Version 20091105-C-1.03 Product Version Release 6300 series Organization The IP Routing Volume is organized as follows: Features IP Routing Overview Static Routing

More information

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP

SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 RIP, IGRP, EIGRP SEMESTER 2 Chapter 4 Distance Vector Routing Protocols V 4.0 4.1.1 What are the three distance vector routing protocols? What are the key characteristics of RIP? What are the key characteristics of IGRP?

More information

C13b: Routing Problem and Algorithms

C13b: Routing Problem and Algorithms CISC 7332X T6 C13b: Routing Problem and Algorithms Hui Chen Department of Computer & Information Science CUNY Brooklyn College 11/20/2018 CUNY Brooklyn College 1 Acknowledgements Some pictures used in

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Network Layer (Routing)

Network Layer (Routing) Network Layer (Routing) Topics Network service models Datagrams (packets), virtual circuits IP (Internet Protocol) Internetworking orwarding (Longest Matching Prefix) Helpers: ARP and DHP ragmentation

More information

TCP/IP Networking. Part 3: Forwarding and Routing

TCP/IP Networking. Part 3: Forwarding and Routing TP/IP Networking Part 3: Forwarding and Routing Routing of IP Packets There are two parts to routing IP packets:. How to pass a packet from an input interface to the output interface of a router ( IP forwarding

More information

CSE/EE 461 Distance Vector Routing

CSE/EE 461 Distance Vector Routing S/ 46 istance Vector Routing Last Time Introduction to the Network layer Internetworks atagram and virtual circuit services Internet Protocol (IP) packet format The Network layer Provides end-to-end data

More information

Two types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs).

Two types of routing protocols are used in internetworks: interior gateway protocols (IGPs) and exterior gateway protocols (EGPs). Introduction Dynamic routing is when protocols are used to find networks and update routing tables on routers. True, this is easier than using static or default routing, but it ll cost you in terms of

More information

ECE 158A: Lecture 5. Fall 2015

ECE 158A: Lecture 5. Fall 2015 8: Lecture Fall 0 Routing ()! Location-ased ddressing Recall from Lecture that routers maintain routing tables to forward packets based on their IP addresses To allow scalability, IP addresses are assigned

More information

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms Announcements CS 5565 Network Architecture and Protocols Lecture 20 Godmar Back Project 2B due in 2 parts: Apr 29 and May 6 Extra Credit Opportunities: Expand simulator (and your implementation) to introduce

More information

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers Table of Contents RIP Configuration 1 RIP Overview 1 Operation of RIP 1 Operation of RIP 2 RIP Version 2 RIP Message Format 3 Protocols and Standards 4 Configuring RIP Basic Functions 5 Configuration Prerequisites

More information

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing ICS 351: Today's plan netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing Netmask exercises how many bits in this netmask: 255.128.0.0 using this netmask and the

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

9.1. Routing Protocols

9.1. Routing Protocols 9.1. Routing Protocols Each organization that has been assigned a network address from an ISP is considered an autonomous system (AS). That organization is free to create one large network, or divide the

More information

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan

Routing Protocols of IGP. Koji OKAMURA Kyushu University, Japan Routing Protocols of IGP Koji OKAMURA Kyushu University, Japan Routing Protocol AS (Autonomous System) Is operated autonomous in the organization. 6bit IGP (Interior Gateway Protocol) Routing Control inside

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Subnets. Subnets. Subnets. IP Addressing: introduction

Chapter 4: Network Layer. TDTS06 Computer networks. Subnets. Subnets. Subnets. IP Addressing: introduction hapter 4: Network Layer TDTS06 omputer s Lecture 6: Network layer III Routing in the Internet Jose M. Peña, jospe@ida.liu.se ID/DIT, LiU 2009-09-16 4. 1 Introduction 4.2 Virtual circuit and datagram s

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Routing. Jens A Andersson Communication Systems

Routing. Jens A Andersson Communication Systems Routing Jens A Andersson Communication Systems R1 Choosing an Optimal Path R4 5 R7 5 10 40 R6 6 5 B R2 15 A 20 4 10 10 R8 R3 5 R5 10 Router A router is a type of internetworking device that passes data

More information

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:

More information

WAN Technology and Routing

WAN Technology and Routing PS 60 - Network Programming WN Technology and Routing Michele Weigle epartment of omputer Science lemson University mweigle@cs.clemson.edu March, 00 http://www.cs.clemson.edu/~mweigle/courses/cpsc60 WN

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4.5 Routing algorithms

More information

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst

Internet rou)ng. V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Internet rou)ng V. Arun CS491G: Computer Networking Lab University of MassachuseFs Amherst Slide material copyright 1996-2013 J.F Kurose and K.W. Ross, All Rights Reserved Graph abstraction 5 graph: G

More information

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad

Default & Static Routes and Routing Information Protocol. Presented by : Mohammed Hamad Default & Static Routes and Routing Information Protocol Presented by : Mohammed Hamad When a device has multiple paths to reach a destination, it always selects one path by preferring it over others.

More information

4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing

4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing //1 The Problem: istributed Methods for Finding Paths in Networks L 1.0 Spring 01 Lecture #0 addressing, forwarding, routing liveness, advertisements, integration distance-vector routing link-state routing

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat

More information

Introduction to Intra-Domain Routing

Introduction to Intra-Domain Routing Introduction to Intra-Domain Routing Stefano Vissicchio UCL Computer Science COMP3 Agenda We delve into network layer s main functionality. Setting Context Routing players. Intra-domain routing problem

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Chapter 4: outline. Network Layer 4-1

Chapter 4: outline. Network Layer 4-1 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram networks 4.3 what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link

More information

Unit 9. Author: W.Buchanan. Routing Protocols (1)

Unit 9. Author: W.Buchanan. Routing Protocols (1) Unit 9 uthor: W.Buchanan. Routing Protocols (1) Routing Protocols B H F B D E G C uthor: W.Buchanan. Routing Protocols (2) Mobile s (Unit 10) Router Programming (Unit 8) Routing Protocols (Unit 9) IP ddressing/subnets

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source

More information

Redes de Computadores. Shortest Paths in Networks

Redes de Computadores. Shortest Paths in Networks Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are

More information

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions First name: Family name: FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions Jean-Yves Le Boudec, Patrick Thiran 2011 January 15 INSTRUCTIONS 1. The exam is in two time slots. Slot 1

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1

Table of Contents 1 Static Routing Configuration RIP Configuration 2-1 Table of Contents 1 Static Routing Configuration 1-1 Introduction 1-1 Static Route 1-1 Default Route 1-1 Application Environment of Static Routing 1-1 Configuring a Static Route 1-2 Configuration Prerequisites

More information

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 9. Network Layer (cont d) Network Layer 1-1 Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest

More information

Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli

Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli Shortest Paths Algorithms and the Internet: The Distributed Bellman Ford Lecturer: Prof. Chiara Petrioli Dipartimento di Informatica Rome University La Sapienza G205: Fundamentals of Computer Engineering

More information