Distributed Algorithms in Networks EECS 122: Lecture 17
|
|
- Melanie Lee
- 6 years ago
- Views:
Transcription
1 istributed lgorithms in Networks EES : Lecture 7 epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley Network Protocols often have unintended effects TP Eample TP connections detect congestion after it has happened May cause packet drops from uncongested well behaved flows Non congested flows back off Eample Two TP flows sharing the same router get uneven bandwidths because one has a much smaller RTT than the other Routing Oscillation and countless other pathologies It is very difficult to avoid these unintended effects March, 00 KP: EES Lecture 7 The Internet is a HUGE istributed System Nodes are local processors Messages are echanged over various kinds of links Nodes contain sensors which sense local changes Nodes control the network jointly Method for doing this is a distributed algorithm Eample: Routing Time taken to solve the problem has two components: omputation time taken for local processing ommunication time for messages to be received over the links Today Focus on protocol design issues How to move from entralized to istributed lg. Synchronous and synchronous computation Why does the synchronous ellman Ford converge? Selfish behavior distributed systems March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 Solving Global Problems in a istributed Setting Eamples: Minimum Spanning Tree Shortest Path Leader Election Topology roadcast Much easier to think in terms of centralized algorithms reativity needed to convert to the distributed case The Network is Heterogeneous Speed ialup to terabit fiber Reliability Hosts: istributed Server farms to 8 P Links: Noisy wireless to virtually error free fiber ongestion Trustworthiness What is a general enough model to cover all of this? March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7
2 onsensus over an Unreliable Link and in a connection over an unreliable link They both want to terminate the connection only if they are certain that no more packets will arrive from the other user messages to all their neighbors who then flood. won t terminate unless it knows that knows it is about to terminate. won t terminate unless it knows that knows it is about to terminate slow link March, 00 KP: EES Lecture 7 7 March, 00 KP: EES Lecture 7 0 onsensus Problem Suppose tells it can terminate and receives this message, say M can terminate, but will never know if actually received M and so it can t terminate neighbors who then flood. fails sends K(M) to, but then needs to makes sure that received this message, so it must wait for K(K(M)) never terminates. In fact, NO protocol eists to solve this problem! Worth convincing yourself of this fact. March, 00 KP: EES Lecture 7 8 March, 00 KP: EES Lecture 7 Link model Error correction ssume that errors can eventually corrected Propagation elay Fied. fails marks the link down Variable but no more than d Variable with no upper bound Other components of delay Queueing elay Transmission elay Packet order FIFO an be delivered in arbitrary order March, 00 KP: EES Lecture 7 9 March, 00 KP: EES Lecture 7
3 . fails marks the link down. comes back up msg lost This can be fied with sequence numbers, but then other problems emerge. fails marks the link down. comes back up marks the link up. marks the link down. fails message lost thinks is down when it is actually up! March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7. fails marks the link down. comes back up Synchronous v/s synchronous lgorithms Synchronous algorithms can be described in terms of global iterations. The time taken for a given iteration is the time taken for the slowest processor to complete that iteration: time driven E.g. TM or SONET synchronous algorithms eecute at a processor based on received messages and internal state: event driven E.g. IP protocols which must run over heterogeneous systems March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 7 Slotted Time. fails marks the link down. comes back up marks the link up. marks the link down Slotted system,,, ll nodes agree on slot boundaries Have access to a global clock Helps to co-ordinate the nodes Every node can run the same algorithm Proving correctness is generally tractable if the centralized algorithm is analyzable Easier to understand the sequence of communication between nodes March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 8
4 Synchronous ellman-ford (SF) Every node runs the same algorithm Time is slotted and in every tick each node sends its distance vector. t time h, node i has as an estimate of the shortest path to node that has <= h+ hops h+ (I,j) = min kεn(i) { h (k,j) + c(i,k)} Synchronization Penalty Slow nodes can create a penalty as well Node Node Node Penalty can be huge! March, 00 KP: EES Lecture 7 9 March, 00 KP: EES Lecture 7 Synchronous Timing Great when links are reliable and similar Node Implementing a Synchronous lgorithm Suppose the slowest process can complete an iteration in time T p Node Link delay is always less than T l Then a slot size of T p +T l or more is sufficient ut most processors may be most of the time What if T p and or T l are not known? March, 00 KP: EES Lecture 7 0 March, 00 KP: EES Lecture 7 Synchronous Timing ut what when some links are much faster? Node Node Node Node suffers synchronization penalty Locally Synchronous omputation Forget about fied slots When a node has received all round k- messages from its neighbors, it computes and sends out its round k message Worst-case: s slow as synchronous computation Generally much faster ny synchronous algorithm that isn t using time as a part of the computation will also work when run in a locally synchronous manner. March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7
5 Local Synchronization Send update k after you ve heard update k- from all neighbors. Node Node Node Why bother with synchronous lgorithms To reduce the synchronization penalty ifficult to get the synchronous algorithm to start The network is dynamic Flows Topology Think of the algorithm having to restart with a new set of initial conditions, every time there is a failure hanges create events which may or may not have global impact Event-driven algorithms better suited March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 8 ompare with Synchronous Slot size is affected by the slow node Node Node Node synchronous ellman Ford (F) on t even wait to hear from all neighbors! Use most recent information to compute new distance vectors i.e. use last received values of () and d Whenever ready, each node i computes (i) = min k ε N(i) [(k) + c(i,k)] Sends the result to each of its neighbors No notion of global iterations In general, nodes are using different and possibly inconsistent estimates March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 9 synchronous computation No notion of slot size at all! Node Node Node Why should this work? synchronous ellman Ford Regardless of how asynchronous the nodes are, the algorithm will eventually converge to the shortest path Links can go down and come up but as long as the topology is fied after some time t, the algorithm will eventually converge to the shortest path Why? There s some hope because the (j) can only go up if one of j s neighbors estimates has gone up. March, 00 KP: EES Lecture 7 7 March, 00 KP: EES Lecture 7 0
6 Idea Trustworthiness There are too many different runs of F, so lets try to bound the range of distance estimates of (j) over time o this by two different runs of Synchronous F Set different initial estimates One run U, uses the familiar ones, i.e. estimate is infinity if no edge The other, L, uses -if no edge! One bounds the estimates from above, one from below and both find the correct the shortest paths eventually For every iteration k of the two SF runs L k (j) L k+ (j) *(j) U k+ (j) U k (j) For any asynchronous run,, it is possible to show that for any k, there is a time t such that L k (j) L k+ (j) t (j) U k+ (j) U k (j) Since both lower and upper runs converge to the optimal, so will F eventually Three levels Honest: lways in conformance of the protocol Selfish: May lie to get better performance out of the protocol (GP) Malicious: Unpredictable Internet Protocols (for the most part) assume Honest protocol agents Unreliable infrastructure Infrastructure has gotten more reliable, and agents have gotten less honest raess s Parado: Eample of how Greediness and distributed algorithms can lead to suboptimality March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 Soft State ongestion Sensitive Routing State with Time-Out Eample: host joins a group by sending a join message to a host manager. The manager adds the host to the group for the net T seconds. If the host wants to stay in the group it must send a refresh message within T seconds to the manager. Otherwise it is dropped. dvantage: Manager robust to host failure isadvantage: Too many messages Most internet protocols use this way of communicating Trades of simplicity of correctness with compleity of communication epends on traffic S R Q T Weights are delays/bit unit of traffic from s to t u bits on the upper path -u bits on the lower path March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7 The nature of asynchronous distributed protocols Generally non-intuitive Limited theory to work with orrectness etremely hard to prove Robustness hard to analyze Networking gurus have a vast knowledge of special cases that can lead to strange behaviors Misconfiguration is a big cause of errors Soft state helps a lot, but wastes many messages! What about just broadcasting topology information accurately so that these problems go away Each Node is Greedy epends on traffic S R Q T Weights are delays/bit unit of traffic from s to t u bits on the upper path -u bits on the lower path Node S minimizes Total delay = u(u+) + (-u)(-u) = (u^ u +) elay minimized at u=. So Total elay =. s March, 00 KP: EES Lecture 7 March, 00 KP: EES Lecture 7
7 Greediness leads to suboptimality S still sends. on each path. R Weights are delays/bit unit of traffic from s to t S 0 T u bits on the upper path -u bits on the lower path. Q RESS S PROX R is greedy R diverts all. units on to the new link Now total delay is! March, 00 KP: EES Lecture 7 7 onclusions istributed lgorithms are not intuitive There is no systematic way to design them ctive research area is making some progress Until then use Hacking bilities Simulation ontrol Theory Optimization Graph Theory Game Theory. Greedy and malicious users complicate the protocol design problem even more nother active research area making progress This is why it is hard to build networks March, 00 KP: EES Lecture 7 8 7
Distributed Routing. EECS 228 Abhay Parekh
Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors
More informationWhat is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats
What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern
More informationReview: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues
Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table
More informationIP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing
IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet
More informationEE 122: Intra-domain routing
EE : Intra-domain routing Ion Stoica September 0, 00 (* this presentation is based on the on-line slides of J. Kurose & K. Rose) Internet Routing Internet organized as a two level hierarchy First level
More informationFinal Overview EECS 122
The Network ore Final Overview EES epartment of Electrical Engineering and omputer Sciences University of alifornia erkeley any interconnected subs any different architectures dvertises a service to the
More informationDiscussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich
iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion
More informationDistance Vector Routing
ÉOL POLYTHNIQU FÉÉRL LUSNN istance Vector Routing Jean Yves Le oudec 20 ontents. Routing in General 2. istance vector: theory 3. istance vector: practice (RIP) 4. Software efined Networking (SN) Textbook
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed
More informationAdvanced Computer Networks
istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of
More informationCS 43: Computer Networks. 23: Routing Algorithms November 14, 2018
S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6
More informationIP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing
IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure
More informationDistance-Vector Routing: Distributed B-F (cont.)
istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path
More informationLet s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.
Let s focus on clarifying questions I love the degree of interaction in this year s class More Routing all Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion
More informationCEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni
3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides
More informationWAN Technology and Routing
PS 60 - Network Programming WN Technology and Routing Michele Weigle epartment of omputer Science lemson University mweigle@cs.clemson.edu March, 00 http://www.cs.clemson.edu/~mweigle/courses/cpsc60 WN
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationInternet Architecture I EECS 122: Lecture 2
Back to a simple Internet rchitecture I EECS 122: Lecture 2 C E epartment of Electrical Engineering and Computer Sciences University of California Berkeley B eview: Hosts connect to specialized devices
More informationMore on Network Routing and Internet Protocol
omputer Networks //03 More on Network Routing and Internet Protocol Kai Shen Network Routing Link state routing: ijkstra s algorithm efficient approach to calculate least cost routes all routers need complete
More informationRouting. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control
Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the
More informationEE122 MIDTERM EXAM: Scott Shenker, Ion Stoica
EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e
More informationRouting Metric. ARPANET Routing Algorithms. Problem with D-SPF. Advanced Computer Networks
Advanced Computer Networks Khanna and Zinky, The Revised ARPANET Routing Metric, Proc. of ACM SIGCOMM '89, 19(4):45 46, Sep. 1989 Routing Metric Distributed route computation is a function of link cost
More informationRouters & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives
Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain
More informationCOMP 3331/9331: Computer Networks and Applications
OMP /9: omputer Networks and pplications Week 9 Network Layer: Routing Reading Guide: hapter 4: Sections 4.5 Network Layer nnouncements v Labs Lab 4 ongestion ontrol Lab 5 Simple Router (start up for ssignment,
More informationAnnouncements. Ethernet. Goals of Today s Lecture. Three Ways to Share the Media. Random Access Protocols. Key Ideas of Random Access
Ethernet EE 1: Intro to ommunication Networks Fall 00 (WF -:0 in ory ) Vern Paxson Ts: Lisa Fowler, aniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee1/ nnouncements Solutions for Homework
More informationWe will discuss about three different static routing algorithms 1. Shortest Path Routing 2. Flooding 3. Flow Based Routing
In this lecture we will discuss about Routing algorithms Congestion algorithms Lecture 19 The routing algorithm is that part of the network layer software, which is responsible for deciding which output
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
OMP/ELE 49/6 Introduction to omputer Networks Intra-domain routing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More information(Refer Slide Time: 01:08 to 01:25min)
COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 11 Rou+ng: Deep Dive. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 11 Rou+ng: Deep Dive Spring 2018 Rachit Agarwal 2 Goals for Today s Lecture Learning about Routing Protocols Link State (Global view) Distance
More informationRouting in Ad-hoc Networks
0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationRouting Outline. EECS 122, Lecture 15
Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall
More information0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP
epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network
More information6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long
6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!
More informationDeployment of IGRP/EIGRP
1 eployment of IGRP/EIGRP Session 2 Presentation_I.scr 1 Understanding EIGRP Understanding and deploying EIGRP is like driving a car 3 genda Fundamentals of EIGRP UL Summarization and Load alancing EIGRP/IGRP
More informationMissing Pieces of the Puzzle
Missing Pieces of the Puzzle EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and
More informationChapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source
More informationIntroduction to Communication Networks Spring Unit 15 Internetworking (cont) Routing
Introduction to Communication Networks Spring 007 Unit 5 Internetworking (cont) Routing EECS SPRING 007 Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Several
More information4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing
//1 The Problem: istributed Methods for Finding Paths in Networks L 1.0 Spring 01 Lecture #0 addressing, forwarding, routing liveness, advertisements, integration distance-vector routing link-state routing
More informationUnicast Routing in Mobile Ad Hoc Networks
Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain
More informationNetwork service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.
Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and
More informationRouting in a network
Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationThird Generation Routers
IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry
More informationYouki Kadobayashi NAIST
Information Network 1 Routing (1) Image: Part of the entire Internet topology based on CAIDA dataset, using NAIST Internet viewer Youki Kadobayashi NAIST 1 The Routing Problem How do I get from source
More informationCS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016
9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:
More information4.5.2 The Distance-Vector (DV) Routing Algorithm
4.5 ROUTING ALGORITHMS 371 highl congested (for eample, high-dela) links. Another solution is to ensure that not all routers run the LS algorithm at the same time. This seems a more reasonable solution,
More informationComputer Networks. Routing
Computer Networks Routing Topics Link State Routing (Continued) Hierarchical Routing Broadcast Routing Sending distinct packets Flooding Multi-destination routing Using spanning tree Reverse path forwarding
More informationNetwork Layer: Routing
Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:
More informationModule 8. Routing. Version 2 ECE, IIT Kharagpur
Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer IV Dmitri Loguinov Texas A&M University April 12, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationRouting. Information Networks p.1/35
Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual
More informationQoS in Frame relay networks
Frame Relay ndrea ianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching
More informationNetwork Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture
Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction
More informationQoS in Frame relay networks
QoS in Frame Relay ndrea ianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ omputer Networks esign and Management - 1 Frame Relay: characteristics Packet
More informationCCNA IP ROUTING. Revision no.: PPT/2K605/03
CCNA 640-801 IP ROUTING Revision no.: PPT/2K605/03 Routing Basics The term routing is used for taking a packet from one device and sending it through the network to another device on a different network.
More informationLecture 4 Wide Area Networks - Routing
DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Routing Mei Yang Based on Lecture slides by William Stallings 1 ROUTING IN PACKET SWITCHED NETWORK key design issue for (packet) switched
More informationDSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016
estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra
More informationInternet Architecture. Network Layer Overview. Fundamental Network Layer Function. Protocol Layering and Data. Computer Networks 9/23/2009
omputer Networks 9//9 Network Layer Overview Kai Shen Internet rchitecture ottom-up: : electromagnetic signals on the wire : data transfer between neighboring elements encoding, framing, error correction,
More information06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing
Local & Metropolitan rea Networks OE3 Lecture 6 Routing r. L. hristofi Overview The main function of the network layer is routing packets from the source to the destination machine. The only exception
More informationCHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL
CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks
More informationComputer Science 425 Distributed Systems CS 425 / ECE 428. Fall 2013
Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013 Indranil Gupta (Indy) October 10, 2013 Lecture 14 Networking Reading: Chapter 3 (relevant parts) 2013, I. Gupta, K. Nahrtstedt, S. Mitra,
More informationChapter 12. Routing and Routing Protocols 12-1
Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone
More informationRecap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking
Lecture : Networking istributed Systems ehzad ordbar School of omputer Science, University of irmingham, UK Recap rchitecture, what? and why? Tiered rchitecture Various software layer: middleware client/server
More informationMore Routing. EE122 Fall 2012 Scott Shenker
More Routing EE Fall 0 Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and UC Berkeley Let s focus
More informationRedes de Computadores. Shortest Paths in Networks
Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are
More informationInitial Assumptions. Modern Distributed Computing. Network Topology. Initial Input
Initial Assumptions Modern Distributed Computing Theory and Applications Ioannis Chatzigiannakis Sapienza University of Rome Lecture 4 Tuesday, March 6, 03 Exercises correspond to problems studied during
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationDistance vector and RIP
DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4
More informationDestination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6
estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the
More informationChapter 4 Network Layer. Network Layer 4-1
Chapter 4 Network Layer Network Layer 4- Chapter 4: Network Layer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing
More informationLecture 4. The Network Layer (cont d)
Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols
More informationResearch paper Measured Capacity of an Ethernet: Myths and Reality
Research paper Measured apacity of an Ethernet: Myths and Reality Theoretical work seems to suggest that Ethernet works saturate at 7%. Realistic networks can offer higher throughputs Lessons learnt Don
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)
ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor
More informationECE 158A: Lecture 5. Fall 2015
8: Lecture Fall 0 Routing ()! Location-ased ddressing Recall from Lecture that routers maintain routing tables to forward packets based on their IP addresses To allow scalability, IP addresses are assigned
More informationICS 451: Today's plan. Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing
ICS 451: Today's plan Network Layer Protocols: virtual circuits Static Routing Distance-Vector Routing Virtual Circuits: Motivation Implementing the routing table in hardware can be expensive to make it
More informationLecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?
Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning
More informationNetwork Control and Signalling
Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches
More informationFrom Routing to Traffic Engineering
1 From Routing to Traffic Engineering Robert Soulé Advanced Networking Fall 2016 2 In the beginning B Goal: pair-wise connectivity (get packets from A to B) Approach: configure static rules in routers
More informationComputer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)
Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP
More information2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept
//8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8
More informationRouting. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?
Routing 9: Intro to Routing lgorithms Last Modified: // :: PM : Netork Layer a- IP Routing each router is supposed to send each IP datagram one step closer to its Ho do they do that? Static Routing Hierarchical
More informationCSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)
S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access
More informationChapter 4: Network Layer
Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link
More informationRouting Algorithms. CS158a Chris Pollett Apr 4, 2007.
Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing
More informationChapter 4: Network Layer
hapter 4: Network Layer hapter goals: understand principles behind layer services: routing (path selection) dealing with scale how a router works advanced topics: IPv6, multicast instantiation and implementation
More informationCS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791
CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there
More informationSwitching and Forwarding
Switching and Forwarding Outline Store-and-Forward Switches ridges and Extended LNs ell Switching Segmentation and Reassembly Scalable Networks Switch forwards packets from input port to output port port
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationMain Challenge. Other Challenges. How Did it Start? Napster. Model. EE 122: Peer-to-Peer Networks. Find where a particular file is stored
Main hallenge ind where a particular file is stored : Peer-to-Peer Networks Ion Stoica (and righten Godfrey) Ts: Lucian Popa, avid Zats and Ganesh nanthanarayanan http://inst.eecs.berkeley.edu/~ee/ (Materials
More informationInterplay between routing, forwarding
Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationLecture 9. Network Layer (cont d) Network Layer 1-1
Lecture 9 Network Layer (cont d) Network Layer 1-1 Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest
More informationCS 5114 Network Programming Languages Control Plane. Nate Foster Cornell University Spring 2013
CS 5 Network Programming Languages Control Plane http://www.flickr.com/photos/rofi/0979/ Nate Foster Cornell University Spring 0 Based on lecture notes by Jennifer Rexford and Michael Freedman Announcements
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 5: Network Layer Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Contents The
More informationGIAN Course on Distributed Network Algorithms. Spanning Tree Constructions
GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.
More informationGIAN Course on Distributed Network Algorithms. Spanning Tree Constructions
GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.
More information