Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Similar documents
Chapter 4: Network Layer

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Step N' D(v),p(v) D(w),p(w) D(x),p(x) D(y),p(y) D(z),p(z) 0 u 7,u 3,u 5,u. N (uw) update D(v), D(x), D(y), D(z)

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 5 Network Layer

Initialization: Loop until all nodes in N

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

Computer Networking. Rou1ng Algorithms. Rou1ng Algorithms. Interplay between rou1ng, forwarding. routing algorithm

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Interplay between routing, forwarding

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Routing Algorithm Classification. A Link-State Routing Algorithm

Internet Technology 3/21/2016

Chapter 4: Network Layer

4.5 Routing Algorithms

Network Layer: Routing

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Lecture 13: Traffic Engineering

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

4.5.2 The Distance-Vector (DV) Routing Algorithm

CSCE 463/612 Networks and Distributed Processing Spring 2018

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

DATA COMMUNICATOIN NETWORKING

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Chapter 4: Network Layer, partb

VI. ROUTING. - "routing protocol" nodes exchange information to ensure consistent understanding of paths

Graph abstraction: costs. Graph abstraction 10/26/2018. Interplay between routing and forwarding

CSC 4900 Computer Networks: Routing Algorithms

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:

EE 122: Intra-domain routing

Chapter 4 Network Layer

Computer Networks. Instructor: Niklas Carlsson

CSc 450/550 Computer Networks Internet Routing

The Disciplined Flood Protocol in Sensor Networks

Announcement. Project 2 extended to 2/20 midnight Project 3 available this weekend Homework 3 available today, will put it online

Math 365 Wednesday 4/10/ & 10.2 Graphs

Chapter 4: Network Layer

Network Layer: Control Plane 5-2

Internet Protocol: Routing Algorithms. Srinidhi Varadarajan

IP Multicast Fault Recovery in PIM over OSPF

Agenda. distance-vector (what you invented last Friday) hierarchical routing routing in the Internet. v DNS assignment Q&A v Routing Algorithms

Routing in a network

Net Ne w t ork y La e y r Net Ne w t ork y La e y r Initial motivation: Net Ne w t ork y La e y r Net Ne w t ork y La e y r Net Ne w t ork

Chapter 4: Network Layer: Part II

ETSF05/ETSF10 Internet Protocols Routing on the Internet

Interplay tra routing e forwarding

Path Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley

Lecture 10: Addressing

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Routing Unicast routing protocols

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2017

Introduction to Intra-Domain Routing

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Routing. 4. Mar INF-3190: Switching and Routing

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Network layer. Network Layer 4-1. application transport network data link physical. network data link physical. network data link physical

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Missing Pieces of the Puzzle

Routing. Jens A Andersson Communication Systems

5.2 Routing Algorithms

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

Lecture 7: Data Center Networks

Chapter 4: outline. Network Layer 4-1

Computer Networks. Routing Algorithms

Lecture 9. Network Layer (cont d) Network Layer 1-1

Lecture 4. The Network Layer (cont d)

CSC 401 Data and Computer Communications Networks

Chapter IV: Network Layer

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

ETSF05/ETSF10 Internet Protocols. Routing on the Internet

Topics for This Week

COMP/ELEC 429/556 Introduction to Computer Networks

Network layer: Overview. Network layer functions Routing IP Forwarding

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview

CSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes

1048: Computer Organization

Computer Networking Introduction

Rectangle-of-influence triangulations

End-to-end path: route

Chapter 4: Network Layer

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

Module 8. Routing. Version 2 ECE, IIT Kharagpur

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

Transcription:

Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast) Each node shold receie the packet at least once. Efficient distribtion. The destination addresses are not knon. Problems: - Copies of data packets - Old packets - Seqence nmber oerflos Broadcast: send a message on all links Flooding Algorithms Spanning Tree On message on link i: Uncontrolled flooding: - send msg on all links j!i > ccles, broadcast storm seqence nmber controlled flooding: list of receied, dplicated, forarded messages - if in list: drop msg - else send msg on all links j!i Link on ith the message as first heard = reerse path to the sorce of the message. Efficient distribtion of information (broadcast) Roting on reerse path

Roting Distribted algorithm eected among the roters hich bilds the roting tables Optimiation based on roting metric (cost): dela, hops, congestion, qalit, batter, polic, etc. Design and ealation criteria: Scalabilit Speed of conergence Stabilit Roting: G=(N,E) Nodes: Roters and Hosts (,,,...) Edges: Links beteen nodes. Each edge has a Cost associated ith it. - c(,) = 1, c(,)=2, etc. Main Problem - Calclating the path ith the loest cost from sorce to destination: D(,) = min{path: sm of all edge costs c(.,.) oer the path} 2 1 2 5 1 3 2 4 3 Link-State Roting Assmptions: Each node knos the cost of the link of each its directl connected neighbors. Basic Idea: - Eer node knos ho to reach it s neighbors. - If this information is spread to eer node ia flooding, then eer node ill hae enogh information to determine the correct path to an node in the netork. In fact, eer node ill be able to bild a complete map of the netork. - This means that eer node ill eentall hae access to the same information, as eer other node. Link-State Roting 2 Link-State protocols rel on 2 things: - Reliable spreading of link-state information (Reliable Flooding) - Calclation of paths from the sm of all the accmlated link-state knoledge > e.g., Dijkstra-Algorithm - Notation Dijkstra-Algorithm D(): cost of least-cost path from sorce to p(): preios node along the crrent least-cost path from sorce to N : sbset of nodes; is in N = least cost from sorce to definitiel knon.

Dijkstra s Algorithm Initialisation: N = {} for all nodes n if n is a neighbor of then D(n)=c(,n) else D(n)=inf Dijkstra s Algorithm Loop: find m not in N sch that D(m) is a minimm: add m to N pdate D(n) for each neighbor n of m and not in N : D(n) = min(d(n), D(m)+c(m,n)) if ne D(n): p(n) = m ntil N =N step N D(), p() D(), p() D(), p() D(), p() D(), p() step N D(), p() D(), p() D(), p() D(), p() D(), p() 0 1, 5, 2, inf inf Distance-Vector Roting Each node knos the cost of the link of each its directl connected neighbors: initial forarding table. Periodicall each node transmits their table to all their neighbors. When a node receies sch a table it calclates the distance to the nodes on the receied table. If the node discoers a shorter path to a destination node, it s on table is pdated. If the table as pdated, the ne table is immediatel sent to the neighbors, otherise the node aits for a timeot or a ne message. Bellman-Ford Eqaltion d () = min{c(, ) + d ()} : neighbor of d(): least cost rote from to as seen from c(,): link cost on link from to

Vie of a Node A nodes roting table consists of triples in the form: <destination, cost, nethop> The messages sent are (pdate)lists containing tples in the form: <destination, cost> Rotig table for node : dest cost nethop 1 3 2 3 6 Algorithm Initialisation (at node s): for all dest d in N: Ds(d) = c(s,d) for each neighbor n Dn(d) = inf for all dest d in N send distance ector Ds = [Ds(d): d in N] to n Loop (at node s): ait (ntil c(s,n) changes for some neighbor n, or ntil receie Dn from some neighbor n) for each d in N: Ds(d) = min_n{c(s,n} + Dn(d)} if Ds(d) changed for an destination d send distance ector Ds = [Ds(d): d in N] to all neighbors n Notation: s sorce d destination n neighbor Link-Cost Changes 1) : =1, =1 > adertise 2) : =2, =1 > adertise 3) conergence cont-to-infinit problem: 1) : =6, =1 LOOP!! 2) : =7, =1... 3) : =8, =1...... 45) : =50, =1 (partial) Soltion: Poisoned Reerse annonces D()=inf if it rotes throgh to get to. Detection of Bad Links Roters periodicall send control packets hich hae to be acknoledged Roter epects periodic roting pdates or Hello messages from its neighbors Roting oscillations are aoided b k of n rle: a change is onl accepted if it persists dring at least k of n periods

Distance-Vector s. Link-State The difference beteen the to algorithms can be smmaried: - D.V.: Each node onl talks to its directl connected neighbors, bt sends its entire forarding table. simple to implement, simple to configre, bad conergence, bad scaling. - L.S.: Each node talks to all other nodes, bt onl tells them hat it knos for sre (i.e., the state of its directl connected links) fast conergence, generates less traffic, fast reaction on topolog changes, bad scaling Different Approaches to Roting Proactie s. reactie roting - proactie: constantl pdate roting tables for all nodes. - reactie: find a rote on demand (hen needed). Incremental forarding s. sorce roting - incremental: roters hae a forarding table specifing the net hop. - sorce roting: the rote a packet shold take is eplicitl stored in the packet. - loose sorce roting: onl a partial rote (sbset) is specified. Smmar of Roting Algorithms Flooding/Spanning Tree Link-State neighbors send to: eerone Distance-Vector eerone send to: neighbors Problem: Does not scale for large netorks like the Internet. 200 million hosts; netork of netorks $ tracerote.eth.ch 1 r1.n.it..se (130.238.8.1) 4.772 ms 2 l-2..se (130.238.6.238) 0.457 ms 3 2-fe2.snet.se (130.242.88.17) 1.364 ms 4 ppsala2-srp2.snet.se (130.242.85.162) 2.686 ms 5 stockholm2-pos0.snet.se (130.242.82.33) 4.070 ms 6 se-kth.nord.net (193.10.252.177) 2.591 ms 7 se-o.nord.net (193.10.252.42) 2.916 ms 8 dk-g2.nord.net (193.10.68.118) 11.817 ms 9 nordnet.rt1.cop.dk.geant2.net (62.40.124.45) 12.385 ms 10 so-7-3-0.rt1.fra.de.geant2.net (62.40.112.49) 24.939 ms 11 so-6-2-0.rt1.gen.ch.geant2.net (62.40.112.21) 33.028 ms 12 sice2-10ge-1-1.sitch.ch (62.40.124.22) 33.212 ms 13 sils2-10ge-1-3.sitch.ch (130.59.37.2) 34.002 ms 14 sie2-10ge-1-1.sitch.ch (130.59.36.206) 37.455 ms 15 ro-r-g-giga-to-sitch.eth.ch (192.33.92.1) 37.761 ms...

$ tracerote.bs.ch 1 r1.n.it..se (130.238.8.1) 9.989 ms 2 l-2..se (130.238.6.238) 0.591 ms 3 2-fe2.snet.se (130.242.88.17) 1.430 ms 4 ppsala2-srp2.snet.se (130.242.85.162) 1.346 ms 5 stockholm2-pos0.snet.se (130.242.82.33) 2.607 ms 6 stockholm4-pos0.snet.se (130.242.82.50) 2.873 ms 7 pos7-7.br1.stk2.alter.net (130.242.94.118) 3.564 ms 8 so-5-0-0.tr2.stk2.alter.net (146.188.6.85) 3.280 ms 9 so-2-0-0.tr2.r3.alter.net (146.188.3.82) 32.009 ms 10 so-6-0-0.r2.r4.alter.net (146.188.5.134) 32.288 ms 11 pos2-0.g4.r4.alter.net (146.188.4.194) 31.890 ms 12 bs-g.cstomer.alter.net (146.188.66.170) 33.284 ms...