Border Gateway Protocol

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Quality of Service Requirements
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Chapter 30 Quality of Service
CS 408 Computer Networks Congestion Control (from Chapter 05)
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
Chapter 12 Transmission Control Protocol (TCP)
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
24.1 Chapter 24 Congestion Control and Quality of Service ICE302 Term # 2 Lecture # 3 Md. Asif Hossain.
Providing QoS in IP Networks
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Congestion Control in Data Networks and Internets
QoS & Queuing Theory CS352.
Topics discussed in this section:
Congestion Control and
Congestion Control, Quality of Service, and Internetworking
Buffer Management in a Switch
Congestion Control Evaluation in Dynamic Network
Queue Management Jennifer Rexford COS 461: Computer Networks
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Net 323 D: Networks Protocols
Chapter 25 Multimedia TCP/IP Protocol Suite
Net 323 D: Networks Protocols
CONGESTION CONTROL.
CONGESTION CONTROL, QUALITY OF SERVICE, & INTERNETWORKING
William Stallings Data and Computer Communications
CprE 458/558: Real-Time Systems
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Process-to-Process Delivery:
Advanced Computer Networks
Congestion Control in Data Networks and Internets
Data Communication Networks
Congestion Control (from Chapter 05)
PRESENTATION COMPUTER NETWORKS
Switching Techniques.
Computer Science Division
Congestion Control, Quality of Service, & Internetworking
Congestion Control (from Chapter 05)
Figure Areas in an autonomous system
Congestion Control (from Chapter 05)
Congestion Control Reasons:
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Process-to-Process Delivery: UDP, TCP
Congestion Control (from Chapter 05)
Computer Networks Protocols
Presentation transcript:

Border Gateway Protocol

Intra-AS v.s. Inter-AS Intra-AS Inter-AS

2 Types of Routing Protocols

Path vector routing Path vector v.s. Distance vector Speaker node creates a routing table advertises routing table to speaker nodes in the neighboring ASs.

Initial routing tables in path vector routing

Stabilized tables for four ASs

BGP Messages BGP messages exchanged using TCP on port 179.

BGP Function BGP provides each AS a means to: Obtain subnet reachability information from neighboring ASs. Propagate reachability information to all AS-internal routers. Determine “good” routes to subnets based on reachability information and policy. allows subnet to advertise its existence to rest of Internet: “I am here”

Distributing reachability info using eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1. 1c can then use iBGP do distribute new prefix info to all routers in AS1 1b can then re-advertise new reachability info to AS2 over 1b-to-2a eBGP session when router learns of new prefix, it creates entry for prefix in its forwarding table. eBGP session 3c iBGP session 2c 3a 3b 2a AS3 2b 1c AS2 1a 1b AS1 1d

Why different Intra- and Inter-AS routing ? Policy: Inter-AS: admin wants control over how its traffic routed, who routes through its net. Intra-AS: single admin, so no policy decisions needed Scale: hierarchical routing saves table size, reduced update traffic Performance: Intra-AS: can focus on performance Inter-AS: policy may dominate over performance

CHAPTER 24 Congestion Control and Quality of Service

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one of two things must happen: The subnet must prevent additional packets from entering the congested region until those already present can be processed. The congested routers can discard queued packets to make room for those that are arriving.

Factors that Cause Congestion Packet arrival rate exceeds the outgoing link capacity. Insufficient memory to store arriving packets Bursty traffic Slow processor

Congestion control and quality of service are two issues so closely bound together that improving one means improving the other and ignoring one usually means ignoring the other.

For real-time voice or video it is probably better to Load Shedding When buffers become full, routers simply discard packets. Which packet is chosen to be the victim depends on the application and on the error strategy used in the data link layer. For a file transfer, for, e.g. cannot discard older packets since this will cause a gap in the received data. For real-time voice or video it is probably better to throw away old data and keep new packets. Get the application to mark packets with discard priority.

So the policy for file transfer is called WINE(old is better than new ). And the policy for multimedia is called MILK(new is better than old )

24-1 DATA TRAFFIC The main focus of congestion control and quality of service is data traffic. In congestion control we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself.

An important issues in Packet Switched Network i.e congestion

Traffic Descriptor Traffic descriptors are qualitative values that represent a data flow.

Figure 24.1 Traffic descriptors

Traffic Profiles For our purposes, a data flow can have one of the following traffic profiles: constant bit rate, variable bit rate, or bursty In the bursty data category, the data rate changes suddenly in a very short time. It may jump from zero, for example, to 1 Mbps in a few microseconds and vice versa

Figure 24.2 Three traffic profiles

Topics discussed in this section: 24-2 CONGESTION Congestion in a network may occur if the load on the network—the number of packets sent to the network—is greater than the capacity of the network—the number of packets a network can handle. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. Topics discussed in this section: Network Performance

Figure 24.3 Queues in a router it undergoes three steps before departing,

There are mainly two issues which cause congestion. The first issues is that if the rate of the packet arrival is higher than the packet processing rate, input queue becoming longer and longer. If the packet departure rate is less than the packet processing rate the output queue become longer and longer

Figure Packet delay and throughput as functions of load

Topics discussed in this section: 24-3 CONGESTION CONTROL Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. In general, we can divide congestion control mechanisms into two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal). Topics discussed in this section: Open-Loop Congestion Control Closed-Loop Congestion Control

Figure 24.5 Congestion control categories Timer

The retransmission policy and the retransmission timers must be designed to optimize efficiency and at the same time prevent congestion

If the receiver does not acknowledge every packet it receives, it may slow down the sender and help prevent congestion The Selective Repeat window is better than the Go-Back-N window for congestion control.

A good discarding policy by the routers may prevent congestion and at the same time may not harm the integrity of the transmission A router can deny establishing a virtual circuit connection if there is congestion in the network or if there is a possibility of future congestion.

Figure 24.6 Backpressure method for alleviating congestion

Figure 24.7 Choke packet

Selective repeat window is better Should send cumulative ack Higher priority packets should not be discard

Implicit- by symptom source will aware about congestion in network Explicit signal- send control data Backward signaling- warning source (opposite direction to congestion) Forward signaling

Implicit- by symptom source will aware about congestion in network Explicit signal- send control data Backward signaling- warning source (opposite direction to congestion) Forward signaling

Topics discussed in this section: 24-6 TECHNIQUES TO IMPROVE QoS In Section 24.5 we tried to define QoS in terms of its characteristics. In this section, we discuss some techniques that can be used to improve the quality of service. We briefly discuss four common methods: scheduling, traffic shaping, admission control, and resource reservation. Topics discussed in this section: Scheduling Traffic Shaping Resource Reservation Admission Control

Different applications need different bandwidths Different applications need different bandwidths. In video conferencing we need to send millions of bits per second to refresh a color screen while the total number of bits in an e-mail may not reach even a million. Again applications can tolerate delay in different degrees Source-to-destination delay is another flow characteristic For example, it is more important that electronic mail, file transfer, and Internet access have reliable transmissions than telephony or audio conferencing. In this case, telephony, audio conferencing, video conferencing, and remote log-in need minimum delay, while delay in file transfer or e-mail is less important. Reliability is a characteristic that a flow needs. Lack of reliability means losing a packet or acknowledgment, which entails retransmission. Jitter is the variation in delay for packets belonging to the same flow. For example, if four packets depart at times 0, 1, 2, 3 and arrive at 20, 21, 22, 23, all have the same delay, 20 units of time. On the other hand, if the above four packets arrive at 21, 23, 21, and 28, they will have different delays: 21,22, 19, and 24. Jitter is defined as the variation in the packet delay. High jitter means the difference between delays is large; low jitter means the variation is small.

TECHNIQUES TO IMPROVE QoS

Figure 24.16 FIFO queue In first-in, first-out (FIFO) queuing, packets wait in a buffer (queue) until the node (router or switch) is ready to process them. If the average arrival rate is higher than the average processing rate, the queue will fill up and new packets will be discarded. A FIFO queue is familiar to those who have had to wait for a bus at a bus stop. Figure shows a conceptual view of a FIFO queue.

Figure 24.17 Priority queuing In priority queuing, packets are first assigned to a priority class. Each priority class has its own queue. The packets in the highest-priority queue are processed first. Packets in the lowest-priority queue are processed last. A priority queue can provide better QoS than the FIFO queue because higher priority traffic, such as multimedia, can reach the destination with less delay.

Figure 24.18 Weighted fair queuing A better scheduling method is weighted fair queuing. In this technique, the packets are still assigned to different classes and admitted to different queues. The queues, however, are weighted based on the priority of the queues; higher priority means a higher weight. The system processes packets in each queue in a round-robin fashion

Traffic Shaping Traffic shaping is a mechanism to control the amount and the rate of the traffic sent to the network. Two techniques can shape traffic: leaky bucket and token bucket

rate can vary, but the output rate remains constant . E.g. 1024 bytes per tick will allow one 1024-byte packet or two 512-byte packets or four 256-byte packets on 1 tick. Figure 24.19 Leaky bucket If a bucket has a small hole at the bottom, the water leaks from the bucket at a constant rate as long as there is water in the bucket. The rate at which the water leaks does not depend on the rate at which the water is input to the bucket unless the bucket is empty The input rate can vary, but the output rate remains constant

Figure 24.20 Leaky bucket implementation A host sends a burst of data at a rate of 12 Mbps for 2 s, for a total of 24 Mbits of data. The host is silent for 5 s and then sends data at a rate of 2 Mbps for 3 s, for a total of 6 Mbits of data. In all, the host has sent 30 Mbits of data in lOs.

Note A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full.

The token bucket allows bursty traffic at a regulated maximum rate. Note The token bucket allows bursty traffic at a regulated maximum rate.

Figure 24.21 Token bucket

The Leaky Bucket Algorithm The Leaky Bucket Algorithm used to control rate in a network. It is implemented as a single-server queue with constant service time. If the bucket (buffer) overflows then packets are discarded.

The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.

Leaky Bucket Algorithm, cont. The leaky bucket enforces a constant output rate (average rate) regardless of the burstiness of the input. Does nothing when input is idle. The host injects one packet per clock tick onto the network. This results in a uniform flow of packets, smoothing out bursts and reducing congestion. When packets are the same size (as in ATM cells), the one packet per tick is okay. For variable length packets though, it is better to allow a fixed number of bytes per tick

Token Bucket Algorithm In contrast to the LB, the Token Bucket Algorithm, allows the output rate to vary, depending on the size of the burst. In the TB algorithm, the bucket holds tokens. To transmit a packet, the host must capture and destroy one token. Tokens are generated by a clock at the rate of one token every t sec. Idle hosts can capture and save up tokens (up to the max. size of the bucket) in order to send larger bursts later.

The Token Bucket Algorithm 5-34 (a) Before. (b) After.

Leaky Bucket vs Token Bucket LB discards packets; TB does not. TB discards tokens. With TB, a packet can only be transmitted if there are enough tokens to cover its length in bytes. LB sends packets at an average rate. TB allows for large bursts to be sent faster by speeding up the output. TB allows saving up tokens (permissions) to send large bursts. LB does not allow saving.