COS 461: Computer Networks Spring 2014

Slides:



Advertisements
Similar presentations
Introduction to IP Routing Geoff Huston. Routing How do packets get from A to B in the Internet? A B Internet.
Advertisements

Outline  Recap Network components & basic mechanisms Routing Flow control  Continue Basic queueing analysis Construct routing table.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Recitation 5 COS 461. Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False.
Distance-Vector and Path-Vector Routing Sections , 4.3.2, COS 461: Computer Networks Spring 2011 Mike Freedman
1 Tutorial 5 Safe “Peering Backup” Routing With BGP Based on:
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Computer Networks Layering and Routing Dina Katabi
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
ITI-510 Computer Networks ITI 510 – Computer Networks Meeting 3 Rutgers University Internet Institute Instructor: Chris Uriarte.
Routing Protocols Brandon Wagner.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Internet Routing 11/11/2009. Admin. r Assignment 3 2.
14 – Inter/Intra-AS Routing
Chapter 4: Network Layer
Working at a Small-to-Medium Business or ISP – Chapter 6
CS 3700 Networks and Distributed Systems
CS 5565 Network Architecture and Protocols
CS 3700 Networks and Distributed Systems
Routing Jennifer Rexford.
Routing: Link State Algorithm
(How the routers’ tables are filled in)
Border Gateway Protocol
ICMP ICMP – Internet Control Message Protocol
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Chapter 4 Network Layer A note on the use of these ppt slides:
COMP 3270 Computer Networks
TODAY’S TENTATIVE AGENDA
COS 561: Advanced Computer Networks
BGP supplement Abhigyan Sharma.
Distance Vector Routing
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Net 323 D: Networks Protocols
Net 323 D: Networks Protocols
(How the routers’ tables are filled in)
COS 461: Computer Networks Spring 2013
E : Internet Routing Lecture 5 Fundamentals of Routing Protocols
Department of Computer and IT Engineering University of Kurdistan
COS 561: Advanced Computer Networks
Routers Routing algorithms
CS 3700 Networks and Distributed Systems
Intradomain Routing Outline Introduction to Routing
COS 561: Advanced Computer Networks
Inter-domain Routing Outline Homework #3 solutions
Chapter 4: Network Layer
Switch controller: Routing
CS 3700 Networks and Distributed Systems
Chapter 4: Network Layer
COS 561: Advanced Computer Networks
Chapter 4: Network Layer
Communication Networks
Working at a Small-to-Medium Business or ISP – Chapter 6
COMP/ELEC 429/556 Introduction to Computer Networks
COS 461: Computer Networks
Chapter 4: Network Layer
Communication Networks
BGP Instability Jennifer Rexford
Computer Networks Protocols
Network Layer: Internet Inter-Domain Routing
Presentation transcript:

COS 461: Computer Networks Spring 2014 Routing Recitation #5 COS 461: Computer Networks Spring 2014

Link State (Djikstra’s) dest link b (a,?) 6 e d c (a,?) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,?) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,?) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,?) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,f) a f 4 f (a,?)

Link State (Djikstra’s) dest link b (a,b) 6 e d c (a,f) 4 22 7 d (a,f) b c 7 10 18 e (a,f) a f 4 f (a,f)

Which routing protocol requires the least amount of state on the router? link state distance vector path vector

Which routing protocol requires the least amount of state on the router? link state distance vector path vector D_x(y) = cost of least-cost path from x to y Update distances based on neighbors Path vector: send the entire path for each destination d

Which of the following, if true, ensures packets from a to e always traverse c? B. Y > X + 1 C. Y > X D. A or B D

Which of the following, if true, ensures packets from a to e always traverse c? B. Y > X + 1 C. Y > X D. A or B D

Which of the following, if true, ensures packets from b to e always traverse d? B. Y > X + 1 C. Y > X D. A or B B

Which of the following, if true, ensures packets from b to e always traverse d? B. Y > X + 1 C. Y > X D. A or B B

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C 11 D

Distance Vector Routing Initial Routing table at E 18 C 21 11 12 5 A D E 15 17 Initial Routing table at E Destination Cost Next Hop A Inf --- B C 11 D 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 11 12 5 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A Inf --- B C 11 D 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B Inf --- C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 17

Distance Vector Routing Routing table at E after one iteration 18 C 21 12 5 11 A D E 15 17 Routing table at E after one iteration Destination Cost Next Hop A 32 D B 29 C 11 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 32 D B 29 C 11 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 29 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing Routing table at E after two iterations 18 C 21 12 5 11 A D E 15 17 Routing table at E after two iterations Destination Cost Next Hop A 31 C B 28 11 D 16

Distance Vector Routing B 18 C X 12 5 11 A D E 15 17 For what value of x does the routing table at E not change anymore after two iterations? For all X >= 2 For all X >= 3 For all X <= 4 For all X <= 3

Distance Vector Routing B 18 C X 5 11 12 A D E 15 17 For what value of x does the routing table at E not change anymore after two iterations? If x =2, the routing table will change: E->A is through C, distance 30 instead of 31 through D (2nd hop) For all X >= 2 For all X >= 3 For all X <= 4 For all X <= 3

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why?

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why? Don’t export routes learned from a peer or provider to another peer or provider

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why?

AS X would have to pay AS U whereas it could go through AS Y for free Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why? AS X would have to pay AS U whereas it could go through AS Y for free

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why?

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why? Y and Z would prefer the peering link over the provider link through W to save money.

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why?

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why? AS Z would not advertise a route to its provider, AS W, to its peer, AS Y, and vice versa

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why?

Border Gateway Protocol (BGP) Assuming standard BGP routing policies (Gao-Rexford model), will packets take the drawn path? True or False Why? AS X would not advertise a peer link to its provider, AS U (it would pay for being a middle man)

Routing Loops b d 2 1 a 1 c e 1 2 If the link (c – e) fails, and the nodes run a link-state routing protocol, can a temporary forwarding loop occur? If so, which node pairs may see their traffic loop?

Routing Loops b d 2 1 a 1 c e 1 2 Nodes a, c, d, and e could potentially see their outgoing packets loop. a  e c <-> e d  c

Routing Loops b d 2 1 a 1 c e 1 2 Suppose network operator Olivia decides to bring down the link c – e for maintenance. Olivia figures she can issue a series of link weight changes in the network to shift traffic away from c – e such that no temporary forwarding loops occur. She’s right; what series of changes to c – e’s weight would achieve this?

Routing Loops b d 2 1 a 1 c e 1 2 Change c – e weight to 4. a to e moves to a – b. c to e remains on c – e. c to d? d to c moves to d – b. e to c remains on c – e.

Routing Loops b d 2 1 a 1 c e 1 2 Change c – e weight to 6. c to e moves to c – a. e to c moves to e – d. No traffic left on c – e. Olivia can bring down the link.

b->a->d h->e->d f->e->d c->b->e->d BGP Routing Peer ----- Peer Provider -> Customer 1. Which of the following paths to d are valid? b->a->d h->e->d f->e->d c->b->e->d

b->a->d h->e->d f->e->d c->b->e->d BGP Routing Peer ----- Peer Provider -> Customer 1. Which of the following paths to d are valid? Not c because don’t export paths through peers to other peers b->a->d h->e->d f->e->d c->b->e->d

e->b->c->f->i e->d->g->h->i BGP Routing Peer ----- Peer Provider -> Customer 2. Which path does e take to reach i ? e->h->i e->f->i e->b->c->f->i e->d->g->h->i

e->b->c->f->i e->d->g->h->i BGP Routing Peer ----- Peer Provider -> Customer 2. Which path does e take to reach i ? H would be paying to be the middle man, E would be paying B and f would be paying C, and then G would be paying to be the middle man e->h->i e->f->i e->b->c->f->i e->d->g->h->i

e->b->c->f->i e->d->g->h->i BGP Routing Peer ----- Peer Provider -> Customer 3. If the link e-f is removed then which path does e take to reach i ? e->h->i e->f->i e->b->c->f->i e->d->g->h->i

e->b->c->f->i e->d->g->h->i BGP Routing Peer ----- Peer Provider -> Customer 3. If the link e-f is removed then which path does e take to reach i ? Not a because h would be paying to be the middle man e->h->i e->f->i e->b->c->f->i e->d->g->h->i

e->h e->f f->i d->g c->f BGP Routing Peer ----- Peer Provider -> Customer 4. Suppose AS b provides a dump of all BGP routes they learn for every destination and we use them to reconstruct the AS-level topology, which of the following business relations will be missing ? e->h e->f f->i d->g c->f

e->h e->f f->i d->g c->f BGP Routing Peer ----- Peer Provider -> Customer 4. Suppose AS b provides a dump of all BGP routes they learn for every destination and we use them to reconstruct the AS-level topology, which of the following business relations will be missing ? e->h e->f f->i d->g c->f

a and h a and c a, b and h a, b and c h BGP Routing Peer ----- Peer Provider -> Customer 5. What is the minimum set of ASes that must provide “dumps” of every AS path they learn for every edge in the graph to be visible in at least one dump? a and h a and c a, b and h a, b and c h

a and h a and c a, b and h a, b and c h BGP Routing Peer ----- Peer Provider -> Customer 5. What is the minimum set of ASes that must provide “dumps” of every AS path they learn for every edge in the graph to be visible in at least one dump? a and h a and c a, b and h a, b and c h

BGP Routing 6. BGP supports flexible routing policies. Internet Service Providers (ISPs) often have a “prefer customer” policy where they prefer to route through a customer, even if a shorter route exists through a peer or provider. Why? How is this policy realized in BGP?

BGP Routing 6. BGP supports flexible routing policies. Internet Service Providers (ISPs) often have a “prefer customer” policy where they prefer to route through a customer, even if a shorter route exists through a peer or provider. Why? How is this policy realized in BGP? Directing traffic through a customer generates revenue, whereas sending through a peer or provider is (at best) revenue neutral and may, in fact, cost money.   The policy is realized in BGP by having an import policy that assigns a higher local-preference value to routes learned from customer ASes.