Reasons for unnecessary route changes: (1) not knowing the cause

Slides:



Advertisements
Similar presentations
Power of a test. power The power of a test (against a specific alternative value) Is a tests ability to detect a false hypothesis Is the probability that.
Advertisements

LSRP: Local Stabilization in Shortest Path Routing Anish Arora Hongwei Zhang.
> >
University of Palestine software engineering department Testing of Software Systems Fundamentals of testing instructor: Tasneem Darwish.
Distance Vector Routing Protocols W.lilakiatsakun.
Count to infinity problem
Wireless TCP Prasun Dewan Department of Computer Science University of North Carolina
Quality Assurance.
Covering Prefixes Outbound Route Filter for BGP-4 draft-bonica-l3vpn-orf-covering-prefixes-01 H. Jeng, l. Jalil, R. Bonica, Y. Rekhter, K. Patel, L. Yong.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
3:00. 2:59 2:58 2:57 2:56 2:55 2:54 2:53 2:52.
PROTOCOL BASICS. 2 Introduction In chapter 3: Circuits and techniques can be employed to transmit a frame of information between 2 DTEs Error detection.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Network Hardware for Expanding Network
Exercises for Chapter 11: COORDINATION AND AGREEMENT
Distributed Systems Course Coordination and Agreement
Computer Communication & Networks
MODULE I NETWORKING CONCEPTS.
Java Programming Fifth Edition
CSE 486/586 Distributed Systems Failure Detectors
(How the routers’ tables are filled in)
Number for instant help.
Introduction to Software Testing Chapter 9.2 Program-based Grammars
Mistake proofing Mistake proofing is a scientific technique for improvement of operating systems including materials, machines and methods with an aim.
Instructor Mazhar Hussain
RSVP: A New Resource ReSerVation Protocol
Faults, Errors, Failures CS 4501 / 6501 Software Testing
Internet Networking recitation #4
Ivy Eva Wu.
CSE 486/586 Distributed Systems Failure Detectors
Distance-Vector Routing Protocols
CSE 486/586 Distributed Systems Failure Detectors
Steps to Fix ESET NOD32 Antivirus Error 0008 Call
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Flow Control.
Top Fire Protection Services Ottawa available on Dubinskyconstruction
BACK SOLUTION:
EEC4113 Data Communication & Multimedia System Chapter 5: Error Control by Muhazam Mustapha, August 2010.
Dynamic Routing Protocols part2
Hongwei Zhang Anish Arora
A stability-oriented approach to improving BGP convergence
IFPS Error Messages in Flight Plan Rejections
Kuliah 5 ROUTING.
Vidur Nayyar Xueting Wang Weicong Zhao
Introduction to Software Testing Chapter 5.2 Program-based Grammars
זכויות סוציאליות.
Different Testing Methodology
A Universal-Particular (U-P) argument
RFID for Patient Flow Management in Emergency Unit
خطوات البحث العلمي.
Lecture 7 review Consider a link running the Go-Back-N protocol. Suppose the transmission delay and propagation delay are both 1ms, the window size is.
Outline on the web (big file!) :
EEC 688/788 Secure and Dependable Computing
CSE 143 Java Exceptions 1/18/2019.
Foundations for Highly-Available Content-based Publish/Subscribe Overlays Young Yoon, Vinod Muthusamy and Hans-Arno Jacobsen.
Please use speaker notes for additional information!
Replicated state machine and Paxos
By Werner Vogels and Chris Re
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
The Transport Layer Reliability
By Werner Vogels and Chris Re
Distance Vector Routing Protocols
A Routing Protocol for WLAN Mesh
Distributed Systems Course Coordination and Agreement
DSDV Destination-Sequenced Distance-Vector Routing Protocol
CSE 486/586 Distributed Systems Failure Detectors
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Error Checking continued
Presentation transcript:

Reasons for unnecessary route changes: (1) not knowing the cause b c c withdraws its route f withdraws its route; but the withdrawal by e is delayed d e f Solution: propagate information about fault and its location g knows the invalidity of [e, c, a], and adopts [d, b, a] immediately g g will mistakenly regard route [e, c, a] as valid, and adopt it h

Reasons for unnecessary route changes : (2) uncertainty about fault type the fail-stop of links <a, b> and <a, c>, instead of the fail-stop of a, is detected b c b, c, e, f withdraw their routes; but the withdrawal by d is delayed d e f d withdraws its route Solution: G waits for certain time g will mistakenly regard [d, b, a] as valid, and adopt it g g withdraws its route h

Reasons for unnecessary route changes : (3) obsolete fault information <a, c> re-joins Information m0(<a, c>) is generated to signify the fail-stop of link <a, c> b c d e f m0(<a, c>) reaches f, but is delayed in reaching e c, f, and g change their routes back Delayed m0(<a, c>) reaches e, and then g g rejects the delayed m0(<a, c>), and does not change route g Solution: reject obsolete information by attaching seq. number to fault information g changes its route to [d, b, a] g changes its route to [d, b, a] h

Reasons for unnecessary route changes : (4) fault propagation state corruption at c: c withdraws its route b c c corrects its state Before the fault propagates to f, c corrects the state of itself Solution: execute “correction” action quicker than “propagation” action before c corrects its state, f withdraws its route. Thus, the fault at c propagates to f d f before f corrects its state, g changes its route. Thus, the fault at c propagates to g g h