Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #06: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.

Slides:



Advertisements
Similar presentations
Routing Protocol.
Advertisements

Computer Networks with Internet Technology William Stallings
Courtesy: Nick McKeown, Stanford
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Interior Gateway Protocols: RIP & OSPF Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
RD-CSY3021 Comparing Routing Protocols. RD-CSY3021 Criteria used to compare routing protocols includes  Time to convergence  Proprietary/open standards.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Exterior Gateway Protocols: EGP, BGP-4, CIDR Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Extending Networks. Three Levels of Extension Physical Layer –Repeaters Link Layer –Bridges –Switches Network –Routers: “Connecting networks”
Routing and Routing Protocols
Routing.
COS 420 Day 17. Agenda Finished Grading Individualized Projects Very large disparity in student grading No two students had same ranking for other students.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Informal Quiz 3 True or False? T F  Forwarding works in the control plane whereas routing.
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
Delivery, Forwarding, and Routing
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.5 Routing algorithms m Link state m Distance.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 2 Shivkumar Kalyanaraman:
1 Distance Vector Routing Protocols Dr. Rocky K. C. Chang 14 November 2006.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
TCP/IP Protocol Suite 1 Chapter 14 Upon completion you will be able to: Unicast Routing Protocols: RIP, OSPF, and BGP Distinguish between intra and interdomain.
Network Layer Goals: understand principles behind network layer services: –routing (path selection) –dealing with scale –how a router works –advanced topics:
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Review Routing fundamental W.lilakiatsakun. Review Routing Fundamental VLSM VLSM Route Summarization Route Summarization Static & Dynamic Routing Static.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #03 SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
1 Routing Table  The seven fields Mask: for finding (sub)network address of the destination l Host-specific routing: (/32) l Default routing:
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #08: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Routing and Routing Protocols
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
1 Version 3.1 Module 6 Routed & Routing Protocols.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Chapter 20 Unicast Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Routing Protocols Brandon Wagner.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Ch 22. Routing Direct and Indirect Delivery.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Inter-domain Routing Outline Border Gateway Protocol.
4. Interconnecting Networks: Routers. © Tallal Elshabrawy 2 Bridges Vs Routers BRIDGES DO WELL IN SMALL (FEW HUNDRED HOSTS) WHILE ROUTERS USED IN LARGE.
22.1 Network Layer Delivery, Forwarding, and Routing.
Preliminaries: EE807 Software-defined Networked Computing KyoungSoo Park Department of Electrical Engineering KAIST.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Computer Networks Routing Algorithms.
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
COMP 3270 Computer Networks
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing.
Dynamic Routing and OSPF
ECSE-4670: Computer Communication Networks (CCN)
Routing.
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #06: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI” Informal Quiz #06: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 Routing I: Informal Quiz Solutions

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 Routing: Basic Ideas T F    Forwarding works in the control plane whereas routing works in the data plane   Forwarding is an example of resolving an indirection (I.e. binding), and the routing table is the aid used.    Routing tables are always necessary for the filtering and forwarding decision   A routing protocol summarizes global information to setup a local next-hop entry in the forwarding table    Internet routing guarantees that packets forwarded by using the routing tables at routers will ultimately reach their destination   The internet routing infrastructure continuously works to increase the probability that packets forwarded using the routing tables will ultimately reach their destination.    Internet routing guarantees shortest paths from source to destinations   When the flag field in a host routing table is U, it means the corresponding interface (and peer) is likely to be up and working   Layer 2 (bridge) forwarding tables tend to be inefficient when topology becomes large and highly dynamic

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 Routing: Basic Ideas.    A L3 routing protocol is always needed to make changes in a forwarding table.   Bridges resort to flooding of data packets when they do not find a match for the packet’s destination address in the forwarding table    Routers resort to flooding of data packets when they do not find a match for the packet’s destination address in the forwarding table    It is possible that a L3 lookup in a forwarding table will not lead to any matches.   It is possible that a L3 lookup in a forwarding table will lead to multiple matches due to the practice of supernetting (CIDR): this situation is resolved using the longest-prefix-match rule.   Bridges coordinate with other bridges only to make sure that the flooding of packets does not go out of control (using a tree-topology to guide and filter flooding)   ARP requests, multicast traffic and poorly populated L2 bridging tables can lead to “broadcast storms” on extended LANs: a factor limiting scalability of L2 bridged networks

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 Routing: Basic Ideas..    Routing algorithms always build a comprehensive view (a map or graph) of the network and figure out next-hops to all destinations from these views.   There is usually a tradeoff between consistency and completeness in routing design (assuming limited scale networks).   If the topology is simple, the networks are small, and the network management goals are simple, then a simple routing protocol (eg: RIP) is preferred to complex routing protocols (eg: OSPF, IS-IS).   Both the goals: consistency and completeness, put a limit on scalability of the routing protocol. This is one of the motivations for hierarchical routing (eg: OSPF and IS-IS areas, PNNI peer-groups, and the split between inter- and intra-domain routing).    Global state of large, dynamic networks can be quickly and easily collected, and processed to create routing tables.    The internet uses a signaled approach to routing state establishment    When a routing protocol is in its transient phase (I.e. it has not converged), we can safely say that its routing tables are consistent

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 Routing: Basic Ideas…   Inconsistent routing tables lead to wandering or looping packets.    Delay-sensitive, fragile applications (eg: internet telephony, interactive multimedia) can function quite well over networks that have a high probability of being inconsistent in terms of routing table states.   A simple consistency criterion is usually necessary in a fully- distributed routing approach to quickly converge to consistent routing tables.   With a complete view of the network topology and dynamic state, more sophisticated routing and traffic engineering decisions (eg: multi-path or QoS routing) can be performed by the routing algorithms.   Telephony uses an explicit, source-based routing approach.   Centralized routing is not even used in relatively small networks because it is prone to failures and traffic surges   The term “hop-by-hop” routing is used often instead of the term “fully distributed routing”    The “loose source routing” option is quite frequently used in practice in the Internet.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 Routing: Basic Ideas….    Routed is an example of a static routing protocol   The basic routing architecture in telephony is much simpler than the dynamic routing infrastructure of the Internet   The “dumb” network analogy does not apply to the control-plane architecture (I.e. routing protocols) of the Internet    Like the telephone networks (and its derivatives: frame-relay and ATM networks), the Internet also attempts to provide end-to-end QoS (I.e. quality-of-service) routing   The core topology of the telephone network is extremely simple (I.e. full mesh) and reliable, which facilitates a fairly simple routing approach    Reliable and robust hardware and software components lead to huge surges of routing control traffic for conservatively sized and engineered networks.   The telephone network builds in an alternate path routing mechanism to reduce the call-blocking probability.    Telephone networks are organized as multiple autonomous systems and have multiple AS numbers within a single organization

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 Routing: Basic Ideas…..    All intra-domain routing protocols provide support for sophisticated traffic engineering features   One of the key goals of an inter-domain routing protocol is to allow policy-based path selection.    Inter-domain routing protocols guarantee stability and reachability.   Border routers in an AS may participate in both intra-domain and inter- domain routing   Inter-domain routing may be understood as a routing protocol operating at a higher level of abstraction, I.e. providing routes between “virtual nodes” that are in fact “autonomous systems”   Source-based (or loose-source) routing methods typically encode the route in the packet header and/or pre-setup the route using a signaling protocol    Distance vector protocol collects dynamic state about every link in the network    A path-vector protocol collects dynamic state about every possible path in the network

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 Routing: Basic Ideas….    The maps collected by link state algorithms (link state databases) are guaranteed to be consistent at all times.   Link state algorithms exchange more state information, but they tend to converge to consistent routing tables faster than simple distance-vector algorithms, especially for larger dynamic networks   Distance vector algorithms collect per-node distance information in order to compute routes    The final result of a routing algorithm is the enumeration of all possible routes to every destination in the network.   The distance-vector protocol involves checking neighbors’ distance vectors and updating its own distance vector.   Both the distance-vector and link-state approaches could lead to transient routing loops because the information maintained could be incomplete.   The simple consistency criterion used both by link state and distance vector algorithms in the Internet is that: “a subset of a shortest path is also a shortest path between the intermediate nodes”

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 Routing: Basic Ideas…..   After m-iterations of both the distance vector or link state approach, the algorithm is dealing with a m-hop view of the network from the source node   Even though both LS and DV algorithms deal with the same effective network view after m-iterations, the LS algorithm has more information, and the DV algorithm performs each iteration only after further information exchange with neighbors    Bellman-Ford is an example of a link-state routing algorithm   The count-to-infinity problem is an example of inconsistency issues in distance vector methods.    The poisoned reverse modification of DV algorithm eliminates all forms of inconsistency problems in DV protocols   The poisoned reverse modification of DV algorithm is less effective in cases where the cost of a remote link (not the first or second) in a path increases (because bad-news travels slowly).   The link state method does not face the count-to-infinity problem because it has complete global information (a map in terms of link-states).

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 11 Routing: Basic Ideas……    The Dijkstra algorithm greedily relaxes edges of all nodes at the beginning (I.e. initialization) of the algorithm   The Dijkstra algorithm computes the shortest-path-tree (SPT) that is a spanning tree to all nodes rooted at the source node   Hierarchical addressing, and proper address assignment allows entire subnets to be viewed by interior routers as “virtual nodes”, leading to routing scalability    Hierarchical addressing leads to optimal (I.e. shortest) routes between all pairs of nodes in the network