Berkeley slides were used for this tutorial 1 Internet Networking Spring 2002 Tutorial 3 DUAL Algorithm.

Slides:



Advertisements
Similar presentations
CSE 561 – Bridging and Routing David Wetherall Spring 2000.
Advertisements

RIP V2 CCNP S1(5), Chapter 4.
Chapter 4 Distributed Bellman-Ford Routing
Routing: Cores, Peers and Algorithms
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—3-1 Medium-Sized Routed Network Construction Reviewing Routing Operations.
1 LINK STATE PROTOCOLS (contents) Disadvantages of the distance vector protocols Link state protocols Why is a link state protocol better?
Berkeley slides were used for this tutorial 1 Internet Networking Spring 2003 Tutorial 3 DUAL Algorithm.
Routing So how does the network layer do its business?
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Distance-Vector Routing COS 461: Computer Networks Spring 2010 (MW 3:00-4:20 in COS 105) Michael Freedman
Chapter 4 IP Routing Professor Rick Han University of Colorado at Boulder
RD-CSY /09 Distance Vector Routing Protocols.
TNMK09 Computer Networks Copyright © 2005 Di Yuan, ITN, LiTH 1  Non-hierarchical routing, static or dynamic, won’t work in the Internet  None of the.
Routing.
CSE 461: Distance Vector Routing. Next Topic  Focus  How do we calculate routes for packets?  Routing is a network layer function  Routing Algorithms.
Berkeley slides were used for this tutorial1 Internet Networking Spring 2006 Tutorial 2 DUAL Algorithm.
1 Distance Vector Routing Protocols Dr. Rocky K. C. Chang 14 November 2006.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Distance Vector Routing.
Ad Hoc Wireless Routing COS 461: Computer Networks
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How Routing Works INTRO v2.0—4-1.
Computer Networks Layering and Routing Dina Katabi
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Routing Concepts Warren Toomey GCIT. Introduction Switches need to know the link address and location of every station. Doesn't scale well, e.g. to several.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
Slide /2009COMM3380 Routing Algorithms Distance Vector Routing Each node knows the distance (=cost) to its directly connected neighbors A node sends.
Routing Protocols RIP, OSPF, BGP. A Routing Protocol’s Job Is to Find a “Best” Path between Any Pair of Nodes Routers in a network exchange their routing.
1 Routing. 2 Routing is the act of deciding how each individual datagram finds its way through the multiple different paths to its destination. Routing.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Dynamic Routing Protocol EIGRP Enhanced Interior Gateway Routing Protocol (EIGRP) is an advanced distance vector routing protocol developed by Cisco.
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
Enhanced Interior Gateway Routing Protocol EIGRP 1.
1 CSE524: Lecture 12 Network layer Functions. 2 Where we’re at… Internet architecture and history Internet protocols in practice Application layer Transport.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
CO5023 EIGRP. Features of EIGRP EIGRP is a highly advanced distanced vector routing protocol Uses Protocol dependent modules to route different packets.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Distance Vector Routing
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
Network Layer.
CS 5565 Network Architecture and Protocols
Centralized vs Distributed Routing
Rip Routing Protocol.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing.
Mobile Computing CSE 40814/60814 Spring 2018.
CS 3700 Networks and Distributed Systems
RFC 1058 & RFC 2453 Routing Information Protocol
CS 3700 Networks and Distributed Systems
Chapter 22. Network Layer: Routing
Communication Networks
Advanced Computer Networks
COMPUTER NETWORKS CS610 Lecture-41 Hammad Khalid Khan.
Communication Networks
Chapter 4: Network Layer
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Network Layer.
Computer Networks Protocols
Routing.
Unit 7 EIGRP Chapter 13 Using EIGRP in Enterprise Networks
Presentation transcript:

Berkeley slides were used for this tutorial 1 Internet Networking Spring 2002 Tutorial 3 DUAL Algorithm

2 The Distributed Update Algorithm (DUAL) J.J. Garcia-Luna-Aceves [SIGCOMM’89] Aims at removing transient loops in both DV and LS routing protocols Based on: –“diffusion” algorithm proposed by Dijkstra/Scholten –observation that one cannot create a loop by picking a shorter path to the destination

3 DUAL Data Structures Array d[k,j] contains distance from each neighbor k to each destination j Array l[k] contains cost of link between local router and each neighbor k d[] is obtained from distance vectors advertised by neighbors l[] is locally configured

4 Optimization Criteria Each router minimizes the cost to each destination by selecting a particular neighbor x that minimizes: –cost to j = l[x] + d[x,j] If an update l’[k] or d’[k,j] arrives such that (l’[k] + d’[k,j]) < (l[x]+d[x,j]): –adopt k as new next hop and announce to neighbors (shorter is always ok)

5 Path Selection If an update arrives that is > than the existing choice, do not take any action –Exception: if the cost is an increase using the current selected neighbor x, first look for an “acceptable neighbor” In such cases, acceptable neighbors are: –any k for which d[k,j] < local cost to j prior to the update

6 Selecting Among Neighbors If the set of acceptable neighbors is not empty, select the acceptable neighbor k that minimizes: –l[k] + d[k,j] If the set is empty, must engage in “diffusion” computation during which route entry for the destination j is frozen (not able to be updated)

7 Diffusion Process Routing entry frozen (like holddown - no loops, but black hole to destination) Send a query message to all neighbors except x (sender of update): –contains (d, l’[x] + d’[x,j]), the frozen dist –wants to know d’[k,j] for each neighbor k Routers in passive state (stable routing table) just reply… others become active

8 Active and Passive Routers Routers are “passive” if they have a stable table and do not change path selection as a result of the query message [not using sender as router or are using and alternative for next hop] If they become “active”, they propagate the query to all other neighbors, and the diffusion computation continues

9 Ebbing the Diffusion Once a router hears a reply from all its neighbors, it can return to passive state and return a reply back to its initial querier (like propagating prunes up stream) Eventually, reply will arrive at the originating router, completing the diffusion computation

10 DUAL - Example

11 DUAL – Example(cont.)

12 DUAL (summary) Assures loop-free routing Routers maintain copies of neighbor costs If cheaper route arrives, use it (no loop) If cost goes up: first see if another known route may be used

13 DUAL (summary) if not, freeze table and distribute info to all neighbors –each neighbor seeing more costly route in turn freeze their tables –if all neighbors do not change, they inform sender of this –eventually, returns to original sender Called a “diffusion computation”