Intradomain Topology and Routing Nick Feamster CS 6250 September 5, 2007.

Slides:



Advertisements
Similar presentations
Intradomain Routing CS 4251: Computer Networking II Nick Feamster Spring 2008.
Advertisements

Intradomain Routing Computer Networking I Nick Feamster Spring 2010.
Intradomain Topology and Routing (Nick Feamster) January 30, 2008.
Courtesy: Nick McKeown, Stanford
Lecture 8 Overview. Graph abstraction u y x wv z Graph: G = (N,E) N = set of routers = { u, v, w, x, y, z } E = set of links ={ (u,v),
Distance-Vector and Path-Vector Routing Sections , 4.3.2, COS 461: Computer Networks Spring 2011 Mike Freedman
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination Network layer must.
CSE331: Introduction to Networks and Security Lecture 9 Fall 2002.
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer The service should be independent of the router.
Katz, Stoica F04 EECS 122: Introduction to Computer Networks Link State and Distance Vector Routing Computer Science Division Department of Electrical.
Routing.
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 18.
Networks: Routing1 Network Layer Routing. Networks: Routing2 Network Layer Concerned with getting packets from source to destination. The network layer.
CS 4700 / CS 5700 Network Fundamentals Lecture 9: Intra Domain Routing Revised 7/30/13.
1 ECE453 – Introduction to Computer Networks Lecture 10 – Network Layer (Routing II)
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
CS 4396 Computer Networks Lab
Intra-Domain Routing D.Anderson, CMU Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
Routing and Routing Protocols Routing Protocols Overview.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
Routing protocols Basic Routing Routing Information Protocol (RIP) Open Shortest Path First (OSPF)
Network Layer4-1 Chapter 4 Network Layer Part 3: Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March.
10-1 Last time □ Transitioning to IPv6 ♦ Tunneling ♦ Gateways □ Routing ♦ Graph abstraction ♦ Link-state routing Dijkstra's Algorithm ♦ Distance-vector.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
RIP2 (Routing Information Protocol) Team Agile. Routing Protocols Link State – OSPF – ISIS Distance vector – RIP (version 1 and 2) – IGRP (Cisco Proprietary)
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Unicast Routing Protocols.
Network Layer4-1 Distance Vector Algorithm Bellman-Ford Equation (dynamic programming) Define d x (y) := cost of least-cost path from x to y Then d x (y)
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Introduction 1 Lecture 19 Network Layer (Routing Algorithms) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Dynamic Routing Protocols II OSPF
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
4: Network Layer4a-1 Distance Vector Routing Algorithm iterative: r continues until no nodes exchange info. r self-terminating: no “signal” to stop asynchronous:
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Intradomain Topology and Routing Nick Feamster CS 7260 January 17, 2007.
Network Layer (2). Review Physical layer: move bits between physically connected stations Data link layer: move frames between physically connected stations.
Inter-domain Routing Outline Border Gateway Protocol.
1. 2  An autonomous system is a region of the Internet that is administered by a single entity.  Examples of autonomous regions are:  UVA’s campus.
Distance Vector and Link State Routing Pragyaditya Das.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Network Layer4-1 Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol.
Network Layer Routing Networks: Routing.
CS 5565 Network Architecture and Protocols
Dynamic Routing Protocols II OSPF
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Routing.
Dan LI CS Department, Tsinghua University
CS 3700 Networks and Distributed Systems
CS 640: Introduction to Computer Networks
CS 3700 Networks and Distributed Systems
Network Layer Routing Networks: Routing.
Computer Networking Lecture 10: Intra-Domain Routing
Communication Networks
EE 122: Intra-domain routing: Distance Vector
Computer Networks Protocols
Routing.
Presentation transcript:

Intradomain Topology and Routing Nick Feamster CS 6250 September 5, 2007

2 Georgia Tech Internet Routing Overview Today: Intradomain (i.e., “intra-AS”) routing Monday: Interdomain routing Comcast Abilene AT&T Cogent Autonomous Systems (ASes)

3 Today: Routing Inside an AS Intra-AS topology –Nodes and edges –Example: Abilene Intradomain routing protocols –Distance Vector Split-horizon/Poison-reverse Example: RIP –Link State Example: OSPF

4 Key Questions Where to place “nodes”? –Typically in dense population centers Close to other providers (easier interconnection) Close to other customers (cheaper backhaul) –Note: A “node” may in fact be a group of routers, located in a single city. Called a “Point-of-Presence” (PoP) Where to place “edges”? –Often constrained by location of fiber

5 Point-of-Presence (PoP) A “cluster” of routers in a single physical location Inter-PoP links –Long distances –High bandwidth Intra-PoP links –Cables between racks or floors –Aggregated bandwidth PoP

6 Example: Abilene Network Topology Problem Set 1 will have a problem dealing with Abilene router configurations/topology.

7 Where’s Georgia Tech? 10GigE (10GbpS uplink) Southeast Exchange (SOX) is at 56 Marietta Street

8 Recent Development: NLR Packet Net

9 Problem: Routing Routing: the process by which nodes discover where to forward traffic so that it reaches a certain node Within an AS: there are two “styles” –Distance vector –Link State

10 Distance-Vector Routing Routers send routing table copies to neighbors Routers compute costs to destination based on shortest available path Based on Bellman-Ford Algorithm –d x (y) = min v { c(x,v) + d v (y) } –Solution to this equation is x’s forwarding table xyz x015 y z xyz x y102 z xyz x y z520 y xz 1 2 5

11 Good News Travels Quickly When costs decrease, network converges quickly xyz x013 y102 z320 xyz x013 y102 z320 xyz x013 y102 z320 y xz 1 2 5

12 Problem: Bad News Travels Slowly y xz xyz x0 50 y502 z320 xyz x06050 y502 z720 Note also that there is a forwarding loop between y and z.

13 It Gets Worse Question: How long does this continue? Answer: Until z’s path cost to x via y is greater than 50. y xz xyz x0 50 y502 z320 xyz x06050 y502 z720

14 “Solution”: Poison Reverse If z routes through y to get to x, z advertises infinite cost for x to y Does poison reverse always work? xyz x013 y102 z320 xyz x01X y102 zX20 xyz x013 y102 z320 y xz 1 2 5

15 Does Poison Reverse Always Work? y x z w 1 1

16 Example: Routing Information Protocol Earliest IP routing protocol (1982 BSD) –Version 1: RFC 1058 –Version 2: RFC 2453 Features –Edges have unit cost –“Infinity” = 16 Sending Updates –Router listens for updates on UDP port 520 –Message can contain up to 25 table entries

17 RIP Updates Initial –When router first starts, asks for copy of table for every neighbor –Uses it to iteratively generate own table Periodic –Table refresh every 30 seconds Triggered –When every entry changes, send copy of entry to neighbors Except for one causing update (split horizon rule) –Neighbors use to update their tables

18 RIP: Staleness and Oscillation Control Small value for Infinity –Count to infinity doesn’t take very long Route Timer –Every route has timeout limit of 180 seconds Reached when haven’t received update from next hop for 6 periods –If not updated, set to infinity –Soft-state Behavior –When router or link fails, can take minutes to stabilize

19 Link-State Routing Idea: distribute a network map Each node performs shortest path (SPF) computation between itself and all other nodes Initialization step –Add costs of immediate neighbors, D(v), else infinite –Flood costs c(u,v) to neighbors, N For some D(w) that is not in N –D(v) = min( c(u,w) + D(w), D(v) )

20 Link-State vs. Distance-Vector Convergence –DV has count-to-infinity –DV often converges slowly (minutes) –Odd timing dependencies in DV Robustness –Route calculations a bit more robust under link-state. –DV algorithms can advertise incorrect least-cost paths Bandwidth Consumption for Messages Computation Security

21 OSPF: Salient Features Dijkstra, plus some additional features Equal-cost multipath Support for hierarchy: Inter-Area Routing

22 Example: Open Shortest Paths First (OSPF) Key Feature: hierarchy Network’s routers divided into areas Backbone area is area 0 Area 0 routers perform SPF computation –All inter-area traffic travles through Area 0 routers (“border routers”) Area 0

23 Abilene in VINI

24 Example: IS-IS Originally: ISO Connectionless Network Protocol (CLNP). – CLNP: ISO equivalent to IP for datagram delivery services – ISO or RFC 1142 Later: Integrated or Dual IS-IS (RFC 1195) – IS-IS adapted for IP – Doesn’t use IP to carry routing messages OSPF more widely used in enterprise, IS-IS in large service providers

25 Area Area Level-1 Routing Level-2 Routing Level-1 Routing Backbone Hierarchical Routing in IS-IS Like OSPF, 2-level routing hierarchy –Within an area: level-1 –Between areas: level-2 –Level 1-2 Routers: Level-2 routers may also participate in L1 routing

26 Level-1 vs. Level-2 Routing Level 1 routing –Routing within an area –Level 1 routers track links, routers, and end systems within L1 area –L1 routers do not know the identity of destinations outside their area. –A L 1 router forwards all traffic for destinations outside its area to the nearest L2 router within its area. Level 2 routing –Routing between areas –Level 2 routers know the level 2 topology and know which addresses are reachable via each level 2 router. –Level 2 routers track the location of each level 1 area. –Level 2 routers are not concerned with the topology within any level 1 area (for example, the details internal to each level 1 area). –Level 2 routers can identify when a level 2 router is also a level 1 router within the same area. –Only a level 2 router can exchange packets with external routers located outside its routing domain.

27 CLNS Addressing: “NSAPs” NSAP: Network-Service Attachment Point (a network-layer address) All routers in the same area must have a common Area ID System ID constraints –Each node in an area must have a unique System ID –All level 2 routers in a domain must have unique System IDs –All NSAPs on the same router must have the same system ID. –All systems belonging to a given domain must have System IDs of the same length in their NSAP addresses System IDNSELAFI Variable length Area address 6 bytes1 byte bytes Area IDSys ID NSEL

28 ISIS on the Wire…

29 IS-IS Configuration on Abilene (atlang) lo0 { unit 0 { …. family iso { address ; } …. } isis { level 2 wide-metrics-only; /* OC192 to WASHng */ interface so-0/0/0.0 { level 2 metric 846; level 1 disable; } Only Level 2 IS-IS in Abilene ISO Address Configured on Loopback Interface

30 IS-IS vs. OSPF Cisco ships OSPF in 1991 Cisco ships dual IS-IS in 1992 Circa 1995: ISPs need to run IGPs, IS-IS is recommended due to the recent rewrite IS-IS became very popular in late 1990s –Deployed in most large ISPs (also Abilene) –Some ISPs (e.g., AOL backbone) even switched

31 Monitoring OSPF Challenge: How to get the OSPF Link State Advertisements (LSAs)?

32 Challenge #1: Capturing LSAs Wire-tap mode –Invasive –Dependent on Layer-2 Host mode –Distribute LSAs over multicast –LSAR joins multicast group Full adjacency mode –Form high-cost adjacency with network Partial adjacency mode

33 Challenge #2: Dealing with Areas Problem: OSPF LSAs not advertised across area boundaries.

34 Fast Reroute Idea: Detect link failure locally, switch to a pre- computed backup path Two deployment scenarios –MPLS Fast Reroute Source-routed path around each link failure Requires MPLS infrastructure –IP Fast Reroute Connectionless alternative Various approaches: ECMP, Not-via

35 IP Fast Reroute Interface protection (vs. path protection) –Detect interface/node failure locally –Reroute either to that node or one hop past Various mechanisms –Equal cost multipath –Loop-free Alternatives –Not-via Addresses

36 Equal Cost Multipath Set up link weights so that several paths have equal cost Protects only the paths for which such weights exist Link not protected S D I

37 ECMP: Strengths and Weaknesses Simple No path stretch upon recovery (at least not nominally) Won’t protect a large number of paths Hard to protect a path from multiple failures Might interfere with other objectives (e.g., TE) Strengths Weaknesses