Hierarchical Routing: 1.Leonard Kleinrock and Farouk Kamoun: Hierarchical routing for large networks: Performance evaluation and optimization, Computer.

Slides:



Advertisements
Similar presentations
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Advertisements

Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Scalable Application Layer Multicast Suman Banerjee Bobby Bhattacharjee Christopher Kommareddy ACM SIGCOMM Computer Communication Review, Proceedings of.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART VII-2 Wide Area Networks (WANs), Routing, and Shortest Paths.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
Hierarchical Routing Slides adopted from Christos Papadopoulos’ lecture at USC.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
CHAPTER 6: PNNI (Private Network Node Interface or Private Network-to-Network Interface) PNNI is a switch-to-switch protocol developed within the ATM Forum.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Fall 2006Computer Networks19-1 Chapter 19. Host-to-Host Delivery: Internetworking, Addressing, and Routing 19.1 Internetworks 19.2 Addressing 19.3 Routing.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 Multi Protocol Label Switching Presented by: Petros Ioannou Dept. of Electrical and Computer Engineering, UCY.
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Routing Protocols. 2 Distributed Routing Protocols Rtrs exchange control info Use it to calculate forwarding table Two basic types –distance vector.
1 Chapter Wide Area Networks (WANs), Routing, and Shortest Paths.
Chapter 18. Virtual-Circuit Networks: Frame Relay and ATM
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Introduction to Network Layer. Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using bridges? –No!
Multi-protocol Label Switching Jiang Wu Computer Science Seminar 5400.
CHAPTER #6  Introducti on to ATM. Contents  Introduction  ATM Cells  ATM Architecture  ATM Connections  Addressing and Signaling  IP over ATM.
1 Flow Identification Assume you want to guarantee some type of quality of service (minimum bandwidth, maximum end-to-end delay) to a user Before you do.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Case Study: ATM (+ MPLS)
Chapter 14 Connection-Oriented Networking and ATM
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
ATM Technologies. Asynchronous Transfer Mode (ATM) Designed by phone companies Single technology meant to handle –Voice –Video –Data Intended as LAN or.
Data and Computer Communications Chapter 11 – Asynchronous Transfer Mode.
1 Copyright © Monash University ATM Signalling Philip Branch Centre for Telecommunications and Information Engineering (CTIE) Monash University
Routing and Routing Protocols
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Node Lookup in P2P Networks. Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service.
Univ. of TehranComputer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani.
Virtual Circuit Networks Frame Relays. Background Frame Relay is a Virtual Circuit WAN that was designed in late 80s and early 90s. Prior to Frame Relays.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Multi-protocol Label Switching
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
COMPUTER NETWORKS CS610 Lecture-17 Hammad Khalid Khan.
Advanced Computer Networks
Chapter 3: Packet Switching (overview)
COMPUTER NETWORKS CS610 Lecture-21 Hammad Khalid Khan.
Asynchronous Transfer Mode
Ch 13 WAN Technologies and Routing
Presented by Alexei Semenov
3. Internetworking (part 1)
ECE 544 Protocol Design Project 2016
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
COMP 3270 Computer Networks
Link-State Routing Protocols
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing.
ECE 544 Protocol Design Project 2016
Chapter 3: Dynamic Routing
ECE 544 Protocol Design Project 2016
Link-State Routing Protocols
CS 4594 Broadband PNNI Signaling.
Link-State Routing Protocols
Wide Area Networks (WANs), Routing, and Shortest Paths
Routing.
Chapter 1 Introduction Networking Architecture Overview.
Presentation transcript:

Hierarchical Routing: 1.Leonard Kleinrock and Farouk Kamoun: Hierarchical routing for large networks: Performance evaluation and optimization, Computer Networks, Vol. 1(3): ,, Jan PNNI Routing, Private Network-Network Interface Specification Version 1.0, ATM Forum, March Paul Tsuychia, The Landmark Hierarchy: A new hierarchy for routing in very large networks, ACM Sigcomm, p , 1988.

Leonard Kleinrock and Farouk Kamoun: Hierarchical routing for large networks Performance evaluation and optimization Computer Networks, Vol. 1(3), Jan 1977, pp (uses slides prepared by Boris Drazic)

Routing in the 1970s Computer networks are new and have a small number of nodes ARPANET is predecessor of Internet Uses concepts of: – routing table (RT) – Distributed routing protocols ARPANET 1969

Routing in the 1970s Computer networks are new and have a small number of nodes ARPANET is predecessor of Internet Uses concepts of: – routing table (RT) – Distributed routing protocols ARPANET 1971

Routing in the 1970s Computer networks are new and have a small number of nodes ARPANET is predecessor of Internet Uses concepts of: – routing table (RT) – Distributed routing protocols One routing table for each “node” of the network ARPANET 1980

Number of Internet Hosts Source: Internet Systems Consortium (

Active BGP Entries (FIB) Source:

Example of Routing Table (1) DestinationNext-hop bb cc db eb fb gb hb ib Routing table for node a

Hierarchical Routing Schemes Goal: Reduce the size of routing tables (RT) Approach: Keep complete routing information about nodes that are “close” and less information about nodes that are “far away” – One RT entry for every destination that is “close” – One RT entry for every set of destinations that is “far away” Forwarding has two parts: 1.Forward the message “close” to the destination 2.Forward the message to the destination

Example of RT (2) DestinationNext-hop bb cc 2b 3b Routing table for node a “close” destinations “far away” destinations `

m-level Hierarchical Clustering Create a hierarchy with m levels by: – Each node is a 0 th level cluster – Group nodes into 1 st level clusters – Group 1 st level clusters into 2 nd level clusters – …

` 3 rd level cluster 2 nd level cluster 1 st level cluster 0 th level cluster

Tree representation in 3-level hierarchy

` 3 rd level cluster 2 nd level cluster 1 st level cluster 0 th level cluster

RT in 3-level Hierarchical Clustering DestinationNext-hop 1.1.1self self self nodes in same cluster ` clusters in same supercluster superclusters 0 th level cluster entries 1 st level cluster entries 2 nd level cluster entries

Example: Source: Destination: 3.2.2

What is the optimal clustering in a network with N nodes? Proposition 1: Given the number of levels m, if each cluster has the same number of lower level clusters, the minimum routing table lengths is. Proposition 2: The global optimal clustering is achieved for m=ln(N), when each cluster has e lower level clusters, and the minimum table length is l=e ln(N).

Minimum Relative Table Length RT size decreases fast for m < ln(N) Minima for: m = ln(N)

Hierarchical Routing increases path length Shortest path: 4 hopsWith hierarchical routing: 5 hops Example: Source: a Destination: i

Increased Path Length Assumption 1: Every cluster has the same number of sub-clusters and for every pair of nodes in a cluster a path exists between them in that cluster Assumption 2: The diameter of any k th level cluster is less or equal to some quantity d k h c is average path length with clustering h is average path length without clustering

Increased Path Length Proposition 10: Under Assumptions 1 and 2

Limiting Performance Assumption 3: Any cluster contains the shortest path between any pair of nodes that belong to that cluster Proposition 11: Under Assumptions 1-3, for an m-level optimal clustering hierarchy where the diameter of any cluster is bounded by a power law function of the number of nodes in that cluster:

Increased Path Length Define as the increase in path length produced by introducing clustering Observe E, which is a bound on D Presented results for a network where Assumptions 1-3 hold

Decrease in RT Length for a Given Maximum Increase in Path Length Interpret “E” as the tolerated “stretch” factor

Conclusion In very large networks, hierarchical routing schemes achieve great reduction of routing table size with only a small increase in path lengths between nodes, when compared to non-hierarchical routing schemes

Hierarchical Routing Application: ATM Networks In the 1990s, the ATM Forum adopted a routing scheme which is based on hierarchical routing

ATM Connection Acronyms VC - virtual channel, synonymous with “ circuit ” or “ connection ” VPC - virtual path connection VCC - virtual channel connection PVC - permanent virtual circuit PVP - permanent virtual path SVC - switched virtual circuit SVP - switched virtual path SPVC - switched/signaled/soft permanent virtual circuit PMP - point-to-multipoint

Traditional Network Infrastructure Company A Company B Telephone network Data network Residential user x Video network

The B-ISDN vision (from mid 1980s!) Company A Company B Residential user x Broadband Integrated Services Network (B-ISDN)

ATM’s Key Concepts ATM uses Virtual-Circuit Packet Switching – ATM can reserve capacity for a virtual circuit. This is useful for voice and video, which require a minimum level of service – Overhead for setting up a connection is expensive if data transmission is short (e.g., web browsing) ATM packets are small and have a fixed sized – Packets in ATM are called cells – Small packets are good for voice and video transmissions Header (5 byte) Data (48 byte) Cell is 53 byte long

Virtual Paths and Virtual Circuits Virtual Path Connections Virtual Channel Connection VPI identifies virtual path (8 or 12 bits) VCI identifies virtual channel in a virtual path (16 bits) Link

VPI/VCI assignment at ATM switches 1/24 7/24 3/24 1/40 3/24 2/17

PNNI UNI: User-to-Network Interface NNI: Network-to-Network Interface PNNI: Suite of protocols for topology discovery and routing of an ATM network

PNNI Routing Goal of PNNI Routing: Establish a switching path from sender to receiver PNNI characteristics: – Link State Routing – Source Routing – Hierarchical Routing – Crankback Routing protocol information is sent on VPI/VCI=0/18

Link State Routing Algorithm B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 PNNI uses link state routing: – Each node floods route messages on its links to all nodes in the network – Each node has complete topology information Source routing: PNNI computes route at the first switch QoS: Route messages also contain QoS information on links Hierarchy: PNNI deals with complex networks by using a hierarchy

PNNI Routing Hierarchy Routing hierarchy is defined recursively: – Neighbor nodes build Peer Groups by comparing their address prefixes (nodes with longest prefix match are in the same peer group) – Each group behaves like a Logical Group Node (LGN) in the next level peer group A.1.2 A.1.1 A.2.2 A.2.1 A.2.3 B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 C.1.2 C.1.1 A.1 A.2 B.2 B.1 B.3 C.1 A C B

Building the PNNI Routing Hierarchy A.1.2 A.1.1 A.2.2 A.2.1 A.2.3 B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 C.1.2 C.1.1 Each switch is initialized with a 20-byte ATM address

PNNI Routing Hierarchy Nodes with common prefix A.1, A.2, B.2, B.2, B.3, C.1 each form a logical group node A.1.2 A.1.1 A.2.2 A.2.1 A.2.3 B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 C.1.2 C.1.1 A.1 A.2 B.2 B.3 C.1 B.1

PNNI Routing Hierarchy Nodes with common prefix A, B, C each form a logical group node at the next level A.1.2 A.1.1 A.2.2 A.2.1 A.2.3 B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 C.1.2 C.1.1 A.1 A.2 B.2 B.3 C.1 B.1 A C B

Resulting Hierarchy Within each peer group, nodes or LGNs elect a peer group leader (PGL), which represents the peer group at the next level A.1.2 A.1.1 A.2.2 A.2.1 A.2.3 B.2.2 B.2.1 B.2.3 B.1.1B.1.2 B.3.2 B.3.1 C.1.2 C.1.1 A.1 A.2 B.2 B.1 B.3 C.1 A C B

Complete Hierarchy A.1A.2 B.2 B.1 B.3 C.1 A C B

Routing Messages Hierarchy A.1A.2 B.2 B.1 B.3 C.1 A C B Routing messages are called PNNI Topology State Packets (PTSP) 1.Nodes within each peer group exchange PTSP 2.Group Leader relays routing information from higher level topology to lower layer

Resulting Hierarchy Node B.2.3 ’ s view of the network topology Node can now run source routing C B.1 B.2.2 B.2.1 B.2.3 B.2 C B B.3 A

Source routing in the hierarchy At A.1.1 : Route = [ (A.1.1, A.1.2), (A.1, A.2), (A, B)] At A.1.2 : Route = [ (A.1, A.2), (A, B)] At A.2.1 : Route = [ (A.2.1, A.2.2, A.2.3), (A.1, A.2), (A, B)] At A.2.2 : Route = [ (A.2.1, A.2.2, A.2.3), (A.1, A.2), (A, B)] At A.2.3 : Route = [ (A, B)] At B.1: Route= [ (B.1, B.3), (A, B) ] At B.3: Route= [ ] A.1.2 A.1.1 A.2.1 A.2.2 A.2.3 B.2 B.1 B.3 A.1 A.2 A B desti- nation source

Crankback and Alternate routing At A.1.1 : Route = [ (A.1.1, A.1.2), (A.1, A.2), (A, B)] At A.1.2 : Route = [ (A.1, A.2), (A, B)] At A.2.1 : Route = [ (A.2.1, A.2.2, A.2.3), (A.1, A.2), (A, B)] At A.2.2 : Route = [ crankback: (A.2.1, A.2.2, A.2.3), (A.1, A.2), (A, B)] At A.2.1 : Route = [ (A.2.1, A.2.3), (A.1, A.2), (A, B)] At A.2.3 : Route = [ (A, B)] and so on A.1.2 A.1.1 A.2.1 A.2.2 A.2.3 B.2 B.1 B.3 A.1 A.2 A B desti- nation source QoS cannot be satisfied

Paul Tsuychia: The Landmark Hierarchy: A new hierarchy for routing in very large networks ACM Sigcomm 1988, p

Drawback of Hierarchical Routing

Enter “Landmarks” Landmarks can be seen from far away! Landmark router: Normal router can see a landmark router from several hops away  Information about landmark routers is disseminated to normal routers

Landmark router Router 1 is landmark router with radius 2 – Routers up to 2 hops away have routing entries for Router 1  Router 1 can be seen from 2 hops away

Hierarchy of Landmarks Every router is a level-0 landmark with a small radius Some level-0 landmarks are level-1 landmarks 1.Radius of level-1 landmark is greater than that of level-0; 2.Each level-0 landmark LM 0 [id] can reach at least one level-1 landmark in r 0 [id] hops Some level-1 landmarks are level-2 landmarks 1.Radius of level-2 landmark is greater than that of level-1; 2.Each level-1 landmark LM 1 [id] can reach at least one level-11 landmark in r 1 [id] hops …… A small number of routers are level-H landmarks (“global landmarks”) 1.Every router “can see” all level-H landmarks Notation: i : level number (0 is lowest level, H is highest level) LM i : landmark at level-i LM i [id]: specific landmark at level i with identifier id r i [id]: Radius of LM i [id]

Forwarding in Landmark Hierarchy Destination: LM 0 [a] Source forwards packet towards LM 2 [c] Once the packet is within reach of r 1 [b], packet is sent towards LM 1 [c] Once the packet is within reach of r 0 [a], packet is sent towards LM 0 [a] r 2 [c] r 1 [b] r 0 [a] Source LM 0 [a] LM 1 [b] LM 2 [c]

Routing Table Each router keeps a table of the next hop on the shortest path to each landmark for which it has routing entries: – Each router has entries … for every LM 0 [id] within a radius of r 0 [id], … every LM1[id] within a radius of r1[id], … and so on. This ensure that a router – has full knowledge of all routers within immediate vicinity (i.e., the LM 0 routers) – has knowledge of a portion of the network routers further away – Has full local information, and increasingly less information further away in all directions Note the difference to pure hierarchical routing

Addressing In a pure hierarchy: The address of a router is a reflection of the area(s) at each hierarchical level in which the router resides e.g., telephone number In a Landmark hierarchy: The address of a router is a reflection of the Landmark(s) at each hierarchical level which the router is near. Landmark Address is a series of Landmark identifiers LM H [id H ].LM H-1 [ID H-1 ]...LM 0 [id 0 ] such that: 1.The landmark represented by each address component must be within radius of the landmark in the next lower address component 2.Nodes may have multiple address (since more than one level-n landmark may be within radius of a level-n-1 landmark)

Forwarding Path: Source  LM0[a] Address of LM0[a]: LM 2 [c].LM 1 [b].LM 0 [a] 1.At source: – has entry for LM 2 [c] – forwards towards LM 2 [c] 2.At first router within r 1 [b]: – has entry for LM 1 [b] – forwards towards LM 1 [b] 3.At first router within r 0 [a]: – has entry for LM 0 [a] – forwards towards LM 0 [a ] r 2 [c] r 1 [b] r 0 [a] Source LM 0 [a] LM 1 [b] LM 2 [c]

Forwarding 1.Routing path in landmark routing are longer than shortest path 2.Path do not necessarily traverse the landmarks given in a landmark address r 2 [c] r 1 [b] r 0 [a] Source LM 0 [a] LM 1 [b] LM 2 [c]

Example: d.i.k All routers are LM 0 (r 0 =2) Diamonds: LM 1 (r 1 =4) Large circles: LM 2 (r 2 =8)

Example: All routers are LM 0 (r 0 =2) Diamonds: LM 1 (r 1 =4) Large circles: LM 2 (r 2 =8) LandmarkLevelNext Hop LM 2 [d]2f LM 1 [i]1k LM 0 [e]0f LM 0 [k]0k LM 0 [f]0f Routing table of g:

Example: Source: g Destination: t Address of t: d.n.t LandmarkLevelNext Hop LM 2 [d]2f LM 1 [i]1k LM 0 [e]0f LM 0 [k]0k LM 0 [f]0f Routing table of g:

Dynamic Algorithms Several algorithms are needed: – Assign landmarks and determine radii – Discover landmarks and establish path to landmarks – Needs to use distance vector, and not link state (Why?) – Modification to distance vector: radius limits advertisements – Bind identifiers (id’s) to addresses – Addresses of a router can change

Performance Evaluated by simulation Performance metrics: – Average routing table size: R – Stretch: Ratio of paths length of landmark or hierarchical routing ( ) to shortest path ( )

Simulations Compared simulation of pure hierarchy with landmark hierarchy 200 routers Different settings Comment: Method of comparison questionable

Landmark routing r i : radius of level-i landmark d i : distance to nearest level-i landmark

Summary Landmark hierarchy has similar performance as pure hierarchical routing Easier to configure (claimed): – Not very sensitive to placement of landmarks – More sensitive to failures