Lecture 10 Overview. Border Gateway Protocol(BGP) De facto standard for Internet inter-AS routing allows subnet to advertise its existence to rest of.

Slides:



Advertisements
Similar presentations
Chapter 4: Network Layer
Advertisements

Network Layer4-1 Hierarchical Routing scale: with 200 million destinations: r can’t store all dest’s in routing tables! r routing table exchange would.
Lecture 9 Overview. Hierarchical Routing scale – with 200 million destinations – can’t store all dests in routing tables! – routing table exchange would.
Path Vector Routing NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Chapter 4: Network Layer 4. 1 Introduction 4.2 Virtual circuit and datagram networks 4.3 What’s inside a router 4.4 IP: Internet Protocol –Datagram format.
4a-1 CSE401: Computer Networks Hierarchical Routing & Routing in Internet S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
Network Layer4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 Routing Principles 4.3 Hierarchical Routing 4.4 The Internet (IP) Protocol.
Routing - II Important concepts: Hierarchical Routing, Intra-domain routing, inter- domain routing, RIP, OSPF, BGP, Router Architecture.
Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet Protocol m Datagram.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 04/05/2007.
14 – Inter/Intra-AS Routing
Review r The Internet (IP) Protocol m Datagram format m IP fragmentation m ICMP: Internet Control Message Protocol m NAT: Network Address Translation r.
Feb 12, 2008CS573: Network Protocols and Standards1 Border Gateway Protocol (BGP) Network Protocols and Standards Winter
Routing Algorithms & Routing Protocols  Shortest Path Routing  Flooding  Distance Vector Routing  Link State Routing  Hierarchical Routing  Broadcast.
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 15.
R OUTING IN THE INTERNET. A UTONOMOUS SYSTEM ( AS ) Collections of routers that has the same protocol, administative and technical control Intra-AS routing.
4: Network Layer4b-1 Router Architecture Overview Two key router functions: r run routing algorithms/protocol (RIP, OSPF, BGP) r switching datagrams from.
Chapter 4 Queuing, Datagrams, and Addressing
14 – Inter/Intra-AS Routing Network Layer Hierarchical Routing scale: with > 200 million destinations: can’t store all dest’s in routing tables!
CSC 450/550 Part 4: Network Layer Part B: The Internet Routing Protocols.
What’s inside a router. Router architecture overview two key router functions:  run routing algorithms/protocol (RIP, OSPF, BGP)  forwarding datagrams.
I-4 routing scalability Taekyoung Kwon Some slides are from Geoff Huston, Michalis Faloutsos, Paul Barford, Jim Kurose, Paul Francis, and Jennifer Rexford.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Introduction 1 Lecture 21 Network Layer (Routing Activity) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
RSC Part II: Network Layer 6. Routing in the Internet (2 nd Part) Redes y Servicios de Comunicaciones Universidad Carlos III de Madrid These slides are,
Introduction 1 Lecture 19 Network Layer (Routing Protocols) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science &
CS 3830 Day 29 Introduction 1-1. Announcements r Quiz 4 this Friday r Signup to demo prog4 (all group members must be present) r Written homework on chapter.
10-1 Last time □ Transitioning to IPv6 ♦ Tunneling ♦ Gateways □ Routing ♦ Graph abstraction ♦ Link-state routing Dijkstra's Algorithm ♦ Distance-vector.
Router Architecture Overview
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer r Introduction r Datagram networks r IP: Internet Protocol m Datagram format m IPv4 addressing m ICMP r What’s inside a router r Routing.
1 Mao W07 Interdomain Routing Broadcast routing EECS 489 Computer Networks Z. Morley Mao Monday Feb 12, 2007.
Network Layer4-1 Intra-AS Routing r Also known as Interior Gateway Protocols (IGP) r Most common Intra-AS routing protocols: m RIP: Routing Information.
Forwarding.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
4: Network Layer4b-1 OSPF (Open Shortest Path First) r “open”: publicly available r Uses Link State algorithm m LS packet dissemination m Topology map.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Transport Layer3-1 Network Layer Every man dies. Not every man really lives.
Network Layer4-1 Routing Algorithm Classification Global or decentralized information? Global: r all routers have complete topology, link cost info r “link.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Network Layer4-1 Chapter 4 Network Layer All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down.
Border Gateway Protocol. Intra-AS v.s. Inter-AS Intra-AS Inter-AS.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
Application Layer 2-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 18 INTRODUCTION NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Routing in the Internet
Chapter 3 Part 3 Switching and Bridging
14 – Inter/Intra-AS Routing
Chapter 4: Network Layer
ICMP ICMP – Internet Control Message Protocol
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 3 Part 3 Switching and Bridging
Department of Computer and IT Engineering University of Kurdistan
Part 4: Network Layer Part B: The Internet Routing Protocols
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4: Network Layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach 5th edition. Jim Kurose, Keith Ross Addison-Wesley, April Network Layer.
Computer Networks Protocols
Network Layer: Internet Inter-Domain Routing
Chapter 4: Network Layer
Presentation transcript:

Lecture 10 Overview

Border Gateway Protocol(BGP) De facto standard for Internet inter-AS routing allows subnet to advertise its existence to rest of Internet: “I am here” BGP provides each AS a means to: – Obtain subnet reachability information from neighboring ASs – Propagate reachability information to all AS- internal routers – Determine “good” routes to subnets based on reachability information and policy CPE 401/601 Lecture 10 : Border Gateway Protocol 2

BGP basics Pairs of routers (BGP peers) exchange routing info over semi-permanent TCP connections: BGP sessions – BGP sessions need not correspond to physical links when AS2 advertises a prefix to AS1: – AS2 promises it will forward datagrams towards that prefix – AS2 can aggregate prefixes in its advertisement 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c eBGP session iBGP session CPE 401/601 Lecture 10 : Border Gateway Protocol 3

Distributing reachability info 3b 1d 3a 1c 2a AS3 AS1 AS2 1a 2c 2b 1b 3c eBGP session iBGP session using eBGP session between 3a and 1c, AS3 sends prefix reachability info to AS1 – 1c can then use iBGP do distribute new prefix info to all routers in AS1 – 1b can then re-advertise new reachability info to AS2 over 1b-to-2a eBGP session CPE 401/601 Lecture 10 : Border Gateway Protocol 4

Path attributes & BGP routes advertised prefix includes BGP attributes – prefix + attributes = “route” two important attributes – AS-PATH: contains ASs through which prefix advertisement has passed: e.g, AS 67, AS 17 – NEXT-HOP: indicates specific internal-AS router to next-hop AS may be multiple links from current AS to next-hop-AS when gateway router receives advertisement, uses import policy to accept/decline CPE 401/601 Lecture 10 : Border Gateway Protocol 5

BGP route selection router may learn about more than 1 route to some prefix – Router must select route elimination rules – local preference value attribute: policy decision – shortest AS-PATH – closest NEXT-HOP router: hot potato routing – additional criteria CPE 401/601 Lecture 10 : Border Gateway Protocol 6

BGP messages BGP messages exchanged using TCP BGP messages: – OPEN: opens TCP connection to peer and authenticates sender – UPDATE: advertises new path (or withdraws old) – KEEPALIVE: keeps connection alive in absence of UPDATES; also ACKs OPEN request – NOTIFICATION: reports errors in previous msg; also used to close connection CPE 401/601 Lecture 10 : Border Gateway Protocol 7

BGP routing policy A,B,C are provider networks X,W,Y are customer (of provider networks) X is dual-homed: attached to two networks – X does not want to route from B via X to C –.. so X will not advertise to B a route to C A B C W X Y legend : customer network: provider network CPE 401/601 Lecture 10 : Border Gateway Protocol 8

BGP routing policy (2) A advertises path AW to B B advertises path BAW to X Should B advertise path BAW to C? – No way! B gets no “revenue” for routing CBAW since neither W nor C are B’s customers B wants to force C to route to w via A B wants to route only to/from its customers! A B C W X Y legend : customer network: provider network CPE 401/601 Lecture 10 : Border Gateway Protocol 9

Why different Intra- and Inter-AS routing ? Policy: – Inter-AS: admin wants control over how its traffic routed, who routes through its net – Intra-AS: single admin, no need for policy decisions Scale: – hierarchical routing saves table size, reduced update traffic Performance: – Intra-AS: can focus on performance – Inter-AS: policy may dominate over performance CPE 401/601 Lecture 10 : Border Gateway Protocol 10

Lecture 11 Router Architectures CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger

Router Architecture Overview Two key router functions: – run routing algorithms/protocol (RIP, OSPF, BGP) – forwarding datagrams from incoming to outgoing link CPE 401/601 Lecture 11 : Router Architectures 12

Input Port Functions Goal: complete input port processing at ‘line speed’ Decentralized switching: – given datagram dest., lookup output port using forwarding table in input port memory CPE 401/601 Lecture 11 : Router Architectures 13

Input Port Functions Physical layer: bit-level reception Data link layer: e.g., Ethernet Network layer: Routing & forwarding CPE 401/601 Lecture 11 : Router Architectures 14

Input Port Queuing Queuing when datagrams arrive faster than forwarding rate into switch fabric queuing delay and loss due to input buffer overflow! Head-of-the-Line (HOL) blocking: queued datagram at front of queue prevents others in queue from moving forward CPE 401/601 Lecture 11 : Router Architectures 15

Three types of switching fabrics CPE 401/601 Lecture 11 : Router Architectures 16

Output Ports Buffering required when datagrams arrive from fabric faster than the transmission rate Scheduling discipline chooses among queued datagrams for transmission CPE 401/601 Lecture 11 : Router Architectures 17

Output port queueing Queuing (delay) and loss due to output port buffer overflow! CPE 401/601 Lecture 11 : Router Architectures 18

How much buffering? RFC 3439 rule of thumb: – buffering equal to typical RTT (say 250 msec) times link capacity C e.g., C = 10 Gps link: – 2.5 Gbit buffer Recent recommendation: – with N flows, buffering equal to RTT C. N CPE 401/601 Lecture 11 : Router Architectures 19

Bridges

Bridge Software A bridge connects networks and forwards frames from one network to another. 21 BRIDGE AB CD EF GH PORTS CPE 401/601 Lecture 11 : Bridges

Selective Forwarding If A sends a frame to E – the frame must be forwarded by the bridge If A sends a frame to B – there is no reason to forward the frame 22 BRIDGE AB CD EF GH CPE 401/601 Lecture 11 : Bridges

Bridge Database The bridge needs a database that contains information about which hosts are on which network. The realistic options are: – The system administrator can create and maintain the database. – The bridge can acquire the database on the fly. 23 Hard to add new computers Some loss of efficiency CPE 401/601 Lecture 11 : Bridges

Learning the host mapping The bridge forwards packets for which it does not know which network the destination is on Every time the bridge forwards a packet it can record the network on which the sender is located Each host mapping expires when it is unused for a “long” period of time. 24 CPE 401/601 Lecture 11 : Bridges

“Learning” Bridge A host can be moved to another network. New hosts can be added at any time. Requires no setup information from humans. 25 CPE 401/601 Lecture 11 : Bridges

What is the problem ? 26 Bridge 1 10 Bridge 2 10 A C B D F E CPE 401/601 Lecture 11 : Bridges

Possible Solutions Forget about smart bridges Tell customers to avoid topologies that include loops – design bridges so that they detect loops and scream at the customer Design bridges that prune the network topology into something with no loops. 27 CPE 401/601 Lecture 11 : Bridges

Spanning Tree Creation The bridges must communicate! – They send configuration bridge protocol data units (BPDUs) – Multicast: special data link address Each bridge has a unique ID Use an algorithm to construct a spanning tree based on local messages 28 CPE 401/601 Lecture 11 : Bridges

Spanning Tree 29 B B B B B B B B B B B B Prune B bridge network CPE 401/601 Lecture 11 : Bridges