ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit.

Slides:



Advertisements
Similar presentations
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Advertisements

Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Project3 Malabika Das Prajna Setty Preeti Rao. Assumptions and Address Scheme Assumptions End hosts can only connect to one router and knows which router.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Link-State Routing Protocols Routing Protocols and Concepts – Chapter.
ECE 544 Project 3 Content Based Routing Neelakantan Nurani Krishnan Shikha Kakkar Suja Srinivasan.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
NETWORK LAYER (2) T.Najah AlSubaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
TCP/IP Protocol Suite 1 Chapter 14 Upon completion you will be able to: Unicast Routing Protocols: RIP, OSPF, and BGP Distinguish between intra and interdomain.
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
ECE 544 Project3 Team member. Assumptions and Address Scheme Assumptions End hosts can only connect to routers Same content available at multiple end.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Multicast Routing Algorithms n Multicast routing n Flooding and Spanning Tree n Forward Shortest Path algorithm n Reversed Path Forwarding (RPF) algorithms.
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
1 Module 4: Implementing OSPF. 2 Lessons OSPF OSPF Areas and Hierarchical Routing OSPF Operation OSPF Routing Tables Designing an OSPF Network.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Routing and Routing Protocols
Routing Fundamentals and Subnets Introduction to IT and Communications Technology CE
Stainov - DataComMET CS TC5353 THE NETWORK LAYER 5.2 ROUTING ALGORITHMS - adaptive Distance Vector Routing (Bellman-Ford, Ford-Fulkenson). It was used.
Content Routing Protocol Design Karthikeyan Ganesan Shruti Venkatesh Rafay Zamir.
Dynamic Routing Protocols II OSPF
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Link-State Routing Protocols Routing Protocols and Concepts – Chapter 10.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Fundamentals of Computer Networks ECE 478/578
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
ECE 544 Project3 Ali Rostami Mohsen Ghassemi Mahmoud Ramezani-Mayiami.
ECE 544 Protocol Design Project 2016 Chengyao Wen Hua Deng Xiaoyu Duan.
DVMRP Distance Vector Multicast Routing Protocol Jerad Bates UMBC - Fall 2006.
ECE 544 Protocol Design Project 2016 Nirali Shah Thara Philipson Nithin Raju Chandy.
ECE 544 Protocol Design Project 2016 Michael Sherman Murtadha Aldeer Leonard T. Park.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
ECE 544 Project3 Parishad Karimi Mehrnaz Tavan Sai Teja Lingam.
+ Dynamic Routing Protocols 2 nd semester
1 CMPT 471 Networking II Multicasting © Janice Regan,
Dynamic Routing Protocols II OSPF
Instructor Materials Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
Routing Protocols and Concepts
Link-State Routing Protocols
Chapter 5 Network and Transport Layers
THE NETWORK LAYER.
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
ECE 544 Project3 Team member.
Chapter 5: Dynamic Routing
ECE 544 Protocol Design Project 2016
Dynamic Routing Protocols part2
Dynamic Routing Protocols II OSPF
ECE 544 Protocol Design Project 2016
Anup Mathur Anusha Sheelavant Prakhar Srivastava
Vidur Nayyar Xueting Wang Weicong Zhao
Link-State Routing Protocols
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Aayush Patidar Ashwin Ramakrishnan Manoj Juneja
Viet Nguyen Jianqing Liu Yaqin Tang
Christopher Beyer Hajar Mahdavi-Doost Tony Thayil
Routing Fundamentals and Subnets
Link-State Routing Protocols
ECE 544 Project3 Team member.
Bridges Neil Tang 10/10/2008 CS440 Computer Networks.
ECE 544 Project3 Dheeraj Medikonda Ravi Chandra Godavarthi 1.
Presentation transcript:

ECE 544 Project3 Amith V.S Pavan Kulkarni Suneet Dixit

Assumptions and Address Scheme Assumptions Routers do not fail in the life time of the Network. Router to Router Links do not fail in the life time of the Network. IPs of all the Routers are preassigned. Routers assign IPs to all the hosts in the Network. Naming scheme and eventual address scheme Edge routers are assigned IPs in the form X.X.n.0 where n ranges from End hosts are assigned IPs in the form X.X.n.h where n is the subnet number as assigned above and h ranges from (since no. of hosts connected to network N < 255). Content files are identified by their content ID ranging from (since no. of contents in the network K < 255).

Bootstrapping and Discovery Modified Link State Algorithm - MLSF Extends the functionality of Link state algorithm to support the functionality of Content Provider Network. Initially each of the edge router sends the contents that are available in their subnet along with the distance vector to their adjacent routers. After the convergence of the network each of the router will have a table as shown below: Time Stamp DestinationCostNext HopContents

Bootstrapping and Discovery Discovery Routers discover other routers with Hello Packets as shown Below : Edge routers discover their hosts and contents present in them with Hello Packets as shown below : Router Source IPContent Indicator Array 32 Bits256 Bits Host IP addressContent ID array 32 bitsVariable Length

Baseline Algorithm Content routing algorithm Once the Modified Distance Vector Algorithm – Routing Table is established in each of the Router, the network is now ready to respond to the get(ContentID) request. How to route a content-request packet? For each of the request issued by a host, the packets are generated in following format: The edge router receives this packet and converts it into Router-Router request packet as shown below: Host Source IPFlagContent ID 32 Bits8 bits Host Source IPDestination Router IP FlagContent ID 32 Bits 8 Bits

Baseline Algorithm How to route a content-request packet(cont..)? This packets traverses the network through the shortest path and reaches the edge router which is connected to the host which has the content. Each edge Router has a table mapping the Hosts IP address to the contents the host has. Referring to this table the packet is forwarded to the appropriate host. The host extracts the packet and gets the content ID requested and generates the response packet as shown Host Destination IP FlagContent IDContent 32 Bits8 Bits Upto 1466 Bytes

Baseline Algorithm How the content is actually delivered? While the request packet traverses through the network it updates the bread crumbs table as shown below present in each router : The response packet refers the bread crumbs table to get the next hop. How network is updated when a host has a new content? When a host has a new content, a new content packet is generated as shown and forwarded to the edge router: Destination IP addressNext Hop IP address 32 Bits Host Source IP FlagContent IDTime Stamp 32 bits8 bits 32 Bits

Baseline Algorithm How network is updated when a host has a new content(cont..)? The edge router gets this packet replaces the host IP address with its own IP address and broadcasts the packet to all the connecting Routers. This is continued as Spanning tree algorithm with Time Stamp as the update parameter. Thus all the router's MDVA table is updated. How network is updated when a host deletes a content(cont..)? The same procedure is followed as above with the flag set to delete content.

Data Transfer and Reliability Message Forward Host – Router is Unicast Hello Packets and Update Packets between Routers is Multicast ARQ Scheme Hop-by-hop acknowledgement scheme is being used at every router

Advantages Algorithm: A modified version of the Distance Vector Table is being used which efficiently calculates the shortest path to the host which has the required contents Scalability: The method employed can be extended by using the unused bits of the IP address making the system scalable Latency: The method employs bread crumbs to send data back to the requesting host. In this way a low latency is maintained

Disadvantages As Distance Vector Algorithm is a decentralized routing algorithm, it takes time to converge the table Hop-by-hop acknowledgement scheme may introduce latency

Appendix: Network Architecture Example scenarios for analysis purposes: H1 H2 H3 C1 C2 C3 R1R2R3R4 R5 Scenario get (content_C3)

Appendix: Network Architecture H1H1 H2H2 H3H3 C1C1 C1C1 C2C2 C2C2 C2C2 C2C2 C3C3 C3C3 C3C3 C3C3 R1R2R3R4 R5 Scenario get (content_C2)

Appendix: Network Architecture H1 C3 Scenario get (content_C1) H2H3 H4 C1 C2 C1