Top Banner
1 ROUTING, PART 1 Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today’s Lecture I. Basic concepts and terminology II. Distance-Vector protocols III. Link-State protocols copyright 2005 Douglas S. Reeves 3 Announcements Exam will be returned on Tuesday HW4 online – due Tuesday help! Project Part II online BASIC CONCEPTS AND TERMINOLOGY copyright 2005 Douglas S. Reeves 5 Routing Protocols Goal: configure router forwarding tables so datagrams from anywhere to anywhere will be delivered by the “best” path what is “best”? what info does each router need? how does the routing algorithm work? how ensure routers make consistent decisions? Steps 1. routers discover their neighbors 2. routers exchange information about the network 3. routers compute forwarding tables copyright 2005 Douglas S. Reeves 6 Metrics For Routing Algorithms 1. Find a route if one exists 2. Avoid routing loops 3. Support for enforcement of routing “policy” 4. Scale to large size networks 5. Adapt quickly to changes in network state 6. Recover quickly from temporary failures and mistakes 7. Minimize size of routing tables
7

ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

Aug 09, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

1

ROUTING, PART 1

Internet Protocols

CSC / ECE 573

Fall, 2005

N. C. State University

copyright 2005 Douglas S. Reeves 2

Today’s Lecture

I. Basic concepts and terminology

II. Distance-Vector protocols

III. Link-State protocols

copyright 2005 Douglas S. Reeves 3

Announcements

Exam will be returned on Tuesday

HW4 online – due Tuesday

help!

Project Part II online

BASIC CONCEPTS ANDTERMINOLOGY

copyright 2005 Douglas S. Reeves 5

Routing Protocols

• Goal: configure router forwarding tables sodatagrams from anywhere to anywhere will bedelivered by the “best” path– what is “best”?

– what info does each router need?– how does the routing algorithm work?

– how ensure routers make consistent decisions?

• Steps1. routers discover their neighbors

2. routers exchange information about the network

3. routers compute forwarding tablescopyright 2005 Douglas S. Reeves 6

Metrics For Routing Algorithms1. Find a route if one exists

2. Avoid routing loops

3. Support for enforcement of routing “policy”

4. Scale to large size networks

5. Adapt quickly to changes in network state

6. Recover quickly from temporary failures andmistakes

7. Minimize size of routing tables

Page 2: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

2

copyright 2005 Douglas S. Reeves 7

What is the “Best” Route?

copyright 2005 Douglas S. Reeves 8

Autonomous Systems (RFC 1930)

• An autonomous system (AS) is an independentrouting domain within which all routers agree onthe same external routing policy– under control of a single administrative entity

– each AS gets a 16 bit ID number– there are currently ~17,000 ASes

• AS’es are arranged in a hierarchy; those at top…– have largest routing tables– have most specific routes

– do not use a “default” route

copyright 2005 Douglas S. Reeves 9

Internet Routing Architecture

• Regional registries (ARIN, RIPE, LACNIC, etc.)– manage allocation of CIDR blocks– manage allocation of AS numbers

– manage allocation of top-level domain names

• Interconnection of ISPs occurs by peering ortraffic exchange agreement– either they exchange routing tables, and carry traffic

for each other, or

– one network serves as transit network for another

copyright 2005 Douglas S. Reeves 10

Internet Routing Architecture (cont’d)

• Facilities where ISPs interconnect andexchange traffic are Internet Exchanges– slightly less than 100 in the world today

• A route server collects route information from allpeers at an exchange, and redistributes to them

• The Internet Routing Registry is a distributeddatabase where operators register their routinginformation– allows consistency checking of routing policies

copyright 2005 Douglas S. Reeves 11

Autonomous Systems Example

Default-freeProvider

Default-freeProvider

Mid-levelProvider

Mid-levelProvider

Dial-upProvider

Dial-upProvider

Company Company

RouteServer

RouteServer

InternetExchange

InternetExchange

copyright 2005 Douglas S. Reeves 12

The Internet AS Topology, Again

Page 3: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

3

copyright 2005 Douglas S. Reeves 13

Distribution of AS Degree (2003)Degree Histogram of ASes on AS-level Internet Topology

(12538 ASes, 32932 Links / Skitter 8/2003)

1

10

100

1000

10000

1 10 100 1000

Number of Peers of the Autonomous System

Fre

qu

en

cy

copyright 2005 Douglas S. Reeves 14

Interior vs. Exterior Gateway Protocols

• Interior (intra-domain): within a single AS– single administration, single policy– normal objectives: efficiency / simplicity / stability

• Exterior (inter-domain): between ASes– many organizations, each with own policy– objectives: configurability, scalability, robustness,

security

• Exchange of info between inter-domain, intra-domain routing occurs at border gateways

DISTANCE VECTOR PROTOCOLS

copyright 2005 Douglas S. Reeves 16

Distance Vector (DV) Routing

• Routers exchange information in the followingform:<destination1, min_cost to destination1>,<destination2, min_cost to destination2>,<destination3, min_cost to destination3>, ...

• Routers do not know the complete networktopology

• Exchange info with directly-attached neighborsonly– multiple steps of exchange needed to propagate

information across the network

copyright 2005 Douglas S. Reeves 17

DV Route Computation• Asynchronous, iterative, distributed computation

• For each destination, find…– cost of least cost path– “first hop” (neighbor) router on least cost path

• Computation based on Bellman-Ford algorithm

copyright 2005 Douglas S. Reeves 18

DV Route Computation (cont’d)

• In words:Least cost path to destination j is the path startingfrom any neighbor k for which(cost of link to k + path cost from k to j)is the least

Page 4: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

4

copyright 2005 Douglas S. Reeves 19

DV Routing Example

copyright 2005 Douglas S. Reeves 20

DV Routing Example (cont'd)

copyright 2005 Douglas S. Reeves 21

DV Routing Example (cont'd)

copyright 2005 Douglas S. Reeves 22

The Spanning Tree from A

copyright 2005 Douglas S. Reeves 23

Results of DV Computation

• Guaranteed non-looping LC path between everypair of nodes, after convergence

• But, while converging, or when changes occur,there may be temporary routing loops orinefficient paths

• Source of the problem: with distance vectors, youcan’t tell (locally) what path is being taken to adestination

DV Routing Example -- Link Failure

i.e., D’s distance vector has not been updated (yet),so D’s LC path to B goes through A,and A’s LC path to B goes through D

Page 5: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

5

copyright 2005 Douglas S. Reeves 25

Propagating Distance Information

Distance tonetwork N1

N1 N2 N3 N4 N5

R1 R2 R3 R4 R5

InitiallyInfInfInfInf

After 1 exchange (DV’s)InfInfInf1

After 2 exchangesInfInf21

After 3 exchangesInf321

After 4 exchanges4321

• “Good news travels fast” = availability of a newlink or router

copyright 2005 Douglas S. Reeves 26

The “Count to Infinity” Problem

Distance tonetwork N1

N1 N2 N3 N4 N5

R1 R2 R3 R4 R5

• “Bad news travels slowly” = failure of an existinglink or router

Initially4321

link fails

copyright 2005 Douglas S. Reeves 27

The “Count to Infinity” Problem

Distance tonetwork N1

N1 N2 N3 N4 N5

R1 R2 R3 R4 R5

After 1 exchanges4323

After 2 exchanges4343

After 3 exchanges4545

• “Bad news travels slowly” = failure of an existinglink or router

Initially4321

After 4 exchanges6565

After 5 exchanges6767

link fails

LINK-STATE PROTOCOLS

copyright 2005 Douglas S. Reeves 29

“Link State” (LS) Routing

• A link-state database is…

– a map of the entire network topology, describing nodesand links

• Each router maintains an identical copy of thisdatabase– routers broadcast link-state advertisements (LSAs) to

update the database of other routers– each router is responsible for originating an LSA

describing its working interfaces

copyright 2005 Douglas S. Reeves 30

LS Database Example

Page 6: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

6

copyright 2005 Douglas S. Reeves 31

Computing Routes from LSAs

• Each router computes the least cost path fromitself to all networks– normally computed by Dijkstra's shortest-path

algorithm– no convergence issues, no “count to infinity” issues

– only issue: how long to propagate LSAs throughoutentire network?

• With complete network topology information,there is more flexibility about how to optimizeroutes

copyright 2005 Douglas S. Reeves 32

Example: LSAs

copyright 2005 Douglas S. Reeves 33

Comparison of LS and DV Algorithms

–+Amount of data exchanged–+Simplicity

??Robustness+–Flexibility (metrics)+–Scalability+–Convergence Time

LSDVProperty

copyright 2005 Douglas S. Reeves 34

Also…

• Flooding and broadcasting

• Hierarchical routing

copyright 2005 Douglas S. Reeves 38

Summary

The Internet routing architecture consists ofrouters, Internet exchanges, routing databases

The top level of the Internet organization is theAutonomous Systems level

Exterior gateway protocols exchange routinginformation between ASes; interior protocols areused inside an AS

copyright 2005 Douglas S. Reeves 39

Summary (cont’d)

The two classes of routing algorithms aredistance-vector and link-statelink-state is more powerful, converges faster, and

scales betterdistance vector is simpler

Page 7: ROUTING, PART 1reeves.csc.ncsu.edu/Classes/csc573/routing1.pdf · Scalability – + Convergence Time – + Property DV LS copyright2005DouglasS.Reeves 34 Also… •Flooding and broadcasting

7

copyright 2005 Douglas S. Reeves 40

Next Lecture

• Routing, Part 2 (RIP and OSPF)