cs 457 lecture 12 routing
play

CS 457 Lecture 12 Routing Fall 2011 IP Address and 24-bit Subnet - PowerPoint PPT Presentation

CS 457 Lecture 12 Routing Fall 2011 IP Address and 24-bit Subnet Mask Address 12 34 158 5 00001100 00100010 10011110 00000101 11111111 11111111 11111111 00000000 255 255 255 0 Mask Scalability Improved Number related


  1. CS 457 – Lecture 12 Routing Fall 2011

  2. IP Address and 24-bit Subnet Mask Address � 12 34 158 5 00001100 00100010 10011110 00000101 11111111 11111111 11111111 00000000 255 255 255 0 Mask �

  3. Scalability Improved • Number related hosts from a common subnet – 1.2.3.0/24 on the left LAN – 5.6.7.0/24 on the right LAN 1.2.3.4 1.2.3.7 1.2.3.156 5.6.7.8 5.6.7.9 5.6.7.212 ... � ... � host � host � host � host � host � host � LAN 2 � LAN 1 � router � router � router � WAN � WAN � 1.2.3.0/24 5.6.7.0/24 • forwarding table �

  4. How Do the Routers Know Where to Send Data? • Forwarding tables at each router populated by routing protocols. • Original Internet: manually updated. • Routing protocols update tables based on “cost.” – Exchange tables with neighbors or everyone. – Use neighbor leading to shortest path.

  5. What is Routing? • A famous quotation from RFC 791 “A name indicates what we seek. An address indicates where it is. A route indicates how we get there.” -- Jon Postel

  6. Forwarding vs. Routing • Forwarding: at the data plane – Directing a packet to an outgoing link – Individual router using a forwarding table • Routing: at the control plane – Computing paths the packets will follow – Involves routers talking amongst themselves – Individual router creating a forwarding table

  7. Why Does Routing Matter? • End-to-end performance – Quality of the path affects user performance – Propagation delay, throughput, and packet loss • Use of network resources – Balance of the traffic over routers and links – Avoid congestion by directing traffic to lightly- loaded links • Transient disruptions during changes – Failures, maintenance, and load balancing – Limiting packet loss and delay during changes

  8. Shortest-Path Routing • Path-selection model – Destination-based – Load-insensitive (e.g., static link weights) – Minimum hop count or sum of link weights 2 1 3 1 4 2 1 5 4 3

  9. Shortest-Path Problem • Given: network topology with link costs – c(x,y) : link cost from node x to node y – Infinity if x and y are not direct neighbors • Compute: least-cost paths to all nodes – From a given source u to all other nodes – p(v) : predecessor node along path from source to v 2 1 3 1 4 u � 2 1 5 p(v) � 4 3 v �

  10. Dijkstra’s Shortest-Path Algorithm • Iterative algorithm – After k iterations, know least-cost path to k nodes • S : nodes whose least-cost path definitively known – Initially, S = {u} where u is the source node – Add one node to S in each iteration • D(v) : current cost of path from source to node v – Initially, D(v) = c(u,v) for all nodes v adjacent to u – … and D(v) = ∞ for all other nodes v – Continually update D(v) as shorter paths are learned

  11. Dijsktra’s Algorithm Initialization: S = {u} for all nodes v if v adjacent to u { D(v) = c(u,v) else D(v) = ∞ Loop find w not in S with the smallest D(w) add w to S update D(v) for all v adjacent to w and not in S: D(v) = min{D(v), D(w) + c(w,v)} until all nodes in S

  12. Dijkstra’s Algorithm Example 2 2 1 • 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3

  13. Dijkstra’s Algorithm Example 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3

  14. Shortest-Path Tree • Shortest-path tree • Forwarding from u table at u • 2 • link • v � • y � • 1 • 3 • 1 • v • (u,v) • 4 • x � • z � • u � • 2 • w • (u,w) • 1 • 5 • x • (u,w) • t � • w � • 4 • 3 • y • (u,v) • s � • z • (u,v) • s • (u,w) • (u,w) • t

  15. Link-State Routing • Each router keeps track of its incident links – Whether the link is up or down – The cost on the link • Each router broadcasts the link state – To give every router a complete view of the graph • Each router runs Dijkstra’s algorithm – To compute the shortest paths – … and construct the forwarding table • Example protocols – Open Shortest Path First (OSPF) – Intermediate System – Intermediate System (IS-IS)

  16. Detecting Topology Changes • Beaconing – Periodic “hello” messages in both directions – Detect a failure after a few missed “hellos” • “hello” � • Performance trade-offs – Detection speed – Overhead on link bandwidth and CPU – Likelihood of false detection

  17. Broadcasting the Link State • Flooding – Node sends link-state information out its links – And then the next node sends out all of its links – … except the one where the information arrived • X • A • X • A • C • B • D • C • B • D • (a) • (b) • X • A • X • A • C • B • D • C • B • D • (c) • (d)

  18. Broadcasting the Link State • Reliable flooding – Ensure all nodes receive link-state information – … and that they use the latest version • Challenges – Packet loss – Out-of-order arrival • Solutions – Acknowledgments and retransmissions – Sequence numbers – Time-to-live for each packet

  19. When to Initiate Flooding • Topology change – Link or node failure – Link or node recovery • Configuration change – Link cost change • Periodically – Refresh the link-state information – Typically (say) 30 minutes – Corrects for possible corruption of the data

  20. What’s Next • Read Chapter 1, 2, 3, and 4.1-4.3 • Next Lecture Topics from Chapter 4.2 and 4.3 – Routing • Homework – Due Thursday in recitation • Project 2 – You should be working on Project 2!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend