routing
play

Routing An Engineering Approach to Computer Networking An - PowerPoint PPT Presentation

Routing An Engineering Approach to Computer Networking An Engineering Approach to Computer Networking What is it? Process of finding a path from a source to every destination in Process of finding a path from a source to every destination in


  1. Real-time network routing No centralized control • No centralized control • Each toll switch maintains a list of lightly loaded links Each toll switch maintains a list of lightly loaded links – – Intersection of source and destination lists gives set of lightly loaded paths Intersection of source and destination lists gives set of lightly loaded paths – – Example Example • • At A, list is C, D, E => links AC, AD, AE lightly loaded At A, list is C, D, E => links AC, AD, AE lightly loaded – – At B, list is D, F, G => links BD, BF, BG lightly loaded At B, list is D, F, G => links BD, BF, BG lightly loaded – – A asks B for its list A asks B for its list – – Intersection = D => AD and BD lightly loaded => ADB lightly loaded => it is Intersection = D => AD and BD lightly loaded => ADB lightly loaded => it is – – a good alternative path a good alternative path Very effective in practice: only about a couple of calls blocked in core Very effective in practice: only about a couple of calls blocked in core • • out of about 250 million calls attempted every day out of about 250 million calls attempted every day

  2. Dynamic Alternative Alternative Routing Routing Dynamic Very simple idea, but can be shown to provide optimal routes at very low complexity… November 2001 Dynamic Alternative Routing 17

  3. Underlying Network Properties Underlying Network Properties  Fully connected network • Underlying network is a trunk network  Relatively small number of nodes • In 1986, the trunk network of British Telecom had only 50 nodes • Any algorithm with polynomial running time works fine  Stochastic traffic • Low variance when the link is nearly saturated November 2001 Dynamic Alternative Routing 18

  4. Dynamic Alternative Routing Dynamic Alternative Routing  Proposed by F.P. Kelly, R. C i,j Gibbens at British Telecom i j (well, Cambridge, Really:)  Whenever the link (i, j) is saturated, use an alternative k node (tandem)  Q. How to choose tandem? November 2001 Dynamic Alternative Routing 19

  5. Fixed Tandem Fixed Tandem  For any pair of nodes (i, j) we assign a fixed node k as tandem  Needs careful traffic analysis and reprogramming  Inflexible during breakdowns and unexpected traffic at tandem November 2001 Dynamic Alternative Routing 20

  6. Sticky Random Tandem Sticky Random Tandem  If there is no free circuit along (i, j) , a new call is routed through a randomly chosen tandem k  k is the tandem as long as it does not fail  If k fails for a call, the call is lost and a new tandem is selected November 2001 Dynamic Alternative Routing 21

  7. Sticky Random Tandem Sticky Random Tandem  Decentralized and flexible  No fancy pre-analysis of traffic required  Most of the time friendly tandems are used: • p k (i, j) : proportion of calls between i and j which go through k • q k (i, j) : proportion of calls that are blocked p a (i, j)q a (i, j) = p b (i, j)q b (i, j)  We may assign different frequencies to different tandems November 2001 Dynamic Alternative Routing 22

  8. Trunk Reservation Trunk Reservation  Unselfishness towards one’s friends i j is good up to a point!!!  We need to penalize two link calls, at least when the lines are very busy! k A tandem k accepts to forward calls if it has free capacity more than R November 2001 Dynamic Alternative Routing 23

  9. Trunk Reservation Trunk Reservation November 2001 Dynamic Alternative Routing 24

  10. Bounds: Erlang’ ’s Bound s Bound Bounds: Erlang  A node connected to C circuits  Arrival: Poisson with mean v  The expected value of blocking: 1 ! c i v v C '( $ E ( v , C ) = % " C ! 0 ! i i & # = November 2001 Dynamic Alternative Routing 25

  11. Max-flow Bound Max-flow Bound  Capacity of (i, j) : C ij C ij i j  Mean load on (i, j) : v ij ' ( $ E n ( t ) f ( v ( t )) ! ij % " k & # i j <  where f is: ' $ max x x ! ! % " + ij ikj & # i j k i , j < ( November 2001 Dynamic Alternative Routing 26

  12. Trunk Reservation Trunk Reservation November 2001 Dynamic Alternative Routing 27

  13. Traffic, Capacity Mismatch Traffic, Capacity Mismatch  Traffic > Capacity for some links  Can we always find a feasible set of tandems?  Red links: saturated links  White links: not saturated  Good triangle: one red, two white links November 2001 Dynamic Alternative Routing 28

  14. Greedy Algorithm Greedy Algorithm a. No red links Success! b. Red link and a Success! good triangle T 1 Add good • T k+1 triangle to the list T k T 2 c. Red link and no Fail good triangle November 2001 Dynamic Alternative Routing 29

  15. Greedy Algorithm Greedy Algorithm a. No red links Success! b. Red link and a For any p < 1/3, the greedy algorithm is Success! good triangle T 1 successful with probability approaching 1. Add good • T k+1 triangle to the list T k T 2 c. Red link and no Fail good triangle November 2001 Dynamic Alternative Routing 30

  16. Extensions to DAR Extensions to DAR  n -link paths • Too much resources consumed, little benefit  Multiple alternatives • M attempts before rejecting a call  Least-busy alternative  Repacking • A call in progress can be rerouted November 2001 Dynamic Alternative Routing 31

  17. Comparison of Extensions Comparison of Extensions November 2001 Dynamic Alternative Routing 32

  18. Features of Internet Routing Packets, not circuits! Packets, not circuits! • • E.g. timescales can be much shorter E.g. timescales can be much shorter – – Topology complicated/heterogeneous • Topology complicated/heterogeneous • Many (10,000 ++) providers Many (10,000 ++) providers • • Traffic sources bursty Traffic sources bursty • • Traffic matrix unpredictable Traffic matrix unpredictable • • E.g. Not distance constrained E.g. Not distance constrained – – Goal: maximise maximise throughput, subject to min delay and cost (and throughput, subject to min delay and cost (and • Goal: • energy?) energy?)

  19. Internet Routing Model 2 key features: 2 key features: • • Dynamic routing – – Dynamic routing Intra- and Inter-AS routing, AS = locus of admin control – – Intra- and Inter-AS routing, AS = locus of admin control Internet organized as Internet organized as “ “autonomous systems autonomous systems” ” (AS). (AS). • • AS is internally connected AS is internally connected – – Interior Gateway Protocols (IGPs IGPs) ) within AS. within AS. Interior Gateway Protocols ( • • – – Eg: RIP, OSPF, HELLO Eg : RIP, OSPF, HELLO Exterior Gateway Protocols ( Exterior Gateway Protocols (EGPs EGPs) ) for AS to AS routing. for AS to AS routing. • • Eg: EGP, BGP-4 : EGP, BGP-4 – – Eg

  20. Requirements for Intra-AS Routing Should scale scale for the size of an AS. for the size of an AS. Should • • Low end: 10s of routers (small enterprise) – – Low end: 10s of routers (small enterprise) High end: 1000s of routers (large ISP) – – High end: 1000s of routers (large ISP) Different requirements on routing convergence Different requirements on routing convergence after topology changes after topology changes • • Low end: can tolerate some connectivity disruptions Low end: can tolerate some connectivity disruptions – – – High end: fast convergence essential to business (making money on transport) High end: fast convergence essential to business (making money on transport) – Operational/Admin/Management (OAM) Complexity Complexity Operational/Admin/Management (OAM) • • Low end: simple, self-configuring – – Low end: simple, self-configuring High end: Self-configuring, but operator hooks for control – – High end: Self-configuring, but operator hooks for control Traffic engineering capabilities: high end only Traffic engineering capabilities: high end only • •

  21. Requirements for Inter-AS Routing Should Should scale scale for the size of the global Internet. for the size of the global Internet. • • Focus on reachability reachability , not optimality , not optimality Focus on – – Use address aggregation Use address aggregation techniques to minimize core routing table sizes and techniques to minimize core routing table sizes and – – associated control traffic associated control traffic At the same time, it should allow flexibility in topological structure flexibility in topological structure (eg: don (eg: don ʼ ʼ t t At the same time, it should allow – – restrict to trees etc) restrict to trees etc) Allow policy-based routing Allow policy-based routing between autonomous systems between autonomous systems • • Policy refers to arbitrary preference among a menu of available options arbitrary preference among a menu of available options (based (based Policy refers to – – upon options ʼ upon options ʼ attributes attributes ) ) In the case of routing, options include advertised AS-level routes to address In the case of routing, options include advertised AS-level routes to address – – prefixes prefixes Fully distributed routing (as opposed to a signaled approach) is the only (as opposed to a signaled approach) is the only Fully distributed routing – – possibility. possibility. Extensible to meet the demands for newer policies. Extensible to meet the demands for newer policies. – –

  22. Intra-AS and Inter-AS routing C.b Gateways: B.a •perform inter-AS A.a routing amongst A.c b c themselves a a C •perform intra-AS b a B routers with other d routers in their AS c b A network layer inter-AS , link layer intra-AS physical layer routing in gateway A.c

  23. Intra-AS and Inter-AS routing: Example Inter-AS routing C.b between B.a A and B A.a Host b h2 c A.c a a C b a B Host d Intra-AS routing c h1 b A within AS B Intra-AS routing within AS A

  24. Basic Dynamic Routing Methods Source-based: Source-based: source gets a map of the network, source gets a map of the network, • • source finds route, and either source finds route, and either – – signals the route-setup (eg: ATM approach) signals the route-setup (eg: ATM approach) – – encodes the route into packets (inefficient) – – encodes the route into packets (inefficient) Link state routing: routing: per-link per-link information information Link state • • Get map map of network (in terms of of network (in terms of link states link states ) at all nodes and find next-hops locally. ) at all nodes and find next-hops locally. – – Get Maps consistent => next-hops consistent – – Maps consistent => next-hops consistent Distance vector: : per-node per-node information information Distance vector • • At every node, set up distance signposts distance signposts to destination nodes (a vector) to destination nodes (a vector) – – At every node, set up Setup this by peeking at neighbors ʼ ʼ signposts. signposts. – – Setup this by peeking at neighbors

  25. Where are we? Routing vs Forwarding Routing vs Forwarding   Forwarding table vs Forwarding in simple topologies Forwarding table vs Forwarding in simple topologies   Routers vs Bridges: review Routers vs Bridges: review   Routing Problem Routing Problem   Telephony vs Internet Routing Telephony vs Internet Routing   Source-based vs Fully distributed Routing Source-based vs Fully distributed Routing   Distance vector vs Link state routing Distance vector vs Link state routing   Bellman Ford and Dijkstra Algorithms Bellman Ford and Dijkstra Algorithms   Addressing and Routing: Scalability Addressing and Routing: Scalability  

  26. DV & LS: consistency criterion The The subset of a shortest path is also the shortest path subset of a shortest path is also the shortest path between the two between the two • • intermediate nodes. intermediate nodes. Corollary: Corollary: • • If the shortest path shortest path from node i to node j, with distance D(i,j) from node i to node j, with distance D(i,j) passes through neighbor passes through neighbor – – If the k, with link cost c(i,k), then: , with link cost c(i,k), then: k D(i,j) = c(i,k) + D(k,j) D(i,j) = c(i,k) + D(k,j) j D(k,j) c(i,k) i k

  27. Distance Vector DV = Set (vector) of Signposts, one for each destination

  28. Distance Vector (DV) Approach Consistency Condition: D(i,j) = c(i,k) + D(k,j) D(i,j) = c(i,k) + D(k,j) Consistency Condition:   The DV (Bellman-Ford) algorithm DV (Bellman-Ford) algorithm evaluates this recursion evaluates this recursion iteratively iteratively. . The • • m th th iteration In the m iteration, the consistency criterion holds, assuming that each node sees , the consistency criterion holds, assuming that each node sees In the – – all nodes and links m-hops (or smaller) away from it (i.e. an m-hop view m-hop view) ) all nodes and links m-hops (or smaller) away from it (i.e. an 1 B C 1 B B C 7 7 7 A A 2 8 A 8 1 1 1 E E D E D 2 2 Example network A’s 1-hop view A’s 2-hop view (After 1 st iteration) (After 2 nd Iteration)

  29. Distance Vector (DV)… Initial distance values (iteration 1): Initial distance values (iteration 1): • • D(i,i) = 0 ; D(i,i) = 0 ; – – D(i,k) = c(i,k) if k is a neighbor (i.e. k is one-hop away); and if k is a neighbor (i.e. k is one-hop away); and – D(i,k) = c(i,k) – D(i,j) = INFINITY for all other non-neighbors j. D(i,j) = INFINITY for all other non-neighbors j. – – Note that the set of values D(i,*) D(i,*) is a is a distance vector at node i. distance vector at node i. Note that the set of values • • The algorithm also maintains a next-hop value (forwarding table) The algorithm also maintains a next-hop value (forwarding table) • • for every destination j, initialized as: for every destination j, initialized as: next-hop(i) = i; next-hop(i) = i; – – next-hop(k) = k if k is a neighbor, and if k is a neighbor, and – next-hop(k) = k – next-hop(j) = UNKNOWN if j is a non-neighbor. if j is a non-neighbor. next-hop(j) = UNKNOWN – –

  30. Distance Vector (DV)… After every iteration each node i each node i exchanges its distance vectors exchanges its distance vectors After every iteration • • D(i,*) with its immediate neighbors with its immediate neighbors. . D(i,*) For any neighbor k, if c(i,k) + D(k,j) < D(i,j), c(i,k) + D(k,j) < D(i,j), then: then: For any neighbor k, if • • D(i,j) = c(i,k) + D(k,j) D(i,j) = c(i,k) + D(k,j) – – next-hop(j) = k – next-hop(j) = k – After each iteration, the consistency criterion is met • After each iteration, the consistency criterion is met • After m m iterations iterations, each node knows the shortest path possible to , each node knows the shortest path possible to – After – any other node which is m m hops hops or less. or less. any other node which is I.e. each node has an m-hop view of the network. I.e. each node has an m-hop view of the network. – – The algorithm converges (self-terminating) in O(d) iterations: O(d) iterations: d is d is – The algorithm converges (self-terminating) in – the maximum diameter of the network. the maximum diameter of the network.

  31. Distance Vector (DV) Example A ʼ A ʼ s distance vector D(A,*): s distance vector D(A,*): • • After Iteration 1 is: [0, 7, INFINITY, INFINITY, 1] – After Iteration 1 is: [0, 7, INFINITY, INFINITY, 1] – After Iteration 2 is: [0, 7, 8, 3, 1] After Iteration 2 is: [0, 7, 8, 3, 1] – – After Iteration 3 is: [0, 7, 5, 3, 1] – After Iteration 3 is: [0, 7, 5, 3, 1] – After Iteration 4 is: [0, 6, 5, 3, 1] – After Iteration 4 is: [0, 6, 5, 3, 1] – 1 B C 1 B B C 7 7 7 A A 2 8 A 8 1 1 1 E E D E D 2 2 Example network A’s 1-hop view A’s 2-hop view (After 1 st iteration) (After 2 nd Iteration)

  32. Distance Vector: link cost changes Link cost changes: 1 node detects local link cost change Y updates distance table 4 1 X Z if cost change in least cost path, notify 5 neighbors “good Time 0 Iter. 1 Iter. 2 news algorithm travels DV(Y) [ 4 0 1] [ 1 0 1] [ 1 0 1] terminates fast” DV(Z) [ 5 1 0] [ 5 1 0] [ 2 1 0]

  33. Distance Vector: link cost changes Link cost changes: good news travels fast 60 Y bad news travels slow - “count to 4 1 infinity” problem! X Z 50 Time 0 Iter 1 Iter 2 Iter 3 Iter 4 algo goes DV(Y) [ 4 0 1] [ 6 0 1] [ 6 0 1] [ 8 0 1] [ 8 0 1] On til Reach 51! DV(Z) [ 5 1 0] [ 5 1 0] [ 7 1 0] [ 7 1 0] [ 9 1 0]

  34. Distance Vector: poisoned reverse If Z routes through Y to get to X : 60 Y Z tells Y its (Z’s) distance to X is infinite (so 4 1 Y won’t route to X via Z) X Z 50 At Time 0, DV(Z) as seen by Y is [INF INF 0], not [5 1 0] ! algorithm terminates Time 0 Iter 1 Iter 2 Iter 3 DV(Y) [ 4 0 1] [ 60 0 1] [ 60 0 1] [ 51 0 1] DV(Z) [ 5 1 0] [ 5 1 0] [ 50 1 0] [ 7 1 0]

  35. Link State (LS) Approach The link state (Dijkstra) approach is iterative, but it link state (Dijkstra) approach is iterative, but it pivots around destinations pivots around destinations • The • j, and their predecessors k = p(j) j, and their predecessors k = p(j) Observe that an alternative version of the consistency condition holds for this case: Observe that an alternative version of the consistency condition holds for this case: – – D(i,j) = D(i,k) + c(k,j) D(i,j) = D(i,k) + c(k,j) j ) j , k ( i c D(i,k) k Each node i collects all link states c(*,*) Each node i collects all link states c(*,*) first and runs the complete Dijkstra first and runs the complete Dijkstra • • algorithm locally locally. . algorithm

  36. Link State (LS) Approach… After each iteration, the algorithm finds a new destination node j and a After each iteration, the algorithm finds a new destination node j and a • • shortest path to it. shortest path to it. After m iterations the algorithm has explored paths, which are m hops or • After m iterations the algorithm has explored paths, which are m hops or • smaller from node i. smaller from node i. It has an m-hop view of the network just like the distance-vector approach It has an m-hop view of the network just like the distance-vector approach – – The Dijkstra algorithm at node i maintains two sets: • The Dijkstra algorithm at node i maintains two sets: • set N set N that contains nodes to which the shortest paths have been found so far, and that contains nodes to which the shortest paths have been found so far, and – – set M set M that contains all that contains all other other nodes. nodes. – – For all nodes k, two values are maintained: For all nodes k, two values are maintained: – – D(i,k): current value of D(i,k): current value of distance distance from i to k. from i to k. • • p(k): the p(k): the predecessor predecessor node to k on the shortest known path from i node to k on the shortest known path from i • •

  37. Dijkstra: Initialization Initialization: • Initialization: • D(i,i) = 0 and p(i) = i; D(i,i) = 0 and p(i) = i; – – D(i,k) = c(i,k) and p(k) = i if k is a neighbor of I D(i,k) = c(i,k) and p(k) = i if k is a neighbor of I – – D(i,k) = INFINITY and p(k) = UNKNOWN if k is if k is not not a neighbor of I a neighbor of I D(i,k) = INFINITY and p(k) = UNKNOWN – – Set N = { i }, and and next-hop (i) = I next-hop (i) = I Set N = { i }, – – Set M = { j | j is not i} Set M = { j | j is not i} – – Initially set N has only the node i and set M has the rest of the nodes. Initially set N has only the node i and set M has the rest of the nodes. • • At the end of the algorithm, the set N contains all the nodes, and set M is At the end of the algorithm, the set N contains all the nodes, and set M is • • empty empty

  38. Dijkstra: Iteration In each iteration, a new node j is moved from set M into the set N. In each iteration, a new node j is moved from set M into the set N. • • Node j has the minimum distance among all current nodes in M, i.e. D(i,j) = min D(i,j) = min {l Node j has the minimum distance among all current nodes in M, i.e. – – {l M} D(i,l). D(i,l). ε M} ε If multiple nodes have the same minimum distance, any one of them is chosen as If multiple nodes have the same minimum distance, any one of them is chosen as – – j. j. Next-hop(j) = the neighbor of i on the shortest path the neighbor of i on the shortest path Next-hop(j) = – – Next-hop(j) = next-hop(p(j)) if p(j) is not i if p(j) is not i Next-hop(j) = next-hop(p(j)) • • Next-hop(j) = j Next-hop(j) = j if p(j) = i if p(j) = i • • Now, in addition, the distance values of any neighbor k of j in set M is reset as: Now, in addition, the distance values of any neighbor k of j in set M is reset as: – – If D(i,k) < D(i,j) + c(j,k), then If D(i,k) < D(i,j) + c(j,k), then • • D(i,k) = D(i,j) + c(j,k), and p(k) = j. D(i,k) = D(i,j) + c(j,k), and p(k) = j. This operation is called This operation is called “ “ relaxing relaxing ” ” the edges of node j. the edges of node j. • •

  39. Dijkstra ʼ s algorithm: example D(B),p(B) D(D),p(D) Step D(C),p(C) D(E),p(E) set N D(F),p(F) 2,A 1,A 0 5,A infinity A infinity 2,A 1 4,D 2,D AD infinity 2,A 2 3,E ADE 4,E 3 3,E ADEB 4,E 4 ADEBC 4,E 5 ADEBCF 5 3 B C 5 2 A 2 F 1 3 1 2 D E 1 The shortest-paths spanning tree rooted at A is called an SPF-tree

  40. Misc Issues: Transient Loops With consistent LSDBs, all nodes With consistent LSDBs, all nodes • • compute consistent loop-free compute consistent loop-free B paths paths 1 1 Limited by Dijkstra computation Limited by Dijkstra computation X • • overhead, space requirements overhead, space requirements 3 A C Can still have Can still have transient loops transient loops • • 5 2 D Packet from C  A may loop around BDC if B knows about failure and C & D do not

  41. Dijkstra ʼ s algorithm, discussion Algorithm complexity: Algorithm complexity: n nodes n nodes   each iteration: need to check all nodes, w, not in N   each iteration: need to check all nodes, w, not in N  n*(n+1)/2 comparisons: O(n**2) n*(n+1)/2 comparisons: O(n**2)  more efficient implementations possible: O(nlogn)   more efficient implementations possible: O(nlogn) Oscillations possible: Oscillations possible: e.g., link cost = amount of carried traffic e.g., link cost = amount of carried traffic   A A A A 1 1+e 2+e 0 2+e 0 2+e 0 D B D D B B D B 0 0 1+e 1 0 0 1+e 1 e 0 0 0 1 e 1+e 0 C C C C 1 1 e … recompute … recompute … recompute initially routing

  42. Misc: How to assign the Cost Metric? Choice of link cost defines traffic load • Choice of link cost defines traffic load • Low cost = high probability link belongs to SPT and will attract traffic Low cost = high probability link belongs to SPT and will attract traffic – – Tradeoff: convergence vs load distribution • Tradeoff: convergence vs load distribution • Avoid oscillations Avoid oscillations – – Achieve good network utilization Achieve good network utilization – – Static metrics (weighted hop count) Static metrics (weighted hop count) • • Does not take traffic load (demand) into account. Does not take traffic load (demand) into account. – – Dynamic metrics (cost based upon queue or delay etc) (cost based upon queue or delay etc) • Dynamic metrics • Highly oscillatory, very hard to dampen (DARPAnet experience) Highly oscillatory, very hard to dampen (DARPAnet experience) – – Quasi-static metric : : • Quasi-static metric • Reassign static metrics based upon overall network load (demand matrix), assumed Reassign static metrics based upon overall network load (demand matrix), assumed – – to be quasi-stationary to be quasi-stationary

  43. Misc: Incremental SPF Dijkstra algorithm is invoked whenever a new LS update is received. • Dijkstra algorithm is invoked whenever a new LS update is received. • Most of the time, the change to the SPT is minimal, or even nothing Most of the time, the change to the SPT is minimal, or even nothing – – If the node has visibility to a large number of prefixes, then it may see • If the node has visibility to a large number of prefixes, then it may see • large number of updates. large number of updates. Flooding bugs further exacerbate the problem Flooding bugs further exacerbate the problem – – Solution: incremental SPF algorithms which use knowledge of current map Solution: incremental SPF algorithms which use knowledge of current map – – and SPT, and process the delta change with lower computational and SPT, and process the delta change with lower computational complexity compared to Dijkstra complexity compared to Dijkstra Avg case: Avg case: O(logn) O(logn) v. to v. to O(nlogn) O(nlogn) for Dijkstra for Dijkstra – – Ref: Alaettinoglu, Jacobson, Yu, “ “Towards Milli-Second IGP Convergence, Towards Milli-Second IGP Convergence,” ” Internet Draft Internet Draft. . Ref: Alaettinoglu, Jacobson, Yu,

  44. Summary: Distributed Routing Techniques Link State Vectoring • Topology information is Topology information is flooded flooded within the within the • Each router knows little about network Each router knows little about network • • routing domain routing domain topology topology Best end-to-end paths are computed Best end-to-end paths are computed Only best next-hops are chosen by each Only best next-hops are chosen by each • • • • locally at each router. router for each destination network. locally at each router. router for each destination network. • Best end-to-end paths determine next- Best end-to-end paths determine next- • Best end-to-end paths result from Best end-to-end paths result from • • hops. hops. composition of all next-hop choices composition of all next-hop choices Based on minimizing some notion of Does not require any notion of distance • • Based on minimizing some notion of • • Does not require any notion of distance distance distance • Does not require uniform policies at all Does not require uniform policies at all • Works only if policy is shared Works only if policy is shared and and uniform uniform routers routers • • Examples: OSPF, IS-IS Examples: RIP, BGP • • Examples: OSPF, IS-IS • • Examples: RIP, BGP

  45. Link state: topology dissemination A router describes its neighbors neighbors with a with a link state packet (LSP) link state packet (LSP) • A router describes its • Use controlled flooding controlled flooding to distribute this everywhere to distribute this everywhere • Use • store an LSP in an LSP database store an LSP in an LSP database – – if new, forward to every interface other than incoming one if new, forward to every interface other than incoming one – – a network with E edges will copy at most 2E times a network with E edges will copy at most 2E times – –

  46. Sequence numbers How do we know an LSP is new? • How do we know an LSP is new? • Use a sequence number in LSP header Use a sequence number in LSP header • • Greater sequence number is newer Greater sequence number is newer • • What if sequence number wraps around? What if sequence number wraps around? • • smaller sequence number is now newer! smaller sequence number is now newer! – – (hint: use a large sequence space) (hint: use a large sequence space) – – On boot up, what should be the initial sequence number? • On boot up, what should be the initial sequence number? • have to somehow purge old LSPs have to somehow purge old LSPs – – two solutions two solutions – – aging aging • • lollipop sequence space lollipop sequence space • •

  47. Aging Creator of LSP puts timeout value in the header Creator of LSP puts timeout value in the header • • Router removes LSP when it times out Router removes LSP when it times out • • also floods this information to the rest of the network (why?) also floods this information to the rest of the network (why?) – – So, on booting, router just has to wait for its old So, on booting, router just has to wait for its old LSPs LSPs to be purged to be purged • • But what age to choose? But what age to choose? • • if too small if too small – – purged before fully flooded (why?) purged before fully flooded (why?) • • needs frequent updates needs frequent updates • • if too large if too large – – router waits idle for a long time on rebooting router waits idle for a long time on rebooting • •

  48. A better solution Need a unique unique start sequence number start sequence number Need a • • a is older than b if: a is older than b if: • • a < 0 and a < b a < 0 and a < b – – a > o, a < b, and b-a b-a < N/4 < N/4 a > o, a < b, and – – a > 0, b > 0, a > b, and a > 0, b > 0, a > b, and a-b a-b > N/4 > N/4 – –

  49. More on lollipops If a router gets an older LSP, it tells the sender about the newer If a router gets an older LSP, it tells the sender about the newer • • LSP LSP So, newly booted router quickly finds out its most recent So, newly booted router quickly finds out its most recent • • sequence number sequence number It jumps to one more than that It jumps to one more than that • • -N/2 is a trigger trigger to evoke a response from community memory to evoke a response from community memory -N/2 is a • •

  50. Recovering from a partition On partition, LSP databases can get out of synch • On partition, LSP databases can get out of synch • Databases described by database descriptor records • Databases described by database descriptor records • Routers on each side of a newly restored link talk to each other to • Routers on each side of a newly restored link talk to each other to • update databases (determine missing and out-of-date LSPs LSPs) ) update databases (determine missing and out-of-date

  51. Router failure How to detect? How to detect? • • HELLO protocol HELLO protocol – – HELLO packet may be corrupted HELLO packet may be corrupted • • so age anyway – so age anyway – on a timeout, flood the information – on a timeout, flood the information –

  52. Securing LSP databases LSP databases LSP databases must must be consistent to avoid routing loops be consistent to avoid routing loops • • Malicious agent may inject spurious LSPs Malicious agent may inject spurious LSPs • • Routers must actively protect their databases Routers must actively protect their databases • • checksum LSPs checksum LSPs – – ack LSP exchanges ack LSP exchanges – – passwords passwords – –

  53. Outline Routing in telephone networks Routing in telephone networks • • Distance-vector routing Distance-vector routing • • Link-state routing • Link-state routing • Choosing link costs • Choosing link costs • Hierarchical routing Hierarchical routing • • Internet routing protocols Internet routing protocols • • Routing within a broadcast LAN Routing within a broadcast LAN • • Multicast routing Multicast routing • • Routing with policy constraints Routing with policy constraints • • Routing for mobile hosts • Routing for mobile hosts •

  54. Choosing link costs Shortest path uses link costs Shortest path uses link costs • • Can use either static of dynamic costs Can use either static of dynamic costs • • In both cases: cost determine amount of traffic on the link In both cases: cost determine amount of traffic on the link • • lower the cost, more the expected traffic lower the cost, more the expected traffic – – if dynamic cost depends on load, can have oscillations (why?) if dynamic cost depends on load, can have oscillations (why?) – –

  55. Static metrics Simplest: set all link costs to 1 => min hop routing Simplest: set all link costs to 1 => min hop routing • • but 28.8 modem link is not the same as a T3! but 28.8 modem link is not the same as a T3! – – Give links weight proportional to capacity Give links weight proportional to capacity • •

  56. Dynamic metrics A first cut (ARPAnet ARPAnet original) original) • A first cut ( • Cost proportional to length of router queue Cost proportional to length of router queue • • independent of link capacity independent of link capacity – – Many problems when network is loaded • Many problems when network is loaded • queue length averaged over a small time => transient spikes caused major queue length averaged over a small time => transient spikes caused major – – rerouting rerouting wide dynamic range => network completely ignored paths with high costs wide dynamic range => network completely ignored paths with high costs – – queue length assumed to predict future loads => opposite is true (why?) queue length assumed to predict future loads => opposite is true (why?) – – no restriction on successively reported costs => oscillations no restriction on successively reported costs => oscillations – – all tables computed simultaneously => low cost link flooded all tables computed simultaneously => low cost link flooded – –

  57. Modified metrics – queue length averaged over a small queue length averaged over a small – queue length averaged over a – – queue length averaged over a time time longer time longer time wide dynamic range queue – – wide dynamic range queue dynamic range restricted dynamic range restricted – – queue length assumed to predict queue length assumed to predict – – – – cost also depends on intrinsic link cost also depends on intrinsic link future loads future loads capacity capacity no restriction on successively – – no restriction on successively restriction on successively reported – – restriction on successively reported reported costs reported costs costs costs all tables computed simultaneously all tables computed simultaneously – – – attempt to stagger table computation attempt to stagger table computation –

  58. Routing dynamics

  59. Outline Routing in telephone networks • Routing in telephone networks • Distance-vector routing Distance-vector routing • • Link-state routing Link-state routing • • Choosing link costs Choosing link costs • • Hierarchical routing • Hierarchical routing • Internet routing protocols • Internet routing protocols • Routing within a broadcast LAN • Routing within a broadcast LAN • Multicast routing • Multicast routing • Routing with policy constraints • Routing with policy constraints • Routing for mobile hosts Routing for mobile hosts • •

  60. Multicast routing Unicast: single source sends to a single destination : single source sends to a single destination • Unicast • Multicast: hosts are part of a multicast group multicast group • Multicast: hosts are part of a • packet sent by packet sent by any any member of a group are received by member of a group are received by all all – – Useful for • Useful for • multiparty videoconference multiparty videoconference – – distance learning distance learning – – resource location resource location – –

  61. Multicast group Associates a set of senders and receivers with each other • Associates a set of senders and receivers with each other • but independent of them but independent of them – – created either when a sender starts sending from a group created either when a sender starts sending from a group – – or a receiver expresses interest in receiving or a receiver expresses interest in receiving – – even if no one else is there! even if no one else is there! – – Sender does not need to know receivers ʼ ʼ identities identities Sender does not need to know receivers • • rendezvous point rendezvous point – –

  62. Addressing Multicast group in the Internet has its own Class D address Multicast group in the Internet has its own Class D address • • looks like a host address, but isn ʼ ʼ t t looks like a host address, but isn – – Senders send to the address • Senders send to the address • Receivers anywhere in the world request packets from that address • Receivers anywhere in the world request packets from that address • “Magic “ Magic” ” is in associating the two: is in associating the two: dynamic directory service dynamic directory service • • Four problems Four problems • • which groups are currently active which groups are currently active – – how to express interest in joining a group how to express interest in joining a group – – discovering the set of receivers in a group discovering the set of receivers in a group – – delivering data to members of a group delivering data to members of a group – –

  63. Expanding ring search A way to use multicast groups for resource discovery • A way to use multicast groups for resource discovery • Routers decrement TTL when forwarding • Routers decrement TTL when forwarding • Sender sets TTL and multicasts • Sender sets TTL and multicasts • reaches all receivers <= TTL hops away reaches all receivers <= TTL hops away – – Discovers local resources first Discovers local resources first • • Since heavily loaded servers can keep quiet, automatically distributes load • Since heavily loaded servers can keep quiet, automatically distributes load •

  64. Multicast flavors Unicast Unicast: point to point : point to point • • Multicast: Multicast: • • point to multipoint point to multipoint – – multipoint to multipoint multipoint to multipoint – – Can simulate point to multipoint by a set of point to point unicasts unicasts • Can simulate point to multipoint by a set of point to point • Can simulate multipoint to multipoint by a set of point to multipoint • Can simulate multipoint to multipoint by a set of point to multipoint • multicasts multicasts The difference is efficiency The difference is efficiency • •

  65. Example Suppose A wants to talk to B, G, H, I, B to A, G, H, I • Suppose A wants to talk to B, G, H, I, B to A, G, H, I • With unicast unicast, 4 messages sent from each source , 4 messages sent from each source • With • links AC, BC carry a packet in triplicate links AC, BC carry a packet in triplicate – – With point to multipoint multicast, 1 message sent from each source With point to multipoint multicast, 1 message sent from each source • • but requires establishment of two separate multicast groups but requires establishment of two separate multicast groups – – With multipoint to multipoint multicast, 1 message sent from each With multipoint to multipoint multicast, 1 message sent from each • • source, source, single multicast group single multicast group – –

  66. Shortest path tree Ideally, want to send exactly one multicast packet per link Ideally, want to send exactly one multicast packet per link • • forms a multicast tree multicast tree rooted at sender rooted at sender – – forms a Optimal multicast tree provides shortest shortest path from sender to every receiver path from sender to every receiver Optimal multicast tree provides • • shortest-path tree rooted at sender tree rooted at sender – – shortest-path

  67. Issues in wide-area multicast Difficult because Difficult because • • sources may join and leave dynamically sources may join and leave dynamically – – need to dynamically update shortest-path tree need to dynamically update shortest-path tree • • leaves of tree are often members of broadcast LAN leaves of tree are often members of broadcast LAN – – would like to exploit LAN broadcast capability would like to exploit LAN broadcast capability • • would like a receiver to join or leave without explicitly notifying sender would like a receiver to join or leave without explicitly notifying sender – – otherwise it will not scale otherwise it will not scale • •

  68. Multicast in a broadcast LAN Wide area multicast can exploit a LAN Wide area multicast can exploit a LAN ʼ ʼ s broadcast capability s broadcast capability • • E.g. Ethernet will multicast all packets with multicast bit set on E.g. Ethernet will multicast all packets with multicast bit set on • • destination address destination address Two problems: • Two problems: • what multicast MAC address corresponds to a given Class D IP address? what multicast MAC address corresponds to a given Class D IP address? – – does the LAN have contain any members for a given group (why do we does the LAN have contain any members for a given group (why do we – – need to know this?) need to know this?)

  69. Class D to MAC translation 23 bits copied from IP address 01 00 5E IEEE 802 MAC Address Reserved bit Multicast bit Class D IP address ‘1110’ = Class D indication Ignored Multiple Class D addresses map to the same MAC address Multiple Class D addresses map to the same MAC address • • Well-known translation algorithm => no need for a translation table Well-known translation algorithm => no need for a translation table • •

  70. Group Management Protocol Detects if a LAN has any members for a particular group Detects if a LAN has any members for a particular group • • If no members, then we can prune prune the shortest path tree for that group by telling parent the shortest path tree for that group by telling parent If no members, then we can – – Router periodically broadcasts a query query message message • Router periodically broadcasts a • Hosts reply with the list of groups they are interested in • Hosts reply with the list of groups they are interested in • To suppress traffic To suppress traffic • • reply after random timeout reply after random timeout – – broadcast reply broadcast reply – – if someone else has expressed interest in a group, drop out if someone else has expressed interest in a group, drop out – – To receive multicast packets: To receive multicast packets: • • translate from class D to MAC and configure adapter translate from class D to MAC and configure adapter – –

  71. Wide area multicast Assume Assume • • each endpoint is a router each endpoint is a router – – a router can use IGMP to discover all the members in its LAN that want to a router can use IGMP to discover all the members in its LAN that want to – – subscribe to each multicast group subscribe to each multicast group Goal • Goal • distribute packets coming from any sender directed to a given group to all distribute packets coming from any sender directed to a given group to all – – routers on the path to a group member routers on the path to a group member

  72. Simplest solution Flood packets from a source to entire network Flood packets from a source to entire network • • If a router has not seen a packet before, forward it to all interfaces If a router has not seen a packet before, forward it to all interfaces • • except the incoming one except the incoming one Pros • Pros • simple simple – – always works! always works! – – Cons Cons • • routers receive duplicate packets routers receive duplicate packets – – detecting that a packet is a duplicate requires storage, which can be detecting that a packet is a duplicate requires storage, which can be – – expensive for long multicast sessions expensive for long multicast sessions

  73. A clever solution Reverse path forwarding Reverse path forwarding • • Rule Rule • • forward packet from S to all interfaces if and only if packet arrives – forward packet from S to all interfaces if and only if packet arrives – on the interface that corresponds to the shortest path to to S S on the interface that corresponds to the shortest path no need to remember past packets no need to remember past packets – – C need not forward packet received from D C need not forward packet received from D – –

  74. Cleverer Don ʼ ʼ t send a packet downstream if you are not on the shortest path t send a packet downstream if you are not on the shortest path Don • • from the downstream router to the source from the downstream router to the source C need not forward packet from A to E • C need not forward packet from A to E • Potential confusion if downstream router has a choice of shortest paths • Potential confusion if downstream router has a choice of shortest paths • to source (see figure on previous slide) to source (see figure on previous slide)

  75. Pruning RPF does not completely eliminate unnecessary transmissions RPF does not completely eliminate unnecessary transmissions • • B and C get packets even though they do not need it B and C get packets even though they do not need it • • Pruning => router tells parent in tree to stop forwarding Pruning => router tells parent in tree to stop forwarding • • Can be associated either with a multicast group or with a source Can be associated either with a multicast group or with a source and and • • group group trades selectivity for router memory trades selectivity for router memory – –

  76. Rejoining What if host on C ʼ ʼ s LAN wants to receive messages from A after a s LAN wants to receive messages from A after a What if host on C • • previous prune by C? previous prune by C? IGMP lets C know of host ʼ IGMP lets C know of host ʼ s interest s interest – – C can send a join(group, A) join(group, A) message to B, which propagates it to A message to B, which propagates it to A C can send a – – or, periodically flood a message; C refrains from pruning or, periodically flood a message; C refrains from pruning – –

  77. A problem Reverse path forwarding requires a router to know shortest path Reverse path forwarding requires a router to know shortest path • • to a source to a source known from routing table – known from routing table – Doesn ʼ Doesn ʼ t work if some routers do not support multicast t work if some routers do not support multicast • • virtual links between multicast-capable routers between multicast-capable routers virtual links – – shortest path to A from E is not C, but F – shortest path to A from E is not C, but F –

  78. A problem (contd.) Two problems Two problems • • how to build virtual links how to build virtual links – – how to construct routing table for a network with virtual links how to construct routing table for a network with virtual links – –

  79. Tunnels Why do we need them? Why do we need them? • • Consider packet sent from A to F via multicast-incapable D Consider packet sent from A to F via multicast-incapable D • • If packet ʼ ʼ s destination is Class D, D drops it s destination is Class D, D drops it If packet • • If destination is F ʼ ʼ s address, F doesn s address, F doesn ʼ ʼ t know multicast address! t know multicast address! If destination is F • • So, put packet destination as F, but carry multicast address internally • So, put packet destination as F, but carry multicast address internally • Encapsulate IP in IP => set protocol type to IP-in-IP • Encapsulate IP in IP => set protocol type to IP-in-IP •

  80. Multicast routing protocol Interface on Interface on “ “shortest path shortest path” ” to source depends on whether path is real or virtual to source depends on whether path is real or virtual • • Shortest path from E to A is not through C, but F Shortest path from E to A is not through C, but F • • so packets from F will be flooded, but not from C – – so packets from F will be flooded, but not from C Need to discover shortest paths only taking multicast-capable routers into Need to discover shortest paths only taking multicast-capable routers into • • account account DVMRP DVMRP – –

  81. DVMRP Distance-vector Multicast routing protocol Distance-vector Multicast routing protocol • • Very similar to RIP Very similar to RIP • • distance vector distance vector – – hop count metric hop count metric – – Used in conjunction with • Used in conjunction with • flood-and-prune (to determine memberships) flood-and-prune (to determine memberships) – – prunes store per-source and per-group information prunes store per-source and per-group information • • reverse-path forwarding (to decide where to forward a packet) reverse-path forwarding (to decide where to forward a packet) – – explicit join messages to reduce join latency (but no source info, so still explicit join messages to reduce join latency (but no source info, so still – – need flooding) need flooding)

  82. MOSPF Multicast extension to OSPF Multicast extension to OSPF • • Routers flood group membership information with LSPs LSPs Routers flood group membership information with • • Each router independently computes shortest-path tree that only Each router independently computes shortest-path tree that only • • includes multicast-capable routers includes multicast-capable routers no need to flood and prune no need to flood and prune – – Complex • Complex • interactions with external and summary records interactions with external and summary records – – need storage per group per link need storage per group per link – – need to compute shortest path tree per source and group need to compute shortest path tree per source and group – –

  83. Core-based trees (CBT) Problems with DVMRP-oriented approach Problems with DVMRP-oriented approach • • need to periodically flood and prune to determine group members need to periodically flood and prune to determine group members – – need to source per-source and per-group prune records at each router need to source per-source and per-group prune records at each router – – Key idea with core-based tree Key idea with core-based tree • • coordinate multicast with a core core router router coordinate multicast with a – – host sends a join request to core router host sends a join request to core router – – routers along path mark incoming interface for forwarding routers along path mark incoming interface for forwarding – –

  84. Example Pros Pros • • routers not part of a group are not involved in pruning routers not part of a group are not involved in pruning – – explicit join/leave makes membership changes faster explicit join/leave makes membership changes faster – – router needs to store only one record per group router needs to store only one record per group – – Cons Cons • • all multicast traffic traverses core, which is a bottleneck all multicast traffic traverses core, which is a bottleneck – – traffic travels on non-optimal paths traffic travels on non-optimal paths – –

  85. Protocol independent multicast (PIM) Tries to bring together best aspects of CBT and DVMRP Tries to bring together best aspects of CBT and DVMRP • • Choose different strategies depending on whether multicast tree is Choose different strategies depending on whether multicast tree is • • dense or or sparse sparse dense flood and prune good for dense groups flood and prune good for dense groups – – only need a few prunes only need a few prunes • • CBT needs explicit join per source/group CBT needs explicit join per source/group • • CBT good for sparse groups CBT good for sparse groups – – Dense mode PIM == DVMRP Dense mode PIM == DVMRP • • Sparse mode PIM is similar to CBT Sparse mode PIM is similar to CBT • • but receivers can switch from CBT to a shortest-path tree but receivers can switch from CBT to a shortest-path tree – –

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend