ADC&N Chapter 3 Handout
ADC&N Chapter 3 Handout
& Networking
( CN-6112 )
Presented by
Dr. M. Prasad, Ph. D, MISTE,
Professor,
Master of Science in Computer Science and Networking Program,
School of Computing and Informatics,
College of Engineering and Technology,
Dilla University, Dilla.
CHAPTER – 3
Routing Protocols
2.2
Chapter_3 Syllabus
Routing Algorithms: Types of routing algorithm,
Multicast Addressing
Protocols
2.3
Routing Algorithms
2.4
Introduction
An internet is a combination of networks connected by
routers
2.5
Introduction . . .
Routing Algorithm is
Two Categories
2.7
Based on Routing Table Updating
Routing algorithms can be grouped into two major classes:
• Non Adaptive
• Adaptive.
Non Adaptive
The route is computed in advance, off-line.
Downloaded to the routers when the network is booted.
This procedure is sometimes called Static Routing.
A static table is one with manual entries.
2.8
Based on Routing Table Updating . . .
Adaptive
• Change their routing decisions to reflect changes in the
topology and traffic as well.
2.9
Based on Routing Table Updating . . .
Interior Routing
Routing inside an autonomous system.
An interior protocol handles intradomain routing.
Examples: BGP
2.10
Based on Routing Table Updating . . .
2.11
Based on Routing Table Updating . . .
Example. 1
2.14
Based on Routing Table Updating . . .
2.15
Based on Routing Table Updating . . .
RIP (Routing Information Protocol)
Treat each network as equals
The cost of passing through each network is the same: one hop
count
Open Shortest Path First (OSPF)
Allow administrator to assign a cost for passing through a network
based on the type of serviced required
For example, maximum throughput or minimum delay
Border Gateway Protocol (BGP)
The criterion is the policy, which can be set by the administrator
2.16
Based on Forwarding Principle
Internet,
Unicasting
Multicasting
Broadcasting.
2.17
Based on Forwarding Principle . . .
Unicasting
One source, one destination
overlay networks
discovery
2.21
Unicast Routing
Algorithms
2.22
RIP:
Routing Information Protocol
2.23
RIP
RIP: Routing Information Protocol
2.24
RIP - Message Format
Command: 8-bit
The type of message:
request (1) or response (2)
Version: 8-bit
Define the RIP version
Family: 16-bit
Define the family of the protocol used
TCP/IP: value is 2
Address: 14 bytes
Defines the address of the destination network
14 bytes for this field to be applicable to any protocol
However, IP currently uses only 4 bytes, the rest are all 0s
Distance: 32-bit
The hop count from the advertising router to the destination network 2.25
RIP - Message Types
RIP uses two type of messages
Request
2.26
RIP - Message Types . . .
Every 30s
2.27
RIP - Message Types . . .
Example 1
2.28
RIP - Message Types . . .
Solution
R1 can advertise three networks 144.2.7.0, 144.2.9.0, and
144.2.12.0.
2.29
RIP - Routing table Updating
Initializing the Routing Table
When a router is added to a network
2.30
RIP - Routing table Updating . . .
Add one hop to the hop count for each advertised destination
Using the RIP updating message algorithm shown below
Repeat the following steps for each advertised destination
Periodic timer
Expiration timer
Garbage collection timer
Periodic timer
Control the advertising of regular update message
Although protocol specifies 30 s, the working model uses a random
number between 25 and 35 s.
Prevent routers update simultaneously
2.33
RIP – Timers . . .
Expiration Timer
When the count reaches zero, the route is purged from the table
and allow neighbors to become aware of the invalidity of a
route prior to purging.
2.35
RIP – Timers . . .
Example 2
A routing table has 20 entries.
It does not receive information about five routes for 200
seconds.
How many timers are running at this time?
Solution
The timers are listed below:
Periodic timer: 1
Expiration timer: 20 - 5 = 15
RIP - Problems
Slow Convergence
Instability
2.37
BGP:
Border Gateway Protocol
2.38
BGP
First appeared in 1989
An inter-autonomous system routing protocol
Based on the path vector routing method
2.39
BGP
2.40
BGP . . .
Autonomous boundary routers advertise the reachability of
networks in their own AS to neighbor autonomous boundary
routers
Each router receives a path vector message
Verify the advertised path is in agreement with its policy
If yes, update its routing table and modify the message before
sending it to the next router.
Add its AS number to the path and replacing the next router entry
with its own identification
2.41
BGP . . .
Example 3
R1 send a path vector message
2.42
BGP . . .
Path vector routing can solve
2.43
BGP . . .
Policy Routing can be easily implemented through path vector
routing
Once a router receives a message, it can check the path.
If one of the AS listed in the path is against its policy,
It can ignore that path and that destination
Does not update its routing table with this path
Does not send this message to its neighbors
Thus, path vector routing are not based on the smallest hop count
or the minimum metric. Based on the policy imposed on the router
by the administrator
2.44
BGP - Path Attributes
In previous example, the path was presented as a list of AS.
Actually, the path was presented as a list of attributes.
Well-known
Optional
2.45
BGP - Path Attributes . . .
Well-known:
One that every BGP router should recognize.
Divided into two categories:
Mandatory
Must appear in the description of a route
Well Known Attributes
ORIGIN: the source of the routing information (RIP or
OSPF)
AS_PATH: the list of AS through which the destination can
be reached.
NEXT_HOP: the next router to which data packet should be
2.46
sent
BGP - Path Attributes . . .
Well-known discretionary
Must be recognized by each router
But is not required to be included in every update
message.
Optional: One that need not be recognized by every router
Transitive
Must be passed to the next router by the router that has not
implemented this attribute
Nontransitive
2.48
BGP - Packet Format . . .
2.50
BGP - Types of Messages . . .
1. Open Message
2.51
BGP - Types of Messages . . .
If a router does not receive one of the messages during the hold
period, it considers the other party dead
2.53
BGP - Types of Messages . . .
2.54
BGP - Types of Messages . . .
2. Update Message
Used by a router to
2.55
BGP - Types of Messages . . .
IP address prefix:
2.58
BGP - Types of Messages . . .
3. Keepalive Message
connections.
2.62
BGP – Sessions . . .
BGP can have two types of sessions.
• External BGP (E-BGP)
Used to exchange information between two speaker
nodes belonging to two different autonomous systems.
• Internal BGP (I-BGP)
Used to exchange routing information between two
routers inside an autonomous system.
2.64
Multicast Routing
Algorithms
2.65
Multicast Routing Algorithms
2.67
DVMRP
Multicast distance vector routing.
Source based tree likely have different tree for different senders.
2.68
DVMRP
DVMRP developed as a progression of algorithms
2.69
DVMRP . . .
DVMRP consists of two major components:
The packet arrived from the link used to reach the source
2.70
DVMRP . . .
The first packet of multicast messages sent from a particular
internetwork.
2.72
DVMRP . . .
Prune 2.75
DVMRP . . .
Graft 2.76
DVMRP . . .
127 Worldwide
2.78
Multicast BackbONE
(MBONE)
2.79
MBONE
In 1992, an interconnected set of subnetworks with routers
countries.
2.80
MBONE
Only a small fraction of Internet routers are multicast
routers.
2.81
MBONE . . .
2.82
MBONE . . .
A logical tunnel is established by encapsulating the multicast
packet inside a unicast packet.
2.83
MBONE . . .
Multicast capable networks are connected to each other by
2.84
MBONE . . .
MBONE Application Areas
Carrying audio and video multicasts of IETF meetings
NASA Space Shuttle Missions
US House and Senate sessions
Many technical talks and seminars.
MBONE Drawbacks
Manual tunnel creation/maintenance
Inefficient
No routing policy (single tree)
Why would an ISP deploy a new Mbonenode? 2.85
Dr. M. Prasad, Ph.D, MISTE,
Professor,
Master of Science in Computer Science and Networking
Program,
School of Computing and Informatics,
E-mail : [email protected]
2.86
Phone No : 0934845087