02:network Routers and Routing Protocols
02:network Routers and Routing Protocols
Routing Protocols
Features available
Cost
The packets are stored in the output buffer until the network is
available.
User
MPLS LSR
Web Server
User
MPLS LSR
• Notice that two labels can be directed
down the same link Web Server
MPLS: Label Values
31
31
User
7
15 7
47
MPLS LSR
• Notice that label values are not
globally unique Web Server
• Each pair of routers agrees on a label
MPLS Packet
MPLS adds a small pre-header to the start of any IPv4
(or IPv6, IPX, etc.) packet
In other words, between the data link and network
headers
20 bits
Label The label value
3 bits Class of Service The QoS class of the packet attached (e.g. discardable?)
1 bit Stack Is there a stack of labels?
8 bits Hop Limit The hop limit, copied from/to the IP header
MPLS and ATM
LSRs can be ATM-enabled
An LSR can forward a packet (as cells) through an ATM
network. This can be for any number of hops through the
ATM network.
In this situation the source and destination ATM switches
must be LSRs:
Other switches in between can be normal ATM
switches, however, the source LSR will use AAL
segmentation to send the cells on the ATM network
using a VPI/VCI for the destination LSR.
The destination LSR will extract the packet and
continue transmission using MPLS.
Routing
functions
routing
protocol
routing
protocol Control
routing table
updates
routing
table
Datapath:
routing table
lookup
per-packet
processing
IP
incoming IP Forwarding outgoing IP
datagrams datagrams
Routing
Decision
Routing
Table
Forwarding
Decision
Routing
Table
Forwarding
Decision
06/26/21 07:05 TN206 SemesterII2011 25 25
Slotted Chassis
CPU
Capacity of shared bus limits the
number of interface cards that can be
connected
06/26/21 07:05 TN206 SemesterII2011 28
2nd Generation Routers
Keeps shared bus architecture, Route Processor
switch)
Distributed architecture: Switch Switch Route
Interface Fabric
cards operate Fabric
Interface Interface
Processor
When the network address matches more than one route in the
routing table, the router uses the route that has the most
specific, or longest, network address match from its routing
table.
Sometimes there is more than one equal cost route to the same
destination network. There are routing protocol rules that
determine which route the router will use.
The attacker may also fool the machine on the private network
into believing it is some other computer using IP spoofing.
For a Cisco router, the IOS command show ip route displays the routes in the
routing table.