cs 457 lecture 12 routing
play

CS 457 Lecture 12 Routing Fall 2011 IP Address and 24-bit Subnet - PowerPoint PPT Presentation

CS 457 Lecture 12 Routing Fall 2011 IP Address and 24-bit Subnet Mask Address 12 34 158 5 00001100 00100010 10011110 00000101 11111111 11111111 11111111 00000000 255 255 255 0 Mask Scalability Improved Number related


  1. CS 457 – Lecture 12 Routing Fall 2011

  2. IP Address and 24-bit Subnet Mask Address � 12 34 158 5 00001100 00100010 10011110 00000101 11111111 11111111 11111111 00000000 255 255 255 0 Mask �

  3. Scalability Improved • Number related hosts from a common subnet – 1.2.3.0/24 on the left LAN – 5.6.7.0/24 on the right LAN 1.2.3.4 1.2.3.7 1.2.3.156 5.6.7.8 5.6.7.9 5.6.7.212 ... � ... � host � host � host � host � host � host � LAN 2 � LAN 1 � router � router � router � WAN � WAN � 1.2.3.0/24 5.6.7.0/24 • forwarding table �

  4. How Do the Routers Know Where to Send Data? • Forwarding tables at each router populated by routing protocols. • Original Internet: manually updated. • Routing protocols update tables based on “cost.” – Exchange tables with neighbors or everyone. – Use neighbor leading to shortest path.

  5. What is Routing? • A famous quotation from RFC 791 “A name indicates what we seek. An address indicates where it is. A route indicates how we get there.” -- Jon Postel

  6. Forwarding vs. Routing • Forwarding: at the data plane – Directing a packet to an outgoing link – Individual router using a forwarding table • Routing: at the control plane – Computing paths the packets will follow – Involves routers talking amongst themselves – Individual router creating a forwarding table

  7. Why Does Routing Matter? • End-to-end performance – Quality of the path affects user performance – Propagation delay, throughput, and packet loss • Use of network resources – Balance of the traffic over routers and links – Avoid congestion by directing traffic to lightly- loaded links • Transient disruptions during changes – Failures, maintenance, and load balancing – Limiting packet loss and delay during changes

  8. Shortest-Path Routing • Path-selection model – Destination-based – Load-insensitive (e.g., static link weights) – Minimum hop count or sum of link weights 2 1 3 1 4 2 1 5 4 3

  9. Shortest-Path Problem • Given: network topology with link costs – c(x,y) : link cost from node x to node y – Infinity if x and y are not direct neighbors • Compute: least-cost paths to all nodes – From a given source u to all other nodes – p(v) : predecessor node along path from source to v 2 1 3 1 4 u � 2 1 5 p(v) � 4 3 v �

  10. Dijkstra’s Shortest-Path Algorithm • Iterative algorithm – After k iterations, know least-cost path to k nodes • S : nodes whose least-cost path definitively known – Initially, S = {u} where u is the source node – Add one node to S in each iteration • D(v) : current cost of path from source to node v – Initially, D(v) = c(u,v) for all nodes v adjacent to u – … and D(v) = ∞ for all other nodes v – Continually update D(v) as shorter paths are learned

  11. Dijsktra’s Algorithm Initialization: S = {u} for all nodes v if v adjacent to u { D(v) = c(u,v) else D(v) = ∞ Loop find w not in S with the smallest D(w) add w to S update D(v) for all v adjacent to w and not in S: D(v) = min{D(v), D(w) + c(w,v)} until all nodes in S

  12. Dijkstra’s Algorithm Example 2 2 1 • 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3

  13. Dijkstra’s Algorithm Example 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3 2 2 1 1 3 3 1 1 4 4 2 2 1 1 5 5 4 4 3 3

  14. Shortest-Path Tree • Shortest-path tree • Forwarding from u table at u • 2 • link • v � • y � • 1 • 3 • 1 • v • (u,v) • 4 • x � • z � • u � • 2 • w • (u,w) • 1 • 5 • x • (u,w) • t � • w � • 4 • 3 • y • (u,v) • s � • z • (u,v) • s • (u,w) • (u,w) • t

  15. Link-State Routing • Each router keeps track of its incident links – Whether the link is up or down – The cost on the link • Each router broadcasts the link state – To give every router a complete view of the graph • Each router runs Dijkstra’s algorithm – To compute the shortest paths – … and construct the forwarding table • Example protocols – Open Shortest Path First (OSPF) – Intermediate System – Intermediate System (IS-IS)

  16. Detecting Topology Changes • Beaconing – Periodic “hello” messages in both directions – Detect a failure after a few missed “hellos” • “hello” � • Performance trade-offs – Detection speed – Overhead on link bandwidth and CPU – Likelihood of false detection

  17. Broadcasting the Link State • Flooding – Node sends link-state information out its links – And then the next node sends out all of its links – … except the one where the information arrived • X • A • X • A • C • B • D • C • B • D • (a) • (b) • X • A • X • A • C • B • D • C • B • D • (c) • (d)

  18. Broadcasting the Link State • Reliable flooding – Ensure all nodes receive link-state information – … and that they use the latest version • Challenges – Packet loss – Out-of-order arrival • Solutions – Acknowledgments and retransmissions – Sequence numbers – Time-to-live for each packet

  19. When to Initiate Flooding • Topology change – Link or node failure – Link or node recovery • Configuration change – Link cost change • Periodically – Refresh the link-state information – Typically (say) 30 minutes – Corrects for possible corruption of the data

  20. What’s Next • Read Chapter 1, 2, 3, and 4.1-4.3 • Next Lecture Topics from Chapter 4.2 and 4.3 – Routing • Homework – Due Thursday in recitation • Project 2 – You should be working on Project 2!

Recommend


More recommend