SlideShare a Scribd company logo
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 3
Routing
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Routing
• RIP
• OSPF
• Metrics
• Switch basics
• Global internet
• Areas
• BGP
• IPV6
• Multicast Addresses
• Multicast Routing
• DVMRP
• PIM
Routing
Introduction
• Routing is the most important task in the networks to forward packets from source to
destination
• The devices like switches and routers take the responsibility of delivering the packets to right
destination
• This is accomplished by referring to their forwarding table and routing table respectively
• The fundamental problem is “how routers acquire the information about the network in their
routing table?”
Understanding – Routing in Real time
Understanding – Routing in Networks
Representing Network as a graph
• The routing process is well understood by representing
a network as a graph.
• Each node on the network may represent any host or
switch or router.
• Each link on the network is associated with a cost.
• The ultimate work of the router is to find the path with the
lowest cost between any nodes.
• These are performed by routing algorithm or routing
protocols.
Types of routing protocols
Distance Vector Algorithm
• The idea behind the DVR is that it maintains a table
with distance to every node
Assumptions:
• Each node contains the cost of link to the other node. These cost are configured by the administrator.
• The link that is down is assign with infinite cost.
Stages in DVR
• There are 3 stages in DVR
Initialization
Sharing
Updating
1. Initialization
Consider the given example network
Each node creates an initialization table with the cost to reach all other nodes. Since they do not know about all the
nodes, they create only for the neighboring node.
2. Sharing
From the given network Node A do not know about Node E but Node C knows about Node E.
Similarly Node C do not know about Node D
but Node A knows about Node D
Thus by sharing Node A’s Table to Node C ,
Node C learns about Node D.
By sharing Node C’s Table to Node A ,
Node A learns about Node E
3. Updating
Each and every node in the network updates its own table from the table received from the neighbor nodes.Updating process happens in 3 steps
1. Receiving node need to add the cost between itself (A) and sending node(C). (Cost of A  C is 2)2. Receiving node have to add the name of the sending node to each row as third column. This acts as the next node
information when the table is updated
3. The receiving node compares each row of its old table with the modified table.
If the next node entry is different, then the receiving node chooses the lowest value.
If the there is a tie, then old value is maintained
After several sharing and updates process all nodes in the network becomes stable and knows about the path to
reach any node on the network.
When to update??
• 2 methods
• Periodic update
• Triggered update
Instability problem
• 2 node instability
• 3 node instability
2 node instability
Remedies for 2 node instability
• Defining infinity
• Split horizon
• Split horizon with poison reverse
3 node instability
Routing Information Protocol
• Considerations
• Only networks have routing table not networks
• Metric used in Hop Count
• Infinity is 16
• Next node column defines the address of the router to reach the destination
Example scenario
Link State Routing Alg
Steps in Link state alg
• Reliable dissemination of LSP
• Creation of LSP
• Flooding of LSP
• Calculation of Routes from all received LSP
• Formation of Shortest path tree for each node
• Calculation of Routing Table
Creation of LSP
• LSP are created with 4 main information
• Node identity
• The list of links
• Sequence numbers
• Age (TTL)
Flooding
• Steps in flooding
• Creating node floods the LSP
• Receiving node compares the LSP with old LSP
• If received is old – discarded
• If received is new – old is discarded and new LSP is Flooded
• Old and new are differentiated by sequence numbers
• TTL helps in removing the old packets from the network.
Formation of shortest path
• It is created by using “Dijkstra Algorithm”
Computer networks    unit iii
Computer networks    unit iii
Calculation of Routing Table
OSPF Protocol
• One of the widely used link state routing is OSPF.
• OSPF offers many features
• Authentication of routing messages
 Routing messages are sent to all the nodes. Thus they should be authenticated.
• Additional hierarchy
 This is the tool to make the system more scalable. It allows many networks to be grouped as “Areas”
• Load balancing
 OSPF allows multiple routes with the same cost. Thus the traffic gets distributed all over the network.
Example Network
OSPF Header Format
Describes the version of the OSPFDescribes the total length of the mesasage
Used to identify the sender of the message
Used to identify in which area the node is locatedEntire packet except the data field is protected by check sum
Defines the type of authentication
0 - No Authentication
1 – simple password
2 – cryptographic authentication
Data
LSP Advertising Packet
• The basic building block of OSPF is creating the link state packet and
advertising them. There are 2 types of advertisements.
• Router should advertise the LSP packets to the directly connected networks
• Router should advertise information about the loss of link throughout the
network.
LSP Advertisement Packet Format
They are equal to the TTL.Defines the router that created the advertisementThey are used to detect the old or duplicate LSA’sThey are used to protect the entire advertisement packet.It defines the length of the complete LSA in bytes
Link ID and Link Data
They are used to identify the link along with the router IDThey are used to define the cost of the link
It defines the type of the link. There are 4 types of links
1. Point to point link
2. Transient link
3. Stub link
4. Virtual link
It is used for defining the type of service. It is possible to assign
different cost for the same route based on the type of service
Metrics
• The metrics that we have discussed so far were assumed that they are a known
factor for executing the algorithm.
• Drawbacks in simply assuming the metric
• They do not distinguish links on latency basis
• They do no distinguish links in capacity basis
• They do no distinguish links based on their current load.
Solution
• There are several methods evolved to calculate the metrics.
• But all we need is to test the various methods on a common flat form.
• One such flat form is known as ARPANET
• Further details about the ARPANET can be studied in the given link.
https://en.wikipedia.org/wiki/ARPANET
3 stages of ARPANET
• Original ARPANET
• New Routing Mechanism
• Revised ARPANET Routing Metric
• Each version uses different logics to compute the metric.
Original ARPANET
• In this method the metric is computed based on the “ Number of packets
queued for transmission on each link”
• Link with 10 packets queued for the transmission is assigned larger cost than
the link which has 5 packets queued for transmission.
New Routing Mechanism
• In this mechanism both latency and bandwidth is considered for calculation of metrics.
• The arrival time and depart time are captured from the time stamp added to the packet.
• Delay is computed as
• Delay = (depart time – arrival time) + Transmission time + latency.
• Based on this delay the cost will be assigned.
Revised ARPANET Routing Metric
• The major changes done in this versions are
• Compress the dynamic range of metric considerably
• Smoothen the variation of the metric with time
• Compression is achieved by taking the function of measured utilization , link type and link
speed.
• Smoothing can be achieved in 2 ways
• Averaging the delay instead of taking the trials
• Setting up a hard limit on how much the metric could change from one cycle to another cycle.
Switch Basics
• The conceptual structure of the switch is shown in the figure.
1. Control processor
• This block is responsible for moving the data from interface to memory
without the intervention of the CPU
2. Ports
• The ports communicates with the outside worlds
• It contains fiber optic receivers, buffers for holding the packets that are to be
transmitted.
• In case of virtual circuit, the port contains the virtual circuit identifier
• In case of ethernet, the port contains the forwarding table .
3. Fabrics
• They are very Basic and important function of a switch.
• They are responsible for forwarding the packets from input port to output port with minimal delay and max throughput.
• Types of Fabrics:
• Shared Bus:
• They are found in conventional processors. The bus is shared because in the conventional system the bus bandwidth determines the throughput.
• Shared Memory:
• They are found in the modern switches. They have common memory for both input and output port. Here the memory decides the throughput.
• Cross Bar:
• They are the matrix of pathways that can be configured to connect any input port to any output port.
• Self Routing:
• Self routing fabrics relay on some information in a pack header to direct each packet to its correct destination.
Global Internet
Some Techniques to address the Problems
• Areas
• Border gateway Protocol
• IP Version 6
Areas
Back bone Area or Area 0
• Inter domain Routing
• Intra domain Routing
BGP
Inter domain routing
Types of autonomous systems
• There are 3 types
• Stub autonomous system
• This type of as carries only local traffic. Ex. Small corporation
• Multi homed autonomous system
• They carries traffic for more than 2 AS. Ex. Large Corporation
• Transit autonomous system
• They carry traffic for more than 1 AS. This carries both transit traffic and local traffic.. Ex. Back bone
Providers
Challenges in Intra domain routing
• It should focus on finding the non looping path
• Backbone router should be able to route the packet anywhere in the network
• Varying nature of the AS should be addressed
• Multiple ISP’s may create a problem of reliability coz, different ISP have Different
Policies.
Path Vector Routing
• 3 stages
• Initialization
• Sharing
• Updating
1.Initialization
2. Sharing
• A1 shares with B1 and C1
• B1 shares with A1 and C1
• C1 shares with A1, B1, and C1
• D1 shares with C1
3.Updating
Looping problem
Multicast Addresses
Multicast Protocols
DVMRP
• Distance Vector Multicast Routing Protocol.
• Sharing of routing tables with the neighboring routers are not possible here.
• Each router have to create routing table from the scratch. Based on the information of the uni cast
routing.
• This can be achieved in 4 methods:
• Flooding
• Reverse Path Forwarding (RPF)
• Reverse Path Broadcasting (RPB)
• Reverse Path Multicasting (RPM)
1. Flooding
• default flooding concept.
• Router floods the all the received packets to all the ports, except the incoming
port.
• Drawbacks:
• By this method only broad casting is achieved not the multicasting.
• A router may receive multiple packets.
Reverse path Forwarding (RPF)
• In this method the packets are sent only to the
shortest path.
• This shortest path information is obtained from the
unicast routing tables.
• The router will not forward the table if the source
address and destination address are same. (in case of
receiving multiple copies)
Computer networks    unit iii
Multicast Addresses
Ipv6 header
End
of
Unit - 3

More Related Content

What's hot (20)

PPTX
Routing algorithm
Bushra M
 
PPT
Routing
Saima Azam
 
PPTX
Multicastingand multicast routing protocols
Iffat Anjum
 
PPTX
Framing in data link layer
Ahtesham Ullah khan
 
PPTX
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
PPTX
Link state routing protocol
Aung Thu Rha Hein
 
PPSX
Congestion control in TCP
selvakumar_b1985
 
PPTX
Computer networks - Channelization
Elambaruthi Elambaruthi
 
PPTX
Computer network switching
Shivani Godha
 
PDF
Interconnection Network
Heman Pathak
 
PPTX
Transport layer protocol
N.Jagadish Kumar
 
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
PPTX
Bgp protocol
Smriti Tikoo
 
PDF
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
PPT
Wireless routing protocols
barodia_1437
 
PPTX
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
PDF
Transport layer services
Melvin Cabatuan
 
PPTX
Error control
Bhupendra sahu
 
PDF
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 
Routing algorithm
Bushra M
 
Routing
Saima Azam
 
Multicastingand multicast routing protocols
Iffat Anjum
 
Framing in data link layer
Ahtesham Ullah khan
 
Protocols and the TCP/IP Protocol Suite
Atharaw Deshmukh
 
Link state routing protocol
Aung Thu Rha Hein
 
Congestion control in TCP
selvakumar_b1985
 
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Computer network switching
Shivani Godha
 
Interconnection Network
Heman Pathak
 
Transport layer protocol
N.Jagadish Kumar
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Kaushik Panta
 
Bgp protocol
Smriti Tikoo
 
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Wireless routing protocols
barodia_1437
 
Distance Vector & Link state Routing Algorithm
MOHIT AGARWAL
 
Transport layer services
Melvin Cabatuan
 
Error control
Bhupendra sahu
 
7. data link layer error detection and correction codes - parity and checksum
JAIGANESH SEKAR
 

Viewers also liked (14)

PPTX
Unit 3 computer system presention
Mat_J
 
PDF
Networking interview questions and answers
Amit Tiwari
 
PPTX
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...
Surabhi Gosavi
 
PPT
Threads in Java
Gaurav Aggarwal
 
PDF
Sliding window
radhaswam
 
PPTX
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
PPTX
Types of Networks,Network Design Issues,Design Tools
Surabhi Gosavi
 
PPS
Protocol & Type of Networks
Normarni Mohd Ariffin
 
PPTX
07. Virtual Functions
Haresh Jaiswal
 
PPTX
Pointers, virtual function and polymorphism
lalithambiga kamaraj
 
PPT
Unit 3 principles of programming language
Vasavi College of Engg
 
PPT
Network Topology
Norhisham Mohamad Nordin
 
PPTX
Ppt of types of-network
Darshit narechania
 
Unit 3 computer system presention
Mat_J
 
Networking interview questions and answers
Amit Tiwari
 
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...
Surabhi Gosavi
 
Threads in Java
Gaurav Aggarwal
 
Sliding window
radhaswam
 
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Types of Networks,Network Design Issues,Design Tools
Surabhi Gosavi
 
Protocol & Type of Networks
Normarni Mohd Ariffin
 
07. Virtual Functions
Haresh Jaiswal
 
Pointers, virtual function and polymorphism
lalithambiga kamaraj
 
Unit 3 principles of programming language
Vasavi College of Engg
 
Network Topology
Norhisham Mohamad Nordin
 
Ppt of types of-network
Darshit narechania
 
Ad

Similar to Computer networks unit iii (20)

PPTX
Routing Protocols
Dr.Ashvini Chaudhari Bhongade
 
PPTX
NETWORK LAYER PRESENTATION IP ADDRESSING UNIT-3.pptx
troqia
 
PPTX
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
PPTX
Unit 3_Network Layer_Part II.pptx
HODElex
 
PPTX
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
PPTX
Unit 4_Network Layer_Part II.pptx
HODElex
 
PPT
Routing.ppt
dada827350
 
PPT
Unit-3-Part-1 [Autosaved].ppt
Ramya Nellutla
 
PPTX
Network layer Part 7
Tutun Juhana
 
PPTX
Routing algorithms mehodology materials doc1
Mugabo4
 
PPTX
ROUTING PROTOCOLS new.pptx
AayushMishra89
 
PPTX
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
PPT
Routing protocols-network-layer
Nitesh Singh
 
PPTX
Network layer
Hasib Shaikh
 
PPTX
Routing algorithms
MoctardOLOULADE
 
PPT
Network layer
TharuniDiddekunta
 
PDF
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
PPTX
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
PPTX
CN Unit 2 - cs8591.pptx
Pondinesh2
 
PPT
NETWORK LAYER.ppt
DrTThendralCompSci
 
NETWORK LAYER PRESENTATION IP ADDRESSING UNIT-3.pptx
troqia
 
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
Unit 3_Network Layer_Part II.pptx
HODElex
 
unit 3 computer networks-switching,packet switching,internet protocol.
venigkrish89
 
Unit 4_Network Layer_Part II.pptx
HODElex
 
Routing.ppt
dada827350
 
Unit-3-Part-1 [Autosaved].ppt
Ramya Nellutla
 
Network layer Part 7
Tutun Juhana
 
Routing algorithms mehodology materials doc1
Mugabo4
 
ROUTING PROTOCOLS new.pptx
AayushMishra89
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
Routing protocols-network-layer
Nitesh Singh
 
Network layer
Hasib Shaikh
 
Routing algorithms
MoctardOLOULADE
 
Network layer
TharuniDiddekunta
 
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
CN Unit 2 - cs8591.pptx
Pondinesh2
 
NETWORK LAYER.ppt
DrTThendralCompSci
 
Ad

More from JAIGANESH SEKAR (20)

PDF
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
PDF
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
PDF
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
PDF
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
PDF
2.10 network layer services i pv4
JAIGANESH SEKAR
 
PDF
2.9 network layer services packet switching
JAIGANESH SEKAR
 
PDF
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
PDF
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
PDF
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
PDF
2.5 access control channelization methods
JAIGANESH SEKAR
 
PDF
2.4 access control controlled access methods
JAIGANESH SEKAR
 
PDF
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
PDF
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
PDF
2.2 flow control
JAIGANESH SEKAR
 
PDF
2.1 framing
JAIGANESH SEKAR
 
PDF
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
PDF
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
PDF
6. data link layer physical addressing
JAIGANESH SEKAR
 
PDF
5. protocol layering
JAIGANESH SEKAR
 
PDF
2. overview of data communication part 1
JAIGANESH SEKAR
 
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
JAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
JAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
JAIGANESH SEKAR
 
2.10 network layer services i pv4
JAIGANESH SEKAR
 
2.9 network layer services packet switching
JAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
JAIGANESH SEKAR
 
2.7 wlan ieee 802.11
JAIGANESH SEKAR
 
2.6 ethernet ieee 802.3
JAIGANESH SEKAR
 
2.5 access control channelization methods
JAIGANESH SEKAR
 
2.4 access control controlled access methods
JAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
JAIGANESH SEKAR
 
2.3 access control random access methods - part 1
JAIGANESH SEKAR
 
2.2 flow control
JAIGANESH SEKAR
 
2.1 framing
JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
JAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
JAIGANESH SEKAR
 
6. data link layer physical addressing
JAIGANESH SEKAR
 
5. protocol layering
JAIGANESH SEKAR
 
2. overview of data communication part 1
JAIGANESH SEKAR
 

Recently uploaded (20)

PDF
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PDF
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
Chapter-V-DED-Entrepreneurship: Institutions Facilitating Entrepreneurship
Dayanand Huded
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
The History of Phone Numbers in Stoke Newington by Billy Thomas
History of Stoke Newington
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 

Computer networks unit iii

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 3 Routing Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Routing • RIP • OSPF • Metrics • Switch basics • Global internet • Areas • BGP • IPV6 • Multicast Addresses • Multicast Routing • DVMRP • PIM
  • 5. Introduction • Routing is the most important task in the networks to forward packets from source to destination • The devices like switches and routers take the responsibility of delivering the packets to right destination • This is accomplished by referring to their forwarding table and routing table respectively • The fundamental problem is “how routers acquire the information about the network in their routing table?”
  • 8. Representing Network as a graph • The routing process is well understood by representing a network as a graph. • Each node on the network may represent any host or switch or router. • Each link on the network is associated with a cost. • The ultimate work of the router is to find the path with the lowest cost between any nodes. • These are performed by routing algorithm or routing protocols.
  • 9. Types of routing protocols
  • 10. Distance Vector Algorithm • The idea behind the DVR is that it maintains a table with distance to every node Assumptions: • Each node contains the cost of link to the other node. These cost are configured by the administrator. • The link that is down is assign with infinite cost.
  • 11. Stages in DVR • There are 3 stages in DVR Initialization Sharing Updating
  • 12. 1. Initialization Consider the given example network Each node creates an initialization table with the cost to reach all other nodes. Since they do not know about all the nodes, they create only for the neighboring node.
  • 13. 2. Sharing From the given network Node A do not know about Node E but Node C knows about Node E. Similarly Node C do not know about Node D but Node A knows about Node D Thus by sharing Node A’s Table to Node C , Node C learns about Node D. By sharing Node C’s Table to Node A , Node A learns about Node E
  • 14. 3. Updating Each and every node in the network updates its own table from the table received from the neighbor nodes.Updating process happens in 3 steps 1. Receiving node need to add the cost between itself (A) and sending node(C). (Cost of A  C is 2)2. Receiving node have to add the name of the sending node to each row as third column. This acts as the next node information when the table is updated 3. The receiving node compares each row of its old table with the modified table. If the next node entry is different, then the receiving node chooses the lowest value. If the there is a tie, then old value is maintained After several sharing and updates process all nodes in the network becomes stable and knows about the path to reach any node on the network.
  • 15. When to update?? • 2 methods • Periodic update • Triggered update
  • 16. Instability problem • 2 node instability • 3 node instability
  • 18. Remedies for 2 node instability • Defining infinity • Split horizon • Split horizon with poison reverse
  • 20. Routing Information Protocol • Considerations • Only networks have routing table not networks • Metric used in Hop Count • Infinity is 16 • Next node column defines the address of the router to reach the destination
  • 23. Steps in Link state alg • Reliable dissemination of LSP • Creation of LSP • Flooding of LSP • Calculation of Routes from all received LSP • Formation of Shortest path tree for each node • Calculation of Routing Table
  • 24. Creation of LSP • LSP are created with 4 main information • Node identity • The list of links • Sequence numbers • Age (TTL)
  • 25. Flooding • Steps in flooding • Creating node floods the LSP • Receiving node compares the LSP with old LSP • If received is old – discarded • If received is new – old is discarded and new LSP is Flooded • Old and new are differentiated by sequence numbers • TTL helps in removing the old packets from the network.
  • 26. Formation of shortest path • It is created by using “Dijkstra Algorithm”
  • 30. OSPF Protocol • One of the widely used link state routing is OSPF. • OSPF offers many features • Authentication of routing messages  Routing messages are sent to all the nodes. Thus they should be authenticated. • Additional hierarchy  This is the tool to make the system more scalable. It allows many networks to be grouped as “Areas” • Load balancing  OSPF allows multiple routes with the same cost. Thus the traffic gets distributed all over the network.
  • 32. OSPF Header Format Describes the version of the OSPFDescribes the total length of the mesasage Used to identify the sender of the message Used to identify in which area the node is locatedEntire packet except the data field is protected by check sum Defines the type of authentication 0 - No Authentication 1 – simple password 2 – cryptographic authentication Data
  • 33. LSP Advertising Packet • The basic building block of OSPF is creating the link state packet and advertising them. There are 2 types of advertisements. • Router should advertise the LSP packets to the directly connected networks • Router should advertise information about the loss of link throughout the network.
  • 34. LSP Advertisement Packet Format They are equal to the TTL.Defines the router that created the advertisementThey are used to detect the old or duplicate LSA’sThey are used to protect the entire advertisement packet.It defines the length of the complete LSA in bytes Link ID and Link Data They are used to identify the link along with the router IDThey are used to define the cost of the link It defines the type of the link. There are 4 types of links 1. Point to point link 2. Transient link 3. Stub link 4. Virtual link It is used for defining the type of service. It is possible to assign different cost for the same route based on the type of service
  • 35. Metrics • The metrics that we have discussed so far were assumed that they are a known factor for executing the algorithm. • Drawbacks in simply assuming the metric • They do not distinguish links on latency basis • They do no distinguish links in capacity basis • They do no distinguish links based on their current load.
  • 36. Solution • There are several methods evolved to calculate the metrics. • But all we need is to test the various methods on a common flat form. • One such flat form is known as ARPANET • Further details about the ARPANET can be studied in the given link. https://en.wikipedia.org/wiki/ARPANET
  • 37. 3 stages of ARPANET • Original ARPANET • New Routing Mechanism • Revised ARPANET Routing Metric • Each version uses different logics to compute the metric.
  • 38. Original ARPANET • In this method the metric is computed based on the “ Number of packets queued for transmission on each link” • Link with 10 packets queued for the transmission is assigned larger cost than the link which has 5 packets queued for transmission.
  • 39. New Routing Mechanism • In this mechanism both latency and bandwidth is considered for calculation of metrics. • The arrival time and depart time are captured from the time stamp added to the packet. • Delay is computed as • Delay = (depart time – arrival time) + Transmission time + latency. • Based on this delay the cost will be assigned.
  • 40. Revised ARPANET Routing Metric • The major changes done in this versions are • Compress the dynamic range of metric considerably • Smoothen the variation of the metric with time • Compression is achieved by taking the function of measured utilization , link type and link speed. • Smoothing can be achieved in 2 ways • Averaging the delay instead of taking the trials • Setting up a hard limit on how much the metric could change from one cycle to another cycle.
  • 41. Switch Basics • The conceptual structure of the switch is shown in the figure.
  • 42. 1. Control processor • This block is responsible for moving the data from interface to memory without the intervention of the CPU
  • 43. 2. Ports • The ports communicates with the outside worlds • It contains fiber optic receivers, buffers for holding the packets that are to be transmitted. • In case of virtual circuit, the port contains the virtual circuit identifier • In case of ethernet, the port contains the forwarding table .
  • 44. 3. Fabrics • They are very Basic and important function of a switch. • They are responsible for forwarding the packets from input port to output port with minimal delay and max throughput. • Types of Fabrics: • Shared Bus: • They are found in conventional processors. The bus is shared because in the conventional system the bus bandwidth determines the throughput. • Shared Memory: • They are found in the modern switches. They have common memory for both input and output port. Here the memory decides the throughput. • Cross Bar: • They are the matrix of pathways that can be configured to connect any input port to any output port. • Self Routing: • Self routing fabrics relay on some information in a pack header to direct each packet to its correct destination.
  • 46. Some Techniques to address the Problems • Areas • Border gateway Protocol • IP Version 6
  • 47. Areas
  • 48. Back bone Area or Area 0
  • 49. • Inter domain Routing • Intra domain Routing BGP
  • 51. Types of autonomous systems • There are 3 types • Stub autonomous system • This type of as carries only local traffic. Ex. Small corporation • Multi homed autonomous system • They carries traffic for more than 2 AS. Ex. Large Corporation • Transit autonomous system • They carry traffic for more than 1 AS. This carries both transit traffic and local traffic.. Ex. Back bone Providers
  • 52. Challenges in Intra domain routing • It should focus on finding the non looping path • Backbone router should be able to route the packet anywhere in the network • Varying nature of the AS should be addressed • Multiple ISP’s may create a problem of reliability coz, different ISP have Different Policies.
  • 53. Path Vector Routing • 3 stages • Initialization • Sharing • Updating
  • 55. 2. Sharing • A1 shares with B1 and C1 • B1 shares with A1 and C1 • C1 shares with A1, B1, and C1 • D1 shares with C1
  • 60. DVMRP • Distance Vector Multicast Routing Protocol. • Sharing of routing tables with the neighboring routers are not possible here. • Each router have to create routing table from the scratch. Based on the information of the uni cast routing. • This can be achieved in 4 methods: • Flooding • Reverse Path Forwarding (RPF) • Reverse Path Broadcasting (RPB) • Reverse Path Multicasting (RPM)
  • 61. 1. Flooding • default flooding concept. • Router floods the all the received packets to all the ports, except the incoming port. • Drawbacks: • By this method only broad casting is achieved not the multicasting. • A router may receive multiple packets.
  • 62. Reverse path Forwarding (RPF) • In this method the packets are sent only to the shortest path. • This shortest path information is obtained from the unicast routing tables. • The router will not forward the table if the source address and destination address are same. (in case of receiving multiple copies)

Editor's Notes

  • #13: View in Slide Show Mode