Routing Basics. Chapter Goals. What Is Routing? CHAPTER

Similar documents
Router and Routing Basics

Introduction to Dynamic Routing Protocols

Routing with OSPF. Introduction

Routing Protocols OSPF CHAPTER. The following topics describe supported routing protocols. Topics include OSPF, page 9-1 IS-IS Protocol, page 9-3

Overview of Routing between Virtual LANs

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Introduction to LAN/WAN. Network Layer

Routing in Small Networks. Internet Routing Overview. Agenda. Routing in Large Networks

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Chapter 10 Link-State Routing Protocols

Layer 3 Routing User s Manual

O /27 [110/129] via , 00:00:05, Serial0/0/1

Route Discovery Protocols

Internet Control Message Protocol (ICMP)

Exterior Gateway Protocols (BGP)

Table of Contents. Cisco How Does Load Balancing Work?

Introduction to TCP/IP

Chapter 4. Distance Vector Routing Protocols

Advanced Networking Routing: RIP, OSPF, Hierarchical routing, BGP

Local-Area Network -LAN

Inter-domain Routing. Outline. Border Gateway Protocol

Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur

Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Using the Border Gateway Protocol for Interdomain Routing

Level 2 Routing: LAN Bridges and Switches

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Based on Computer Networking, 4 th Edition by Kurose and Ross

ITRI CCL. IP Routing Primer. Paul C. Huang, Ph.D. ITRI / CCL / N300. CCL/N300; Paul Huang 1999/6/2 1

Link-State Routing Protocols

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:

Computer Networks. Main Functions

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Active measurements: networks. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis Georgios Smaragdakis, Ph.D.

Routing Protocols (RIP, OSPF, BGP)

Route Optimization. rek Petr Grygarek, VSB-TU Ostrava, Routed and Switched Networks 1

Routing in packet-switching networks

RARP: Reverse Address Resolution Protocol

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Introduction to Metropolitan Area Networks and Wide Area Networks

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Configuring a Gateway of Last Resort Using IP Commands

Lecture 12: Link-state Routing"

DEMYSTIFYING ROUTING SERVICES IN SOFTWAREDEFINED NETWORKING

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CLASSLESS INTER DOMAIN ROUTING - CIDR

Protocol Data Units and Encapsulation

GregSowell.com. Mikrotik Routing

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Ethernet (LAN switching)

Lesson 5-3: Border Gateway Protocol

IP Addressing A Simplified Tutorial

Transport Layer Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

SolarWinds Technical Reference

CSE331: Introduction to Networks and Security. Lecture 8 Fall 2006

- Route Redistribution -

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

- Hubs vs. Switches vs. Routers -

Internet Protocol version 4 Part I

Evaluation And Implementation Of The Open Shortest Path First (OSPF) Routing Protocol

OSPF Configuring Multi-Area OSPF

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Scaling 10Gb/s Clustering at Wire-Speed

6.263 Data Communication Networks

Data Center Convergence. Ahmad Zamer, Brocade

The Internet. Internet Technologies and Applications

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Computer Networking Networks

Administrative Distance

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Network-Wide Change Management Visibility with Route Analytics

IP Traffic Engineering over OMP technique

- IGRP - IGRP v1.22 Aaron Balchunas

for guaranteed IP datagram routing

Introduction to LAN/WAN. Network Layer (part II)

Can Forwarding Loops Appear when Activating ibgp Multipath Load Sharing?

BGP Best Path Selection Algorithm

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Advanced Transportation Management Systems

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Network Layer: Network Layer and IP Protocol

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

IP Routing Configuring RIP, OSPF, BGP, and PBR

Border Gateway Protocol BGP4 (2)

10CS64: COMPUTER NETWORKS - II

Textbook Required: Cisco Networking Academy Program CCNP: Building Scalable Internetworks v5.0 Lab Manual.

Access Control Lists: Overview and Guidelines

BGP. 1. Internet Routing

Transcription:

CHAPTER 5 Chapter Goals Learn the basics of routing protocols Learn the differences between link-state and distance vector routing protocols Learn about the metrics used by routing protocols to determine path selection Learn the basics of how data travels from end stations through intermediate stations and on to the destination end station Understand the difference between routed protocols and routing protocols This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role of routing protocols is briefly contrasted with the role of routed or network protocols Subsequent chapters in Part VII, Routing Protocols, address specific routing protocols in more detail, while the network protocols that use routing protocols are discussed in Part VI, Network Protocols What Is Routing? Routing is the act of moving information across an internetwork from a source to a destination Along the way, at least one intermediate node typically is encountered Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer The primary difference between the two is that bridging occurs at Layer 2 (the link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer) This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways The topic of routing has been covered in computer science literature for more than two decades, but routing achieved commercial popularity as late as the mid-1980s The primary reason for this time lag is that networks in the 1970s were simple, homogeneous environments Only relatively recently has large-scale internetworking become popular 5-1

Routing Components Chapter 5 Routing Components Routing involves two basic activities: determining optimal routing paths and transporting information groups (typically called packets) through an internetwork In the context of the routing process, the latter of these is referred to as packet switching Although packet switching is relatively straightforward, path determination can be very complex Path Determination Routing protocols use metrics to evaluate what path will be the best for a packet to travel A metric is a standard of measurement, such as path bandwidth, that is used by routing algorithms to determine the optimal path to a destination To aid the process of path determination, routing algorithms initialize and maintain routing tables, which contain route information Route information varies depending on the routing algorithm used Routing algorithms fill routing tables with a variety of information Destination/next hop associations tell a router that a particular destination can be reached optimally by sending the packet to a particular router representing the next hop on the way to the final destination When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop Figure 5-1 depicts a sample destination/next hop routing table Figure 5-1 Destination/Next Hop Associations Determine the Data s Optimal Path Packet to router X Router 1 t1 Routing table Router 2 Routing table Dest: X Send to: R2 Dest: X Send to: R1 Already updated Not yet updated Routing tables also can contain other information, such as data about the desirability of a path Routers compare metrics to determine optimal routes, and these metrics differ depending on the design of the routing algorithm used A variety of common metrics will be introduced and described later in this chapter Routers communicate with one another and maintain their routing tables through the transmission of a variety of messages The routing update message is one such message that generally consists of all or a portion of a routing table By analyzing routing updates from all other routers, a router can build a detailed picture of network topology A link-state advertisement, another example of a message sent between routers, informs other routers of the state of the sender s links Link information also can be used to build a complete picture of network topology to enable routers to determine optimal routes to network destinations 5-2

Chapter 5 Routing Components Switching Switching algorithms is relatively simple; it is the same for most routing protocols In most cases, a host determines that it must send a packet to another host Having acquired a router s address by some means, the source host sends a packet addressed specifically to a router s physical (Media Access Control [MAC]-layer) address, this time with the protocol (network layer) address of the destination host As it examines the packet s destination protocol address, the router determines that it either knows or does not know how to forward the packet to the next hop If the router does not know how to forward the packet, it typically drops the packet If the router knows how to forward the packet, however, it changes the destination physical address to that of the next hop and transmits the packet The next hop may be the ultimate destination host If not, the next hop is usually another router, which executes the same switching decision process As the packet moves through the internetwork, its physical address changes, but its protocol address remains constant, as illustrated in Figure 5-2 The preceding discussion describes switching between a source and a destination end system The International Organization for Standardization (ISO) has developed a hierarchical terminology that is useful in describing this process Using this terminology, network devices without the capability to forward packets between subnetworks are called end systems (ESs), whereas network devices with these capabilities are called intermediate systems (ISs) ISs are further divided into those that can communicate within routing domains (intradomain ISs) and those that communicate both within and between routing domains (interdomain ISs) A routing domain generally is considered a portion of an internetwork under common administrative authority that is regulated by a particular set of administrative guidelines Routing domains are also called autonomous systems With certain protocols, routing domains can be divided into routing areas, but intradomain routing protocols are still used for switching both within and between areas 5-3

Routing Algorithms Chapter 5 Figure 5-2 Numerous Routers May Come into Play During the Switching Process Source host PC Packet To: Destination host Router 1 (Protocol address) (Physical address) Packet Router 1 To: Destination host Router 2 (Protocol address) (Physical address) Router 2 Router 3 To: Destination host Router 3 Packet (Protocol address) (Physical address) To: Destination host Destination host (Protocol address) (Physical address) Destination host PC Packet Routing Algorithms Routing algorithms can be differentiated based on several key characteristics First, the particular goals of the algorithm designer affect the operation of the resulting routing protocol Second, various types of routing algorithms exist, and each algorithm has a different impact on network and router resources Finally, routing algorithms use a variety of metrics that affect calculation of optimal routes The following sections analyze these routing algorithm attributes Design Goals Routing algorithms often have one or more of the following design goals: Optimality Simplicity and low overhead Robustness and stability Rapid convergence Flexibility 5-4

Chapter 5 Routing Algorithms Optimality refers to the capability of the routing algorithm to select the best route, which depends on the metrics and metric weightings used to make the calculation For example, one routing algorithm may use a number of hops and delays, but it may weigh delay more heavily in the calculation Naturally, routing protocols must define their metric calculation algorithms strictly Routing algorithms also are designed to be as simple as possible In other words, the routing algorithm must offer its functionality efficiently, with a minimum of software and utilization overhead Efficiency is particularly important when the software implementing the routing algorithm must run on a computer with limited physical resources Routing algorithms must be robust, which means that they should perform correctly in the face of unusual or unforeseen circumstances, such as hardware failures, high load conditions, and incorrect implementations Because routers are located at network junction points, they can cause considerable problems when they fail The best routing algorithms are often those that have withstood the test of time and that have proven stable under a variety of network conditions In addition, routing algorithms must converge rapidly Convergence is the process of agreement, by all routers, on optimal routes When a network event causes routes to either go down or become available, routers distribute routing update messages that permeate networks, stimulating recalculation of optimal routes and eventually causing all routers to agree on these routes Routing algorithms that converge slowly can cause routing loops or network outages In the routing loop displayed in Figure 5-3, a packet arrives at Router 1 at time t1 Router 1 already has been updated and thus knows that the optimal route to the destination calls for Router 2 to be the next stop Router 1 therefore forwards the packet to Router 2, but because this router has not yet been updated, it believes that the optimal next hop is Router 1 Router 2 therefore forwards the packet back to Router 1, and the packet continues to bounce back and forth between the two routers until Router 2 receives its routing update or until the packet has been switched the maximum number of times allowed Figure 5-3 Slow Convergence and Routing Loops Can Hinder Progress To reach network: 27 57 17 24 52 16 26 Send to: Node A Node B Node C Node A Node A Node B Node A Routing algorithms should also be flexible, which means that they should quickly and accurately adapt to a variety of network circumstances Assume, for example, that a network segment has gone down As many routing algorithms become aware of the problem, they will quickly select the next-best path for all routes normally using that segment Routing algorithms can be programmed to adapt to changes in network bandwidth, router queue size, and network delay, among other variables 5-5

Routing Algorithms Chapter 5 Algorithm Types Routing algorithms can be classified by type Key differentiators include these: Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent Intradomain versus interdomain Link-state versus distance vector Static Versus Dynamic Single-Path Versus Multipath Static routing algorithms are hardly algorithms at all, but are table mappings established by the network administrator before the beginning of routing These mappings do not change unless the network administrator alters them Algorithms that use static routes are simple to design and work well in environments where network traffic is relatively predictable and where network design is relatively simple Because static routing systems cannot react to network changes, they generally are considered unsuitable for today s large, constantly changing networks Most of the dominant routing algorithms today are dynamic routing algorithms, which adjust to changing network circumstances by analyzing incoming routing update messages If the message indicates that a network change has occurred, the routing software recalculates routes and sends out new routing update messages These messages permeate the network, stimulating routers to rerun their algorithms and change their routing tables accordingly Dynamic routing algorithms can be supplemented with static routes where appropriate A router of last resort (a router to which all unroutable packets are sent), for example, can be designated to act as a repository for all unroutable packets, ensuring that all messages are at least handled in some way Some sophisticated routing protocols support multiple paths to the same destination Unlike single-path algorithms, these multipath algorithms permit traffic multiplexing over multiple lines The advantages of multipath algorithms are obvious: They can provide substantially better throughput and reliability This is generally called load sharing Flat Versus Hierarchical Some routing algorithms operate in a flat space, while others use routing hierarchies In a flat routing system, the routers are peers of all others In a hierarchical routing system, some routers form what amounts to a routing backbone Packets from nonbackbone routers travel to the backbone routers, where they are sent through the backbone until they reach the general area of the destination At this point, they travel from the last backbone router through one or more nonbackbone routers to the final destination Routing systems often designate logical groups of nodes, called domains, autonomous systems, or areas In hierarchical systems, some routers in a domain can communicate with routers in other domains, while others can communicate only with routers within their domain In very large networks, additional hierarchical levels may exist, with routers at the highest hierarchical level forming the routing backbone 5-6

Chapter 5 Routing Algorithms The primary advantage of hierarchical routing is that it mimics the organization of most companies and therefore supports their traffic patterns well Most network communication occurs within small company groups (domains) Because intradomain routers need to know only about other routers within their domain, their routing algorithms can be simplified, and, depending on the routing algorithm being used, routing update traffic can be reduced accordingly Host-Intelligent Versus Router-Intelligent Intradomain Versus Interdomain Some routing algorithms assume that the source end node will determine the entire route This is usually referred to as source routing In source-routing systems, routers merely act as store-and-forward devices, mindlessly sending the packet to the next stop Other algorithms assume that hosts know nothing about routes In these algorithms, routers determine the path through the internetwork based on their own calculations In the first system, the hosts have the routing intelligence In the latter system, routers have the routing intelligence Some routing algorithms work only within domains; others work within and between domains The nature of these two algorithm types is different It stands to reason, therefore, that an optimal intradomain-routing algorithm would not necessarily be an optimal interdomain-routing algorithm Link-State Versus Distance Vector Routing Metrics Link-state algorithms (also known as shortest path first algorithms) flood routing information to all nodes in the internetwork Each router, however, sends only the portion of the routing table that describes the state of its own links In link-state algorithms, each router builds a picture of the entire network in its routing tables Distance vector algorithms (also known as Bellman-Ford algorithms) call for each router to send all or some portion of its routing table, but only to its neighbors In essence, link-state algorithms send small updates everywhere, while distance vector algorithms send larger updates only to neighboring routers Distance vector algorithms know only about their neighbors Because they converge more quickly, link-state algorithms are somewhat less prone to routing loops than distance vector algorithms On the other hand, link-state algorithms require more CPU power and memory than distance vector algorithms Link-state algorithms, therefore, can be more expensive to implement and support Link-state protocols are generally more scalable than distance vector protocols Routing tables contain information used by switching software to select the best route But how, specifically, are routing tables built? What is the specific nature of the information that they contain? How do routing algorithms determine that one route is preferable to others? Routing algorithms have used many different metrics to determine the best route Sophisticated routing algorithms can base route selection on multiple metrics, combining them in a single (hybrid) metric All the following metrics have been used: Path length Reliability Delay Bandwidth 5-7

Network Protocols Chapter 5 Load Communication cost Path length is the most common routing metric Some routing protocols allow network administrators to assign arbitrary costs to each network link In this case, path length is the sum of the costs associated with each link traversed Other routing protocols define hop count, a metric that specifies the number of passes through internetworking products, such as routers, that a packet must take en route from a source to a destination Reliability, in the context of routing algorithms, refers to the dependability (usually described in terms of the bit-error rate) of each network link Some network links might go down more often than others After a network fails, certain network links might be repaired more easily or more quickly than other links Any reliability factors can be taken into account in the assignment of the reliability ratings, which are arbitrary numeric values usually assigned to network links by network administrators Routing delay refers to the length of time required to move a packet from source to destination through the internetwork Delay depends on many factors, including the bandwidth of intermediate network links, the port queues at each router along the way, network congestion on all intermediate network links, and the physical distance to be traveled Because delay is a conglomeration of several important variables, it is a common and useful metric Bandwidth refers to the available traffic capacity of a link All other things being equal, a 10-Mbps Ethernet link would be preferable to a 64-kbps leased line Although bandwidth is a rating of the maximum attainable throughput on a link, routes through links with greater bandwidth do not necessarily provide better routes than routes through slower links For example, if a faster link is busier, the actual time required to send a packet to the destination could be greater Load refers to the degree to which a network resource, such as a router, is busy Load can be calculated in a variety of ways, including CPU utilization and packets processed per second Monitoring these parameters on a continual basis can be resource-intensive itself Communication cost is another important metric, especially because some companies may not care about performance as much as they care about operating expenditures Although line delay may be longer, they will send packets over their own lines rather than through the public lines that cost money for usage time Network Protocols Routed protocols are transported by routing protocols across an internetwork In general, routed protocols in this context also are referred to as network protocols These network protocols perform a variety of functions required for communication between user applications in source and destination devices, and these functions can differ widely among protocol suites Network protocols occur at the upper five layers of the OSI reference model: the network layer, the transport layer, the session layer, the presentation layer, and the application layer Confusion about the terms routed protocol and routing protocol is common Routed protocols are protocols that are routed over an internetwork Examples of such protocols are the Internet Protocol (IP), DECnet, AppleTalk, Novell NetWare, OSI, Banyan VINES, and Xerox Network System (XNS) Routing protocols, on the other hand, are protocols that implement routing algorithms Put simply, routing protocols are used by intermediate systems to build tables used in determining path selection of routed protocols Examples of these protocols include Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (Enhanced IGRP), Open Shortest Path First (OSPF), Exterior Gateway Protocol (EGP), Border Gateway Protocol (BGP), Intermediate System-to-Intermediate System (IS-IS), and Routing Information Protocol (RIP) Routed and routing protocols are discussed in detail later in this book 5-8

Chapter 5 Review Questions Review Questions Q Describe the process of routing packets A Routing is the act of moving information across an internetwork from a source to a destination Q What are some routing algorithm types? A Static, dynamic, flat, hierarchical, host-intelligent, router-intelligent, intradomain, interdomain, link-state, and distance vector Q Describe the difference between static and dynamic routing A Static routing is configured by the network administrator and is not capable of adjusting to changes in the network without network administrator intervention Dynamic routing adjusts to changing network circumstances by analyzing incoming routing update messages without administrator intervention Q What are some of the metrics used by routing protocols? A Path length, reliability, delay, bandwidth, load, and communication cost 5-9

Review Questions Chapter 5 5-10