Académique Documents
Professionnel Documents
Culture Documents
1
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
1
Example
1
2
3
4
5
6
5
2
1
2
3
3
1
1
2
5
•
Assume node 1 has obtained the entire network topology
using some link state routing protocol
•
Construct the routing table at node 1 using
Dijkstra’s
algorithm to determine shortest paths from node 1 to all
other nodes in the network
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
4
Solution
•
Use
Dijkstra’s
algorithm described in slide 2
•
Start with M consisting of only node 1.
M
D1
D2
D3
D4
D5
D6
0
{1}
0
2
5
1
inf
inf
1
{1,4}
0
2
4
1
2
inf
2
{1,4,2,5}
0
2
3
1
2
4
3
{1,4,2,5,3}
0
2
3
1
2
4
4
{1,4,2,5,3,6}
0
2
3
1
2
4
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
6
IP Routing
•
IP Forwarding is performed by IP (in OS kernel)
•
IP Routing is performed by a user
-
level process
•
In Unix, by the daemon processes
routed
and
gated
5
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
9
IP Routing
TCP
Network Interfaces
IP Input
Queue
IP Output: Calculate
Next Hop Router
ICMP
routing
daemon
Process IP
Options
For me ?
UDP
route
command
netstat
command
routing
table
ICMP Redirect
Source
Routing
NO:
if forwarding enabled
YES
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
10
Route Command
•
Route commands are put in a system file that is read during
system bootstrap
•
System file is:
/etc/rc2.d/S69inet in Solaris,
/etc/netstart in FreeBSD.
•
Example:
“default:” destination “sun:” gateway or router 1: metric
route add default sun 1
route add slip bsdi 1
Malathi Veeraraghavan
(originals by
Jörg Liebeherr
)
14
ICMP Redirect
•
Based on routing data in host, it does an
arp
for router 1 and sends packet
to router 1
•
When router 1 detects that an IP datagram should have gone to a
different
router, the router:
•
forwards the IP
datagram
to the correct router
•
sends an ICMP redirect message to the host
•
Host uses ICMP message to update its routing table
(3) ICMP Redirect
Router 2
Router 1
(2) IP datagram
(1) IP datagram
•
•
•
•
•
Also known as Shortest path Routing algorithm.
Link states:
Information about the state of (Router interfaces) links is known as
link-states. As you can see in the figure, this
information includes:
•
The interface's IP address and subnet mask.
•
The type of network, such as Ethernet (broadcast) or Serial point-to-
point link.
•
The cost of that link.
•
Any neighbor routers on that link.
So exactly how does a link-state routing protocol work? All routers will
complete the following generic link-
Dijkstra's Shortest Path first algorithm
state routing process to reach a state of convergence:
1.
Each router learns about its own links, its own directly connected
networks.
This is done by
detecting that an interface is in the up state.
2.
Each router is responsible for meeting its neighbors on directly
connected networks.
link state
routers do this by exchanging Hello packets with other link-state
routers on directly connected networks.
3.
Each router builds a Link-State Packet (LSP) containing the state of
each directly connected link.
This is done by recording all the pertinent information about each
neighbor, including neighbor ID, link
type, and bandwidth.
4.
Each router floods the LSP to all neighbors, who then store all LSPs
received in a database.
Neighbors then flood the LSPs to their neighbors until all routers in the
area have received the LSPs.
Each router stores a copy of each LSP received from its neighbors in a
local database.
5.
Each router uses the database to construct a complete map of the
topology and computes the best
path to each destination network
. Like having a road map, the router now has a complete map of all
destinations in the topology and the routes to reach them. The SPF
algorithm is used to construct the
map of the topology and to determine the best path to each network.
Advantages of Link state Routing protocol:
Build the topological map:
Link-state routing protocols create a topological map, or SPF tree of
the network topology. Distance vector
routing protocols do not have a topological map of the network.
Faster Convergence:
When receiving a Link-state Packet (LSP), link-state routing protocols
immediately flood the LSP out all
interfaces except for the interface from which the LSP was received.
This way, it achieve the faster convergence.
With distance vector routing algorithm, router needs to process each
routing update and update its routing table
before flooding them out other interfaces.
Event Driven Updates:
After the initial flooding of LSPs, link-state routing protocols only send
out an LSP when there is a change in the
topology. The LSP contains only the information regarding the affected
link. Unlike some distance vector
routing protocols, link-state routing protocols do not send periodic
updates.
Distance vector vs. Link state:
Sno. Distance Vector
Link State
1 Uses hop count as Metric.
Uses shortest path.
2 View the network from the perspective of
neighbor.
Gets common view of entire network topology.
3 Has frequent and periodic updates
Has event triggered updates.
4 Slow convergence
Faster convergence
Page: 120
compiled by: JP NEC. Daya Ram Budhathoki
5 Susceptible to routing loops.
Not as susceptible to routing loops.
6 Easy to configure and administer.
Difficult to configure and administer.
7 Requires less memory and processing power
of routers.
Requires more precessing power and memory
than distance vector.
8 Consumes a lot of Bandwidth.
Consumes less BW than distance vector.
9 Passes copies of routing table to neighbor
routers.
Passes link-state routing updates to other routers.
10 Eg. RIP
Eg. OSPF
Flow based routing:
A flooding algorithm is an algorithm for distributing material to every
part of a connected network. The name
derives from the concept of inundation by a flood. Its implemented by
the ospf:
Advantages of Flooding
The main advantage of flooding the increased reliability provided by
this routing method. Since the message will
be sent at least once to every host it is almost guaranteed to reach its
destination. In addition, the message will
reach the host through the shortest possible path.
Disadvantages of Flooding
There are several disadvantages with this approach to routing. It is
very wasteful in terms of the networks total
bandwidth. While a message may only have one destination it has to
be sent to every host. This increases the
maximum load placed upon the network.
Messages can also become duplicated in the network further
increasing the load on the networks bandwidth as
well as requiring an increase in processing complexity to disregard
duplicate messages.
A variant of flooding called
selective flooding
partially addresses these issues by only sending packets to routers
in the same direction.
Link State Routing:
• The following sequence of steps can be executed in the Link State Routing.
• The basis of this advertising is a short packed called a Link State Packet (LSP).
• OSPF (Open shortest path first) and IS-IS are examples of Link state routing.
• Link State Packet(LSP) contains the following information:
1. The ID of the node that created the LSP;
2. A list of directly connected neighbors of that node, with the cost of the link to
each one;
3. A sequence number;
4. A time to live(TTL) for this packet.
• When a router floods the network with information about its neighbourhood, it is said to be
advertising.
1. Discover your neighbors
2. Measure delay to your neighbors
3. Bundle all the information about your neighbors together
4. Send this information to all other routers in the subnet
5. Compute the shortest path to every router with the information you receive
6. Each router finds out its own shortest paths to the other routers by using Dijkstra's
algorithm.
• In link state routing, each router shares its knowledge of its neighbourhood with all routers
in the network.
• Link-state protocols implement an algorithm called the shortest path first (SPF, also known
as Dijkstra's Algorithm) to determine the path to a remote destination.
• There is no hop count limit. (For an IP datagram, the maximum time to live ensures that
loops are avoided.)
• Only when changes occur, It sends all summary information every 30 minutes by
default. Only devices running routing algorithms listen to these updates. Updates are sent to
a multicast address.
• Updates are faster and convergence times are reduced. Higher CPU and memory
requirements to maintain link-state databases.
• Link-state protocols maintain three separate tables:
1. Neighbor table: It contains a list of all neighbors, and the interface each neighbor is
connected off of. Neighbors are formed by sending Hello packets.
2. Topology table (Link- State table) : It contains a map of all links within an area,
including each link’s status.
3. Routing table : It contains the best routes to each particular destination
Flooding Algorithm:
• Where, μ = Mean number of arrivals in packet/sec, 1/μ = The mean packet size in the
bits, and c = Line capacity (bits/s).
The Optimality Principal: This simple states that if router J is on the optimal path form router I to
router k, then the optimal path from J to K also falls along this same path.
• 54 upvotes
• 5 comments
Related Posts
Routers
525Jan 13
Our Apps
• Exam Preparation App
• Test Series App
Gradeup Apps
• GATE CSE Preparation App
• Gradeup Test Series App
Exams
• Computer Science Engineering
• GATE CSE
• ISRO Computer Science
• AFCAT CS
• Coal India CS
• BARC CSE
8 Square Building, 6th Floor,
Plot No. 8, Sector 125,
Noida - 201313
support@gradeup.co
+91 9650053463
About UsFAQTerms & Conditions
Top
Armed with that information, each router can quickly compute the shortest path from itself to all
other routers.
The SPF algorithm determines how the various pieces of the puzzle fit together. Figure below
illustrates all of these pieces put together in operation.
Link-state protocols such as OSPF flood all the routing information when they first become active
in link-state packets. After the network converges, they send only small updates via link-state
packets.