Académique Documents
Professionnel Documents
Culture Documents
ALTTC/DX/AK/ROUTING_PRINCIPLES/1999
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Routing Principles
Switching
A typical electrical switch directs current to one of several wires of the
electrical circuit. Once the connection is made, the switch appears as part of
the wire - it (ideally) introduces no resistance, no attenuation, no delay. A
networking switch is designed to behave in much the same way. Its primary
feature is speed. Like an electrical switch, it is designed to appear much like
a wire when relaying data signals.
Normal Bridges and Routers will receive an entire packet, analyse its
headers, make a forwarding decision, then transmit the packet. The packet
is stored in the RAM (Random access Memory) while being processed.
These RAM buffers can become bottlenecks in a busy network. Switches
use special silicon chips than can forward packets directly from source to
destination without passing through RAM buffers.
Routing
The primary function of a packet switching network is to receive
packets from a source and deliver them to the destination. To achieve this, a
path or route through the network has to be determined. More than one route
may be possible. This requires a routing function/ algorithm to be
implemented.
BRBRAITT Nov-2006 2
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
3
Network
2 Data Link
1 Physical
BRBRAITT Nov-2006 3
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
ROUTER R1 100.2.0.0
S1
S2
S0
100.1.0.0
100.3.0.0
S0
DESTINATION ROUTER
NETW ORK PO RT
S1
ADDRESS ROUTER R2
100.1.0.0 S0
100.2.0.0 S1
100.4.0.0
100.3.0.0 S2
100.4.0.0 S2
BRBRAITT Nov-2006 4
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
For new network installations, the best approach is to plan for routing
even if it's not used at first. This requires some advanced planning to design
an addressing scheme that will work. However, the overhead is all human -
hardware won't know the difference between organised and haphazard
addressing schemes. Network should be planned for the ability to put routers
in strategic locations, even if those locations will initially use bridges or just
signal boosters (such as Ethernet hubs and repeaters). In this manner,
routers can be easily added later.
Routed Protocol
The internet protocol IP and Novell’s IPX are examples of routed protocols.
BRBRAITT Nov-2006 5
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Routing Protocol
A routing protocol provides mechanisms for sharing routing
information. Routing protocol messages move between the routers. A routing
protocol allows the routers to communicate with other routers to update and
maintain routing tables. Routing protocol messages do not carry end-user
traffic from network to network. A routing protocol uses the routed protocol to
pass information between routers.
Traffic to 10.1
R1 R2
WA N
Send all traffic to R1
Default Routing
BRBRAITT Nov-2006 6
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
R2
Routing update :
I can reach 100.1
X
R2
R3 R1
100.1
Routing update :
I can reach 100.1
Static and default routing are not our enemy. The most stable (but not
so flexible) configurations are the ones based on static routing. Many people
feel that they are not technologically up-to-date because they are not
running dynamic routing. Trying to force dynamic routing on situations that
do not really need it is just a waste of bandwidth, effort, and money.
BRBRAITT Nov-2006 7
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Routing Algorithms
Routing algorithms and protocols form the core of the hacker's
Internet, because it is here that all the decisions get made. Network
engineers assign costs to network paths, and routing protocols select the
least-cost path to the destination.
• First, routing tables match the destination addresses with next hops.
• Second, routing protocols determine the contents of these tables.
Non-Adaptive or Static
Adaptive or Dynamic
• When does the algorithm decide to change the routes - whether every ∆T
sec, when the load changes, or when the topology changes, and
BRBRAITT Nov-2006 8
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Convergence
Information about the network topology needs to be very accurate and
also consistent from Router to Router. This consistency and accuracy is
referred to as Convergence. The network is considered to have converged
when all the Routers contain consistent information.
2) Cost : Path cost is the sum of cost associated with each link to
a destination. Costs are assigned (automatically or manually) to the process
of crossing a network. Slower networks typically have a higher cost than
BRBRAITT Nov-2006 9
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
faster networks. The lowest ‘cost” route is the one believed to be the fastest
route available.
The distance vector routing is also known by other names, viz; the
distributed Bellman-Ford routing algorithm and the Ford-Fulkerson
algorithm, after the researchers who developed it (Bellman, 1957; and Ford
and Fulkerson, 1962). It was the original ARPANET routing algorithm and
was also used in the Internet under the name RIP and in early versions of
DECnet and Novell’s IPX.
1) the preferred outgoing line/ port to use for that destination, and
BRBRAITT Nov-2006 10
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
A
C
D C B A
BRBRAITT Nov-2006 11
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Examples of distance vector routing protocols are IPX RIP and IP RIP.
D
B C
100.2.0.0 100.3.0.0
100.1.0.0
S2 S0
S2 S1
S1 S1
BRBRAITT Nov-2006 12
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
When a router is booted, its first task is to learn who its neighbours
are. This task is accomplished by sending a special HELLO packet on each
point-to-point line. The router on the other end is expected to send back a
reply telling who it is.
BRBRAITT Nov-2006 13
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
A B C
X Y
W Z
S1 S0
S0
S1 S1
X S1 0 Y S0 0 Z S0 0
• The router computes its best paths and the ports to these
destination networks and enters them in the routing table.
BRBRAITT Nov-2006 14
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
Table 1
Copies of Routing Tables are passed Link State Packets are passed to other
to neighbouring Routers Routers
Interior Routing
Interior routing occurs within an autonomous system. Most common
interior routing protocols are RIP and OSPF. The basic routable element is
the IP network or subnetwork, or CIDR prefix for newer protocols.
Exterior Routing
Exterior routing occurs between autonomous systems, and is of
concern to service providers and other large or complex networks. The basic
routable element is the Autonomous System, a collection of CIDR prefixes
identified by an Autonomous System number. While there may be many
different interior routing schemes, a single exterior routing system manages
the global Internet, based primarily on the BGP-4 (Border Gateway
Protocol Version 4) exterior routing protocol.
IGP
Autonomous
Systems
Autonomous
Systems
BGP BGP
IGP
IGP
BGP
BRBRAITT Nov-2006 15
“DATA NETWORK” FOR JTOs PH-II : Routing Principles
2) The term Distance Vector derives from the fact that the protocol includes
in its routing updates a vector of distances (hop counts).
3) Low speed links are treated equally or sometimes preferred over a high-
speed link, depending on the calculated hop count in reaching a
destination. This may lead to inefficient routing behaviour.
4) Count to infinity restriction : D-V Protocols have a finite limit of hops (15)
after which a route is considered unreachable. This would restrict the
propagation of routing updates and would cause problems for large
networks.
6) D-V Protocols work on the concept that routers exchange all the network
numbers they can reach via periodic broadcasts of the entire routing
table.
In large networks, the routing table exchanged between routers becomes
very hard to maintain, leading to slower convergence.
2) This means that routers running link state protocols do not exchange
routing tables. Each router inside a domain will have enough bits and
pieces of the big puzzle that it can run a shortest path algorithm and build
BRBRAITT Nov-2006 16