Professional Documents
Culture Documents
Chapter II (Mod)
Chapter II (Mod)
Concepts of Routing
Routing Protocols and Algorithms
Exterior Routing Protocols
The Border Gateway Protocol (BGP)
Congestion Control
Multicasting
What’s Routing
Network A Network B
3
IP Routing
IP performs:
search for a matching host address
search for a matching network address
search for a default entry
Routing done by IP router, when it searches the routing table and decide which
interface to end a packet out.
incoming
which interface ?
4
Routing Tables
Routing is carried out in a router by consulting/accessing a routing table.
Routing algorithms uses the most similar path (i.e., a path with the highest
similarity to the given network by its prefix) to route a packet.
No unique format for routing tables, typically table contains:
address of a destination
IP address of next hop router
network interface to be used
subnet mask for the this interface
distance to the destination
6
Routing Algorithm
Design goals
7
Routing Protocols
Routing Metrics
How do we decide that one route is better than another?
Solution : using a metric as a measurement to compare routes
Metrics may be distance, throughput, delay, Hop count, error rate, bandwidth, Load and
Reliability.
8
Routing Algorithm Types
9
Routing Algorithm: Static Route
point to point
connection
route to this
way only, no need
for update
10
Dynamic Routing Protocols
11
Dynamic Routing Protocols
12
Internet Routing Architecture
Autonomous
System
EGP/BGP
IGP EGP/BGP
IGP
IGP
13
Gateway Protocol
14
Exterior Routing Protocols
Problems:
Topology: The Internet is a complex mesh of different AS’s with very little
structure.
Autonomy of AS’s: Each AS defines link costs in different ways, so not
possible to find lowest cost paths.
Trust: Some AS’s can’t trust others to advertise good routes (e.g. two
competing backbone providers), or to protect the privacy of their traffic (e.g.
two warring nations).
Policies: Different AS’s have different objectives (e.g. route over fewest hops;
use one provider rather than another).
15
Autonomous System
AS is a collection of LANs and WANs and the interconnecting routers which under the control of one
management authority
The same AS runs the same Interior Gateway Protocol
Why setting up AS? - establish a direct link to each other rather than route through the core Internet
Usually under single ownership, trust and administrative control
How to select AS? - register and get the AS number from Internet Architecture Board (IAB
Collection of networks with same routing policy
Single routing protocol AS 100
16
Border Gateway Protocol
17
Border Gateway Protocol (BGP-4)
18
BGP (continued)
Topology independent
Each iBGP speaker must
peer with every other iBGP AS 100
speaker in the AS D
A
BGP peer within the same AS B
Not required to be directly
connected
iBGP speakers need to be fully
meshed
they originate connected networks E
they do not pass on prefixes learned
from other iBGP speakers
21
External BGP Peering (eBGP)
AS 100 AS 101
C
22
Interior Routing Protocols
RIP
Uses distributed Bellman-Ford algorithm.
Updates sent every 30 seconds.
No authentication.
Originally in BSD UNIX.
OSPF
Link-state updates sent (using flooding) as and when required.
Every router runs Dijkstra’s algorithm.
Authenticated updates.
Autonomous system may be partitioned into “areas”.
23
RIP timers
24
OSPF (type of links)
25
Open Shortest Path First (RFC 1247)
Special routers (autonomous system boundary routers) or backbone routers responsible to dissipate
information about other AS into the current system.
26
Congestion Control at Network Layer
Congestion in the network layer is a situation when many datagrams are present in the Internet.
Congestion may occur if the number of datagrams sent by source computers is beyond the
capacity of the network or routers.
Congestion at the network layer is related to two issues, throughput and delay (processing,
propagation and queue delays).
Ayenew Y. Ibrahim 27
Congestion control cont….
Ayenew Y. Ibrahim 28
Open-loop congestion control
Ayenew Y. Ibrahim 29
Closed-loop congestion control
Closed-loop congestion control mechanisms try to alleviate congestion after it happens. Several
mechanisms have been used by different protocols.
Backpressure
Backpressure is a node-to-node congestion control that starts with a node and propagates, in
the opposite direction of data flow, to the source.
The backpressure technique can be applied only to virtual circuit networks.
Ayenew Y. Ibrahim 30
Closed-loop cont…..
Choke Packet
A choke packet is a packet sent by a node to the source to inform it of congestion.
When a router in the Internet is overwhelmed with IP datagrams, it may discard some of them,
but it informs the source host, using a source quench ICMP message.
Ayenew Y. Ibrahim 31
Closed-loop cont…..
Implicit Signaling
In implicit signaling, there is no communication between the congested node or nodes and the
source. The source guesses that there is congestion somewhere in the network from other
symptoms.
For example:
missing of acknowledgment,
delay and other indicators.
Explicit Signaling
The node that experiences congestion can explicitly send a signal to the source or destination.
This method, however, is different from the choke-packet method. In the choke-packet method,
a separate packet is used for this purpose; in the explicit-signaling method, the signal is included
in the packets that carry data (piggybacking).
Explicit signaling can occur in either the forward or the backward direction.
Ayenew Y. Ibrahim 32
Closed-loop cont……
Multicasting Techniques and Protocols
It is a way of sending a packet from a source to the members of a multicast address group.
In multicasting, there is one source and a group of destinations.
The group address defines the members of the group.
Ayenew Y. Ibrahim 34
Multicasting cont.…..
P2MP services can be carried in unicast, multicast or broadcast mode. However, some
inherent problems occur if unicast or broadcast is used to carry P2MP services.
A multicast address defines a group of recipients. If a new group is formed with some active
members, an authority can assign an unused multicast address to this group to uniquely define
it.
A host which is a member of n groups, actually has (n + 1) addresses.
Multicast addresses in IPv4 belong to a large block of addresses that are specially designed for
this purpose.
In classful addressing, all of class D was composed of these addresses;
Classless addressing used the same block, but it was referred to as the block 224.0.0.0/4
(from 224.0.0.0 to 239.255.255.255).
Four bits define the block; the rest of the bits are used as the identifier for the group.
The multicast address selection depends on the type of application.
Ayenew Y. Ibrahim 38
Multicasting cont….
The number of addresses in the multicast block is huge (2 28). However, the block is divided into several
subblocks.
Administratively Scoped Block (239.0.0.0/8): the addresses in this block are used in a particular area of the
Internet. The packet whose destination address belongs to this range is not supposed to leave the area.
GLOP Block (233.0.0.0/8): this block defines a range of addresses that can be used inside an autonomous
system (AS). One can insert the AS number as the two middle octets (233.x.y.0 to 233.x.y.255), in which x.y is
the AS number.
Internetwork Control Block (224.0.1.0/24): it is assigned to a multicast routing protocol to be used in the whole
Internet, which means that the packet with a destination address in this range can be forwarded by a router.
Ayenew Y. Ibrahim 40
Multicast service models
When receiving a multicast data, multicast group members can select multicast data sources.
Therefore, two multicast service models area available: any-source multicast (ASM) and
source-specific multicast (SSM)
Multicast data forwarding
Challenges
Multicast data forwarding cont.….
Multicast data forwarding include all unicast forwarding information and add multicast source and inbound
interface.
Then the device forwards only the multicast data received from the specified inbound interface, preventing
problems such as loops, sub-optimal routes and duplicate packets (partially) during multicast forwarding.
For the same multicast source, the device can determine the unique inbound interface of multicast traffic
through the reverse path forwarding (RPF) check.
Collecting Information about Groups
Creation of forwarding tables in multicast routing involves two steps:
A router needs help to find out which groups are active in each of its interfaces. Then a router can propagate
the membership to any other router using a multicast routing protocol,
Ayenew Y. Ibrahim 44
Routing Tree in Multicasting
Two different approaches in multicast routing have been developed these are:
Ayenew Y. Ibrahim 47
IGMP cont…
Query Message
There are three versions of query messages:
A general query message
A group-specific query message
A source-and-group-specific query message
Report Message
A report message is sent by a host as a response to a query message.
The message contains a list of records in which each record gives the identifier of the
corresponding group (multicast address), and
Addresses of all sources that the host is interested in receiving messages from (inclusion) and
the source addresses from which the host does not desire to receive a group message
(exclusion).
Ayenew Y. Ibrahim 48
Multicast routing protocol
Multicast routing protocol cont.….
A multicast network needs to establish forwarding paths based on multiple multicast protocols.
Protocols workings on the multicast forwarding network includes PIM, MOSPF, MSDP, MBGP etc.
PIM is mainly used to generate MDTs in an AS.
MSDP is mainly used to generate inter-AS MDTs.
MBGP is used to perform RPF check on inter-AS multicast traffic.
Protocol Independent Multicast (PIM)
It is the name given to a common protocol that needs a unicast routing protocol
for its operation, but the unicast protocol can be either a distance-vector or a
link-state protocol.
PIM can work in two different modes: dense and sparse.
The term dense here means that the number of active members of a group
in the internet is large.
The term sparse means that only a few routers in the internet have active
members in the group.
When the protocol is working in the dense mode, it is referred to as PIM-DM;
when it is working in the sparse mode, it is referred to as PIM-SM.
Ayenew Y. Ibrahim 51
PIM routing entries
PIM-DM is mainly used on a network with small number of densely distributed group members.
PIM-DM uses the flooding-prune mechanism to establish an MDT.
In addition to the flooding and prune mechanisms, PIM-DM involves the neighbor discovery,
graft, assert and state-refresh mechanisms.
Ayenew Y. Ibrahim 53
PIM-DM messages
MDT establishment
In PIM-DM, an MDT is established for the first time based on the flooding, prune, assert and DR election
mechanisms.
Flooding: multicast packets are flooded to all PM neighbors and multicast routers generate multicast routing
entries.
Assert: when a multi-source network exists during multicast traffic forwarding, a multicast forwarding
router needs to be elected to prevent duplicate multicast packets.
Prune: if a multicast router has no multicast receiver, the multicast forwarding path from the source to the
multicast router is pruned.
Protocol Independent Multicast-Sparse Mode (PIM-SM)
PIM-SM uses a group-shared tree approach to multicasting. The core router in PIM-SM is called
the rendezvous point (RP).
Multicast communication is achieved in two steps:
Any router that has a multicast packet to send to a group of destinations first encapsulates the
multicast packet in a unicast packet (tunneling) and sends it to the RP.
The RP then decapsulates the unicast packet and sends the multicast packet to its destination.
For each multicast group the routers select one RP (i.e. for m groups we need m RPs)
After the RP for each group is selected, each router creates a database and stores the group
identifier and the IP address of the RP for tunneling multicast packets to it.
PIM-SM uses a spanning multicast tree rooted at the RP with leaves pointing to designated
routers connected to each network with an active member.
Ayenew Y. Ibrahim 56
PIM-SM cont…..
Ayenew Y. Ibrahim 57
CHAPTER III
MPLS
Ayenew Y. Ibrahim 58