Lektion 1-Introduktion - miun.se

Lektion 1-Introduktion - miun.se

Kapitel 19: Routing. Kapitel 21: Routing Protocols Hosts and Routers The computers in Internet terminology are called hosts. They usually have one NIC (network interface card = network adapter = ntverkskort) Routers are special purpose computers and they have more than one NIC

An old name for routers is gateways Forward packets between networks (route and switch) Transform packets as necessary to meet standards for each network A Windows PC can act as a router if it has more than one NIC, and IP forwarding is enabled in the networking settings. What Does a Router Do?

Accepts incoming packets Checks the destination address in the IP header Look up for destination in the forwarding table Sends packet to the appropriate next hop The packet may be dropped if

There is no space in the routers buffers The TTL=0 There is no matching row in the routing table Forwarding (Routing) Table The forwarding table consists of two columns: Destination network and Next hop. Destination network is some network address and the next hop is the address of the next router. When the router is connected directly to a network, the Next hop is labeled as Direct meaning Directly

connected Figure 19.29 Network-specific routing Figure 19.31 Default routing Default Route

In order to make the forwarding table shorter (smaller number of rows) the default route is introduced Default or Else is a row that points to some Next hop and is used whenever a destination is not found in the forwarding table. Hosts send all packets out of their network to the default router (or gateway) Figure 19.32 Example: Subnet mask based routing table

Example 10 Using the table in Figure 19.32, the router receives a packet for destination 192.16.7.1. For each row, the mask is applied to the destination address until a match with the destination address is found. In this example, the router sends the packet through interface m0 (host specific). Example 11 Using the table in Figure 19.32, the router receives a packet for destination 193.14.5.22. For each row, the mask is applied to the

destination address until a match with the next-hop address is found. In this example, the router sends the packet through interface m2 (network specific). Example 12 Using the table in Figure 19.32, the router receives a packet for destination 200.34.12.34. For each row, the mask is applied to the destination address, but no match is found. In this example, the router sends the packet through the default interface m0. Example: Unicast Routing

128.47.23.10 netid 128.47.92 /24 128.47.23 /24 128.47.36 /24 128.47.92.67 netid 128.47.92 /24 128.47.23 /24

128.47.36 /24 port 2 1 2 1 port 1

2 3 R1 3 Router R1 checks its table and sends it to R2 through its

interface 2. R2 2 R3 2 1

128.47.23.00 /24 Host with IP address 128.47.92.67 sends a packet to host 128.47.23.10 128.47.36.00 /24

128.47.36.97 Router R2 checks its table and sends it to its interface 1 The Forwarding Table Necessary in every host and the router On Windows OS it can be seen using the command netstat rn at the command prompt

Entries in the destination column are networks, not hosts Once the interface on the router through which the packet is to be delivered is known, the physical address is used for delivery Contains the columns: Destination (Network destination), Mask (Netmask), Next hop (Gateway), Interface and Metric Example How Routers Build the Routing

Tables Preprogrammed or Static Routes The table is manually configured by a human The routes cannot be dynamically changed if something fails Dynamically calculated routes Calculated by the software built in the routers that provide communication among routers Algorithms that calculate shortest path are used Complexity is increased, but the routes change automatically if some part of the network fails

Metric A metric is a cost assigned for passing through a network The total cost of the path is the sum of the metrics for the networks that are on the path Metrics are assigned in such a way that the best pat is the path with the minimum total cost The Best Path

Factors determining the best path Bandwidth

Delay Hop-count Load Money Reliability S The cost or the metric can involve a single or several of these factors

The best path from S to D is A C B A B 4 2 C

1 D Interior vs. Exterior Protocols The worldwide Internet is a very large network It needs to be segmented in areas based upon the entity that administrates the networks and routers in the area Autonomous System (AS) is a collection of networks and routers under single administration authority

Interior protocols or IGP (Interior Gateway Protocols) Used for routing inside AS Exterior protocols or EGP (Exterior Gateway Protocols) Used for routing between ASs Figure 21.3 Autonomous systems

Figure 21.5 Initial routing tables in a small autonomous system Figure 21.6 Final routing tables for Figure 21.5 Interior Routing Protocols The goal: To choose the best path, among a set of alternatives based on some or a combination of criteria (e. g. minimum delay, maximum throughput etc.) The objectives are to use the network resources

(bandwidth and the routers buffers and processing power) in the best way Two groups of interior protocols Distance Vector protocols Link State protocols Figure 21.2 Popular routing protocols RIP = Routing Information Protocol

OSPF = Open Shortest Path First BGP = Boarder Gateway Protocol Unicast vs. Multicast Unicast: One source to one destination Multicast: One source to many destinations Many sources to many destinations Many sources to one destination

Motivation for multicast routing Growing demand (vide/audio conferences, vide streaming etc) Bandwidth need to be saved Example Router 3 Receiver 1 Router 1

Receiver 2 Sender Router 2 Receiver 3 If unicast routing is used, the links between the sender and the Router 1 will be overloaded (bandwidth required will depend on the number of receivers) Figure 21.23

Multicasting Group Membership vs. Multicast Routing IGMP (Internet Group Management Protocol) Keeps router up-to-date with group membership of entire LAN A device can join or leave a group at any moment Multicast Routing Protocols MBone A set of routers on the Internet that are running multicast

routing protocols Tunneling (encapsulation of multicast packets into unicast packets) is used in the rest of the network Note: In multicast routing, the router may forward the received packet through several of its ports. Note: IGMP is a group management

protocol. It helps a multicast router create and update a list of loyal members related to each router interface. Figure 21.32 MBONE

Recently Viewed Presentations

  • Kahoot - nthurston.k12.wa.us

    Kahoot - nthurston.k12.wa.us

    To get to my saved kahoots just click on the button. Duplicate of Winter Analogies is the holiday one mentioned in the email. I prefer you do this one second if time allows. To start it click on the play...
  • ESL Experiences

    ESL Experiences

    I can play computer games very well. I can fold the clothes every day. I can read a book every day. I can finish my homework in one hour… (by Yorkie) "I can" poems I can play different kinds of...
  • Utilitarianism

    Utilitarianism

    A utilitarian view makes you realize that your actions affect more than just yourself. Also, since maximization of happiness is the goal, utilitarianism does not discriminate between black, white, male, female…
  • Penulisan/Laporan Kerja Praktek

    Penulisan/Laporan Kerja Praktek

    Hal ini dapat dilihat berdasarkan sebagai berikut : Diameter (cm) Daya dukung izin (ton) Penurunan (cm) Jumlah kelompok tiang Momen lateral (kNm) 100 339.434 2,5 148 335 Saran yang dapat diberikan dalam perencanaan pondasi tiang bor haruslah memperhatikan data-data penyelidikan...
  • Writing Your First Business Case - Project Management Conference

    Writing Your First Business Case - Project Management Conference

    PMI: "A portfolio is a collection of projects and Programmes and other work grouped to facilitate the effective management of that work to meet strategic business objectives. The components of a portfolio are quantifiable - they can be measured, ranked...
  • Basic Petrochemicals - Arctic gas pipeline

    Basic Petrochemicals - Arctic gas pipeline

    WILLIAMS ARCTIC TEAM Petrochemicals in Alaska: Background and Opportunities Olefins - North America The olefin business is in the early stages of restructuring and change.
  • Bell - Knoke's Classroom

    Bell - Knoke's Classroom

    Crim. comes from the Latin for "fault or crime" or "accusation" The root crim-produces such English words as crime and criminal. Criminology. Criminology. Criminology (n) The study of crime, criminals, law enforcement, and punishment. Decriminalize.
  • Cyclic Voltammetry - sunlight.caltech.edu

    Cyclic Voltammetry - sunlight.caltech.edu

    Chem. Comm., 13, 349 (1948). Randles, "A Cathode Ray Polarograph", Faraday Society, 44, 327 (1948). Problem There is no analytical solution to Fick's second law when the boundary is time dependent. Sevick and Randles solutions was to approximate the integral...