SlideShare a Scribd company logo
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
a
b c
d
f
e
3
4
6
5
3
4
3
2
Link State Routing
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Link State Routing
• Discover its neighbour and learn network
addresses
– Measure cost to each of its neighbours
– Construct a packet telling what it has learnt
– Send packet to all other routers
– With link state packets from all router construct
shortest path to every other router
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
b
seqno
age
3
4
5
f
c
d
e
seqno
age
2
3
f
c
a
f
seqno
age
5
6
e
d
b
c
seqno
age
3
e
d
b 4
3
4
4
a
seqno
age
3
2
c
b
d
seqno
age
3
f
c
6
Links State Packets from Different Routers
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Link State Routing
• Flags
– Send flags
• On which lines should the packets be sent
– Ack flags
• On which lines should the packets be acked
– Seqno
• Sequence number of packet
– Useful to distinguish between new and old packets
– Age
• Remove packets that are circulating that are aged
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Link State Routing
• Distribution of link state packets:
– Periodically flood
– dam the flood
– seqno –
• new forward
• old discard
• lower discard
• What if seqno corrupted
– Packet discarded after it has aged
– decrementing age by route
– Decrement age also on time
• All link state packet acked echo reply/ echo request with
timestamp
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Link state packet information (router b)
1 0 0
0 1 1
59
21
d
1 0 1
0 1 0
60
20
c
0 1 0
1 0 1
51
21
e
1 1 0
0 0 1
60
21
f
0 1 1
1 0 0
60
21
a
src seqno age ack send
a c f a c f
Once all link state packets available –
compute SSSP on all possible destination
Data
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing
• Too many routers:
– Hierarchical routing
– Backbone routers
– Regional routers (Points of Presence)
– Subnetting
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing
• Flooding (Broadcast routing)
– Send distinct packet to every host (wasteful of network
bw)
– Every incoming packet sent on every out going line
except the line on which it arrived.
– Generates large number of packets
• Use hop count
– Seqno to prevent reflooding
– Selective flooding
• East west need not be sent south north
• Flooding in military
– When master dies
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
1a
1b
1c
2a 2b
2c
2d
3a
3b
3c
3d
3e
4a
4b
4c
5a
5b
Hierarchical routing
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
1
5b
1
5a
1
1b
0 0
1c 1
1a
1b
1c
5a
2
1c
3
1c
4
1c
2
1b
1
1a
1
1b
-
-
1a
1b
1c
5
2
3
4
Full table 1a
Line Hop
Hierarchical routing table 1a
Line Hop
Path 1a to 3a via 1c = 6
1a to 3a via 2a = 5
Therefore not always the best.
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing (Miscellaneous)
• Multi destination routing:
– Each packet contains a list of destinations
– Router check destinations for choosing output
lines
– Copy of packet made and forwarded only line
where destination exists
– Partitioning of destination into the output lines
– After sufficient number of hops – each packet
only one destination
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing (Miscellaneous)
• Multidestination Routing
– Sending a message to a group of hosts
– Routers must know about hosts that belong to the same
group
– Prune spanning tree to include only the edges of hosts
in the group
– Forward packets in that group
• Link state / distance vector
• Node not in group tells host not to send
– n groups – m members
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing (Miscellaneous)
• Sink tree router / spanning tree
– Each router copies packets on to output lines on
spanning tree except line it arrived.
• Reverse Path Forwarding:
– Broadcast packet at router forwarded on all lines other
line it arrived
– Provided packet arrived on preferred
– Otherwise discarded
– No need to know spanning tree
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing (Miscellaneous)
• When a router receives a multicast packet
– Examines spanning tree
– Prune tree to lead to hosts only on the group
– Forward packets only on pruned tree
• Link state pruning:
– Each router aware of the complete subnet topolo
– Prune spanning tree
• Start from end of each path and work toward the root
– Distance vector approach
• Reverse path forwarding
– Send message back to host to prune its tree
Computer Networks Prof. Hema A Murthy
Indian Institute of Technology Madras
Distributed Routing (Miscellaneous)
• Core base tree
– Single spanning tree / group
– Root near middle of the group
– Host sends multicast packet send to the root
– Multicast along spanning tree

More Related Content

Similar to Lecture34_RoutingAlgorithmsLSR.pdf

Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
Mugabo4
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
karthiksmart21
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
11 routing
11 routing11 routing
11 routing
shefali84
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
NiharikaDubey17
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network Architecture
Gunawan Jusuf
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram  SnehiRouting and IP in Advance Computer Network,Vikram  Snehi
Routing and IP in Advance Computer Network,Vikram Snehi
MR. VIKRAM SNEHI
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 
Network layer
Network layerNetwork layer
Network layer
TharuniDiddekunta
 
Lecture 7
 Lecture 7 Lecture 7
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
Qspiders - Software Testing Training Institute
 
routing 23.pptx
routing 23.pptxrouting 23.pptx
routing 23.pptx
zulhelmanz
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Networking devices
Networking devicesNetworking devices
Networking devices
rupinderj
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
DivyanshThakur7
 
Routing Protocols.pdf
Routing Protocols.pdfRouting Protocols.pdf
Routing Protocols.pdf
Hirdesh Sharma
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
Aman Jaiswal
 
16 bgp
16 bgp16 bgp
16 bgp
TCT
 

Similar to Lecture34_RoutingAlgorithmsLSR.pdf (20)

Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
11 routing
11 routing11 routing
11 routing
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
A Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network ArchitectureA Scalable, Commodity Data Center Network Architecture
A Scalable, Commodity Data Center Network Architecture
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram  SnehiRouting and IP in Advance Computer Network,Vikram  Snehi
Routing and IP in Advance Computer Network,Vikram Snehi
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
Network layer
Network layerNetwork layer
Network layer
 
Lecture 7
 Lecture 7 Lecture 7
Lecture 7
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
routing 23.pptx
routing 23.pptxrouting 23.pptx
routing 23.pptx
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Routing Protocols.pdf
Routing Protocols.pdfRouting Protocols.pdf
Routing Protocols.pdf
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
 
16 bgp
16 bgp16 bgp
16 bgp
 

Recently uploaded

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 

Recently uploaded (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 

Lecture34_RoutingAlgorithmsLSR.pdf

  • 1. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras a b c d f e 3 4 6 5 3 4 3 2 Link State Routing
  • 2. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Link State Routing • Discover its neighbour and learn network addresses – Measure cost to each of its neighbours – Construct a packet telling what it has learnt – Send packet to all other routers – With link state packets from all router construct shortest path to every other router
  • 3. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras b seqno age 3 4 5 f c d e seqno age 2 3 f c a f seqno age 5 6 e d b c seqno age 3 e d b 4 3 4 4 a seqno age 3 2 c b d seqno age 3 f c 6 Links State Packets from Different Routers
  • 4. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Link State Routing • Flags – Send flags • On which lines should the packets be sent – Ack flags • On which lines should the packets be acked – Seqno • Sequence number of packet – Useful to distinguish between new and old packets – Age • Remove packets that are circulating that are aged
  • 5. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Link State Routing • Distribution of link state packets: – Periodically flood – dam the flood – seqno – • new forward • old discard • lower discard • What if seqno corrupted – Packet discarded after it has aged – decrementing age by route – Decrement age also on time • All link state packet acked echo reply/ echo request with timestamp
  • 6. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Link state packet information (router b) 1 0 0 0 1 1 59 21 d 1 0 1 0 1 0 60 20 c 0 1 0 1 0 1 51 21 e 1 1 0 0 0 1 60 21 f 0 1 1 1 0 0 60 21 a src seqno age ack send a c f a c f Once all link state packets available – compute SSSP on all possible destination Data
  • 7. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing • Too many routers: – Hierarchical routing – Backbone routers – Regional routers (Points of Presence) – Subnetting
  • 8. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing • Flooding (Broadcast routing) – Send distinct packet to every host (wasteful of network bw) – Every incoming packet sent on every out going line except the line on which it arrived. – Generates large number of packets • Use hop count – Seqno to prevent reflooding – Selective flooding • East west need not be sent south north • Flooding in military – When master dies
  • 9. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras 1a 1b 1c 2a 2b 2c 2d 3a 3b 3c 3d 3e 4a 4b 4c 5a 5b Hierarchical routing
  • 10. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras 1 5b 1 5a 1 1b 0 0 1c 1 1a 1b 1c 5a 2 1c 3 1c 4 1c 2 1b 1 1a 1 1b - - 1a 1b 1c 5 2 3 4 Full table 1a Line Hop Hierarchical routing table 1a Line Hop Path 1a to 3a via 1c = 6 1a to 3a via 2a = 5 Therefore not always the best.
  • 11. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing (Miscellaneous) • Multi destination routing: – Each packet contains a list of destinations – Router check destinations for choosing output lines – Copy of packet made and forwarded only line where destination exists – Partitioning of destination into the output lines – After sufficient number of hops – each packet only one destination
  • 12. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing (Miscellaneous) • Multidestination Routing – Sending a message to a group of hosts – Routers must know about hosts that belong to the same group – Prune spanning tree to include only the edges of hosts in the group – Forward packets in that group • Link state / distance vector • Node not in group tells host not to send – n groups – m members
  • 13. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing (Miscellaneous) • Sink tree router / spanning tree – Each router copies packets on to output lines on spanning tree except line it arrived. • Reverse Path Forwarding: – Broadcast packet at router forwarded on all lines other line it arrived – Provided packet arrived on preferred – Otherwise discarded – No need to know spanning tree
  • 14. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing (Miscellaneous) • When a router receives a multicast packet – Examines spanning tree – Prune tree to lead to hosts only on the group – Forward packets only on pruned tree • Link state pruning: – Each router aware of the complete subnet topolo – Prune spanning tree • Start from end of each path and work toward the root – Distance vector approach • Reverse path forwarding – Send message back to host to prune its tree
  • 15. Computer Networks Prof. Hema A Murthy Indian Institute of Technology Madras Distributed Routing (Miscellaneous) • Core base tree – Single spanning tree / group – Root near middle of the group – Host sends multicast packet send to the root – Multicast along spanning tree