Delivery, Forwarding and RoutingNetworking Fundamentals
22.2DELIVERYDELIVERY• DeliveryDelivery of a packet is defined as the handling ofof a packet is defined as the handling oft...
22.3Direct and indirect delivery
22.4FORWARDING & ROUTINGFORWARDING & ROUTING• ForwardingForwarding means to place the packet in its route to itsmeans to p...
22.51. Route method versus next-hop method (lesser content)
22.62. Host-specific versus network-specific method (again lesser content)
22.73. Default method (The default route is normally defined as address 0.0.0.0)
22.8Classless Inter-Domain Routing (CIDR) is a systemof IP addressing and routing that solves the manyproblems of “classfu...
22.9
22.10Simplified forwarding module in classless address
22.11In classless addressing, we need atleast four columns in a routing table.Usually there are more.Note
22.12Make a routing table for router R1, using theconfiguration in Figure.Example 1SolutionTable after the figure shows th...
22.13Configuration for Example 1m3
22.14Routing table for router R1 in FigureActually, for Default route, Mask should be /0 and Network Addressshould be 0.0....
22.15Show the forwarding process if a packet arrives at R1 inFigure with the destination address 180.70.65.140.Example 2So...
22.16Show the forwarding process if a packet arrives at R1 inFigure with the destination address 201.4.22.35.Example 3Solu...
22.17Show the forwarding process if a packet arrives at R1 inFigure with the destination address 18.24.32.78.Example 4Solu...
22.18
22.19Address aggregation
22.20
22.21Longest mask matching
22.22Earlier
22.23As an example of hierarchical routing, let us consider theFigure. A regional ISP is granted 16,384 addressesstarting ...
22.24The second local ISP has divided its block into 4 blocks and hasassigned the addresses to four large organizations.Ex...
22.25Hierarchical routing with ISPs120.14.127.255120.14.79.255120.14.95.255120.14.111.255120.14.127.2558120.14.65.255120.1...
22.26
22.27Common fields in a routing table
22.28
22.29One utility that can be used to find the contents of arouting table for a host or router is netstat in UNIX orLINUX. ...
22.30Example 6 (continued)The destination column here defines the network address.The term gateway used by UNIX is synonym...
22.31Example 6 (continued)More information about the IP address and physicaladdress of the server can be found by using th...
22.32Configuration of the server for Example 6
22.33Destination : The destination can be an IP network address.Netmask : Specifies the netmask (also known as a subnet ma...
22.34
22.35UNICAST ROUTING PROTOCOLSUNICAST ROUTING PROTOCOLS• A routing table can be eitherA routing table can be either static...
22.36col
22.37Autonomous systems
22.38Popular routing protocols
22.39Distance-Vector Protocols• The distance-vector routing approach determines the direction(vector) and distance (hop co...
22.40Link-State Protocols• Link-state routing protocols were designed to overcome thelimitations of distance vector routin...
22.41BGP• Border Gateway Protocol (BGP) is an example of anEGP. BGP exchanges routing information betweenautonomous system...
Upcoming SlideShare
Loading in …5
×

4d routing

246 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
246
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

4d routing

  1. 1. Delivery, Forwarding and RoutingNetworking Fundamentals
  2. 2. 22.2DELIVERYDELIVERY• DeliveryDelivery of a packet is defined as the handling ofof a packet is defined as the handling ofthe packets by the underlying Physical networksthe packets by the underlying Physical networksbased on the supervision of the Networkbased on the supervision of the Network (& Data(& DataLink)Link) layer.layer.• Delivery of a packet to its final destination isDelivery of a packet to its final destination isaccomplished by using two different methods,accomplished by using two different methods,direct and indirect.direct and indirect.
  3. 3. 22.3Direct and indirect delivery
  4. 4. 22.4FORWARDING & ROUTINGFORWARDING & ROUTING• ForwardingForwarding means to place the packet in its route to itsmeans to place the packet in its route to itsdestination. Forwarding requires a host or a router todestination. Forwarding requires a host or a router tohave a routing table. When a host has a packet to sendhave a routing table. When a host has a packet to sendor when a router has received a packet to be forwarded,or when a router has received a packet to be forwarded,it looks at this table to find the route to the finalit looks at this table to find the route to the finaldestination.destination.• RoutingRouting refers to the way routing tables are created torefers to the way routing tables are created tohelp in forwarding.help in forwarding.• We now see three forwarding techniques, these makeWe now see three forwarding techniques, these makethethe size of the routing table manageablesize of the routing table manageable..
  5. 5. 22.51. Route method versus next-hop method (lesser content)
  6. 6. 22.62. Host-specific versus network-specific method (again lesser content)
  7. 7. 22.73. Default method (The default route is normally defined as address 0.0.0.0)
  8. 8. 22.8Classless Inter-Domain Routing (CIDR) is a systemof IP addressing and routing that solves the manyproblems of “classful” addressing by eliminatingfixed address classes in favor of a flexible,multiple-level, hierarchical structure of networksof varying size.Note
  9. 9. 22.9
  10. 10. 22.10Simplified forwarding module in classless address
  11. 11. 22.11In classless addressing, we need atleast four columns in a routing table.Usually there are more.Note
  12. 12. 22.12Make a routing table for router R1, using theconfiguration in Figure.Example 1SolutionTable after the figure shows the corresponding table.
  13. 13. 22.13Configuration for Example 1m3
  14. 14. 22.14Routing table for router R1 in FigureActually, for Default route, Mask should be /0 and Network Addressshould be 0.0.0.0
  15. 15. 22.15Show the forwarding process if a packet arrives at R1 inFigure with the destination address 180.70.65.140.Example 2SolutionThe router performs the following steps:1. The first mask (/26) is applied to the destination address.The result is 180.70.65.128, which does not match thecorresponding network address.2. The second mask (/25) is applied to the destinationaddress. The result is 180.70.65.128, which matches thecorresponding network address. The desination addressand the interface number m0 are passed to ARP forfurther processing.
  16. 16. 22.16Show the forwarding process if a packet arrives at R1 inFigure with the destination address 201.4.22.35.Example 3SolutionThe router performs the following steps:1. The first mask (/26) is applied to the destinationaddress. The result is 201.4.22.0, which does notmatch the corresponding network address.2. The second mask (/25) is applied to the destination address. Theresult is 201.4.22.0, which does not match the correspondingnetwork address (row 2).3. The third mask (/24) is applied to the destinationaddress. The result is 201.4.22.0, which matches thecorresponding network address. The destinationaddress of the packet and the interface number m3 arepassed to ARP.
  17. 17. 22.17Show the forwarding process if a packet arrives at R1 inFigure with the destination address 18.24.32.78.Example 4SolutionThis time all masks are applied, one by one, to thedestination address, but no matching network address isfound. When it reaches the end of the table, the modulegives the next-hop address 180.70.65.200 and interfacenumber m2 to ARP. This is probably an outgoingpackage that needs to be sent, via the default router, tosomeplace else in the Internet.
  18. 18. 22.18
  19. 19. 22.19Address aggregation
  20. 20. 22.20
  21. 21. 22.21Longest mask matching
  22. 22. 22.22Earlier
  23. 23. 22.23As an example of hierarchical routing, let us consider theFigure. A regional ISP is granted 16,384 addressesstarting from 120.14.64.0. The regional ISP has decidedto divide this block into four subblocks, each with 4096addresses. Three of these subblocks are assigned to threelocal ISPs; the second subblock is reserved for future use.Note that the mask for each block is /20 because theoriginal block with mask /18 is divided into 4 blocks.Example 5The first local ISP has divided its assigned subblock into8 smaller blocks and assigned each to a small ISP. Eachsmall ISP provides services to 128 households, each usingfour addresses.
  24. 24. 22.24The second local ISP has divided its block into 4 blocks and hasassigned the addresses to four large organizations.Example 5 (continued)There is a sense of hierarchy in this configuration. All routers inthe Internet send a packet with destination address 120.14.64.0 to120.14.127.255 to the regional ISP.The regional ISP sends every packet between 120.14.64.0 to120.14.79.255 to local ISP1.Local ISP1 sends every packet between 120.14.64.0 to120.14.65.255 to Small ISP1.Small ISP1 sends every packet between 120.14.64.0 to 120.14.64.3to H001.The third local ISP has divided its block into 16 blocks andassigned each block to a small organization. Each smallorganization has 256 addresses, and the mask is /24.
  25. 25. 22.25Hierarchical routing with ISPs120.14.127.255120.14.79.255120.14.95.255120.14.111.255120.14.127.2558120.14.65.255120.14.79.255120.14.64.3120.14.99.255120.14.112.255
  26. 26. 22.26
  27. 27. 22.27Common fields in a routing table
  28. 28. 22.28
  29. 29. 22.29One utility that can be used to find the contents of arouting table for a host or router is netstat in UNIX orLINUX. The next slide shows the list of the contents of adefault server. We have used two options, r and n. Theoption r indicates that we are interested in the routingtable, and the option n indicates that we are looking fornumeric addresses. Note that this is a routing table for ahost, not a router. Although we discussed the routing tablefor a router throughout, a host also needs a routing table.Example 6
  30. 30. 22.30Example 6 (continued)The destination column here defines the network address.The term gateway used by UNIX is synonymous withrouter. This column actually defines the address of the nexthop. The value 0.0.0.0 shows that the delivery is direct. Thelast entry has a flag of G, which means that the destinationcan be reached through a router (default router). The Ifacedefines the interface.
  31. 31. 22.31Example 6 (continued)More information about the IP address and physicaladdress of the server can be found by using the ifconfigcommand on the given interface (eth0).
  32. 32. 22.32Configuration of the server for Example 6
  33. 33. 22.33Destination : The destination can be an IP network address.Netmask : Specifies the netmask (also known as a subnet mask)Gateway : Specifies the forwarding or next hop IP address over which the set of addresses defined by the network destination and subnet mask are reachable. 
  34. 34. 22.34
  35. 35. 22.35UNICAST ROUTING PROTOCOLSUNICAST ROUTING PROTOCOLS• A routing table can be eitherA routing table can be either staticstatic oror dynamicdynamic. A. Astatic table is one with manual entries. A dynamicstatic table is one with manual entries. A dynamictable is one that is updated automatically whentable is one that is updated automatically whenthere is a change somewhere in the Internet.there is a change somewhere in the Internet.• A routing protocol is a combination of rules andA routing protocol is a combination of rules andprocedures that lets routers in the Internet informprocedures that lets routers in the Internet informeach other of changes.each other of changes.• A dynamic routing table is updated periodically byA dynamic routing table is updated periodically byusing one of these protocols.using one of these protocols.
  36. 36. 22.36col
  37. 37. 22.37Autonomous systems
  38. 38. 22.38Popular routing protocols
  39. 39. 22.39Distance-Vector Protocols• The distance-vector routing approach determines the direction(vector) and distance (hop count) to any link in the internetwork.Distance-vector algorithms periodically (such as every 30 seconds)send all or some portion of their routing table to their adjacentneighbors.• Routers running a distance-vector routing protocol send periodicupdates even if there are no changes in the network. By receiving aneighbor’s routing table, a router can verify all the known routes andmake changes to the local routing table based on updated informationreceived from the neighboring router.• Distance-vector protocols use the Bellman-Ford Algorithm tocalculate the best paths. Examples of distance-vector protocolsinclude the following:■ Routing Information Protocol (RIP)—The most common IGP in theInternet, RIP uses hop count as its routing metric.■ Interior Gateway Routing Protocol (IGRP)— Addresses the issuesassociated with routing in large, heterogeneous networks.
  40. 40. 22.40Link-State Protocols• Link-state routing protocols were designed to overcome thelimitations of distance vector routing protocols. Link-state routingprotocols respond quickly to network changes, send trigger updatesonly when a network change has occurred, and send periodic updates(called link-state refreshes) at long time intervals, such as every 30minutes.• When a link changes state, the device that detected the changecreates a link-state advertisement (LSA) concerning that link (route),and that LSA is propagated to all neighboring devices. Each routingdevice takes a copy of the LSA, updates its link-state (topological)database, and forwards the LSA to all neighboring devices. Thisflooding of the LSA is required to ensure that all routing devicesupdate their databases before creating an updated routing table thatreflects the new topology.• The link-state database is used to calculate the best pathsthrough the network by applying the Dijkstra Shortest Path First (SPF)algorithm• Examples of link-state protocols are OSPF and IS-IS.
  41. 41. 22.41BGP• Border Gateway Protocol (BGP) is an example of anEGP. BGP exchanges routing information betweenautonomous systems while guaranteeing loop-free pathselection.• It is the principal route advertising protocol used bymajor companies and ISPs on the Internet. BGP-4 is thefirst version of BGP that supports classless interdomainrouting (CIDR) and route aggregation.• Unlike common IGPs such as RIP, OSPF, andEIGRP, BGP does not use metrics such as hop count orbandwidth or delay.• Instead, BGP makes routing decisions based onnetwork policies or rules using various BGP pathattributes.

×