SlideShare a Scribd company logo
1 of 71
1
INTRODUCTION
An internet is a combination of networks connected by
routers. When a datagram goes from a source to a
destination, it will probably pass through many routers
until it reaches the router attached to the destination
network.
•Metric- cost assigned for passing through the
network.
•Metric assigned to each N/W depend on the type of
protocol.
•RIP- treat each N/W equal. One hop count for each
network.
•E.g. 10 network=10 hop count
 OSPF- assign a cost based on the type
of services required. A route through a
N/W can have different costs.
 E.g for Maximum throughput-satellite
link has lower metric than fiber optic line
 Minimum delay-fiber optic cable(low
metric)
 BGP- the criterion is the policy.
 Policy defines what path should be
chosen.
TCP/IP Protocol Suite 2
3
INTER- AND INTRA-DOMAIN
ROUTING
Today, an internet can be so large that one routing
protocol cannot handle the task of updating the routing
tables of all routers. For this reason, an internet is
divided into autonomous systems. An
autonomous system (AS) is a group of networks and
routers under the authority of a single administration.
Routing inside an autonomous system is called intra-
domain routing. Routing between autonomous systems
is called inter-domain routing
4
Autonomous systems
5
6
7
8
9
DISTANCE VECTOR ROUTING
In DSR each router periodically shares its knowledge
about the entire internet with its neighbors at regular
intervals e.g. 30 Sec. it uses the Bellman ford Algo.
Each node maintains a set of triples
􀂉 (Destination, Cost, NextHop)
LINK STATE ROUTING
In LSR each Router shares its knowledge about its
neighborhood with every router in the area.
10
11
RIP
The Routing Information Protocol (RIP) is an intra-
domain (interior) routing protocol used inside an
autonomous system. It is a very simple protocol based
on distance vector routing. RIP implements distance
vector routing directly with some considerations.
12
13
Updating Routing Table
 If the next-node entry is different
 The receiving node chooses the row with the
smaller cost
 If there is a tie, the old one is kept
 If the next-node entry is the same
 i.e. the sender of the new row is the provider
of the old entry
 The receiving node chooses the new row,
even though the new value is infinity.
When to Share
 Periodic Update
 A node sends its routing table, normally 30
seconds, in a periodic update
 Triggered Update
 A node sends its routing table to its neighbors
any time when there is a change in its routing
table
 1. After updating its routing table, or
 2. Detects some failure in the neighboring links
16
Figure 11.5 shows the initial routing table for an AS. Note that the
figure does not mean that all routing tables have been created at
the same time; each router creates its own routing table when it is
booted.
Example
17
Figure Example 11.1
18
Now assume router A sends four records to its neighbors, routers
B, D, and C. Figure 11.6 shows the changes in B’s routing table
when it receives these records. We leave the changes in the
routing tables of other neighbors as exercise.
Example
19
Figure Example 11.2
Net4 , 1
3
Net5 , 1
4
Net2 , 1
2
20
Figure shows the final routing tables for routers in Figure 11.5.
Example
21
Figure Example
22
Figure Two-node instability
Two-Node Instability (1)
 Defining Infinity
 Most implementations define 16 as infinity
 Split Horizon
 Instead of flooding the table through each
interface, each node sends only part of its
table through each interface
 E.g. node B thinks that the optimum route to
reach X is via A, it does not need to advertise
this piece of information to A
Two-Node Instability (2)
 Split Horizon and Poison Reverse
 One drawback of Split Horizon
 Normally, the DV protocol uses a timer and if there
is no news about a route, the node deletes the
route from its table
 In the previous e.g., node A cannot guess that this
is due to split horizon or because B has not
received any news about X recently
 Poison Reverse
 Node B can still advertise the value for X, but is the
source of information is A, it can replace the
distance with infinity as a warning
25
RIP messages
• RIP uses two types of message
• Request
– A request message is sent by a router that
has just come up or by a router that has
some time-out entries
– A request can ask about specific entries or
all entries
• Response
– A response can be either solicited or
unsolicited (30s or when there is a change
in the routing table)
26
RIP Timers
• Periodic timer
– It controls the advertising of regular update
message (25 ~ 30 sec)
• Expiration timer
– It governs the validity of a route (180 sec)
– In normal situation new updates received in 30 sec.
but when inernet is down and update not received in
180 sec. then….
– The route is considered expired and the hop count
of the route is set to 16(means host unreachable)
• Garbage collection timer
– A invalid route is not purged from the routing
table until this timer expires (120 sec)
27
RIPv2 vs. RIPv1
• Classless Addressing
• Authentication
• Multicasting
– RIPv1 uses broadcasting to send RIP messages
to every neighbors. Routers as well as hosts
receive the packets
– RIPv2 uses the all-router multicast address to
send the RIP messages only to RIP routers in
the network
28
Example of a domain using RIP
29
RIP message format
Command-8bit-specifies the type of messages-request/response
Family- 16 bit- defines the family of protocols. For TCP/IP
value=2
Address- address of destination network
Distance- 32 bit – defines the hop count from the advertising
router to the destination network.
30
Request messages
31
RIP uses the services of UDP on well-
known port 520.
Note
Problem with RIP
 Slow convergence –
Change somewhere in the internet propagates very
slowly through the rest of the internet.
Solu: limit the hop count to 15, the number 16 is
considered infinity. It prevents the data packets from
wandering around.
 Instability- RIP takes a long time to stabilize.
Even for a small network, it takes several minutes
until the routing tables have settled after a change.
Limiting number of hops to 15 will improve stability
but will not eliminate all problems.
It may have to wait for 30 sec. before it can it
updates with new information.(mean time another
send its own updates) 32
33
34
35
LINK STATE ROUTING
Link state routing has a different philosophy from that
of distance vector routing. In link state routing, if each
node in the domain has the entire topology of the
domain—the list of nodes and links, how they are
connected including the type, cost (metric), and the
condition of the links (up or down)—the node can use
the Dijkstra algorithm to build a routing table.
36
Concept of Link state routing
37
Link state knowledge
38
Building Routing Tables
• Creation of the states of the links by
each node, called the link state
packets (LSP)
• Dissemination of LSPs to every other
routers, called flooding (efficiently)
• Formation of a shortest path tree for
each node
• Calculation of a routing table based on
the shortest path tree
39
Creation of LSP
• LSP data: E.g. the node ID, the list of
links, a sequence number, and age.
• LSP Generation
– When there is a change in the
topology of the domain
– On a periodic basis
• There is no actual need for this type of
LSP, normally 60 minutes or 2 hours
40
41
OSPF
The Open Shortest Path First (OSPF) protocol is an
intra-domain routing protocol based on link state
routing. Its domain is also an autonomous system.
42
Topics Discussed in the Section
 Area
 Metric
 Types of Links
 Graphical Representation
 OSPF Packets
 Link State Update Packet
 Other Packets
 Encapsulation
43
Areas in an autonomous system
44
Area in OSPF (1)
• A collection of networks with area ID
• Routers inside an area flood the area
with routing information
• Area border routers summarize the
information about the area and send
it to other areas
• Backbone area and backbone routers
– All of the area inside an AS must be
connected to the backbone
45
Area in OSPF (2)
• Virtual link
– If, because of some problem, the
connectivity between a backbone
and an area is broken, a virtual link
between routers must be created
by the administration to allow
continuity of the functions of the
backbone as the primary area
46
Types of links
47
Point-to-point link
48
Transient link
49
Stub link
50
Example of an AS and its graphical representation in OSPF
51
Types of OSPF packet
52
OSPF packets are encapsulated in
IP datagrams.
Note
53
PATH VECTOR ROUTING
Distance vector and link state routing are both interior
routing protocols. They can be used inside an autonomous
system. Both of these routing protocols become
intractable when the domain of operation becomes large.
Distance vector routing is subject to instability if there is
more than a few hops in the domain of operation. Link
state routing needs a huge amount of resources to
calculate routing tables. It also creates heavy traffic
because of flooding. There is a need for a third routing
protocol which we call path vector routing.
54
Topics Discussed in the Section
 Reachability
 Routing Table
55
The difference between the distance vector routing and path
vector routing can be compared to the difference between a
national map and an international map. A national map can tell us
the road to each city and the distance to be traveled if we choose
a particular route; an international map can tell us which cities
exist in each country and which countries should be passed before
reaching that city.
Example
56
Reachability
57
Stabilized table for three autonomous system
58
Routing tables after aggregation
59
BGP
Border Gateway Protocol (BGP) is an interdomain
routing protocol using path vector routing. It first
appeared in 1989 and has gone through four versions.
60
Topics Discussed in the Section
 Types of Autonomous Systems
 Path Attributes
 BGP Sessions
 External and Internal BGP
 Types of Packets
 Packet Format
 Encapsulation
61
Internal and external BGP sessions
A speaker node advertises the path, not the metric of
the nodes, in its AS or other ASs.
62
Path Vector Routing (1)
• Sharing
– A speaker in an AS shares its table with
immediate neighbors
• Updating
– Adding the nodes that are not in its
routing table and adding its own AS and
the AS that sent the table
– The routing table shows the path
completely
63
Path Vector Routing (2)
• Loop prevention
– A route checks to see if its AS is in the
path list to the destination
• Policy routing
– If one of the ASs listed in the path is
against its policy, it can ignore that path
and that destination
– It does not update its routing table with
the path, and it does not send this
message to its neighbors
64
Path Vector Routing (3)
• Optimum path
– Problem: each AS that is included in the
path may use a different criteria for
the metric
– The optimum path is the path that fits
the organization
– For Fig. 14-49, the author chose the one
that had the smaller number of ASs
– Other criteria: security, safety,
reliability, etc.
65
Types of AS
• Stub AS
– Only one connection to another AS (only
a source or sink for data traffic)
• Multihomed AS
– More than one connection to other AS,
but it is still only a source or sink for
data traffic
• Transit AS
– Multihomed AS that also allows
transient traffic
66
Types of BGP messages
67
BGP packet header
68
Open message
69
Update message
70
BGP supports classless addressing
and CIDR.
Note
71
BGP uses the services of TCP
on port 179.
Note

More Related Content

Similar to DSR,LSR,IGMP,RIP,OSPF.ppt

IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocolsassinha
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocolsmita gupta
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdfngusyirga
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxGirT2
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2Krishna Nanda
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptxMNSUAM
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ansRavi Kodoli
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing ProtocolsBIT DURG
 

Similar to DSR,LSR,IGMP,RIP,OSPF.ppt (20)

Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
Notes
NotesNotes
Notes
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
computer communications
computer communicationscomputer communications
computer communications
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
COMPUTER COMMUNICATION NETWORKS-R-Routing protocols 2
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
RIP and OSPF
RIP and OSPFRIP and OSPF
RIP and OSPF
 
IP ROUTING
IP ROUTINGIP ROUTING
IP ROUTING
 
Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 

Recently uploaded

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

DSR,LSR,IGMP,RIP,OSPF.ppt

  • 1. 1 INTRODUCTION An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many routers until it reaches the router attached to the destination network. •Metric- cost assigned for passing through the network. •Metric assigned to each N/W depend on the type of protocol. •RIP- treat each N/W equal. One hop count for each network. •E.g. 10 network=10 hop count
  • 2.  OSPF- assign a cost based on the type of services required. A route through a N/W can have different costs.  E.g for Maximum throughput-satellite link has lower metric than fiber optic line  Minimum delay-fiber optic cable(low metric)  BGP- the criterion is the policy.  Policy defines what path should be chosen. TCP/IP Protocol Suite 2
  • 3. 3 INTER- AND INTRA-DOMAIN ROUTING Today, an internet can be so large that one routing protocol cannot handle the task of updating the routing tables of all routers. For this reason, an internet is divided into autonomous systems. An autonomous system (AS) is a group of networks and routers under the authority of a single administration. Routing inside an autonomous system is called intra- domain routing. Routing between autonomous systems is called inter-domain routing
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9 DISTANCE VECTOR ROUTING In DSR each router periodically shares its knowledge about the entire internet with its neighbors at regular intervals e.g. 30 Sec. it uses the Bellman ford Algo. Each node maintains a set of triples 􀂉 (Destination, Cost, NextHop) LINK STATE ROUTING In LSR each Router shares its knowledge about its neighborhood with every router in the area.
  • 10. 10
  • 11. 11 RIP The Routing Information Protocol (RIP) is an intra- domain (interior) routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing. RIP implements distance vector routing directly with some considerations.
  • 12. 12
  • 13. 13
  • 14. Updating Routing Table  If the next-node entry is different  The receiving node chooses the row with the smaller cost  If there is a tie, the old one is kept  If the next-node entry is the same  i.e. the sender of the new row is the provider of the old entry  The receiving node chooses the new row, even though the new value is infinity.
  • 15. When to Share  Periodic Update  A node sends its routing table, normally 30 seconds, in a periodic update  Triggered Update  A node sends its routing table to its neighbors any time when there is a change in its routing table  1. After updating its routing table, or  2. Detects some failure in the neighboring links
  • 16. 16 Figure 11.5 shows the initial routing table for an AS. Note that the figure does not mean that all routing tables have been created at the same time; each router creates its own routing table when it is booted. Example
  • 18. 18 Now assume router A sends four records to its neighbors, routers B, D, and C. Figure 11.6 shows the changes in B’s routing table when it receives these records. We leave the changes in the routing tables of other neighbors as exercise. Example
  • 19. 19 Figure Example 11.2 Net4 , 1 3 Net5 , 1 4 Net2 , 1 2
  • 20. 20 Figure shows the final routing tables for routers in Figure 11.5. Example
  • 23. Two-Node Instability (1)  Defining Infinity  Most implementations define 16 as infinity  Split Horizon  Instead of flooding the table through each interface, each node sends only part of its table through each interface  E.g. node B thinks that the optimum route to reach X is via A, it does not need to advertise this piece of information to A
  • 24. Two-Node Instability (2)  Split Horizon and Poison Reverse  One drawback of Split Horizon  Normally, the DV protocol uses a timer and if there is no news about a route, the node deletes the route from its table  In the previous e.g., node A cannot guess that this is due to split horizon or because B has not received any news about X recently  Poison Reverse  Node B can still advertise the value for X, but is the source of information is A, it can replace the distance with infinity as a warning
  • 25. 25 RIP messages • RIP uses two types of message • Request – A request message is sent by a router that has just come up or by a router that has some time-out entries – A request can ask about specific entries or all entries • Response – A response can be either solicited or unsolicited (30s or when there is a change in the routing table)
  • 26. 26 RIP Timers • Periodic timer – It controls the advertising of regular update message (25 ~ 30 sec) • Expiration timer – It governs the validity of a route (180 sec) – In normal situation new updates received in 30 sec. but when inernet is down and update not received in 180 sec. then…. – The route is considered expired and the hop count of the route is set to 16(means host unreachable) • Garbage collection timer – A invalid route is not purged from the routing table until this timer expires (120 sec)
  • 27. 27 RIPv2 vs. RIPv1 • Classless Addressing • Authentication • Multicasting – RIPv1 uses broadcasting to send RIP messages to every neighbors. Routers as well as hosts receive the packets – RIPv2 uses the all-router multicast address to send the RIP messages only to RIP routers in the network
  • 28. 28 Example of a domain using RIP
  • 29. 29 RIP message format Command-8bit-specifies the type of messages-request/response Family- 16 bit- defines the family of protocols. For TCP/IP value=2 Address- address of destination network Distance- 32 bit – defines the hop count from the advertising router to the destination network.
  • 31. 31 RIP uses the services of UDP on well- known port 520. Note
  • 32. Problem with RIP  Slow convergence – Change somewhere in the internet propagates very slowly through the rest of the internet. Solu: limit the hop count to 15, the number 16 is considered infinity. It prevents the data packets from wandering around.  Instability- RIP takes a long time to stabilize. Even for a small network, it takes several minutes until the routing tables have settled after a change. Limiting number of hops to 15 will improve stability but will not eliminate all problems. It may have to wait for 30 sec. before it can it updates with new information.(mean time another send its own updates) 32
  • 33. 33
  • 34. 34
  • 35. 35 LINK STATE ROUTING Link state routing has a different philosophy from that of distance vector routing. In link state routing, if each node in the domain has the entire topology of the domain—the list of nodes and links, how they are connected including the type, cost (metric), and the condition of the links (up or down)—the node can use the Dijkstra algorithm to build a routing table.
  • 36. 36 Concept of Link state routing
  • 38. 38 Building Routing Tables • Creation of the states of the links by each node, called the link state packets (LSP) • Dissemination of LSPs to every other routers, called flooding (efficiently) • Formation of a shortest path tree for each node • Calculation of a routing table based on the shortest path tree
  • 39. 39 Creation of LSP • LSP data: E.g. the node ID, the list of links, a sequence number, and age. • LSP Generation – When there is a change in the topology of the domain – On a periodic basis • There is no actual need for this type of LSP, normally 60 minutes or 2 hours
  • 40. 40
  • 41. 41 OSPF The Open Shortest Path First (OSPF) protocol is an intra-domain routing protocol based on link state routing. Its domain is also an autonomous system.
  • 42. 42 Topics Discussed in the Section  Area  Metric  Types of Links  Graphical Representation  OSPF Packets  Link State Update Packet  Other Packets  Encapsulation
  • 43. 43 Areas in an autonomous system
  • 44. 44 Area in OSPF (1) • A collection of networks with area ID • Routers inside an area flood the area with routing information • Area border routers summarize the information about the area and send it to other areas • Backbone area and backbone routers – All of the area inside an AS must be connected to the backbone
  • 45. 45 Area in OSPF (2) • Virtual link – If, because of some problem, the connectivity between a backbone and an area is broken, a virtual link between routers must be created by the administration to allow continuity of the functions of the backbone as the primary area
  • 50. 50 Example of an AS and its graphical representation in OSPF
  • 52. 52 OSPF packets are encapsulated in IP datagrams. Note
  • 53. 53 PATH VECTOR ROUTING Distance vector and link state routing are both interior routing protocols. They can be used inside an autonomous system. Both of these routing protocols become intractable when the domain of operation becomes large. Distance vector routing is subject to instability if there is more than a few hops in the domain of operation. Link state routing needs a huge amount of resources to calculate routing tables. It also creates heavy traffic because of flooding. There is a need for a third routing protocol which we call path vector routing.
  • 54. 54 Topics Discussed in the Section  Reachability  Routing Table
  • 55. 55 The difference between the distance vector routing and path vector routing can be compared to the difference between a national map and an international map. A national map can tell us the road to each city and the distance to be traveled if we choose a particular route; an international map can tell us which cities exist in each country and which countries should be passed before reaching that city. Example
  • 57. 57 Stabilized table for three autonomous system
  • 58. 58 Routing tables after aggregation
  • 59. 59 BGP Border Gateway Protocol (BGP) is an interdomain routing protocol using path vector routing. It first appeared in 1989 and has gone through four versions.
  • 60. 60 Topics Discussed in the Section  Types of Autonomous Systems  Path Attributes  BGP Sessions  External and Internal BGP  Types of Packets  Packet Format  Encapsulation
  • 61. 61 Internal and external BGP sessions A speaker node advertises the path, not the metric of the nodes, in its AS or other ASs.
  • 62. 62 Path Vector Routing (1) • Sharing – A speaker in an AS shares its table with immediate neighbors • Updating – Adding the nodes that are not in its routing table and adding its own AS and the AS that sent the table – The routing table shows the path completely
  • 63. 63 Path Vector Routing (2) • Loop prevention – A route checks to see if its AS is in the path list to the destination • Policy routing – If one of the ASs listed in the path is against its policy, it can ignore that path and that destination – It does not update its routing table with the path, and it does not send this message to its neighbors
  • 64. 64 Path Vector Routing (3) • Optimum path – Problem: each AS that is included in the path may use a different criteria for the metric – The optimum path is the path that fits the organization – For Fig. 14-49, the author chose the one that had the smaller number of ASs – Other criteria: security, safety, reliability, etc.
  • 65. 65 Types of AS • Stub AS – Only one connection to another AS (only a source or sink for data traffic) • Multihomed AS – More than one connection to other AS, but it is still only a source or sink for data traffic • Transit AS – Multihomed AS that also allows transient traffic
  • 66. 66 Types of BGP messages
  • 70. 70 BGP supports classless addressing and CIDR. Note
  • 71. 71 BGP uses the services of TCP on port 179. Note