Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
This thesis presents a simulation based analysis of these protocols. We used the combination of EIGRP&IS-IS, RIP&IS-IS routing protocols on the Hybrid network in order to reveal the advantage of one over the other as well as the robustness of each protocol combination and how this is measured.
This thesis presents a simulation based analysis of these protocols. We used the combination of EIGRP&IS-IS, RIP&IS-IS routing protocols on the Hybrid network in order to reveal the advantage of one over the other as well as the robustness of each protocol combination and how this is measured.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
he Optimized Link State Routing Protocol (OLSR)[1] is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.
Overview of IP routing protocols, packet forwarding and proxy ARP.
The principle of IP routing proved to be very flexible and scalable in the growth of the Internet and TCP/IP based networks.
IP routing denotes protocols for exchanging IP address range reachability like RIP, BGP and OSPF.
In contrast to IP routing, IP packet forwarding collectively means all functions performed when an IP router receives a packet and forwards it over the output interface indicated by an IP route in the routing table.
When an IP router performs a route lookup, it calculates a route decision based on different properties like prefix (mask) length, route precedence and metrics.
Routing protocols for exchanging route information can be coarsely classified as distance vector and link state protocols. Distance vector protocols like RIP (Routing Information Protocol) exchange information about the path cost to specific targets (IP address ranges). Routers that talk distance vector protocols receive reachability information about all sub-networks indirectly from neighboring routers.
In contrast to distance vector protocols, link state protocols like OSPF disseminate information about the link state of each router link in a network to all routers in the network. Thus link state protocols tend to converge faster to topology changes since all routers have firsthand information of the topology of the network.
Proxy ARP may be a convenient solution when it comes to add additional subnets without having to add routes to routers and hosts. A proxy ARP enabled router would answer ARP requests on behalf of the targeted hosts mimicking a local network access to the requesting host.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
networking and their Routing protocols with commands along with diagram ,(rip, IGRP and OSPF and BGP ) and knowledge about Network devices like Router and Switch. network define and definitions of Lan, router and all the routing protocols and their features.
he Optimized Link State Routing Protocol (OLSR)[1] is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link-state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths.
Overview of IP routing protocols, packet forwarding and proxy ARP.
The principle of IP routing proved to be very flexible and scalable in the growth of the Internet and TCP/IP based networks.
IP routing denotes protocols for exchanging IP address range reachability like RIP, BGP and OSPF.
In contrast to IP routing, IP packet forwarding collectively means all functions performed when an IP router receives a packet and forwards it over the output interface indicated by an IP route in the routing table.
When an IP router performs a route lookup, it calculates a route decision based on different properties like prefix (mask) length, route precedence and metrics.
Routing protocols for exchanging route information can be coarsely classified as distance vector and link state protocols. Distance vector protocols like RIP (Routing Information Protocol) exchange information about the path cost to specific targets (IP address ranges). Routers that talk distance vector protocols receive reachability information about all sub-networks indirectly from neighboring routers.
In contrast to distance vector protocols, link state protocols like OSPF disseminate information about the link state of each router link in a network to all routers in the network. Thus link state protocols tend to converge faster to topology changes since all routers have firsthand information of the topology of the network.
Proxy ARP may be a convenient solution when it comes to add additional subnets without having to add routes to routers and hosts. A proxy ARP enabled router would answer ARP requests on behalf of the targeted hosts mimicking a local network access to the requesting host.
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
A Comparative Performance Analysis of Route Redistribution among Three Differ...IJCNCJournal
In an enterprise network, it is normal to use multiple dynamic routing protocols for forwarding packets.
Therefore, the route redistribution is an important issue in an enterprise network that has been configured
by multiple different routing protocols in its routers. In this study, we analyse the performance of the
combination of three routing protocols in each scenario and make a comparison among our scenarios. We
have used the OPNET 17.5 simulator to create the three scenarios in this paper by selecting three different
routing protocols from the distance vector and link state routing protocols in each scenario. In the first
scenario, the network routers are configured from EIGRP, IGRP, and IS-IS that is named
EIGRP_IGRP_ISIS in our simulation. The OSPF_IGRP_ISIS scenario is a mixed from EIGRP, IGRP, and
IS-IS protocols that is the second scenario. The third scenario is OSPF_IGRP_EIGRP that is the route
redistribution among OSPF, IGRP, and IS-IS protocols. The simulation results showed that the
performance of the EIGRP_IGRP_ISIS scenario is better than the other scenarios in terms of network
convergence time, throughput, video packet delay variation, and FTP download response time. In contrast,
the OSPF_IGRP_ISIS has less voice packet delay variation, video conferencing and voice packet end to
end delays, and queuing delay as compared with the two other scenarios. On the other hand, the
performance of the OSPF_IGRP_EIGRP scenario has better FTP upload response time, and voice jitter.
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
Routing protocol is taking a vital role in the modern internet era. A routing protocol determines
how the routers communicate with each other to forward the packets by taking the optimal path to travel
from a source node to a destination node in the network layer. Algorithms that are used for route selection
and data structure are the main parts for the network layer. But in this paper we have explored four
eminent dynamic routing protocols namely, Routing Information Protocol (RIP), Open Shortest Path First
(OSPF) & Enhanced Interior Gateway Routing Protocol (EIGRP) and Interior Gateway Routing Protocol
(IGRP) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics
such as Delay, FTP, E-mail, HTTP, VoIP and Video Conferencing through the simulated network models.
The simulation results are analyzed, with a comparison between these protocols on the effectiveness and
performance in network implemented. Results show that EIGRP will be best for delay, E-mail and FTP but
for real time applications OSPF and RIP give better results
3a.Error detection provides for accurate data transfer. Indeed, if.pdfapexjaipur
3a.
Error detection provides for accurate data transfer. Indeed, if the error can be identified in the
data sent over the network, corrective measures can be taken so as to correct the data, thus
maintaining the accuracy of the data. Basic approach used for error detection is the use of
redundancy, where additional bits are added to facilitate detection of errors. Out of various
techniques, Two-dimensional parity & Checksum are discussed as follows:
In one-dimensional parity check, a redundant bit known as parity bit is appended to every data
unit so that total number of 1’s in the data becomes even. The two-dimensional parity check is
used to enhance performance over 1-D parity check. Here, the block of bits are arranged in a
tabular format. For each row and for each column, 1D parity checks are being evaluated
respectively and sent along with the data, which is further checked at the receiving end. This
technique detects burst error of more than n bits with high probability.
7c.
Distance vector routing protocol is one of the main approaches to Intra-domain networking. It is
quite simple to implement. The name Distance vector implies “how far & in which direction” the
data packets need to be sent. \"Direction\" usually means the next hop address and the exit
interface. \"Distance\" is a measure of the cost to reach a certain node. The least cost route
between any two nodes is the route with minimum distance. Each node maintains a vector of
minimum distance to every node. As opposed to Link state protocol, where each node tells all
nodes about its neighbors, here each node tells its neighbors about its shortest route to all other
nodes in the network, on a periodic basis. It is based on Distributed Bellman-Ford Algorithm.
Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which
employ the hop count as a routing metric. RIP is a routing protocol which exchanges network
information between routers dynamically. It uses local broadcast to share routing information.
RIP broadcasts routing updates in every 30 seconds, regardless something in network has
changed or not. Once 30 seconds expires, routers running RIP protocol will broadcast their
routing information to any devices connected to their interfaces. Before sending routing updates
router add a initiating metric to every routes which it has and increments the metric of incoming
routes in advertisements so the listing router can learn how far destination network is. While
sending broadcasts RIP does not care about who listens these broadcast updates or not. After
sending broadcast RIP does not care whether neighbors received these broadcast updates or not.
When router receives routing updates, it compares them with the routes which it already has in
its routing table. If update has information about a route which is not available in its routing
table, router will consider that route as a new route. Router will add all new routes in routing
table before up.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2. Routing is the process of selecting paths in a network along which to
send network traffic. It is to find path between source and destination.
All devices or nodes in the way to destination use the destination IP
address to send the packet in the right direction to reach its
destination. The path a packet takes is determined after a router
consults its routing table. After router determines the best path the
packet is encapsulated into a frame and frame is then placed on
network medium.
Routing protocol is a software process running on the router. It will
exchange routing information with other routers,studying route
information of network not directly connected and adjusting the route
information when topology changes
3. Routing protocols are based either on a distance vector, link state,
or path vector technology.
Distance Vector
Distance vector routing protocols propagate routing information in
the form of an address prefix and its ―distance‖ (hop count).
Routers use distance vector-based routing protocols to periodically
advertise the routes in their routing tables. Routing information
exchanged between typical distance vector-based routers is
unsynchronized and unacknowledged.
The advantages of distance vector based routing protocols include
simplicity and ease of configuration. The disadvantages of distance
vector-based routing protocols include relatively high network
traffic, a long convergence time, and inability to scale to a large or
very large network.
4. Link State
Routers using link state–based routing protocols exchange link
state advertisements (LSAs) throughout the network to update
routing tables. LSAs consist of a router’s attached network
prefixes and their assigned costs. Routers advertise LSAs upon
startup and when changes in the network topology are detected.
Link state updates are sent using unicast or multicast traffic rather
than broadcasting.
Link state routers build a database of link state advertisements
and use the database to calculate the optimal routes to add to the
routing table. Routing information exchanged between link state–
based routers is synchronized and acknowledged.
The advantages of link state–based routing protocols are low
network overhead, low convergence time, and the ability to scale
to large and very large networks. The disadvantages of link state–
based routing protocols are that they can be more complex and
difficult to configure.
5. Unicast routing is a process that enable sender to send an unicast IP
packets to the destination node.
1 router or more intermediate routers may be used, depending to the
destination of the node. (Figure 1)
Unicast routing protocol is a set of rules of forwarding unicast traffic
from a source to a destination on an internetwork.
`
Source (S)
`
Destination (D)
S D S D
S
D
S D S D
Fig. 1. Unicast Routing
The router is using only 1
port to forwards the
received unicast packet
6. Unicast Routing Protocol consists of:
◦ RIP (Routing Information Protocol)
◦ OSPF (
◦ BGP
They each serve a different purpose.
Routing
Interior Exterior
RIP OSPF BGP
Fig. 2. Types of Unicast Routing Protocol
7. Based on Distance Vector algorithm known as bellman ford algorithm.
RIPng for IPv6 has a maximum distance of 15, where 15 is the accumulated
cost (hop count). Locations that are a distance of 16 or further are
considered unreachable.
RIPng for IPv6 is a simple routing protocol with a periodic route-
advertising mechanism designed for use in small to midsize IPv6 networks.
RIPng for IPv6 does not scale well to a large or very large IPv6 network.
RIPng uses a simple mechanism to determine the metric (cost) of a route. It
basically counts the number of routers (hops) to the destination. Each router
counts as one hop. Routes with a distance greater than or equal to 16 are
considered to be unreachable. The router periodically distributes information
about its routes to its directly connected neighbors using RIPng response
messages. Upon receiving RIPng response messages from its neighbor, the
router adds the distance between the neighbor and itself (usually one, as in
one hop) to the metric of each route received.
After initialization, the RIPng for IPv6 router periodically announces (every
30 seconds, by default) the appropriate routes in its routing table for each
interface
8. Router keeps the following entries in the routing table
◦ IPv6 Route
Address prefix and prefix length of the destination address
◦ Next Hop Address
The IPv6 Address (link-local) of the first router along the path
◦ Next Hop Interface
The physical interface used to reach the next hop
◦ Metric
Number indicating the total distance to the destination. RIPng
advertizes directly connected routes with the configured outgoing
metric of 1.
◦ Timer: Amount of time since the information about the route was last
updated
◦ Route change flag: Set to control triggered routing updates
◦ Route Source: Entity to provide route information
◦ eg: Ripng, OSPF etc..
9. RIPng is a UDP-based protocol. Each router that uses RIPng has a routing process
that sends and receives datagrams on UDP port number 521, the RIPng port. All
communications intended for another router's RIPng process are sent to the RIPng
port
20 Bytes/RTE
Command 1: ask
system to send all
or part of its
routing table
Command 2: sends
an update message
containing all or
parts of the
senders routing
table.
10. RIPng header is followed by one or more routing
table entries (format of Routing table entry)
….
16 B IPv6 Prefix
2 B Route Tag
1 B Prefix Length
1 B Metric(1-16)
11. IPv6 Prefix: 128 bits address of the network whose information is being carried.
Route Tag
It may be used to carry additional information about a route learned from another
routing protocol eg: BGP
◦ Prefix Length: The no of bits of the adress that represents the network portion.
The number of RTEs within single updates depends on the MTU of the medium
between two neighboring routers
No of RTEs=[INT(MTU-IPv6 Hdr len-UDP Hdr len -RIPng Hdr len) / RTE-Size]
Timers
◦ RIPng uses different timers to control updates of the routing information
◦ Update timer
By default, every 30 seconds, RIPng process wakesup on each interface to
send an unsolicited routing response to the neighboring routers
12. Timeout Timer
◦ Each time a route entry is updated and the timeout
timer is reset to zero
◦ If the route entry reaches 180 secs (default), without
another update, it is considered to have expired,
metric set to 16 and garbage collection process
starts
Garbage collection timer (hold down timer)
◦ Set to 120 secs (default) that have timeout or been
received with a metric of 16 after expiration, the
route entry finally be removed from the routing table.
13. Each router maintains a database describing the link states within the
autonomous system. This database is being built by exchanging Link
State Advertisements (LSAs) between neighboring routers. Depending
on its contents, an LSA is flooded to all routers in the autonomous
system (AS flooding scope), all routers within the same area (area
flooding scope), or simply to its neighbors. The flooding always occurs
along a path of neighboring routers, so a stable neighbor relationship is
extremely important for OSPF to work properly. The neighbor
relationship is called adjacency. Each router originates router LSAs
advertising the local state of its interfaces to all routers within the same
area. Additional LSAs are originated to identify links with multiple
routers (multi-access networks), IPv6 routes from other areas, or IPv6
routes external to the OSPF autonomous system. Each router puts the
received LSA into its LSA database, called the Link-State Database
(LSDB).
14. Using the LSDB as the input, each router runs the same algorithm to
build a tree of least-cost paths (shortest-path-first tree [SPF tree]) to each
route. The LSDB is like having a map of the network used to plot the
shortest paths to each destination. The cost is described by a single
dimensionless metric, which is configurable on each interface of the
router.
The metric assigned to the interface is usually inversely proportional to
its line speed, i.e., higher bandwidth means lower cost. A common
formula was to divide 10^8 by the line speed in bits per second. This
formula is outdated as interface speed today is in the range of 10^9 (e.g.,
Gigabit Ethernet) or even 10^10. Most vendors today apply a nonlinear
formula. You can always choose and implement your own cost metrics
according to corporate standards. OSPF can put multiple equal-cost paths
to the same route into the routing table. The algorithm for distributing
traffic among these paths is at the discretion of the routing process itself,
normally based on the source and destination IPv6 addresses.
15. An implementation of a Link-State Routing Protocol
Open Standard
Interior Gateway Protocol(inside an AS) developed by
IETF
Cost/Metric: Link-Bandwidth
Manages Hello and Link State advertisements
Implements Shortest-Path-First Algorithm to select
best path
Supports
◦ Authentication and encryption
◦ VLSM
◦ Multiple areas
Area functionality allows OSPF to only function over a
subset of a network
12/7/2015
Niranjan Baral 15
16. Can be used in Scalable network.
Use a hierarchical design principles( Multiple areas connect
to a distribution area or backbone area or Area 0)
It supports area allocation where OSPF can divide the
network into 2 level areas, they are backbone and non-
backbone, in this way, each area will maintain the
independent LSDB and run SPF algorithm respectively, it is
easier and takes less time to calculate the routes, so, area
allocation can reduce the protocol impact on CPU memory.
Only LSDB of routers in the same area can be synchronized.
The changes of network topology structure are first updated
within the area..
After areas are allocated, route aggregation is performed on
the boundary router.
12/7/2015
Niranjan Baral 16
17. 12/7/2015
Niranjan Baral 17
• Each router connects to the backbone called area 0, or the backbone area.
• Routers that connect other areas to the backbone within an AS are called Area Border
Routers (ABRs).
• One interface must be in area 0.
• OSPF runs inside an autonomous system, but can also connect multiple autonomous
systems together.
• The router that connects these ASes together is called an Autonomous System
Boundary Router (ASBR).
18.
19. Link State routing
◦ Each node within the autonomous system has the
information about the entire topology.
◦ Each node in the domain build up the routing table using
Dijkstra’s algorithm.
Link State Database (LSDB) contains link state advertisement is send to
every router in the same domain.
◦ Each router will be updated with the latest copy of LSDB
Based on the LSDB, router creates a Shortest Path First (SPF) tree
◦ Using Dijkstra’s a Algorithm
A routing table can be derived from the SPF tree which contains the best
route to each router.
20. OSPF for IPv6, also known as OSPFv3, is a link state routing
protocol defined in RFC 5340. It is designed to be run as a routing
protocol for a single autonomous system. OSPF for IPv6 is an
adaptation of the OSPF routing protocol version 2 for IPv4. The
OSPF cost of each router link is a unitless number that the network
administrator assigns, and it can include delay, bandwidth, and other
cost factors. The accumulated cost between network segments in an
OSPF network must be less than 65,535.
It was designed to overcome some of the limitations introduced by
RIP, such as the small diameter, long convergence time, and a metric
that does not reflect the characteristics of the network. In addition,
OSPF handles a much larger routing table to accommodate large
number of routes.
21. Protocol Processing Per-Link, Not Per-Subnet
Multiple IPv6 subnets can be assigned to a single link, and two nodes can talk directly over a single
link, even if they do not share a common IPv6 subnet (IPv6 prefix). For this reason, OSPF for IPv6
runs per-link instead of the IPv4 behavior of per-IP-subnet. The terms "network" and "subnet" used in
the IPv4 OSPF specification ([OSPFV2]) should generally be replaced by link.
Removal of addressing semantics
IPv6 addresses are no longer present in OSPF packet headers. They are only allowed as payload
information
Addition of Flooding Scope
Flooding scope for LSAs has been generalized and is now explicitly coded in the
LSA’s LS type field. There are now three separate flooding scopes for LSAs:
o Link-local scope. LSA is only flooded on the local link and no further. Used for the
new link-LSA.
o Area scope. LSA is only flooded throughout a single OSPF area. Used for router-
LSAs, network-LSAs, inter-area-prefix-LSAs, interarea-router-LSAs, and intra-area-
prefix-LSAs.
o AS scope. LSA is flooded throughout the routing domain. Used for AS-external-
LSAs. A router that originates AS scoped LSAs is considered an AS Boundary Router
(ASBR) and will set its E-bit in router-LSAs for regular areas.
22. Explicit Support for Multiple Instances per Link
Ability to run multiple OSPF protocol instances on a single link. Support for multiple
protocol instances on a link is accomplished via an "Instance ID" contained in the
OSPF packet header and OSPF interface data structures.
Use of Link-Local Addresses
IPv6 link-local addresses are for use on a single link, for purposes of neighbor
discovery, auto-configuration, etc. IPv6 routers do not forward IPv6 datagrams having
link-local source addresses [IP6ADDR]. Link-local unicast addresses are assigned
from the IPv6 address range FE80/10
Authentication Changes
In OSPF for IPv6, authentication has been removed from the OSPF protocol. The
"AuType" and "Authentication" fields have been removed from the OSPF packet
header, and all authentication-related fields have been removed from the OSPF area
and interface data structures. When running over IPv6, OSPF relies on the IP
Authentication Header (see [IPAUTH]) and the IP Encapsulating Security Payload (see
[IPESP]) as described in [OSPFV3-AUTH] to ensure integrity and
authentication/confidentiality of routing exchanges.
23. Packet format changes
OSPF for IPv6 runs directly over IPv6. Aside from this, all addressing
semantics have been removed from the OSPF packet headers, making it
essentially"network-protocol-independent".(Details from book)
Identifying Neighbors by Router ID
In OSPF for IPv6, neighboring routers on a given link are always
identified by their OSPF Router ID. This contrasts with the IPv4
behavior where neighbors on point-to-point networks and virtual links
are identified by their Router IDs while neighbors on broadcast and
point-to-multipoint links are identified by their IPv4 interface addresses
Handling unknown LSA types
Instead of simply discarding them, OSPF for IPv6 introduces a more
flexible way of handling unknown LSA types. A new LSA handling bit
has been added to the LS Type field to allow flooding of unknown LSA
types
26. Version: 3
Type: Type of OSPF packet
1- Hello Message
2- Database Description message
3- Link State Request
4- Link State Update
5- Link State Acknowledgement
Packet Length: Length of OSPF packet in bytes. It includes the
standard 16 bytes as well.
Router ID: The 32-bit Router ID of the packet source
Area ID: A 32-bit Area ID indicating the area that this packet belongs
to. Every packet belongs to a single area.
Checksum: Standard 16-bit checksum
InstanceID: Enables multiple instances of OSPF to be run over a single
link. It has local significance only. Received packets whose Instance ID
is not equal to the receiving interface's Instance ID, are discarded.
27. How do OSPF maintain Adjacencies
How they synchronize their link state
database and update using link state update
packet.
(You should submit it writing in a paper next
week later by Tuesday. )
28.
29. Border Gateway Protocol (BGP) is an inter-autonomous
routing protocol used on the edge of autonomous
systems (AS).It is the protocol which is used to make
core routing decisions on the Internet.
This is considered to use a path-vector routing
algorithm( it tracks the path in terms of which AS it
passes through, and does NOT track the 'route'
through individual routers within an AS.)
BGP is a kind of enhanced distance vector routing
protocol
Transmission protocol: TCP,port number: 179
Support CIDR(classless inter domain routing)
Route updates only send added route
12/7/2015
Niranjan Baral 29
30. BGP is used among ASs to ensure that there
is no loop in the network
BGP
AS300
AS100
B
C C
D
A
130.1.0.0/16
AS 400
AS200
130.1.0.0/16
AS:100
130.1.0.0/16
AS:200 100
130.1.0.0/16
AS:200 100
130.1.0.0/16
AS:400 200 100
31. BGP has four kinds of messages:
OPEN – used to establish BGP connection
KEEPALIVE – used to keep BGP connection
UPDATE – used to update or withdraw BGP route
NOTIFICATION – BGP error notification
(Full routing updates are sent at the start of the session,
trigger updates are sent subsequently. This creates and
maintains connections between peers, using TCP port
179. The connection is maintained by periodic keep alive.
The failure to see a keep alive, an update, or a
notification is the means by which destination networks
and paths to those destinations are tracked. Any change
in the network results in a triggered update. )
12/7/2015
Niranjan Baral 31
32. 12/7/2015
Niranjan Baral 32
There are two types of BGP neighbor relationships:
• iBGP Peers – BGP neighbors within the same
autonomous system.
• eBGP Peers – BGP neighbors connecting separate
autonomous systems
Once BGP peers form a neighbor relationship, they
share their full routing table. Afterwards, only
changes to the routing table are forwarded to
peers.
33. Accept those routes without AS loop and with valid next-hop
address. Then make decision for route as follows:
Local preference—routers will prefer the path with the largest
value.
Local router—if local preferences are the same, the preferred
route is one that was originated by the BGP process on this
local router (it might have redistributed into BGP from an IGP
also running on the router)
AS path—if the route wasn’t originated here, then choose the
path with the shortest AS path value
Origin code- if the path lengths are the same, prefer a route
with lowest origin type, where IGP is less than EGP
MED—if there’s still no difference, the path with the lowest
Multi Exit Discriminator is preferred. Since MED is an optional
configuration, this may not apply, and you’ll need to check
whether a missing MED value is counted as worst or best case
in your implementation of the protocol, as they differ. MED
Informs external neighbors about the preferred path into an
AS that has multiple entry points.
12/7/2015
Niranjan Baral 33
34. EBGP vs. IBGP—a route learned via EBGP is
preferred
Smallest internal path cost to the next hop
Choose the route with the lowest neighbor Router-ID
Choose the route with the lowest neighbor interface
address
12/7/2015
Niranjan Baral 34
35. BGP Multiprotocol Extension for IPv6
The only three pieces of information carried by BGP-4 that are IPv4
specific are
(a) the NEXT_HOP attribute (expressed as an IPv4 address),
(b) AGGREGATOR (contains an IPv4 address), and
(c) NLRI (expressed as IPv4 address prefixes).
To enable BGP-4 to support routing for multiple Network Layer protocols,
the only two things that have to be added to BGP-4 are
(a) the ability to associate a particular Network Layer protocol with the next
hop information
(b) the ability to associate a particular Network Layer protocol with NLRI.
(Network Layer Reachability Information)
36. This is an optional non-transitive attribute that can be used for the following
purposes:
(a) to advertise a feasible route to a peer
(b) to permit a router to advertise the Network Layer address of the router
that should be used as the next hop to the destinations listed in the Network
Layer Reachability Information field of the MP_NLRI attribute
+---------------------------------------------------------+
| Address Family Identifier (2 octets) |
+---------------------------------------------------------+
| Subsequent Address Family Identifier (1 octet) |
+---------------------------------------------------------+
| Length of Next Hop Network Address (1 octet) |
+---------------------------------------------------------+
| Network Address of Next Hop (variable) |
+---------------------------------------------------------+
| Reserved (1 octet) |
+---------------------------------------------------------+
| Network Layer Reachability Information (variable) |
37. Address Family Identifier (AFI):
This field in combination with the Subsequent Address Family Identifier
field identifies the set of Network Layer protocols to which the address
carried in the Next Hop field must belong, the way in which the address
of the next hop is encoded, and the semantics of the Network Layer
Reachability Information that follows.( If the Next Hop is allowed to be
from more than one Network Layer protocol, the encoding of the Next
Hop MUST provide a way to determine its Network Layer protocol)
Subsequent Address Family Identifier (SAFI):
This field in combination with the Address Family Identifier field
identifies the set of Network Layer protocols to which the address
carried in the Next Hop must belong, the way in which the address of
the next hop is encoded, and the semantics of the Network Layer
Reachability Information that follows
Length of Next Hop Network Address:
A 1-octet field whose value expresses the length of the "Network
Address of Next Hop" field, measured in octets.
38. Network Address of Next Hop:
A variable-length field that contains the Network Address of the next
router on the path to the destination system. The Network Layer
protocol associated with the Network Address of the Next Hop is
identified by a combination of <AFI, SAFI> carried in the attribute.
Reserved:
A 1 octet field that MUST be set to 0, and SHOULD be ignored upon
receipt.
Network Layer Reachability Information (NLRI):
A variable length field that lists NLRI for the feasible routes that are
being advertised in this attribute. The semantics of NLRI is identified
by a combination of <AFI, SAFI> carried in the attribute.
39. This is an optional attribute that can be used for the purpose of
withdrawing multiple unfeasible routes from service.
The attribute is encoded as shown below:
+-------------------------------------------------+
| Address Family Identifier (2 octets) |
+------------------------------------------------+
| Subsequent Address Family Identifier (1 octet) |
+-------------------------------------------------+
| Withdrawn Routes (variable) |
+-----------------------------------------------+
Withdrawn Routes Network Layer Reachability Information:
A variable-length field that lists NLRI for the routes that are being
withdrawn from service. The semantics of NLRI is identified by a
combination of <AFI, SAFI> carried in the attribute
40. The Network Layer Reachability information is encoded as one or more
2-tuples of the form <length, prefix>, whose fields are described below:+------
---------------------+
| Length (1 octet) |
+---------------------------+
| Prefix (variable) |
+---------------------------+
The use and the meaning of these fields are as follows:
a) Length:
The Length field indicates the length, in bits, of the address prefix. A length of
zero indicates a prefix that matches all (as specified by the address family)
addresses (with prefix, itself,of zero octets)
b) Prefix:
The Prefix field contains an address prefix followed by enough trailing bits to
make the end of the field fall on an octet boundary.
41. Error Handling
If a BGP speaker receives from a neighbor an UPDATE message that contains
the MP_REACH_NLRI or MP_UNREACH_NLRI attribute, and if the
speaker determines that the attribute is incorrect, the speaker MUST delete all
the BGP routes received from that neighbor whose AFI/SAFI is the same as
the one carried in the incorrect MP_REACH_NLRI or MP_UNREACH_NLRI
attribute. For the duration of the BGP session over which the UPDATE
message was received, the speaker then SHOULD ignore all the subsequent
routes with that AFI/SAFI received over that session.
Use of BGP Capability Advertisement
A BGP speaker that uses Multiprotocol Extensions should use the Capability
Advertisement procedures [BGP-CAP] to determine whether the speaker
could use Multiprotocol Extensions with a particular peer. The Capability
Code field is set to 1 (which indicates Multiprotocol Extensions
capabilities). The Capability Length field is set to 4. The Capability Value
field is defined as:
0 7 15 23 31
+-------+-------+-------+-------+
| AFI | Res. | SAFI |
+-------+-------+-------+-------+
42. +------------------------------+
| Capability Code (1 octet) |
+------------------------------+
| Capability Length (1 octet) |
+------------------------------+
| Capability Value (variable) |
+------------------------------+
The use and meaning of these fields are as follows:
Capability Code:
Capability Code is a one octet field that unambiguously identifies individual
capabilities.
Capability Length:
Capability Length is a one octet field that contains the lengthof the Capability Value
field in octets.
Capability Value:
Capability Value is a variable length field that is interpreted according to the value of
the Capability Code field.
43. Multicast Routing are used to distribute data to multiple recipients. Using
multicast, a source can send a single copy of data to a single multicast
address, which is then distributed to an entire group of recipients. In
multicasting, the router may forward the received packets through several
of its interface. In this case, router may copy the data when it is necessary,
and forward it to the receivers.
[A multicast is similar to a broadcast in the sense that its target is a number
of machines on a network, but not all. Where a broadcast is directed to all
hosts on the network, a multicast is directed to a group of hosts. The hosts
can choose whether they wish to participate in the multicast group (often
done with the Internet Group Management Protocol), whereas in a
broadcast, all hosts are part of the broadcast group whether they like it or
not!]
A multicast group identifies a set of recipients that are interested in a
particular data stream, and is represented by an IP address from a well-
defined range. Data sent to this IP address is forwarded to all members of
the multicast group.
44. Routers between the source and recipients duplicate data packets and
forward multiple copies wherever the path to recipients diverges.
Group membership information is used to calculate the best routers at
which to duplicate the packets in the data stream to optimize the use
of the network
A multicast packet is not directed to one host but a number of hosts,
so the destination MAC address will not match the unique MAC
address of any computer, but the computers which are part of the
multicast group will recognize the destination MAC address and
accept it for processing.
(Note:
Each host on an Ethernet network has a unique MAC address. So the
important point to understand in Multicasting is: How do you talk to a
group of hosts (our multicast group), where each host has a different
MAC address, and at the same time ensure that the other hosts, which
are not part of the multicast group, don't process the information)
45. IPv4 Multicast Address :224.0.0.0/4
Data transmissions on Ethernet
◦ Sent directly to specific layer 2 MAC addresses
◦ ARP, one to one mapping between layer 2 and layer 3
To accommodate multicast transmissions, a set of Ethernet MAC
addresses has been reserved specifically for this purpose
◦ Class D IP is mapping to this MAC address
(01:00:5e:00:00:00 - 01:00:5e:7f:ff:ff )
46. We have an IP Address of 224.0.0.5, this is then converted into binary so we can
clearly see the mapping of the 23 bits to the MAC address of the computer. The MAC
Address part which is in yellow has been defined by the IEEE group. So
the yellow and pink line make the one MAC Address as shown in binary mode, then
we convert it from binary to hex and that's about it
47. IPv6 multicast addresses have the Format Prefix (FP) of 1111 1111. An
IPv6 address is simple to classify as multicast because it always begins
with FF. eg:
FF01::1 (node-local scope all-nodes address)
FF02::1 (link-local scope all-nodes address)
Same as IPv4, a set of Ethernet MAC address has been reserved
specifically for this IPv6 multicasting
◦ Take the low order 32 bits of IPv6 multicast addresses uses it to create
a MAC address by mapping it into MAC 33:33:00:00:00:00 (RFC
2464)
◦ Thus, an IPv6 packet addressed to FF02::1:FF68:12CB would be sent
to the Ethernet address 33-33-FF-68-12-CB
◦ Other Example:
FF02:ABCD:EF12::1:3 will have a MAC address 33:33:00:01:00:03
FF32::8000:9 will have a MAC address 33:33:80:00:00:09
49. Reverse Path Forwarding
Goal: avoid flooding duplicates
In multicast routing, the decision to forward traffic is based upon source
address and not on destination address as in unicast routing. When a
multicast packet enters a router's interface, it will look up the list of
networks that are reachable via that interface i.e., it checks the reverse path
of the packet. If the router finds a matching routing entry for the source IP
address of the multicast packet, the RPF check passes and the packet is
forwarded to all other interfaces that are participating in multicast for that
multicast group. If the RPF check fails, the packet will be dropped. As a
result, the forwarding of the packet is decided based upon the reverse path
of the packet rather than the forward path.
It is an optimized form of flooding, where the router accepts a packet from
source S through interface I only if I is the interface the router would use in
order to reach S. It determines whether the interface is correct by consulting
its unicast routing tables. This technique dramatically decreases the
overhead associated with standard flooding.
50. Because a router accepts a packet from only one neighbor, it floods the packet only
once, which means (assuming point-to-point links) each packet is transmitted over
each link once in each direction.
RPF routers only forward packets that come into the interface that also holds the
routing entry for the source of the packet, thus breaking any loop.
This is critically important in redundant multicast topologies. Because the same
multicast packet could reach the same router via multiple interfaces, RPF checking
is integral in the decision to forward packets or not.
Assumptions:
1. A wants to broadcast
2. all nodes know predecessor node on shortest path back to A
Reverse path forwarding(working): if node receives a broadcast packet
And if packet arrived on predecessor on shortest path to A, then flood to all
neighbors otherwise ignore broadcast packet – either already arrived, or will arrive
from predecessor
flood if packet arrives from source on link that router would use to send packets to
source otherwise discard
rule avoids flooding loops uses shortest path tree from destinations to source
(reverse tree)
51. The two basic types of multicast distribution trees:
1. Source trees 2. Shared trees
Source-based tree
Separate shortest path tree for each source
Flood and prune (DVMRP, PIM-DM)
» Send multicast traffic everywhere
» Prune edges that are not actively subscribed to group
Link-state (MOSPF)
» Routers flood groups they would like to receive
» Compute shortest-path trees on demand
Shared tree (PIM-SM)
Single distributed tree shared among all sources
Specify rendezvous point (RP) for group
Senders send packets to RP, receivers join at RP
RP multicasts to receivers; Fix-up tree for optimization
Note : A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared
root for a multicast shared tree. Any number of routers can be configured to work as RPs and
they can be configured to cover different group ranges
52.
53. Dense Vector Multicasting Routing Protocol
The basic assumption behind dense mode is that the multicast packet
stream has receivers at most locations. Sparse mode assumes
relatively fewer receivers. Dense mode is ideal for groups where
many of the nodes will subscribe to receive the multicast packets, so
that most of the routers must receive and forward these packets.
It provides an efficient mechanism for connectionless datagram
delivery to a group of hosts across an internetwork. It is a distributed
protocol that dynamically generates IP multicast delivery trees using
a technique called Reverse Path Multicasting. DVMRP uses a
distance vector distributed routing algorithm in order to build per-
source-group multicast delivery trees.
Dense Mode uses a fairly simple approach to handle IP multicast
routing. The source initially broadcasts to every router directly
connected to it. These neighboring routers further forward the data to
their neighbors.
54. When a router does not wish to receive this group's data (i.e if no
other neighboring PIM routers are present and no host is interested), it
sends a Prune message to indicate its lack of interest or stop the
communication. Upon receiving a Prune message, the router will
modify its state so that it will not forward those packets out
that interface If every interface on a router is pruned, the router will
also be pruned.
The routers will use reverse-path forwarding to ensure that there are
no loops for packet forwarding among routers that wish to receive
multicast packets.
Multicast Forwarding in DVMRP
1. check incoming interface: discard if not on shortest path to source
2. forward to all outgoing interfaces
3. don’t forward if interface has been pruned
4. prunes time out every minute
55.
56. Protocol Independent Multicasting- Sparse Mode
PIM-SM is called "protocol independent" because it can use the route
information that any routing protocol enters into the multicast Routing
Information Base (RIB).
Examples of these routing protocols include unicast protocols such as the
Routing Information Protocol (RIP) and Open Shortest Path First (OSPF),
but multicast protocols that populate the routing tables—such as the
Distance Vector Multicast Routing Protocol (DVMRP)—can also be used.
Sparse mode means that the protocol is designed for situations where
multicast groups are thinly populated across a large region. Sparse-mode
protocols can operate in LAN environments, but they are most efficient over
WANs. A sparse group can be defined as "one in which
a) the number of networks or domains with group members present is
significantly smaller than the number of networks/domains in the Internet,
b) group members span an area that is too large/wide to rely on a hop-count
limit or some other form of limiting the scope of multicast packet
propagation, and c) the internetwork is not sufficiently resource rich to
ignore the overhead of current [dense mode] schemes.
57. PIM-SM was designed to support the following goals:
Maintain the traditional IP multicast service model of receiver-initiated multicast
group membership. In this model, sources simply put packets on the first-hop
Ethernet, without any signaling. Receivers signal to routers in order to join the
multicast group that will receive the data.
Leave the host model unchanged. PIM-SM is a router-to-router protocol, which
means that the hosts don't have to be upgraded, but that PIM-SM-enabled routers
must be deployed in the network.
Support both shared and source distribution trees. For shared trees, PIM-SM uses a
central router, called the Rendezvous Point (RP), as the root of the shared tree. All
source hosts send their multicast traffic to the RP, which in turn forwards the packets
through a common tree to all the members of the group. Source trees directly
connect sources to receivers. There is a separate tree for every source. Source trees
are considered shortest-path trees from the perspective of the unicast routing tables.
PIM-SM can use either type of tree or both simultaneously.
Maintain independence from any specific unicast routing protocol (see above).
Use soft-state mechanisms to adapt to changing network conditions and multicast
group dynamics. Soft-state means that, unless it is refreshed, the router's state
configuration is short-term and expires after a certain amount of time.
(Source: https://msdn.microsoft.com/en-us/library/bb742462.aspx)
58. Concluding:
protocol independent
PIM SM implements forwarding trees for each multicast group
o creating routing tree for a group with Rendezvous Point (RP) as a root for
the tree
o Rendezvous Point Tree (RPT)
PIM SM implements explicit join model to maintain a routing tree
Receivers send Join towards the RP
Sender send Register towards the RP
Supports both Source based and Shared distribution tree
For further information :
1.http://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/Whit
e_papers/mcst_ovr.html#wp1009081
2. https://msdn.microsoft.com/en-us/library/bb742462.aspx