The document provides an overview of different routing algorithms:
- It describes shortest path routing and discusses properties like optimality, simplicity, and robustness that routing algorithms should have.
- Common routing algorithms are described briefly, including flooding, distance vector routing, link state routing, and hierarchical routing.
- Specific routing algorithms like Dijkstra's algorithm, flow based routing, and link state routing are explained in more detail through examples.
- Issues with distance vector routing like the count to infinity problem are also covered.
- The talk concludes with hierarchical routing being presented as a solution for scaling routing to larger networks.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
The network layer is responsible for routing packets from the source to destination. The routing algorithm is the piece of software that decides where a packet goes next (e.g., which output line, or which node on a broadcast channel).For connectionless networks, the routing decision is made for each datagram. For connection-oriented networks, the decision is made once, at circuit setup time.
Routing Issues
The routing algorithm must deal with the following issues:
Correctness and simplicity: networks are never taken down; individual parts (e.g., links, routers) may fail, but the whole network should not.
Stability: if a link or router fails, how much time elapses before the remaining routers recognize the topology change? (Some never do..)
Fairness and optimality: an inherently intractable problem. Definition of optimality usually doesn't consider fairness. Do we want to maximize channel usage? Minimize average delay?
When we look at routing in detail, we'll consider both adaptive--those that take current traffic and topology into consideration--and nonadaptive algorithms.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
INTRODUCTION
WHAT IS OSI?
OSI MODEL
TYPES OF LAYERS
PHYSICAL LAYER
DATA LINK LAYER
NETWORK LAYER
TRANSPORT LAYER
SESSION LAYER
PRESENTATION LAYER
APPLICATION LAYER
Routing is the process of selecting a path for traffic in a network or between or across multiple networks. this slide helps to describe routing protocols and their various aspects.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
2. Outline
• Routing Algorithm
• Shortest Path Routing
• Flow Based Routing
• Flooding
• Distance Vector Routing
• Link State Routing
• Hierarchical Routing
2
3. Routing is the process of forwarding of a packet in a network so that it
reaches its intended destination.
•Correctness: The routing should be done properly and correctly so that the packets may reach
their proper destination.
•Simplicity: The routing should be done in a simple manner so that the overhead is as
low as possible. With increasing complexity of the routing algorithms the overhead also
increases.
•Robustness: Once a major network becomes operative, it may be expected to run continuously
for years without any failures. The algorithms designed for routing should be robust enough to
handle hardware and software failures and should be able to cope with changes in the topology
and traffic without requiring all jobs in all hosts to be aborted and the network rebooted every
time some router goes down.
Properties Of Routing Algorithm
3
4. • Stability: The routing algorithms should be stable under all possible circumstances.
• Fairness: Every node connected to the network should get a fair chance of
transmitting their packets. this is generally done on a first come first serve basis.
• Optimality: The routing algorithms should be optimal in terms of throughput and
minimizing mean packet delays. here there is a trade-off and one has to choose
depending on his suitability.
4
5. Types Of Routing Algorithms
• Nonadaptive (Static)
• Do not use measurements of current conditions
• Static routes are downloaded at boot time
• Adaptive Algorithms
• Change routes dynamically
• Gather information at runtime
• locally
• from adjacent routers
• from all other routers
• Change routes
• Every delta T seconds
• When load changes
• When topology changes
5
6. d3 > d2
as
d1 + d3 > d1 + d2
I
K
J
Optimal path from I to K over J
d1
d2
distance
d1 + d2 is minimal
d3
Other path from J to K
Set of all optimal routes
• from all sources
• to a given destination
is a tree: sink tree
Optimality Principle
6
7. (A) A SUBNET. (B) A SINK TREE FOR ROUTER B. 7
• The set of optimal routes to a particular node forms a sink tree.
• Sink trees are not necessarily unique.
• Goal of all routing algorithms
• Discover sink trees for all destinations
8. Dijkstra’s Algorithm
A
B C
E F
D
G H
1
2
2
6 4
2
7
3
3
2
2
Each node is labeled (in parentheses) with its distance from the source
node along the best known path.
9. (Cont’d)
• We want to find the shortest path from A to D.
• Initially, no paths are known, so all nodes are labeled with infinity.
A
B(∞,−) C(∞,−)
E(∞,−) F(∞,−)
D(∞,−)
G(∞,−) H(∞,−)
10. (Cont’d)
• We start out by marking node A (the working node) as permanent.
• We examine each of the nodes adjacent a, relabeling each one
with the distance to a.
A
B(2, A) C(∞,−)
E(∞,−) F(∞,−)
D(∞,−)
G(6, A) H(∞,−)
2
6
11. (Cont’d)
A
B(2, A) C(∞,−)
E(∞,−) F(∞,−)
D(∞,−)
G(6, A) H(∞,−)
We make B with the smallest label permanent.
B becomes the new working node.
12. (Cont’d)
A
B(2, A) C(9, Β)
E(4, B) F(∞,−)
D(∞,−)
G(6, A) H(∞,−)
2
7
We examine each of the nodes adjacent B, relabeling each one with the
distance to B.
13. (Cont’d)
A
B(2, A) C(9, B)
E(4, B) F(∞,−)
D(∞,−)
G(6, A) H(∞,−)
We make E with the smallest label permanent.
E becomes the new working node.
14. E(4, B)
(Cont’d)
1 2
A
B(2, A) C(9, B)
F(6, Ε)
D(∞,−)
G(5, E) H(∞,−)
We examine each of the nodes adjacent E, relabeling each one with the distance
to E.
15. (Cont’d)
A
B(2, A) C(9, B)
E(4, B) F(6, E)
D(∞,−)
G(5, E) H(∞,−)
We make G with the smallest label permanent.
G becomes the new working node.
16. E(4, B)
(Cont’d)
4
A
B(2, A) C(9, B)
F(6, E)
D(∞,−)
G(5, E) H(9, G)
We examine each of the nodes adjacent G, relabeling each one with the
distance to G.
17. (Cont’d)
A
B(2, A) C(9, B)
E(4, B) F(6, E)
D(∞,−)
G(5, E) H(9, G)
We make F with the smallest label permanent.
F becomes the new working node.
18. E(4, B)
(Cont’d)
2
A
B(2, A) C(9, B)
F(6, E)
D(∞,−)
G(5, E) H(8, F)
3
We examine each of the nodes adjacent F, relabeling each one with the
distance to F.
19. (Cont’d)
A
B(2, A) C(9, B)
E(4, B) F(6, E)
D(∞,−)
G(5, E) H(8, F)
We make H with the smallest label permanent.
H becomes the new working node.
20. E(4, B)
(Cont’d)
2
A
B(2, A) C(9, B)
F(6, E)
D(10, F)
G(5, E) H(8, F)
We examine each of the nodes adjacent H, relabeling each one with the distance to H.
21. (Cont’d)
E(4, B)
A
B(2, A) C(9, B)
F(6, E)
D(10, F)
G(5, E) H(8, F)
We make C with the smallest label permanent. C becomes the new working
node.
22. (Cont’d)
E(4, B)
A
B(2, A) C(9, B)
F(6, E)
D(10, F)
G(5, E) H(8, F)
3
We examine each of the nodes adjacent C, relabeling each one with the distance
to C.
23. (Cont’d)
E(4, B)
A
B(2, A) C(9, B)
F(6, E)
D(10, F)
G(5, E) H(8, F)
We make D with the smallest label permanent. D becomes the new working
node.
24. (Cont’d)
E(4, B)
A
B(2, A) C(9, B)
F(6, E)
D(10, H)
G(5, E) H(8, F)
The shortest path from A to D follows.
25. Flow Based Routing Algorithm
25
•It is a non-adaptive routing algorithm.
•It takes into account both the topology and the load in this routing algorithm;
•We can estimate the flow between all pairs of routers.
•From the known average amount of traffic and the average length of a packet
you can compute the mean packet delays using queuing theory.
•Flow-based routing then seeks to find a routing table to minimize the average
packet delay through the subnet.
•Given the line capacity and the flow, we can determine the delay. It needs to
use the formula for delay time T.
Where, μ = Mean number of arrivals in packet/sec, 1/μ = The mean packet size
in the bits, and c = Line capacity (bits/s).
26. Routing: Flooding
• Every packet is sent out on every outgoing line except the one it
arrived at
• It is non adaptive algorithm.
26
30. • Every packet is sent out on every outgoing line except the one it arrived at
• Duplicates!! How to limit?
• Hop counter
• Decrement in each router
• Discard packet if counter is 0
• Sequence number in packet
• Avoid sending the same packet a second time
• Keep in each router per source a list of packets already seen
• Selective flooding
• Use only those lines that are going approximately in right direction
30
Routing: Flooding
31. Routing: Distance Vector
• Adaptive algorithm
• Exchange of info only with neighbours
• Data to be available in each router
• Routing table: per destination
• Distance
• Outgoing line
• Distance to all neighbours
31
32. ROUTING: DISTANCE VECTORRouting table for A
To cost via
A 0 -
B 12 B
C 25 B
D 40 B
E 14 E
F 23 E
G 18 B
H 17 J
I 21 E
J 9 J
K 24 J
L 29 J 32
33. • Algorithm
• At each step within a router:
• Get routing tables from neighbours
• Compute distance to neighbours
• Compute new routing table
33
40. Routing: Link State
• Each router must
• Discover its neighbours and learn their network addresses
• Measure the delay or cost to each of its neighbours
• Construct a packet with these distances
• Send this packet to all other routers
• Compute the shortest path to every other router
40
42. 42
Measuring line cost
• Send an “ECHO” packet over the line.
• Destination is required to respond to “echo” packet immediately.
• Measure the time required for this operation.
43. Building link state packets
• Packet containing:
• Identity of sender
• Sequence number + age
• For each neighbour: name + distance
43
44. Age in each packet:
• Decremented during flooding,
while used in router
• Age 0 info discarded
44
• Flooding
• Each router records the (source, seq. No.)
• Only flood and record packets from a source with higher seq.No. Than
previously recorded.
• Sequence numbers or router records of them can get corrupt.
• Include age after seq. No. And decrement it per second. Discard
packets with age zero.
Distributing the link state packets
45. Computing new routes
• With a full set of link state packets, a router can:
• Construct the entire subnet graph
• Run Dijkstra's algorithm to compute the shortest path to each
destination
• Problems for large subnets
• Memory to store data
• Compute time
45
46. Hierarchical Routing
• When network size increases…
• Larger stables
• More CPU time needed to compute …
• More bandwidth needed.
46
The Solution is to
•Routers grouped in regions
•Each routers knows how to reach:
• Other routers in its own group
• Other regions