SlideShare a Scribd company logo
1 of 33
Internet Routing Protocols:
Fundamental Concepts of Link-State
and Distance Vector Routing*


*From Christian Huitema’s Routing in the Internet
                                        Vishal Sharma, Ph D
                                     Tellabs Research Center
                                     vsharma@trc tellabs com
                                          November 20, 1998
Outline of the Talk

                    What does a router do?
                          A look at the forwarding process at a router
                    How does it know where to forward packets?
                          Distance vector routing
                             An illustration of its operation
                             Its drawbacks and how they affect performance

                             Some solutions to those drawbacks

                          Link state routing
                             A look at its major components
                             An illustration of their operation

                             Its features and advantages


                    OSPF: a link state based intra-domain routing protocol
                    BGP: a distance vector based inter-domain routing
                     protocol
Copyright © 1998                  Internet Routing Protocols: Fundamental Operation   2
Importance of Routing in the Internet




                     The structure that glues together the worldwide
                     Internet
                    Without routing there would be no Internet!




Copyright © 1998               Internet Routing Protocols: Fundamental Operation   3
Routing process at a router
                                                                        Receive incoming pkt.
                    Destination address (DA)
                     based forwarding                                    DA=my_add or
                                                                                                Yes   Deliver datagram to
                                                                                                      protocol module
                    Longest prefix matching                             DA= IP brdcst add.
                                                                                ?
                                                                                                      (TCP/UDP) specified
                                                                                                      in IP hdr.

                                                                                   No

                   Routing Table                                                                Yes   Send pkt. to next-hop
                                                                           RT entry =
                                                                           complete DA?               router or to directly
                      DA          Next hop         Network                                            connected interface.
                                  router           Interface
        Host entry    198.168.7.3 X                2                               No

        Host entry    198.168.7.4 X                3
                                                                          RT entry =            Yes   Send pkt. to next-hop
        Host entry    198.168.7.1 198.168.7.5 1                           Destn. n/w id?              router or to directly
                                                                                                      connected interface.
        Host entry    198.168.7.2 198.168.7.5 1
                                                                                   No
        N/w entry     198.100.x.x 198.100.9.1 4
        N/w entry     128.72.x.x   128.72.55.4 5                                                Yes
                                                                                                       Send pkt. to
                                                                            Default entry
                                                                            exists?                    next-hop router.
        Default       x.x.x.x      128.84.73.1 6
                                                                                   No

                                                                     Datagram undeliverable. (Use ICMP to inform source.)
Copyright © 1998                   Internet Routing Protocols: Fundamental Operation                                          4
Routing process at a router
                                                                          Longest prefix match in                     DA          Next hop    N/w
                                        Packet generated                  RT gives next hop                                       router      Int.
                                                                          router as 198 100 9 1          Host entry   198.168.7.3 X           2
                                        DA = 198 100 9 75
                                                                          and outgoing interface         Host entry   198.168.7.4 X           3
                                                                          as 4
                                           198.168.7.3                                                   Host entry   198.168.7.1 198.168.7.5 1
                                                                 198.168.7.4                             Host entry   198.168.7.2 198.168.7.5 1
            198.168.7.1

                           198.168.7.5                                                                   N/w entry    198.100.x.x 198.100.9.1 4
                                                                                                         N/w entry    128.72.x.x   128.72.55.4 5
                                                                                          198.100.x.x    Default      x.x.x.x      128.84.73.1 6
                                              2
                                       1              3
                                                                                                               Routing table (RT) at 198 168 7 6
           198.168.7.2                                       4                        198.100.9.1
                                198.168.7.6
                                                         5                                      198.100.9.75
                                              6
           128.84.x.x
                                                                     128.72.x.x



                                                                           128.72. 55.4
                   128.84. 73.1




                             How do routers build their routing tables?
                             By exchanging information with each other using routing protocols

Copyright © 1998                                  Internet Routing Protocols: Fundamental Operation                                                  5
Routing Protocols: Distance vector (DV)
           Routing

                   Local dispersal of global information
                       Each router has unique ID
                       Each router knows cost of its outgoing links

                       Router starts with distance vector “0” for itself, and “infinity”
                      for all other destinations
                       Transmits DV to each neighbor -- periodically or upon
                      change
                       Saves the most recently received DV from each neighbor

                       Calculates new DV based on minimizing cost for each
                      destination
                       Recalculations occur when:
                          DV with new values received from a neighbor
                          Link(s) fails




Copyright © 1998                Internet Routing Protocols: Fundamental Operation           6
Operation of Distance Vector Routing (1)
              From A   Link     Cost                                                From B   Link    Cost

              A        local    0                                                   B        local   0

                                        Letters represent
                                        Node names
                                       A                                     B
                                                     1

                               A=0                                                           2                  From C   Link    Cost
                                                                                                            C   C        local   0

                            3                                            4
Numbers on links represent
link identifiers (not cost)
                                                                                             5

                                                         6
              From D   Link     Cost   D                                     E      From E   Link    Cost

              D        local    0                                                   E        local   0




Copyright © 1998                        Internet Routing Protocols: Fundamental Operation                                            7
Operation of Distance Vector Routing (2)
              From A    Link    Cost                                                   From B   Link    Cost

              A         local   0                                                      B        local   0
                                                                                       A        1       1
                                                                  B=0, A=1
                                           A                                    B
                                                            1

                                                                                                2                  From C   Link    Cost
                                                                                                               C
                                                                                                                   C        local   0

                                       3                                    4
                       D=0, A=1

                                                                                                5

                                                            6
              From D    Link    Cost       D                                    E      From E   Link    Cost

              D         local   0                                                      E        local   0
              A         3       1




Copyright © 1998                           Internet Routing Protocols: Fundamental Operation                                            8
Operation of Distance Vector Routing (3)
              From A   Link    Cost                                                   From B   Link     Cost

              A        local   0                                                      B        local    0
              B        1       1                                                      A        1        1
              D        3       1              A=0, B=1, D=1

                                          A                                    B
                                                              1
                                                                                                       C=0, B=1, A=2
                                                                                               2                   From C   Link    Cost
                                                                                                               C
                                                                                                                   C        local   0
                                                                                                                   B        2       1
                                      3                                    4                                       A        2       2


                                                                                               5

                                                              6
              From D   Link    Cost       D                                    E      From E   Link     Cost

              D        local   0                      E=0, B=1, A=2,                  E        local    0
              A        3       1                                                      B        4        1
                                                      D=1
                                                                                      A        4        2
                                                                                      D        6        1




Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                             9
Operation of Distance Vector Routing (4)
              From A   Link    Cost                                                   From B   Link    Cost

              A        local   0                                                      B        local   0
              B        1       1                                                      A        1       1
              D        3       1                           B=0, A=1, D=2,             D        1       2
                                                           C=1, E=1                   C        2       1
                                          A                                    B      E        5       1
                                                           1

                                                                                               2                  From C   Link    Cost
                                                                                                              C   C        local   0
                                                                                                                  B        2       1
                                      3                                    4                                      A        2       2
                   D=0, A=1, B=2
                   E=1
                                                                                               5

                                                           6
              From D   Link    Cost       D                                    E      From E   Link    Cost

              D        local   0                     E=0, B=1, A=2,                   E        local   0
              A        3       1                                                      B        4       1
                                                     D=1, C=1
              B        3       2                                                      A        4       2
              E        6       1                                                      D        6       1
                                                                                      C        5       1




Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                            10
Operation of Distance Vector Routing (5)
              From A   Link    Cost                                                   From B   Link    Cost

              A        local   0                                                      B        local   0
              B        1       1                                                      A        1       1
              D        3       1                                                      D        1       2
              C        1       2                                                      C        2       1
              E        1       2          A                                    B      E        5       1
                                                           1

These do not alter                                                                             2                  From C   Link    Cost
routing tables further                                                                                        C   C        local   0
Thus, no new                          3                                    4
                                                                                                                  B        2       1
                                                                                                                  A        2       2
updates generated                                                                                                 E        5       1
                                                                                                                  D        5       2
                                                                                               5

                                                           6
              From D   Link    Cost       D                                    E      From E   Link    Cost

              D        local   0                                                      E        local   0
              A        3       1                                                      B        4       1
              B        3       2                                                      A        4       2
              E        6       1                                                      D        6       1
              C        6       2                                                      C        5       1

                                      DV routing has now converged
Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                            11
Drawbacks of Distance-vector Routing


                    Slow convergence after topology change
                         “Counting to infinity” problem:
                            Loop exists
                            DVs do not converge till the link costs reach “infinity ”




                    Problematic convergence with unequal link costs
                         Bouncing effect:
                            Routing and link costs temporarily stabilize, but have a loop
                            Data packets circulate in the loop till time-to-live (TTL) expires

                            This changes only when network converges to a new,

                          coherent version of the routing tables



Copyright © 1998                 Internet Routing Protocols: Fundamental Operation            12
Drawbacks of Distance Vector Routing:
           Counting to “Infinity” (1)
              From A    Link    Cost
                                           A’s stable routing table
              A         local   0
              B         3       3          after link 1 fails
              D         3       1
              C         3       3
              E         3       2          A                                     B
                                                             1

                   A=0, B=3, D=1,                                                               2
                   C=3, E=2                                                                         C
   A transmits its last
                                       3                                     4
   DV before D does

                                                      Link 6 fails                              5

                                                             6
              From D    Link    Cost       D                                     E
              D         local   0
              A         3       1          D’s routing table
              B         6       inf        immediately
              E         6       inf
              C         6       inf        after link 6 fails


Copyright © 1998                            Internet Routing Protocols: Fundamental Operation           13
Drawbacks of Distance Vector Routing:
           Counting to “Infinity” (2)
              From A    Link    Cost

              A         local   0
              B         3       3
              D         3       1
              C         3       3
              E         3       2          A                                     B
                                                             1

  D transmits its                                                                               2
                                                                                                    C
  updated DV
                   D=0, A=1, B=4,      3                                     4
                   E=3, C=4

                                                                                                5

                                                             6
              From D    Link    Cost       D                                     E
              D         local   0
              A         3       1
              B         3       4
              E         3       3
              C         3       4          D updates its routing table


Copyright © 1998                            Internet Routing Protocols: Fundamental Operation           14
Drawbacks of Distance Vector Routing:
           Counting to “Infinity” (3)
              From A   Link    Cost
                                      Then A updates its routing table
              A        local   0
              B        3       5
              D        3       1
                                                 A=0, B=5, D=1,
              C        3       5
                                                 C=5, E=4
              E        3       4          A                                    B
                                                           1

                   A transmits its                                                            2
                                                                                                  C
                   updated DV
                                      3                                    4
       We are in an
       infinite loop!                                                                         5

                                                           6
              From D   Link    Cost       D                                    E
              D        local   0
              A        3       1
              B        3       4                                     Infinite loop broken by some
              E        3       3
              C        3       4                                     convention on the representation
                                                                     of “infinity ”
Copyright © 1998                          Internet Routing Protocols: Fundamental Operation             15
Drawbacks of Distance Vector Routing:
           Bouncing Effect (1)
                                              All links except 5 have unit
              From A   Link    Cost           cost, link 5 cost = 10                  From B   Link    Cost

              A        local   0                                                      B        local   0
              B        1       1                                                      A        1       1
              C        1       2                                                      C        2       1
              D        3       1                                                      D        1       2
              E        3       2          A                                    B      E        4       1
                                                           1

                                                                                               2
                                                                                                              C
                                                                                                                  Routes towards C
                                      3                                    4                                       From   Link   Cost
                                                                                                                   AC    1     2
                                                                                                                   BC    1     1
                                                                                               5                   CC    local 0
                                                                                                                   DC    3     3
                                                           6                                                       EC    4     2
              From D   Link    Cost       D                                    E      From E   Link    Cost

              D        local   0                                                      E        local   0
              A        3       1                                                      A        5       2
              B        3       2                                                      B        4       1
              C        3       3                                                      C        4       2
              E        5       1                                                      D        5       1




Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                      16
Drawbacks of Distance Vector Routing:
           Bouncing Effect (2)
                                               All links except 5 have unit
              From A    Link    Cost           cost, link 5 cost = 10                  From B   Link    Cost
                                                                                                                   B’s routing table
              A         local   0                                                      B        local   0          immediately after
              B         1       1                                                      A        1       1
              C         1       2                                                      C        2       inf        link 2 fails
              D         3       1                                                      D        1       2
              E         3       2          A                                      B    E        4       1
                                                            1
                                                                                                Link 2 fails
                   A=0, B=1, C=2,                                                               2
                   D=1,E=2                                                                                     C
                                                                                                                     Routes towards C
       A transmits its DV              3                                      4                                       From   Link   Cost
       before B does                                                                                                  AC    1     2
                                                                                                                      BC    1     inf
                                                                                                5                     CC    local 0
                                                                                                                      DC    3     3
                                                            6                                                         EC    4     2
              From D    Link    Cost       D                                      E    From E   Link    Cost

              D         local   0                                                      E        local   0            Routes towards C
              A         3       1                                                      A        5       2
                                                                                                                     immediately after
              B         3       2                                                      B        4       1
              C         3       3                                                      C        4       2             B’s update of its
              E         5       1                                                      D        5       1            routing table


Copyright © 1998                           Internet Routing Protocols: Fundamental Operation                                        17
Drawbacks of Distance Vector Routing:
           Bouncing Effect (3)
                                              All links except 5 have unit
              From A   Link    Cost           cost, link 5 cost = 10                  From B   Link    Cost       However, B
                                                                                                                  updates its routing
              A        local   0                                                      B        local   0
                                              B transmits its new DV                  A        1       1          table based on DV
              B        1       1
              C        1       2                       B=0, A=1, C=3,                 C        1       3          from A (causing the
              D        3       1                       D=1,E=1                        D        1       2
                                                                                      E        4       1
                                                                                                                  route towards C to
              E        3       2          A                                      B
                                                           1                                                      change also)

                                                                                               2
                                                                                                              C
                                                                                                                     Routes towards C
                                      3                                      4                                        From   Link   Cost
                                                                                                                      AC    1     2
                                                                                                                      BC    1     3
        A’s DV produces                                                                        5                      CC    local 0

        no change at D                                                                                                DC    3     3
                                                           6                                                          EC    4     2
              From D   Link    Cost       D                                      E    From E   Link    Cost

              D        local   0                                                      E        local   0
              A        3       1                                                      A        5       2
              B        3       2                                                      B        4       1
              C        3       3                                                      C        4       2
              E        5       1                                                      D        5       1




Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                         18
Drawbacks of Distance Vector Routing:
           Bouncing Effect (4)
                                              All links except 5 have unit
              From A   Link    Cost           cost, link 5 cost = 10                  From B   Link    Cost

              A        local   0                                                      B        local   0
              B        1       1                                                      A        1       1
              C        1       4                                                      C        1       3
              D        3       1                                                      D        1       2
              E        3       2          A                                      B    E        4       1
                                                           1

Further DV exchanges                                                                           2
produce no change in                                                                                          C
                                                                                                                   Routes towards C
routing tables! Both                  3                                      4                                      From   Link   Cost
routing and distances                                                                                               AC    1     4
                                                                                                           Loop!
have (temporarily)                                                                                                  BC    1     3
                                                                                               5                    CC    local 0
stabilized
                                                                                                                    DC    3     3
                                                           6                                                        EC    4     4
              From D   Link    Cost       D                                      E    From E   Link    Cost

              D        local   0                                                      E        local   0
              A        3       1                                                      A        5       2
              B        3       2                                                      B        4       1
              C        3       3                                                      C        4       4
              E        5       1                                                      D        5       1


                                          Packets for C can now “bounce” between A and B
Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                                       19
Some Solutions for Problems in Distance
           Vector Routing

                    Split Horizon: If A routes packets for X via B, it should
                     not announce to B that X is a short distance from A!
                                 A                         B                         X




                       Simple algo : Omit from DV any info about destinations
                       routed on the link
                        “Poisonous reverse” algo : Set distance of destination
                       routed on the link to infinity


                    Triggered Updates: transmit updates as soon as routing
                     table changes, don’t wait for end of update period


Copyright © 1998                 Internet Routing Protocols: Fundamental Operation       20
Routing Protocols: Link State (LS)
           Routing

                   Global dispersal of local information Each router:
                         Identifies itself to all its neighbors

                         Constructs a link state packet (LSP) with:
                             Names of each neighbor
                             Cost of link to each neighbor




                         Floods its LSP in the network

                         Stores most recent copy of LSP from every other router

                       Using LSPs constructs a full map of network topology, and
                       computes shortest route(s) to each destination (using an
                       appropriate shortest path algorithm, such as Dijkstra’s)
Copyright © 1998                  Internet Routing Protocols: Fundamental Operation   21
Operation of Link State Routing (1)

                    Meeting neighbors                                     A      Hello                  B
                          Xmit special pkt over link                                          Hello                        C
                          (if pt to pt ) or to a group
                          address (if broadcast n/w or
                                                                                  Hello
                          LAN)
                                                                           D                  Hello      E
                                                    Name of neighbor               Cost of Link to
                                                                                   that neighbor
                                                                            A
                                                                            B/1                              B
                                                                            D/1                              A/1
                                                                                                             C/1            C
                    Construct Link State Packet                      A                              B       E/1            B/1
                                                                                      1                                     D/1
                     (LSP) LSP is sent when:                              Letters represent                         2   C
                         Neighbor changes                                Node names
                                                                                                4
                         Link goes up/down
                                                                                                                    5
                         Also, periodically                                                                  E
                                            Numbers on links are D
                                                                            D         6                       D/1
                                                                            E/1                      E        C/1
                                            link identifiers (not cost)     A/1                               B/1


Copyright © 1998                  Internet Routing Protocols: Fundamental Operation                                             22
Operation of Link State Routing (2)

                    Disseminate LSP to all                              Receive message
                                                                         from A, say
                     routers in the network
                       LSP distrn cannot use                                Record in
                                                                             database
                                                                                           No    - Add to database,
                                                                                                 - Broadcast message.
                       routing database ⇒ use                                from A ?

                       Flooding algorithm
                                                                                    Yes


                       Each LSP has “msg #” and                             Record # in
                                                                                           Yes   - Replace record by
                                                                             database <
                       “age” to enable receiving                             Record # in
                                                                                                 new value.
                                                                                                 - Broadcast message.
                                                                             msg.?
                       node to distinguish between
                       old and new info                                             No


                                                                             Record # in   No     Transmit database
                                                                             database =           value on incoming
                    Advantage:                                              Record # in
                                                                             msg.?
                                                                                                  interface.

                       LSP can be forwarded
                                                                                    Yes
                       without any shortest path
                                                                            Do nothing.
                       computation, so faster
Copyright © 1998                Internet Routing Protocols: Fundamental Operation                                     23
Operation of Link State Routing: The
           Flooding Protocol at Work (1)
      Link State  A
                                           B                               D’s Link State Database
      Packet, LSP B/1                      A/1                             (amalgamation of LSPs from
                  D/1                                        C
                   A                   B   C/1                             remaining network nodes)
                               1           E/1               B/1    Node name LSP #
                                                             D/1
                                                  2      C                 A #1 B #1 C #1 D #1          E #1
                                                                           B/1  A/1  B/1  E/1           D/1
             3                     4                                       D/1  C/1  D/1  A/1           C/1
                                                                                E/1                     B/1
                                                     5
                                            E
                        D      6            D/1
                   D    E/1            E
                                            C/1
                        A/1                 B/1

                                            B #2
                                            A/inf
                 A                     B    C/1
                               1            E/4                            A #1 B #1 C #1 D #1          E #1
                       A #2                      2       C                 B/1  A/1  B/1  E/1           D/1
                       B/inf                                               D/1  C/1  D/1  A/1           C/1
            3          D/1         4                                            E/1                     B/1

                                                  5
                               6
                 D                     E
                                   Internet Routing Protocols: Fundamental Operation                           24
Copyright © 1998
Operation of Link State Routing: The
           Flooding Protocol at Work (2)
                       A                            B                             D’s Link State Database
                                   1
                                                             2        C           A #2 B #1 C #1          D #1   E #1
                                       B #2                                       B/inf A/1 B/1           E/1    D/1
                   3                   A/inf    4                                 D/1   C/1 D/1           A/1    C/1
                                       C/1
                                       E/1
                                                                                        E/1                      B/1
                                                              5 B #2
                                                                   A/inf
                           A #2 6                                  C/1
                   D                             E                 E/1
                           B/inf
                           D/1



                       A                            B
                                   1
                                                              2                   A #2        B #2 C #1   D #1   E #1
             B #2                       A #2                          C
                                                4                                 B/inf       A/inf B/1   E/1    D/1
             A/inf 3                    B/inf
             C/1                        D/1
                                                                                  D/1         C/1   D/1   A/1    C/1
             E/1                                                                              E/1                B/1
                                                               5
                                   6
                       D                            E


Copyright © 1998                          Internet Routing Protocols: Fundamental Operation                             25
Operation of Link State Routing: The
           Flooding Protocol at Work (3)

                                             A #2                    D’s Link State Database
                                             B/inf
                       A              B
                                             D/1
                           1
                                                                     A #2     B #2 C #1   D #1   E #1
                                                2       C            B/inf    A/inf B/1   E/1    D/1
                                                                     D/1      C/1   D/1   A/1    C/1
                   3              4                                           E/1                B/1

                                                 5
                           6                                         No further changes take place
                   D               E
                                                                     in the LS database

                                                                     D (and all other nodes) can now
                                                                     calculate the shortest path to
                                                                     every destination




Copyright © 1998               Internet Routing Protocols: Fundamental Operation                        26
Advantages of Link State Routing

                    Fast, loopless convergence:
                           Rapid new-information transfer via flooding

                           Local computation of shortest path tree


                    Supports precise and multiple metrics
                            Full topology database ⇒ eliminates long convergence time

                        of DV protocols for unequal cost links
                            One DV database per metric (!) vs small overhead per metric

                        in LSP
                    Supports multiple paths to a destination
                           Enables load splitting, which is known to be efficient (less

                        congestion)
                           Gives smoother rerouting on failure of one path (reliability)


                    Better representation of external routes
                           Not limited by “infinity” of DV protocols

                          Computation for N routers is O(N logN) versus O(N^2) for DV
Copyright © 1998                  Internet Routing Protocols: Fundamental Operation         27
Open Shortest Path First (OSPF)

                    Operates within an autonomous system (AS)


                    Therefore, example of an interior gateway protocol (IGP)


                    Based on the link-state routing algorithm




Copyright © 1998               Internet Routing Protocols: Fundamental Operation   28
OSPF Features (1)

                    Runs directly over IP (with protocol field = 189)
                    Organized into “ASs” and “areas ”
                        Area border routers summarize reachable destinations, so that
                        area routers can pick a more optimal exit point


                                                                                       Legend
                       External
                       world
                                                                                                 AS Boundary routers
                                     Area 1                      Area 2
                                                                                                Area backbone routers


                                                                                                 Area border routers


                            OSPF Autonomous
                            System (AS)                                                          Designated routers
                                                Area 3

                                                                                                 Area routers

Copyright © 1998                   Internet Routing Protocols: Fundamental Operation                                   29
OSPF Features (2)

                    Reduces adjacencies over broadcast networks by electing a
                     designated router (DR) and backup designated router (BDR)




Copyright © 1998               Internet Routing Protocols: Fundamental Operation   30
OSPF Features (3)

                    Five link state advertisement (LSA) types:
                        Router links: links that start from the advertising router (flooded
                       in an area)
                        Network links:advertised by designated routers for transit
                       networks (broadcast and non-broadcast)
                        Network summary links: networks reachable from outside the
                       area via area border router
                        Boundary router summary links: path from generating area
                       backbone router to AS boundary routers
                        External links: path from AS bdry router to destinations outside
                       AS




Copyright © 1998                 Internet Routing Protocols: Fundamental Operation             31
Border Gateway Protocol (BGP)

                    Operates across autonomous systems (AS)


                    Therefore, example of an exterior gateway protocol
                     (EGP)

                    Based on the distance-vector routing algorithm, but
                     modified to eliminate looping (and its associated
                     problems)




Copyright © 1998               Internet Routing Protocols: Fundamental Operation   32
BGP Features

                    Runs over TCP, which ensures reliable communication
                        Eliminates need for complex error recovery mechanisms
                        Makes BGP message size independent of IP pkt size



                    BGP routers transmit a sequence of AS #s along the path
                     to a destination
                       Intermediate router on detecting its AS # terminates the
                       path to prevent a loop


                    Allows for policy routing:
                        BGP router uses configuration info to rank routes
                        Important when determining transit rules between ASs



Copyright © 1998               Internet Routing Protocols: Fundamental Operation   33

More Related Content

What's hot

Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTINGanilinvns
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPFarpit
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocolsGaurav Rawat
 
project on OSPF
project on OSPFproject on OSPF
project on OSPFOm Prakash
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2VISHNU N
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 

What's hot (20)

Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Link State Protocol
Link State ProtocolLink State Protocol
Link State Protocol
 
Day 2 IP ROUTING
Day 2 IP ROUTINGDay 2 IP ROUTING
Day 2 IP ROUTING
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
project on OSPF
project on OSPFproject on OSPF
project on OSPF
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
13. eigrp and ospf
13. eigrp and ospf13. eigrp and ospf
13. eigrp and ospf
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
CCIE Lab - IGP Routing
CCIE Lab -  IGP Routing  CCIE Lab -  IGP Routing
CCIE Lab - IGP Routing
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 

Viewers also liked

Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocolCCNAStudyGuide
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocolselvakumar_b1985
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmfarimoin
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithmGaurav Rawat
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210Ericsson Saudi
 
Latihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerLatihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerSimon Patabang
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayshubham katiyar
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
Php hypertext pre-processor
Php   hypertext pre-processorPhp   hypertext pre-processor
Php hypertext pre-processorSiddique Ibrahim
 

Viewers also liked (20)

Routing
RoutingRouting
Routing
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithm
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210
 
Latihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerLatihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan Komputer
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Shubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelayShubham ppt on ospf and framerelay
Shubham ppt on ospf and framerelay
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
MANET
MANETMANET
MANET
 
Advantages of Choosing PHP Web Development
Advantages of Choosing PHP Web DevelopmentAdvantages of Choosing PHP Web Development
Advantages of Choosing PHP Web Development
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Php hypertext pre-processor
Php   hypertext pre-processorPhp   hypertext pre-processor
Php hypertext pre-processor
 

Similar to Internet Routing Protocols: Key Concepts of Link-State and Distance Vector

NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallCassiano Campes
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsDuane Bodle
 
The benefit of BGP for every service provider
The benefit of BGP for every service providerThe benefit of BGP for every service provider
The benefit of BGP for every service providerThomas Mangin
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptxhalosidiq1
 
An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...Takashi Kishida
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configurationstom123
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6Martin Schütte
 
Identifying PCIe 3.0 Dynamic Equalization Problems
Identifying PCIe 3.0 Dynamic Equalization ProblemsIdentifying PCIe 3.0 Dynamic Equalization Problems
Identifying PCIe 3.0 Dynamic Equalization Problemsteledynelecroy
 
Suman's PhD Candidacy Talk
Suman's PhD Candidacy TalkSuman's PhD Candidacy Talk
Suman's PhD Candidacy TalkSuman Srinivasan
 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Raffael Marty
 
versa router teletronics
versa router teletronicsversa router teletronics
versa router teletronicsguestd33e17a
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017Satyendra Singh
 

Similar to Internet Routing Protocols: Key Concepts of Link-State and Distance Vector (20)

Voip basics
Voip basicsVoip basics
Voip basics
 
Voip basics
Voip basicsVoip basics
Voip basics
 
Lecture04 H
Lecture04 HLecture04 H
Lecture04 H
 
NAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewallNAT and firewall presentation - how setup a nice firewall
NAT and firewall presentation - how setup a nice firewall
 
Clase 4. Routing IP.pdf
Clase 4. Routing IP.pdfClase 4. Routing IP.pdf
Clase 4. Routing IP.pdf
 
Surviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview QuestionsSurviving The Stump The Chump Interview Questions
Surviving The Stump The Chump Interview Questions
 
The benefit of BGP for every service provider
The benefit of BGP for every service providerThe benefit of BGP for every service provider
The benefit of BGP for every service provider
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
CNF.Chap.5.pptx
CNF.Chap.5.pptxCNF.Chap.5.pptx
CNF.Chap.5.pptx
 
An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...An Application Gateway to Deploy High-quality Video Communications in Various...
An Application Gateway to Deploy High-quality Video Communications in Various...
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configuration
 
Short Introduction to IPv6
Short Introduction to IPv6Short Introduction to IPv6
Short Introduction to IPv6
 
Identifying PCIe 3.0 Dynamic Equalization Problems
Identifying PCIe 3.0 Dynamic Equalization ProblemsIdentifying PCIe 3.0 Dynamic Equalization Problems
Identifying PCIe 3.0 Dynamic Equalization Problems
 
Suman's PhD Candidacy Talk
Suman's PhD Candidacy TalkSuman's PhD Candidacy Talk
Suman's PhD Candidacy Talk
 
Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006Log Visualization - Bellua BCS 2006
Log Visualization - Bellua BCS 2006
 
Ch5
Ch5Ch5
Ch5
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
versa router teletronics
versa router teletronicsversa router teletronics
versa router teletronics
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
 

More from Vishal Sharma, Ph.D.

Intellectual Property Challenges and IoT
Intellectual Property Challenges and IoTIntellectual Property Challenges and IoT
Intellectual Property Challenges and IoTVishal Sharma, Ph.D.
 
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...Vishal Sharma, Ph.D.
 
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.Vishal Sharma, Ph.D.
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Vishal Sharma, Ph.D.
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Vishal Sharma, Ph.D.
 
Capacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player DiscourseCapacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player DiscourseVishal Sharma, Ph.D.
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Vishal Sharma, Ph.D.
 
Modern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic EngineeringModern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic EngineeringVishal Sharma, Ph.D.
 
Approaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch RouterApproaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch RouterVishal Sharma, Ph.D.
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Vishal Sharma, Ph.D.
 
Design Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet NetworksDesign Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet NetworksVishal Sharma, Ph.D.
 
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Vishal Sharma, Ph.D.
 
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17Vishal Sharma, Ph.D.
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Vishal Sharma, Ph.D.
 
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Vishal Sharma, Ph.D.
 
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Vishal Sharma, Ph.D.
 
Demystifying optical ethernet networks
Demystifying optical ethernet networksDemystifying optical ethernet networks
Demystifying optical ethernet networksVishal Sharma, Ph.D.
 
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsA Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsVishal Sharma, Ph.D.
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSVishal Sharma, Ph.D.
 

More from Vishal Sharma, Ph.D. (20)

Intellectual Property Challenges and IoT
Intellectual Property Challenges and IoTIntellectual Property Challenges and IoT
Intellectual Property Challenges and IoT
 
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...Network Infrastructure Security in  Cellular Data Networks: An Initial Invest...
Network Infrastructure Security in Cellular Data Networks: An Initial Invest...
 
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
7 Keys to Accelerate Profits by Partnering with Metanoia, Inc.
 
A New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM NetworksA New Analysis for Wavelength Translation in Regular WDM Networks
A New Analysis for Wavelength Translation in Regular WDM Networks
 
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
Architectural Options for Metro Carrier-Ethernet Network Buildout: Analysis &...
 
Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12Nanog panel carrier-network-health_vishal_8-5-12
Nanog panel carrier-network-health_vishal_8-5-12
 
Capacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player DiscourseCapacity Planning Panel - Operator and Eco-System Player Discourse
Capacity Planning Panel - Operator and Eco-System Player Discourse
 
Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!Illuminating Optical Ethernet Networks!
Illuminating Optical Ethernet Networks!
 
Modern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic EngineeringModern Carrier Strategies for Traffic Engineering
Modern Carrier Strategies for Traffic Engineering
 
Approaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch RouterApproaches to Designing a High-Performance Switch Router
Approaches to Designing a High-Performance Switch Router
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
 
Design Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet NetworksDesign Considerations for Converged Optical Ethernet Networks
Design Considerations for Converged Optical Ethernet Networks
 
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
Elements of Cross-Layer System & Network Design for QoS-Enabled Wi-Max Networks
 
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
Metro ethernet metanoiainc-next-gen-workshop_2007-07-17
 
Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12Pbt article packet-optical-integration_vishal_05-08-12
Pbt article packet-optical-integration_vishal_05-08-12
 
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
Packet-Optical Integration: The Key to Evolving Towards Packet Enabled Agile ...
 
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
Understanding Intelligent Military-Grade Optical Ethernet Networks: A Versati...
 
Demystifying optical ethernet networks
Demystifying optical ethernet networksDemystifying optical ethernet networks
Demystifying optical ethernet networks
 
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) ToolsA Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
A Survey of Recent Advances in Network Planning/Traffic Engineering (TE) Tools
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoS
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Internet Routing Protocols: Key Concepts of Link-State and Distance Vector

  • 1. Internet Routing Protocols: Fundamental Concepts of Link-State and Distance Vector Routing* *From Christian Huitema’s Routing in the Internet Vishal Sharma, Ph D Tellabs Research Center vsharma@trc tellabs com November 20, 1998
  • 2. Outline of the Talk  What does a router do?  A look at the forwarding process at a router  How does it know where to forward packets?  Distance vector routing An illustration of its operation Its drawbacks and how they affect performance Some solutions to those drawbacks  Link state routing A look at its major components An illustration of their operation Its features and advantages  OSPF: a link state based intra-domain routing protocol  BGP: a distance vector based inter-domain routing protocol Copyright © 1998 Internet Routing Protocols: Fundamental Operation 2
  • 3. Importance of Routing in the Internet The structure that glues together the worldwide Internet  Without routing there would be no Internet! Copyright © 1998 Internet Routing Protocols: Fundamental Operation 3
  • 4. Routing process at a router Receive incoming pkt.  Destination address (DA) based forwarding DA=my_add or Yes Deliver datagram to protocol module  Longest prefix matching DA= IP brdcst add. ? (TCP/UDP) specified in IP hdr. No Routing Table Yes Send pkt. to next-hop RT entry = complete DA? router or to directly DA Next hop Network connected interface. router Interface Host entry 198.168.7.3 X 2 No Host entry 198.168.7.4 X 3 RT entry = Yes Send pkt. to next-hop Host entry 198.168.7.1 198.168.7.5 1 Destn. n/w id? router or to directly connected interface. Host entry 198.168.7.2 198.168.7.5 1 No N/w entry 198.100.x.x 198.100.9.1 4 N/w entry 128.72.x.x 128.72.55.4 5 Yes Send pkt. to Default entry exists? next-hop router. Default x.x.x.x 128.84.73.1 6 No Datagram undeliverable. (Use ICMP to inform source.) Copyright © 1998 Internet Routing Protocols: Fundamental Operation 4
  • 5. Routing process at a router Longest prefix match in DA Next hop N/w Packet generated RT gives next hop router Int. router as 198 100 9 1 Host entry 198.168.7.3 X 2 DA = 198 100 9 75 and outgoing interface Host entry 198.168.7.4 X 3 as 4 198.168.7.3 Host entry 198.168.7.1 198.168.7.5 1 198.168.7.4 Host entry 198.168.7.2 198.168.7.5 1 198.168.7.1 198.168.7.5 N/w entry 198.100.x.x 198.100.9.1 4 N/w entry 128.72.x.x 128.72.55.4 5 198.100.x.x Default x.x.x.x 128.84.73.1 6 2 1 3 Routing table (RT) at 198 168 7 6 198.168.7.2 4 198.100.9.1 198.168.7.6 5 198.100.9.75 6 128.84.x.x 128.72.x.x 128.72. 55.4 128.84. 73.1  How do routers build their routing tables?  By exchanging information with each other using routing protocols Copyright © 1998 Internet Routing Protocols: Fundamental Operation 5
  • 6. Routing Protocols: Distance vector (DV) Routing Local dispersal of global information  Each router has unique ID  Each router knows cost of its outgoing links  Router starts with distance vector “0” for itself, and “infinity” for all other destinations  Transmits DV to each neighbor -- periodically or upon change  Saves the most recently received DV from each neighbor  Calculates new DV based on minimizing cost for each destination  Recalculations occur when: DV with new values received from a neighbor Link(s) fails Copyright © 1998 Internet Routing Protocols: Fundamental Operation 6
  • 7. Operation of Distance Vector Routing (1) From A Link Cost From B Link Cost A local 0 B local 0 Letters represent Node names A B 1 A=0 2 From C Link Cost C C local 0 3 4 Numbers on links represent link identifiers (not cost) 5 6 From D Link Cost D E From E Link Cost D local 0 E local 0 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 7
  • 8. Operation of Distance Vector Routing (2) From A Link Cost From B Link Cost A local 0 B local 0 A 1 1 B=0, A=1 A B 1 2 From C Link Cost C C local 0 3 4 D=0, A=1 5 6 From D Link Cost D E From E Link Cost D local 0 E local 0 A 3 1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 8
  • 9. Operation of Distance Vector Routing (3) From A Link Cost From B Link Cost A local 0 B local 0 B 1 1 A 1 1 D 3 1 A=0, B=1, D=1 A B 1 C=0, B=1, A=2 2 From C Link Cost C C local 0 B 2 1 3 4 A 2 2 5 6 From D Link Cost D E From E Link Cost D local 0 E=0, B=1, A=2, E local 0 A 3 1 B 4 1 D=1 A 4 2 D 6 1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 9
  • 10. Operation of Distance Vector Routing (4) From A Link Cost From B Link Cost A local 0 B local 0 B 1 1 A 1 1 D 3 1 B=0, A=1, D=2, D 1 2 C=1, E=1 C 2 1 A B E 5 1 1 2 From C Link Cost C C local 0 B 2 1 3 4 A 2 2 D=0, A=1, B=2 E=1 5 6 From D Link Cost D E From E Link Cost D local 0 E=0, B=1, A=2, E local 0 A 3 1 B 4 1 D=1, C=1 B 3 2 A 4 2 E 6 1 D 6 1 C 5 1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 10
  • 11. Operation of Distance Vector Routing (5) From A Link Cost From B Link Cost A local 0 B local 0 B 1 1 A 1 1 D 3 1 D 1 2 C 1 2 C 2 1 E 1 2 A B E 5 1 1 These do not alter 2 From C Link Cost routing tables further C C local 0 Thus, no new 3 4 B 2 1 A 2 2 updates generated E 5 1 D 5 2 5 6 From D Link Cost D E From E Link Cost D local 0 E local 0 A 3 1 B 4 1 B 3 2 A 4 2 E 6 1 D 6 1 C 6 2 C 5 1 DV routing has now converged Copyright © 1998 Internet Routing Protocols: Fundamental Operation 11
  • 12. Drawbacks of Distance-vector Routing  Slow convergence after topology change  “Counting to infinity” problem: Loop exists DVs do not converge till the link costs reach “infinity ”  Problematic convergence with unequal link costs  Bouncing effect: Routing and link costs temporarily stabilize, but have a loop Data packets circulate in the loop till time-to-live (TTL) expires This changes only when network converges to a new, coherent version of the routing tables Copyright © 1998 Internet Routing Protocols: Fundamental Operation 12
  • 13. Drawbacks of Distance Vector Routing: Counting to “Infinity” (1) From A Link Cost A’s stable routing table A local 0 B 3 3 after link 1 fails D 3 1 C 3 3 E 3 2 A B 1 A=0, B=3, D=1, 2 C=3, E=2 C A transmits its last 3 4 DV before D does Link 6 fails 5 6 From D Link Cost D E D local 0 A 3 1 D’s routing table B 6 inf immediately E 6 inf C 6 inf after link 6 fails Copyright © 1998 Internet Routing Protocols: Fundamental Operation 13
  • 14. Drawbacks of Distance Vector Routing: Counting to “Infinity” (2) From A Link Cost A local 0 B 3 3 D 3 1 C 3 3 E 3 2 A B 1 D transmits its 2 C updated DV D=0, A=1, B=4, 3 4 E=3, C=4 5 6 From D Link Cost D E D local 0 A 3 1 B 3 4 E 3 3 C 3 4 D updates its routing table Copyright © 1998 Internet Routing Protocols: Fundamental Operation 14
  • 15. Drawbacks of Distance Vector Routing: Counting to “Infinity” (3) From A Link Cost Then A updates its routing table A local 0 B 3 5 D 3 1 A=0, B=5, D=1, C 3 5 C=5, E=4 E 3 4 A B 1 A transmits its 2 C updated DV 3 4 We are in an infinite loop! 5 6 From D Link Cost D E D local 0 A 3 1 B 3 4 Infinite loop broken by some E 3 3 C 3 4 convention on the representation of “infinity ” Copyright © 1998 Internet Routing Protocols: Fundamental Operation 15
  • 16. Drawbacks of Distance Vector Routing: Bouncing Effect (1) All links except 5 have unit From A Link Cost cost, link 5 cost = 10 From B Link Cost A local 0 B local 0 B 1 1 A 1 1 C 1 2 C 2 1 D 3 1 D 1 2 E 3 2 A B E 4 1 1 2 C Routes towards C 3 4 From Link Cost AC 1 2 BC 1 1 5 CC local 0 DC 3 3 6 EC 4 2 From D Link Cost D E From E Link Cost D local 0 E local 0 A 3 1 A 5 2 B 3 2 B 4 1 C 3 3 C 4 2 E 5 1 D 5 1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 16
  • 17. Drawbacks of Distance Vector Routing: Bouncing Effect (2) All links except 5 have unit From A Link Cost cost, link 5 cost = 10 From B Link Cost B’s routing table A local 0 B local 0 immediately after B 1 1 A 1 1 C 1 2 C 2 inf link 2 fails D 3 1 D 1 2 E 3 2 A B E 4 1 1 Link 2 fails A=0, B=1, C=2, 2 D=1,E=2 C Routes towards C A transmits its DV 3 4 From Link Cost before B does AC 1 2 BC 1 inf 5 CC local 0 DC 3 3 6 EC 4 2 From D Link Cost D E From E Link Cost D local 0 E local 0 Routes towards C A 3 1 A 5 2 immediately after B 3 2 B 4 1 C 3 3 C 4 2 B’s update of its E 5 1 D 5 1 routing table Copyright © 1998 Internet Routing Protocols: Fundamental Operation 17
  • 18. Drawbacks of Distance Vector Routing: Bouncing Effect (3) All links except 5 have unit From A Link Cost cost, link 5 cost = 10 From B Link Cost However, B updates its routing A local 0 B local 0 B transmits its new DV A 1 1 table based on DV B 1 1 C 1 2 B=0, A=1, C=3, C 1 3 from A (causing the D 3 1 D=1,E=1 D 1 2 E 4 1 route towards C to E 3 2 A B 1 change also) 2 C Routes towards C 3 4 From Link Cost AC 1 2 BC 1 3 A’s DV produces 5 CC local 0 no change at D DC 3 3 6 EC 4 2 From D Link Cost D E From E Link Cost D local 0 E local 0 A 3 1 A 5 2 B 3 2 B 4 1 C 3 3 C 4 2 E 5 1 D 5 1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 18
  • 19. Drawbacks of Distance Vector Routing: Bouncing Effect (4) All links except 5 have unit From A Link Cost cost, link 5 cost = 10 From B Link Cost A local 0 B local 0 B 1 1 A 1 1 C 1 4 C 1 3 D 3 1 D 1 2 E 3 2 A B E 4 1 1 Further DV exchanges 2 produce no change in C Routes towards C routing tables! Both 3 4 From Link Cost routing and distances AC 1 4 Loop! have (temporarily) BC 1 3 5 CC local 0 stabilized DC 3 3 6 EC 4 4 From D Link Cost D E From E Link Cost D local 0 E local 0 A 3 1 A 5 2 B 3 2 B 4 1 C 3 3 C 4 4 E 5 1 D 5 1 Packets for C can now “bounce” between A and B Copyright © 1998 Internet Routing Protocols: Fundamental Operation 19
  • 20. Some Solutions for Problems in Distance Vector Routing  Split Horizon: If A routes packets for X via B, it should not announce to B that X is a short distance from A! A B X Simple algo : Omit from DV any info about destinations routed on the link  “Poisonous reverse” algo : Set distance of destination routed on the link to infinity  Triggered Updates: transmit updates as soon as routing table changes, don’t wait for end of update period Copyright © 1998 Internet Routing Protocols: Fundamental Operation 20
  • 21. Routing Protocols: Link State (LS) Routing Global dispersal of local information Each router:  Identifies itself to all its neighbors  Constructs a link state packet (LSP) with: Names of each neighbor Cost of link to each neighbor  Floods its LSP in the network  Stores most recent copy of LSP from every other router  Using LSPs constructs a full map of network topology, and computes shortest route(s) to each destination (using an appropriate shortest path algorithm, such as Dijkstra’s) Copyright © 1998 Internet Routing Protocols: Fundamental Operation 21
  • 22. Operation of Link State Routing (1)  Meeting neighbors A Hello B  Xmit special pkt over link Hello C (if pt to pt ) or to a group address (if broadcast n/w or Hello LAN) D Hello E Name of neighbor Cost of Link to that neighbor A B/1 B D/1 A/1 C/1 C  Construct Link State Packet A B E/1 B/1 1 D/1 (LSP) LSP is sent when: Letters represent 2 C  Neighbor changes Node names 4  Link goes up/down 5  Also, periodically E Numbers on links are D D 6 D/1 E/1 E C/1 link identifiers (not cost) A/1 B/1 Copyright © 1998 Internet Routing Protocols: Fundamental Operation 22
  • 23. Operation of Link State Routing (2)  Disseminate LSP to all Receive message from A, say routers in the network LSP distrn cannot use Record in database No - Add to database, - Broadcast message. routing database ⇒ use from A ? Flooding algorithm Yes Each LSP has “msg #” and Record # in Yes - Replace record by database < “age” to enable receiving Record # in new value. - Broadcast message. msg.? node to distinguish between old and new info No Record # in No Transmit database database = value on incoming  Advantage: Record # in msg.? interface. LSP can be forwarded Yes without any shortest path Do nothing. computation, so faster Copyright © 1998 Internet Routing Protocols: Fundamental Operation 23
  • 24. Operation of Link State Routing: The Flooding Protocol at Work (1) Link State A B D’s Link State Database Packet, LSP B/1 A/1 (amalgamation of LSPs from D/1 C A B C/1 remaining network nodes) 1 E/1 B/1 Node name LSP # D/1 2 C A #1 B #1 C #1 D #1 E #1 B/1 A/1 B/1 E/1 D/1 3 4 D/1 C/1 D/1 A/1 C/1 E/1 B/1 5 E D 6 D/1 D E/1 E C/1 A/1 B/1 B #2 A/inf A B C/1 1 E/4 A #1 B #1 C #1 D #1 E #1 A #2 2 C B/1 A/1 B/1 E/1 D/1 B/inf D/1 C/1 D/1 A/1 C/1 3 D/1 4 E/1 B/1 5 6 D E Internet Routing Protocols: Fundamental Operation 24 Copyright © 1998
  • 25. Operation of Link State Routing: The Flooding Protocol at Work (2) A B D’s Link State Database 1 2 C A #2 B #1 C #1 D #1 E #1 B #2 B/inf A/1 B/1 E/1 D/1 3 A/inf 4 D/1 C/1 D/1 A/1 C/1 C/1 E/1 E/1 B/1 5 B #2 A/inf A #2 6 C/1 D E E/1 B/inf D/1 A B 1 2 A #2 B #2 C #1 D #1 E #1 B #2 A #2 C 4 B/inf A/inf B/1 E/1 D/1 A/inf 3 B/inf C/1 D/1 D/1 C/1 D/1 A/1 C/1 E/1 E/1 B/1 5 6 D E Copyright © 1998 Internet Routing Protocols: Fundamental Operation 25
  • 26. Operation of Link State Routing: The Flooding Protocol at Work (3) A #2 D’s Link State Database B/inf A B D/1 1 A #2 B #2 C #1 D #1 E #1 2 C B/inf A/inf B/1 E/1 D/1 D/1 C/1 D/1 A/1 C/1 3 4 E/1 B/1 5 6 No further changes take place D E in the LS database D (and all other nodes) can now calculate the shortest path to every destination Copyright © 1998 Internet Routing Protocols: Fundamental Operation 26
  • 27. Advantages of Link State Routing  Fast, loopless convergence: Rapid new-information transfer via flooding Local computation of shortest path tree  Supports precise and multiple metrics  Full topology database ⇒ eliminates long convergence time of DV protocols for unequal cost links  One DV database per metric (!) vs small overhead per metric in LSP  Supports multiple paths to a destination  Enables load splitting, which is known to be efficient (less congestion)  Gives smoother rerouting on failure of one path (reliability)  Better representation of external routes  Not limited by “infinity” of DV protocols Computation for N routers is O(N logN) versus O(N^2) for DV Copyright © 1998 Internet Routing Protocols: Fundamental Operation 27
  • 28. Open Shortest Path First (OSPF)  Operates within an autonomous system (AS)  Therefore, example of an interior gateway protocol (IGP)  Based on the link-state routing algorithm Copyright © 1998 Internet Routing Protocols: Fundamental Operation 28
  • 29. OSPF Features (1)  Runs directly over IP (with protocol field = 189)  Organized into “ASs” and “areas ”  Area border routers summarize reachable destinations, so that area routers can pick a more optimal exit point Legend External world AS Boundary routers Area 1 Area 2 Area backbone routers Area border routers OSPF Autonomous System (AS) Designated routers Area 3 Area routers Copyright © 1998 Internet Routing Protocols: Fundamental Operation 29
  • 30. OSPF Features (2)  Reduces adjacencies over broadcast networks by electing a designated router (DR) and backup designated router (BDR) Copyright © 1998 Internet Routing Protocols: Fundamental Operation 30
  • 31. OSPF Features (3)  Five link state advertisement (LSA) types:  Router links: links that start from the advertising router (flooded in an area)  Network links:advertised by designated routers for transit networks (broadcast and non-broadcast)  Network summary links: networks reachable from outside the area via area border router  Boundary router summary links: path from generating area backbone router to AS boundary routers  External links: path from AS bdry router to destinations outside AS Copyright © 1998 Internet Routing Protocols: Fundamental Operation 31
  • 32. Border Gateway Protocol (BGP)  Operates across autonomous systems (AS)  Therefore, example of an exterior gateway protocol (EGP)  Based on the distance-vector routing algorithm, but modified to eliminate looping (and its associated problems) Copyright © 1998 Internet Routing Protocols: Fundamental Operation 32
  • 33. BGP Features  Runs over TCP, which ensures reliable communication  Eliminates need for complex error recovery mechanisms  Makes BGP message size independent of IP pkt size  BGP routers transmit a sequence of AS #s along the path to a destination Intermediate router on detecting its AS # terminates the path to prevent a loop  Allows for policy routing:  BGP router uses configuration info to rank routes  Important when determining transit rules between ASs Copyright © 1998 Internet Routing Protocols: Fundamental Operation 33