KEMBAR78
Routing protocols-network-layer | PPT
Network Layer: 
Delivery, Forwarding, and Routing 
21.1 Delivery 
21.2 Forwarding 
21.3 Unicast Routing Protocols 
21.4 Multicast Routing Protocols
Delivery 
• The network layer supervises the handling of the packets by the underlying 
physical networks. We define this handling as the delivery of a packet. 
Direct versus Indirect Delivery
Forwarding 
• Forwarding means to place the packet in its route to its 
destination. 
• Forwarding requires a host or a router to have a routing table
Forwarding techniques to make the size of the 
routing table manageable 
•Next-hop method versus route method 
•Network-specific method versus host-specific 
method 
•Default method
Forwarding Techniques 
1) Route method versus next-hop method :
Host –specific versus network-specific method
Default method
Forwarding Process 
• In classless addressing, we need at least four columns in a routing table
Example 
• Make a routing table for router R1, using the configuration in Figure
Example 
• Routing table for router R1 
• Forwarding process for the destination address 180.70.65.140 ? 
• Forwarding process for the destination address 18.24.32.78 ?
Address Aggregation 
• Classless addressing increases the number of routing table entries 
• To alleviate the problem, the address aggregation is used
Longest Mask Matching
Hierarchical Routing 
• To solve the problem of gigantic routing tables
RIP (Routing Information Protocol), OSPF (Open Shortest Path 
First), BGP (Border Gateway Protocol)
Intra domain : link state and distance vector 
Interdomain : path vector
Popular (Unicast) Routing Protocols
Distance Vector Routing
Distance Vector Routing: Initialization 
• At the beginning, each node can know only the distance between itself and its 
immediate neighbors
Distance Vector Routing: Sharing 
• In distance vector routing, each node shares its routing table (with first two cols) 
with its immediate neighbors periodically and when there is a change
Distance Vector Routing: Updating 
• When a node receives a two-column table from a neighbor, it 
need to update its routing table 
• Updating rule: 
– Choose the smaller cost. If the same, keep the old one 
– If the next-node entry is the same, the receiving node chooses the new row
Ccost+2
When to Share 
• Periodic update: A node sends its routing table, normally 
every 30 s 
• Triggered update: Anode sends its two-column routing table to 
its neighbors anytime there is a change in its routing table
Solutions for Instability
Three-Node Instability 
• If the instability is between three nodes, stability cannot be 
guaranteed.
RRoouuttiinngg IInnffoorrmmaattiioonn PPrroottooccooll
LLiinnkk SSttaattee RRoouuttiinngg 
• Each node has the entire topology of the domain- the list of nodes and links, how 
they are connected including type, cost, and condition of the links(up or down) 
• Node can use Dijkstra’s algorithm to build a routing table
LLiinnkk SSttaattee RRoouuttiinngg 
• Each node has partial knowledge: it know the state (type, condition, and cost) of its links. 
The whole topology can be compiled from the partial knowledge of each node
BBuuiillddiinngg RRoouuttiinngg TTaabbllee 
1. Creation of the states of the links by each node, called the link state packet 
(LSP) 
2. Dissemination of LSPs to every other router, called flooding, in an 
efficient and reliable way 
3. Formation of a shortest path tree for each node 
4. Calculation of a routing table based on the shortest path tree 
• Creation of LSP 
– LSP contains node identity, the list of links (to make the topology), 
sequence number (to facilitate flooding and distinguish new LSPs 
from old ones 
– LSPs are generated (1) when there is a change in the topology of the 
domain, (2) on a periodic basis, normally 60 min or 2 h
BBuuiillddiinngg RRoouuttiinngg TTaabbllee 
• Flooding of LSPs 
– The creating node sends a copy of the LSP out of each interface 
– A node compares it with the copy it may already have. If the newly 
arrived LSP is older than the one it has, it discards the LSP. If it is 
newer, 
1. It discards the old LSP and keeps the new one 
2. It sends a copy of it out of each interface except the one from which 
the packet arrived 
• Formation of shortest path tree: Dijkstra Algorithm 
– After receiving all LSPs, each node will have a copy of the whole 
topology. Need to find the shortest path to every other node 
– The Dijkstra algorithm creates a shortest path tree from a graph
DDiijjkkssttrraa AAllggoorriitthhmm
EExxaammppllee ooff DDiijjkkssttrraa AAllggoorriitthhmm
Open Shortest Path First (OSPF) 
• Popular intra domain routing protocol based on link state routing 
• To handle routing efficiently and in a timely manner, OSPF divides an autonomous 
system into area 
• Area is a collection of network, hosts, and routers all contained within an AS 
• AS can also be divided into many different areas
Metric 
• The OSPF allows the administrator to assign a cost, called the metric, to each route 
• The metric can be based on a type of service (minimum delay, maximum 
throughput, and so on) 
Types of Links
Point-to-Point Link 
• To connect two routers without any other host or router in between 
Transient Link 
• A network with several routers attached to it
Stub Link 
Virtual Link
Path Vector Routing 
• Distance vector routing is subject to instability if there are 
more than a few hops in the domain of operation 
• Link state routing needs a huge amount of resources to 
calculate routing tables. It also create heavy traffic because 
of flooding 
• Need for a third routing algorithm for interdomain routing, 
called path vector routing 
• Path vector routing is similar to distance vector routing 
• But, only speaker node (one node that acts on behalf of 
entire AS) creates a routing table and advertises it to speaker 
nodes in each AS in its neighbour. 
• A speaker node advertises the path, not the metric of nodes
Path Vector Routing: Initialization
Path Vector Routing: Sharing and Updating 
Sharing: Like distance vector routing, a speaker shares its 
table with immediate neighbors 
Updating: When a speaker receives a two-column table from 
a neighbor, it updates its own table 
• Loop prevention 
• Policy routing 
• Optimum path
Border Gateway Protocol (BGP) 
• Interdomain routing protocol using path vector routing 
• Types of autonomous systems (ASs) 
– Stub AS: only one connection to another AS. A stub AS is 
either a sink or source. 
– Multihomed AS: more than one connection to other ASs, 
– Transit AS: A multihomed AS that also allows transient 
traffic
Path attributes 
1. Well-known attribute 
Well-known mandatory attribute: that must appear in 
the description of a router. 
ORIGIN (source of the routing information) 
AS_PATH (the list of ASs) 
NEXT-HOP(the next router) 
Well-known discretionary attribute that not required 
in every update message. 
2. Optional attribute :
BGP Sessions 
• A session is a connection between BGP routers for the 
exchange of router information 
• To create a reliable environment, BGP uses the services of 
TCP as semipermanent connections 
• External and internal BGP 
– E-BGP sessions: used to exchange information between 
two speaker nodes belonging to two different ASs 
– I-BGP sessions: used to exchange information between two 
routers inside an AS

Routing protocols-network-layer

  • 1.
    Network Layer: Delivery,Forwarding, and Routing 21.1 Delivery 21.2 Forwarding 21.3 Unicast Routing Protocols 21.4 Multicast Routing Protocols
  • 2.
    Delivery • Thenetwork layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct versus Indirect Delivery
  • 5.
    Forwarding • Forwardingmeans to place the packet in its route to its destination. • Forwarding requires a host or a router to have a routing table
  • 6.
    Forwarding techniques tomake the size of the routing table manageable •Next-hop method versus route method •Network-specific method versus host-specific method •Default method
  • 7.
    Forwarding Techniques 1)Route method versus next-hop method :
  • 9.
    Host –specific versusnetwork-specific method
  • 11.
  • 12.
    Forwarding Process •In classless addressing, we need at least four columns in a routing table
  • 13.
    Example • Makea routing table for router R1, using the configuration in Figure
  • 14.
    Example • Routingtable for router R1 • Forwarding process for the destination address 180.70.65.140 ? • Forwarding process for the destination address 18.24.32.78 ?
  • 15.
    Address Aggregation •Classless addressing increases the number of routing table entries • To alleviate the problem, the address aggregation is used
  • 16.
  • 17.
    Hierarchical Routing •To solve the problem of gigantic routing tables
  • 19.
    RIP (Routing InformationProtocol), OSPF (Open Shortest Path First), BGP (Border Gateway Protocol)
  • 25.
    Intra domain :link state and distance vector Interdomain : path vector
  • 26.
  • 28.
  • 29.
    Distance Vector Routing:Initialization • At the beginning, each node can know only the distance between itself and its immediate neighbors
  • 30.
    Distance Vector Routing:Sharing • In distance vector routing, each node shares its routing table (with first two cols) with its immediate neighbors periodically and when there is a change
  • 31.
    Distance Vector Routing:Updating • When a node receives a two-column table from a neighbor, it need to update its routing table • Updating rule: – Choose the smaller cost. If the same, keep the old one – If the next-node entry is the same, the receiving node chooses the new row
  • 33.
  • 34.
    When to Share • Periodic update: A node sends its routing table, normally every 30 s • Triggered update: Anode sends its two-column routing table to its neighbors anytime there is a change in its routing table
  • 36.
  • 39.
    Three-Node Instability •If the instability is between three nodes, stability cannot be guaranteed.
  • 41.
  • 42.
    LLiinnkk SSttaattee RRoouuttiinngg • Each node has the entire topology of the domain- the list of nodes and links, how they are connected including type, cost, and condition of the links(up or down) • Node can use Dijkstra’s algorithm to build a routing table
  • 43.
    LLiinnkk SSttaattee RRoouuttiinngg • Each node has partial knowledge: it know the state (type, condition, and cost) of its links. The whole topology can be compiled from the partial knowledge of each node
  • 44.
    BBuuiillddiinngg RRoouuttiinngg TTaabbllee 1. Creation of the states of the links by each node, called the link state packet (LSP) 2. Dissemination of LSPs to every other router, called flooding, in an efficient and reliable way 3. Formation of a shortest path tree for each node 4. Calculation of a routing table based on the shortest path tree • Creation of LSP – LSP contains node identity, the list of links (to make the topology), sequence number (to facilitate flooding and distinguish new LSPs from old ones – LSPs are generated (1) when there is a change in the topology of the domain, (2) on a periodic basis, normally 60 min or 2 h
  • 45.
    BBuuiillddiinngg RRoouuttiinngg TTaabbllee • Flooding of LSPs – The creating node sends a copy of the LSP out of each interface – A node compares it with the copy it may already have. If the newly arrived LSP is older than the one it has, it discards the LSP. If it is newer, 1. It discards the old LSP and keeps the new one 2. It sends a copy of it out of each interface except the one from which the packet arrived • Formation of shortest path tree: Dijkstra Algorithm – After receiving all LSPs, each node will have a copy of the whole topology. Need to find the shortest path to every other node – The Dijkstra algorithm creates a shortest path tree from a graph
  • 46.
  • 47.
  • 50.
    Open Shortest PathFirst (OSPF) • Popular intra domain routing protocol based on link state routing • To handle routing efficiently and in a timely manner, OSPF divides an autonomous system into area • Area is a collection of network, hosts, and routers all contained within an AS • AS can also be divided into many different areas
  • 52.
    Metric • TheOSPF allows the administrator to assign a cost, called the metric, to each route • The metric can be based on a type of service (minimum delay, maximum throughput, and so on) Types of Links
  • 53.
    Point-to-Point Link •To connect two routers without any other host or router in between Transient Link • A network with several routers attached to it
  • 54.
  • 55.
    Path Vector Routing • Distance vector routing is subject to instability if there are more than a few hops in the domain of operation • Link state routing needs a huge amount of resources to calculate routing tables. It also create heavy traffic because of flooding • Need for a third routing algorithm for interdomain routing, called path vector routing • Path vector routing is similar to distance vector routing • But, only speaker node (one node that acts on behalf of entire AS) creates a routing table and advertises it to speaker nodes in each AS in its neighbour. • A speaker node advertises the path, not the metric of nodes
  • 56.
    Path Vector Routing:Initialization
  • 57.
    Path Vector Routing:Sharing and Updating Sharing: Like distance vector routing, a speaker shares its table with immediate neighbors Updating: When a speaker receives a two-column table from a neighbor, it updates its own table • Loop prevention • Policy routing • Optimum path
  • 62.
    Border Gateway Protocol(BGP) • Interdomain routing protocol using path vector routing • Types of autonomous systems (ASs) – Stub AS: only one connection to another AS. A stub AS is either a sink or source. – Multihomed AS: more than one connection to other ASs, – Transit AS: A multihomed AS that also allows transient traffic
  • 63.
    Path attributes 1.Well-known attribute Well-known mandatory attribute: that must appear in the description of a router. ORIGIN (source of the routing information) AS_PATH (the list of ASs) NEXT-HOP(the next router) Well-known discretionary attribute that not required in every update message. 2. Optional attribute :
  • 64.
    BGP Sessions •A session is a connection between BGP routers for the exchange of router information • To create a reliable environment, BGP uses the services of TCP as semipermanent connections • External and internal BGP – E-BGP sessions: used to exchange information between two speaker nodes belonging to two different ASs – I-BGP sessions: used to exchange information between two routers inside an AS