Network Layer: IP, Routing Protocols

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Explain how the functions of the network layer differ between a host and a router.

In a host, the network layer handles segmentation and encapsulation of transport layer segments into datagrams for transmission, and de-encapsulation of received datagrams. In a router, the primary role is forwarding datagrams from input links to output links.

What are the two key network-layer functions, and how do they work together to facilitate data transfer?

The two key functions are forwarding and routing. Forwarding involves transferring a packet from an input link to the appropriate output link within a router. Routing involves determining the end-to-end path that packets should take between source and destination.

How does a router use its forwarding table to process incoming packets?

A router examines a field in the packet's header and uses this value to index into the forwarding table. The corresponding entry indicates the outgoing link interface to which the packet should be forwarded.

Describe the purpose of 'connection setup' in certain network-layer architectures and why it is required.

<p>Connection setup involves routers along a chosen path handshaking to establish state before data packets are sent. This ensures that all routers are prepared for the packets before transmission begins, guaranteeing the connection and potentially reserving resources.</p> Signup and view all the answers

Explain the key differentiating factor between virtual-circuit networks and datagram networks.

<p>Virtual-circuit networks provide a connection service at the network layer, requiring a setup phase before data transfer, whereas datagram networks provide a connectionless service, where each packet is independently routed based on destination address.</p> Signup and view all the answers

What are the three distinct phases in a virtual-circuit network?

<p>The three phases are VC setup, data transfer, and VC teardown. VC setup establishes the path, data transfer involves transmitting packets along the established path, and VC teardown terminates the connection.</p> Signup and view all the answers

How does a datagram network handle packet forwarding, and what information does each packet contain to facilitate this process?

<p>In a datagram network, each packet contains the destination address of the end system. Routers use this address to consult their forwarding tables and independently determine the appropriate output link for each packet.</p> Signup and view all the answers

Explain the concept of 'longest prefix matching' utilized in datagram forwarding tables.

<p>Longest prefix matching is used when a destination address matches multiple entries in a forwarding table. The router selects the entry with the longest matching prefix, ensuring the most specific route is chosen for forwarding the packet.</p> Signup and view all the answers

Describe the main functions of the input ports, output ports, switching fabric, and routing processor router components.

<p>Input ports perform physical and link-layer functions, and lookup the output port for forwarding. The switching fabric transfers packets from input to output ports. Output ports store and transmit packets. The routing processor executes routing protocols and manages the forwarding table.</p> Signup and view all the answers

Explain the difference between the forwarding plane and the control plane in a router.

<p>The forwarding plane (implemented in hardware) handles high-speed packet forwarding using the forwarding table. The control plane (implemented in software, executed by the routing processor) executes routing protocols and manages the forwarding table.</p> Signup and view all the answers

Explain how switching via memory differs from switching via a bus in a router's switching fabric.

<p>Switching via memory involves the routing processor directly controlling the transfer of packets between input and output ports through system memory. Switching via a bus allows input ports to transfer packets directly to output ports over a shared bus, without routing processor intervention.</p> Signup and view all the answers

Describe the concept of a crossbar switch and how it increases the router's switching capacity.

<p>A crossbar switch consists of 2N buses (for N input and N output ports) with cross-points controlled by a switch fabric controller. This enables multiple simultaneous packet transfers between different input-output port pairs, increasing switching capacity compared to a single shared bus.</p> Signup and view all the answers

What is the role of a packet scheduler in output port queuing, and why is it necessary?

<p>A packet scheduler selects one packet among those queued for transmission. It is necessary because output ports can receive packets faster than they can be transmitted, creating a queue, and the scheduler determines the order in which packets are sent, impacting quality of service.</p> Signup and view all the answers

What is the purpose of Active Queue Management (AQM) algorithms at a router's output port?

<p>AQM algorithms manage queue lengths to prevent congestion, by dropping or marking packets before the queue is full. This helps signal congestion to senders, allowing them to reduce their transmission rate and prevent overall network performance degradation.</p> Signup and view all the answers

Explain the 'head-of-the-line (HOL) blocking' problem in input port queuing and how it affects router performance?

<p>HOL blocking occurs when a packet in an input queue cannot be transferred to its output port because another packet at the head of the same queue is destined for a different, congested output port. This blocks subsequent packets in the queue, even if their desired output ports are free, decreasing overall router throughput.</p> Signup and view all the answers

What are the three major components of the Internet's network layer, and what functionalities does each provide?

<p>The three main components are the IP protocol (addressing and datagram format), the routing component (path determination), and ICMP (error reporting and network-layer information requests).</p> Signup and view all the answers

What is the purpose of the 'Time-to-Live (TTL)' field in the IPv4 datagram header, and how does it work?

<p>The TTL field prevents datagrams from endlessly looping in the network. It indicates the maximum time a datagram will live; routers decrement this value, and when it reaches zero, the datagram is discarded.</p> Signup and view all the answers

Explain the process of IP datagram fragmentation and why it is needed.

<p>IP datagram fragmentation divides a large datagram into smaller fragments if the MTU (Maximum Transmission Unit) of a link is smaller than the datagram size. It's needed to allow packets to traverse networks with different MTU limitations.</p> Signup and view all the answers

How does the destination host reassemble fragmented IP datagrams, and what header fields are utilized in this process?

<p>The destination uses the Identification, Flag, and Fragment Offset fields in the IP header. The Identification field groups all fragments of a datagram, the Flag indicates if it's the last fragment, and the Fragment Offset specifies the fragment's position in the original datagram.</p> Signup and view all the answers

What is the significance of an IP address being associated with an interface rather than a host or router?

<p>A router has multiple interfaces (one for each link), each needing its own IP address for identifying the subnet to which it connects. This allows the router to properly forward packets based on the destination IP address.</p> Signup and view all the answers

Explain the purpose of the subnet mask in IP addressing and how it is used to define a subnet.

<p>A subnet mask (e.g., /24) indicates the number of leftmost bits in the IP address that define the subnet address. This differentiates the network portion from the host portion, allowing routers to identify the subnet a packet should be delivered to.</p> Signup and view all the answers

How does Classless Interdomain Routing (CIDR) improve upon classful addressing in IP networks?

<p>CIDR allows for more flexible allocation of IP addresses by removing the rigid class A, B, and C network sizes. Instead, it uses a prefix (a.b.c.d/x) to specify the network portion, allowing for subnets of arbitrary size and reducing IP address waste.</p> Signup and view all the answers

What is the purpose of the IP broadcast address (255.255.255.255), and how is it used in network communication?

<p>The IP broadcast address is used to send a datagram to all hosts on the same subnet. When a host sends a packet to this address, it is delivered to every host within that subnet.</p> Signup and view all the answers

Briefly describe the role of the Internet Corporation for Assigned Names and Numbers (ICANN) in IP addressing.

<p>ICANN is responsible for allocating IP addresses, managing DNS root servers, and assigning domain names. It oversees the overall management of the Internet's address space.</p> Signup and view all the answers

Explain the purpose of the Dynamic Host Configuration Protocol (DHCP) and how it simplifies network administration.

<p>DHCP automatically assigns IP addresses and other network configuration parameters (subnet mask, default gateway, DNS server) to devices on a network. This simplifies network administration by eliminating the need to manually configure each device.</p> Signup and view all the answers

What are the four steps involved in the DHCP protocol for a newly arriving host?

<p>The four steps are DHCP server discovery, DHCP server offer(s), DHCP request, and DHCP ACK. The client discovers servers, the servers offer parameters, the client picks one, and the server acknowledges the choice.</p> Signup and view all the answers

What is Network Address Translation (NAT), and why is it used?

<p>NAT translates private IP addresses within a local network into a single public IP address. It is used to allow multiple devices in a private network to share a single public IP address for accessing the Internet, conserving public IP addresses.</p> Signup and view all the answers

Explain the role of the NAT translation table and the information it contains.

<p>The NAT translation table maintains a mapping between the private IP address and port number of a local host and the public IP address and port number used for communication with the external network. It enables the router to correctly forward packets to the appropriate internal host.</p> Signup and view all the answers

What is the main purpose of the Internet Control Message Protocol (ICMP), and give an example of its use.

<p>ICMP is used by hosts and routers to communicate network-layer information, particularly for error reporting. A common example is the 'TTL expired' message sent by a router when a packet's Time-to-Live counter reaches zero, often used by traceroute.</p> Signup and view all the answers

How does the traceroute tool use ICMP messages to map the route to a destination?

<p>Traceroute sends a series of packets with increasing TTL values. Each router along the path decrements the TTL and sends back an ICMP 'TTL expired' message when the TTL reaches zero. By analyzing these messages, traceroute identifies the routers and their IP addresses along the path.</p> Signup and view all the answers

What are the key improvements in IPv6 compared to IPv4, particularly concerning addressing capabilities?

<p>IPv6 increases the IP address size from 32 bits to 128 bits, providing a much larger address space. It also introduces the anycast address, which allows a datagram to be delivered to any one host from a group of hosts.</p> Signup and view all the answers

Describe the 'dual-stack' approach to transitioning from IPv4 to IPv6.

<p>The dual-stack approach involves IPv6 nodes also having a complete IPv4 implementation, allowing them to send and receive both IPv4 and IPv6 datagrams. This allows for interoperability with IPv4-only nodes during the transition period.</p> Signup and view all the answers

Explain the concept of 'tunneling' as a method for IPv6 nodes to communicate over an IPv4 network.

<p>Tunneling encapsulates an entire IPv6 datagram within the data field of an IPv4 datagram. The IPv4 packet is addressed to the destination IPv6 node. The intervening IPv4 routers forward the IPv4 packet through what is referred to as a tunnel. At the tunnel exit, the IPv4 header is removed and the IPv6 packet is routed to its destination.</p> Signup and view all the answers

What is the role of a routing algorithm in a network, and what is its primary objective?

<p>A routing algorithm determines the best paths for data packets to travel from source to destination through a network of routers. Its primary objective is to find a 'good' path that is efficient and reliable.</p> Signup and view all the answers

Explain the difference between a 'source router' and a 'destination router' in the context of routing algorithms.

<p>The source router is the default router for the sending host, where the packet initially enters the network's routing infrastructure. The destination router is the default router for the receiving host, where the packet exits the routing infrastructure.</p> Signup and view all the answers

Differentiate between global and decentralized routing algorithms.

<p>Global routing algorithms have complete knowledge of the network's topology and link costs, computing least-cost paths centrally. Decentralized algorithms operate iteratively and distributedly, with nodes exchanging information with neighbors to gradually determine the least-cost paths.</p> Signup and view all the answers

Explain the difference between static and dynamic routing algorithms.

<p>Static routing algorithms have routes that change slowly over time, often requiring manual intervention. Dynamic routing algorithms adjust routes in response to network traffic loads or topology changes, adapting automatically to changing conditions.</p> Signup and view all the answers

Describe the main operating principle of the Link-State (LS) routing algorithm.

<p>In LS routing, each node broadcasts link-state packets to all other nodes, providing a complete and identical view of the network topology. Each node then independently runs an algorithm (like Dijkstra's) to compute the least-cost paths from itself to every other node.</p> Signup and view all the answers

Describe the main operating principle of the Distance-Vector (DV) routing algorithm.

<p>In DV routing, each node maintains a distance vector of estimated costs to all other nodes and exchanges this vector with its direct neighbors. Each node then updates its distance vector based on the information received, iteratively improving its path estimates.</p> Signup and view all the answers

Explain the 'count-to-infinity' problem in Distance-Vector routing and how 'poisoned reverse' can help mitigate it.

<p>The count-to-infinity problem occurs when a link cost increases, and nodes iteratively update their distance vectors, resulting in inflated cost estimates propagating slowly through the network. Poisoned reverse involves a node advertising an infinite cost to a destination to its neighbor if it uses that neighbor to reach that destination, preventing loops.</p> Signup and view all the answers

Discuss the two main reasons for hierarchical routing in large networks like the Internet.

<p>The two key reasons are scale, as the overhead of maintaining and distributing routing information becomes prohibitive in a flat network, and administrative autonomy, allowing organizations to manage their networks independently.</p> Signup and view all the answers

Flashcards

Transport Layer

Provides process-to-process communication, relying on the network layer for host-to-host service. A piece exists in every host and router.

Network layer in host

Takes segments, encapsulates them into datagrams (network-layer packets), and sends them to a nearby router.

Network layer at receiving host

Receives datagrams, extracts segments, and delivers them to the transport layer.

Routers

Forward datagrams from input links to output links; do not run application and transport-layer protocols.

Signup and view all the flashcards

Role of the Network Layer

Moves packets from a sending host to a receiving host.

Signup and view all the flashcards

Forwarding

When a packet arrives at a router's input link, the router must move the packet to the appropriate output link.

Signup and view all the flashcards

Routing

The network layer decides the route that packets take from sender to receiver.

Signup and view all the flashcards

Routing Algorithms

Algorithms that calculate the paths packets take.

Signup and view all the flashcards

Forwarding Table

A table used by routers to forward packets by examining a field in the arriving packets header.

Signup and view all the flashcards

Guaranteed Delivery

Service guarantees packet will eventually arrive at its destination.

Signup and view all the flashcards

Guaranteed Delivery with Bounded Delay

Guarantees packet delivery within a specified host-to-host delay bound.

Signup and view all the flashcards

In-order Packet Delivery

Guarantees that packets arrive in the order they were sent

Signup and view all the flashcards

Guaranteed Minimal Bandwidth

Network-layer service emulates the behavior of a transmission link of a specified bit rate.

Signup and view all the flashcards

Guaranteed Maximum Jitter

Guarantees the time between packet transmissions at sender equals the time between their receipt.

Signup and view all the flashcards

Security Services

The source host encrypts the payloads of all datagrams being sent.

Signup and view all the flashcards

Best-effort service

Network layer provides a single service, known as this

Signup and view all the flashcards

ATM Network Architecture

Provides multiple service models, meaning different connections can be provided with different classes of service

Signup and view all the flashcards

Constant bit rate (CBR) ATM Network Service

Goal is to provide a flow of packets with a virtual pipe whose properties are the same as a dedicated bandwidth link.

Signup and view all the flashcards

Available bit rate (ABR) ATM Network Service

Offers a service, might be characterized as being a slightly better-than-best-effort service.

Signup and view all the flashcards

Virtual-circuit(VC) networks

Computer networks that provide only a connection service at the network layer.

Signup and view all the flashcards

Datagram Networks

Computer networks that provide only a connectionless service at the network layer.

Signup and view all the flashcards

Virtual Circuits (VCs)

Network-layer connections in virtual-circuit networks

Signup and view all the flashcards

VC network's routers

Maintains connection state information for ongoing connections where a new connection entry must be added to the router's forwarding table

Signup and view all the flashcards

VC Setup

The sending transport layer contacts the network layer, specifies the receiver's address, and waits for the network to set up the VC.

Signup and view all the flashcards

Data Transfer

Packets can begin to flow along the VC.

Signup and view all the flashcards

VC Teardown

The sender or receiver informs the network layer of its desire to terminate the VC.

Signup and view all the flashcards

Datagram network

Each time an end system wants to send a packet, it stamps the packet with the address of the destination end system and then pops the packet into the network.

Signup and view all the flashcards

Prefix Matching

With this style of forwarding table, the router matches a prefix of the packet's destination address with the entries in the table

Signup and view all the flashcards

Longest Prefix Matching

Router uses the longest matching rule; it finds the longest matching entry in the table

Signup and view all the flashcards

Input Ports role

An input port performs terminating physical link at the router, link-layer functions, and the lookup function.

Signup and view all the flashcards

Forwarding Table

Determines the router output port to which an arriving packet will be forwarded via the switching fabric.

Signup and view all the flashcards

Switching Fabric

Connects the router's input ports to its output ports; completely contained within the router.

Signup and view all the flashcards

Output Ports

Stores packets and transmits them by performing the necessary link-layer and physical-layer functions.

Signup and view all the flashcards

Routing Processor

Executes the routing protocols, maintains routing tables and attached link state information, and computes the forwarding table for the router.

Signup and view all the flashcards

Input Port's Line Termination Function

Implement the physical and link layers for individual input link.

Signup and view all the flashcards

Switching Fabric

Packets are actually switched from input port to an output port

Signup and view all the flashcards

Output Port Processing

Packets are stored in the output port's memory then transmitted over the output link.

Signup and view all the flashcards

Input Port Queuing

If the switch fabric is not fast enough, packet queuing can also occur at the input ports.

Signup and view all the flashcards

Internet's Network Layer

The first component is the IP protocol.

Signup and view all the flashcards

Study Notes

  • These notes cover the network layer, including introduction, virtual circuit and datagram networks, the inside of a router, the Internet Protocol (IP), and routing algorithms like Link State (LS), Distance Vector (DV), and Hierarchical Routing.
  • It highlights how the transport layer relies on the network layer for host-to-host communication.
  • The network layer, unlike transport and application layers, exists in every host and router, making it complex.

Introduction to the Network Layer

  • The network layer in a host encapsulates transport layer segments into datagrams.
  • Datagrams are sent to the nearest router and the roles of routers primarily involves forwarding datagrams from input links to output links.
  • Routers lack upper layers (application and transport) as they do not run those protocols.
  • The network layer's main job is to move packets from a sending host to a receiving host.
  • Forwarding occurs when a router moves a packet from an input link to the correct output link.
  • Routing involves determining the path packets take from sender to receiver with routing algorithms calculating the best routes.
  • Routers have forwarding tables.
  • Routers forward packets by examining a header value in the packet, using it to find the correct entry in the forwarding table.
  • The forwarding table entry shows the outgoing link interface for the packet's next hop.
  • Header values can indicate destination address or connection, depending on protocol.
  • Connection setup involves routers along a path handshaking to establish state before packets flow.

Network Service Models

  • The transport layer passes packets to the network layer, and the network layer offers services like:
    • Guaranteed delivery of packets.
    • Guaranteed delivery with bounded delay, ensuring delivery within a specified time.
    • In-order packet delivery with packets arriving in the order sent.
    • Guaranteed minimal bandwidth, emulating a transmission link with a set bit rate.
    • Guaranteed maximum jitter, ensuring consistent packet timing.
    • Security services using encryption and authentication with a shared key.
  • The Internet provides a best-effort service.
  • ATM offers multiple service models, including constant bit rate (CBR) and available bit rate (ABR).
    • CBR provides a virtual pipe with fixed bandwidth.
    • ABR offers a slightly better-than-best-effort service, providing feedback on congestion.

Virtual Circuit and Datagram Networks

  • The network layer provides connectionless or connection services between hosts.
  • Unlike transport layer services, network layer services are host-to-host while transport layer services are process-to-process.
  • Virtual-circuit (VC) networks provide a connection service, while datagram networks provide a connectionless service.
  • Virtual circuits (VCs) are network-layer connections which consist of:
    • Path: A series of links and routers between hosts.
    • VC numbers: One number for each link along the path.
    • Forwarding table entries: One for each router along the path.
  • Packets in a VC carry a VC number in their header, and routers replace this number at each link.
  • VC networks maintain connection state information, adding entries when connections are made and removing them when released.
  • Three phases in a VC:
    • VC Setup: Sender contacts network layer, specifies receiver, and sets up VC.
    • Data Transfer: Packets flow after the VC is set up.
    • VC Teardown: Sender or receiver ends the VC.
  • The network layer informs end systems of call termination and updates forwarding tables.
  • Signaling messages are used to initiate or terminate a VC.
  • Datagram networks stamp packets with the destination address and send them into the network.
  • Each router uses the destination address to forward the packet using a forwarding table.
  • Routers match a prefix of the packet's destination address to entries in the table.
  • If multiple matches are found, the longest prefix matching rule is used with forwarding to the associated link.
  • Forwarding tables in datagram networks can be modified, allowing packets to take different paths and arrive out of order.

Inside a Router

  • A router's architecture includes input ports, output ports, a switching fabric, and a routing processor.
  • Input ports perform physical and link layer functions, and importantly, the lookup function using a forwarding table.
  • The switching fabric connects input to output ports with it contained within the router.
  • Output ports store and transmit packets, performing link and physical layer functions.
  • The routing processor runs routing protocols, maintains routing tables, and computes the forwarding table.
  • Input ports, output ports, and the switching fabric implement the forwarding plane.
  • Control plane functions execute on the routing processor.
  • Input processing involves line termination, link-layer processing, and lookup to determine the output port.
  • The forwarding table is computed and updated with a shadow copy at each input port.

Switching Fabrics

  • Switching fabrics forward packets from input to output ports: • Switching via Memory: Early routers used direct CPU control, but it's limited. • Switching via a Bus: Input ports transfer packets to output ports over a shared bus (prepending an internal label), but only one packet can cross at a time. • Switching via an Interconnection Network: More sophisticated, like a crossbar switch with 2N buses connecting N input and output ports and controlled by a switch fabric controller.

Output Processing

  • Output port processing selects, de-queues, and transmits packets, performing link and physical-layer functions.
  • Packet queues form at input and output ports depending on traffic load, switching fabric speed, and line speed.
  • If queues grow too large, packet loss occurs.
  • Packet scheduling at the output port selects which packet to send, with options like first-come-first-served (FCFS) and quality-of-service guarantees.
  • Active queue management (AQM) algorithms drop or mark packets to manage congestion.

Input Port Queuing

  • Input port queuing occurs if the switch fabric isn't fast enough which results in head-of-the-line (HOL) blocking, where a packet is delayed because another packet ahead of it is blocked.

Internet Protocol (IP): Addressing and Forwarding

  • The Internet's network layer has three main parts: IP protocol, routing component, and error reporting.
  • Key fields in the IPv4 datagram include:
    • Version number: Indicates IP protocol version.
    • Header Length: Determines where data begins due to variable options.
    • Type of Service: Indicates how the network should handle the IP packet.
    • Datagram Length: Total length of the IP datagram.
    • Time-to-Live: Prevents datagrams from looping forever.
    • Protocol: Indicates the transport-layer protocol.
    • Header Checksum: Detects bit errors.
    • Source Address: Sender's IP address.
    • Destination Address: Receiver's IP address.
    • Options: Allows extending the IP header.
    • Data: Transport-layer segment.
  • IP datagram fragmentation divides data into smaller pieces for transmission, with each fragment reassembled at the destination with Identification, Flag, and Fragment offset fields which are in the datagram header.

IPv4 Addressing

  • Interfaces, not hosts/routers, have IP addresses.
  • Dotted-decimal notation is used to represent IP addresses (e.g., 193.32.216.9).
  • Each interface must have a globally unique IP address.
  • Interfaces connected to the same subnet share a common IP address prefix.
  • Addresses are assigned to subnets using notation like 223.1.1.0/24, where /24 indicates the subnet mask.
  • Classless Interdomain Routing (CIDR) is the Internet’s address assignment strategy.
  • CIDR uses a.b.c.d/x, where x is the number of bits in the prefix.
  • Older classful addressing used 8, 16, or 24-bit subnet addresses (class A, B, C).
  • 255.255.255.255 is the IP broadcast address.

Obtaining and Managing IP Addresses

  • Organizations obtain IP addresses from their ISP.
  • IP addresses are managed by the Internet Corporation for Assigned Names and Numbers (ICANN).
  • Dynamic Host Configuration Protocol (DHCP) dynamically assigns IP addresses and allows hosts to learn subnet mask, default gateway, and DNS server.
  • Steps in DHCP protocol:
    • DHCP server discovery done via a DHCP discover message broadcast to port 67.
    • DHCP server offer with a DHCP offer message announcing IP address to use and is broadcast to all nodes on the subnet.
    • DHCP request is a the client responds to a server offer message.
    • DHCP ACK confirms parameters after the new IP address is assigned for the duration of the lease time.

Network Address Translation

  • Network Address Translation (NAT) allows multiple devices to share a single public IP address by translating local IP addresses to a global IP address.

Internet Control Message Protocol (ICMP)

  • ICMP is used by hosts and routers to share network-layer information.
  • ICMP messages include type and code fields with some ICMP message types include: -Echo Reply (to ping) -Destination Network Unreachable -Source Quench (Congestion Control) -TTL Expired
  • The TTL expired message is used in traceroute to identify routers along a path and involves sending packets with increasing TTL values.

IPv6

  • IPv6 includes expanded address space (128 bits), streamlined 40-byte header, and flow labeling.
  • The size of the IP address increases from 32 to 128 bits.
  • IPv6 address guarantees the world won't run out of address.
  • The Version, Traffic Class, and Hop Limit fields are defined and used with Traffic Class is similar to IPv4 Type of Service.
  • Flow Label, Payload Length, Next Header, Source Address, and Destination Address also provide additional information.
  • Transitioning from IPv4 to IPv6 involves a dual-stack approach, or tunneling, where IPv6 packets are put inside IPv4 packets.
  • Routers in a tunnel route packets as they would any other datagram.

Routing Algorithms

  • A routing algorithm finds the best path for data packets.
  • The job routing is to find good paths from senders to receivers, through the network of routers.
  • Packets move through a sequence of routers from source to destination along determined paths.
  • Default routers forward packets and graphs represents various routing problems.
  • G = (N,E) defines nodes and edges and the nodes in the graph represent routers, the edges represent links.
  • The edges have weights to calculate the optimum path.
  • Least cost paths contain of nodes or routers through which the moving packet travel from source to destination with minimum cost.
  • Classification of Routing Algorithms considers global/decentralized, static/dynamic, load sensitive/load insensitive.

Types of Routing Algorithms

  • Global routing computes the least-cost path with complete network knowledge. • These types of algorithms are referred to as link-state algorithm
  • Decentralized routing uses iterative, distributed calculation. • These types of algorithms are referred to as distance vector (DV) algorithm.
  • Static algorithms route change slowly over time with manual configurations and manual editing of tables.
  • Dynamic routing adapts to network traffic or topology changes and can be run periodically or in response to changes.
  • Load-sensitive algorithms have link costs that reflect current congestion and tend to avoid congested routes.
  • Load-insensitive designs do not explicitly consider current congestion.
  • Finds the shortest path from a source to all other vertices.
  • Link-state algorithms use the network topology and link costs as input and accomplished by having each node complete a link-state broadcast algorithm.
  • Dijkstra's algorithm finds least-cost paths in iterations.
  • Definitions for Dijkstra's algorithm include:
    • D(v): Cost of the least-cost path from the source node to destination v as of this iteration of the algorithm.
    • P(v): Previous node (neighbor of v) along the current least-cost path from the source to v.
    • N': Subset of nodes. v is in N' if the least-cost path from the source to v is definitively known.
  • The cost to w is set to 5 since this is the cost of the direct (one hop) link from u to w.

Distance Vector (DV) Routing Algorithm

  • DV algorithm is iterative, asynchronous, and distributed.
  • Achieves distribution in which each node receives some information from one or more of its directly attached neighbors.
  • Iterative processes continue until no more information is exchanged between neighbors.
  • Asynchronous features do not require all of the nodes to operate in lockstep with each other.
  • Definition of d x (y): cost of the least-cost path from node x to node y.
  • Then the least costs are related by the celebrated Bellman-Ford (dx (y) = minv {c(x,v) + dv (y)}.
  • DV algorithm maintains information for each neighbor, including the cost from x to v and the distance vectors of each neighbor.
  • Processes include updates for routing tables from what is received in the various update messages from adjacent nodes.
  • Problems include the "count-to-infinity" problem, and updates will be slow if various hops continue incrementing what appears to be long distances in distance metrics.
  • Solutions include a method called "poisioned reverse" and will address the slow updates by assigning infinite loops to various hops and distance metrics.

Heirachical Routing

  • Network is a collection of interconnected routers.
  • One router was indistinguishable from another in the sense that all routers executed the same routing algorithm to compute routing paths through the entire network.
  • Scale: As the number of routers becomes large, the overhead involved in computing, storing, and communicating routing information becomes prohibitive.
  • Administrative Autonomous - ideally, an organization should be able to run and administer its network as it wishes, while still being able to connect its network to other outside networks.
  • These problems can be solved by organizing routers into autonomous systems (AS), with each AS consisting of a group of routers that are typically under the same administrative control.

Additional Routing Topics

  • Routers also run the same routing algorithm (for example, an LS or DV algorithm) and have information about each other.
  • AS routing protocol are the running computations within an autonomous system.
  • Intra and inter autonomous system routing configurations will perform tasks such as: obtaining reachability information from neighbouring ASs and propagating the reachability information to all routers internally.
  • Inter protocol tasks occur when router receives a datagram and it should forward packets to gateway routers.
  • Common Inter-AS routing options:
    • RIP: Routing Information Protocol
    • OSPF: Open Shortest Path First
    • IGRP: Interior Gateway Routing Protocol

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Computer 6
15 questions

Computer 6

SilentSeries avatar
SilentSeries
Network Layer Functions and Protocols Quiz
28 questions
Use Quizgecko on...
Browser
Browser