Network Layer: Delivery, Forwarding, and Routing
Network Layer: Delivery, Forwarding, and Routing
Delivery
The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct versus Indirect Delivery
Computer Networks
22-2
Forwarding
Forwarding means to place the packet in its route to its destination. Forwarding requires a host or a router to have a routing table Forwarding techniques to make the size of the routing table manageable
Next-hop method versus route method Network-specific method versus host-specific method Default method
Computer Networks
22-3
Forwarding Techniques
Route method versus next-hop method
Computer Networks
22-4
Forwarding Techniques
Host specific versus network-specific method
Default method
Computer Networks
22-5
Forwarding Process
In classless addressing, we need at least four columns in a routing table
Computer Networks
22-6
Example
Make a routing table for router R1, using the configuration in Figure
Computer Networks
22-7
Example
Routing table for router R1
Forwarding process for the destination address 180.70.65.140 ? Forwarding process for the destination address 18.24.32.78 ?
Computer Networks
22-8
Address Aggregation
Classless addressing increases the number of routing table entries To alleviate the problem, the address aggregation is used
Computer Networks
22-9
Computer Networks
22-10
Hierarchical Routing
To solve the problem of gigantic routing tables
Computer Networks
22-11
Routing Table
Static routing table: created manually Dynamic routing table: updated periodically by using one of the dynamic routing protocols such as RIP, OSPF, or BGP Common fields in a routing table
Flag: U(up), G(gateway), H(host-specific), D(added by redirection), M(modified by redirection) Reference count: number of users of this route at the moment Use: the number of packets transmitted through this router for the corresponding destination
Computer Networks
22-12
Utilities
To find the routing information and the contents of a routing table netstat and ifconfig
Computer Networks
22-13
Routing Protocols
A router consults a routing table when a packet is ready to be forwarded The routing table specifies the optimum path for the packet: static or dynamic Internet needs dynamic routing tables to be updated as soon as there is a change Routing protocols is a combination of rules and procedures for dynamic routing tables The routing protocols also include procedures for combining information received from other routers Unicast routing and multicasting routing RIP (Routing Information Protocol), OSPF (Open Shortest Path First), BGP (Border Gateway Protocol)
Computer Networks
22-14
Optimization
Which of the available pathways is the optimum pathway ? One approach is to assign a cost for passing through a network, called metric Total metric is equal to the sum of the metrics of networks that comprise the route Router chooses the route with shortest (smallest) metric RIP (Routing Information Protocol): hop count OSPF (Open Shortest Path First): allows administrator to assign a cost based on the type of service required BGP (Border Gateway Protocol): criterion is the policy
Computer Networks
22-15
Computer Networks
22-16
Computer Networks
22-17
Computer Networks
22-18
Computer Networks
22-19
Computer Networks
22-20
Computer Networks
22-21
When to Share
Periodic update: A node sends its routing table, normally every 30 s Triggered update: Anode sends its two-column routing table to its neighbors anytime there is a change in its routing table Two-node instability
Computer Networks
22-22
Two-Node Instability
Defining infinity: To redefine infinity to a smaller number, such as 100 Split horizon: Instead of flooding the table through each interface, each node sends only part of its table through each interface. Node B eliminates the last line of its routing table before it sends it to A Split horizon and poison reverse: Node B can still advertise the value for X, but if the source of information is A, it can replace the distance with infinity as a warning: Do not use this value, what I know about this route comes from you.
Computer Networks
22-23
Three-Node Instability
If the instability is between three nodes, stability cannot be guaranteed.
Computer Networks
22-24
Computer Networks
22-25
Computer Networks
22-26
Computer Networks
22-27
Computer Networks
22-28
Creation of LSP
LSP contains node identity, the list of links (to make the topology), sequence number (to facilitate flooding and distinguish new LSPs from old ones LSPs are generated (1) when there is a change in the topology of the domain, (2) on a periodic basis, normally 60 min or 2 h
Computer Networks
22-29
Computer Networks
22-30
Dijkstra Algorithm
Computer Networks
22-31
Computer Networks
22-32
Routing Table
Each node uses the shortest path tree protocol to construct its routing table The routing table shows the cost of reaching each node from the root
Computer Networks
22-33
Popular intradomain routing protocol based on link state routing To handle routing efficiently and in a timely manner, OSPF divides an autonomous system into area Area is a collection of network, hosts, and routers all contained within an AS AS can also be divided into many different areas Area border gateway, backbone router, virtual link
Computer Networks
22-34
Metric
The OSPF allows the administrator to assign a cost, called the metric, to each route The metric can be based on a type of service (minimum delay, maximum throughput, and so on)
Types of Links
Computer Networks
22-35
Point-to-Point Link
To connect two routers without any other host or router in between
Transient Link
A network with several routers attached to it
Computer Networks
22-36
Stub Link
Stub link is a network that is connected to only one router
Virtual Link
Virtual link created for broken link by administrator
Computer Networks
22-37
Computer Networks
22-38
Computer Networks
22-39
Computer Networks
22-40
Computer Networks
22-41
Path attribute
Well-know attribute
Well-known mandatory attribute:
ORIGIN (source of the routing information) AS_PATH (the list of ASs) NEXT-HOP(the next router)
Optional attribute
Computer Networks
22-42
BGP Sessions
A session is a connection between BGP routers for the exchange of router information To create a reliable environment, BGP uses the services of TCP as semipermanent connections External and internal BGP
E-BGP sessions: used to exchange information between two speaker nodes belonging to two different ASs I-BGP sessions: used to exchange information between two routers inside an AS
Computer Networks
22-43
Unicasting
In unicasting, the router forwards the received packet through only one of its interfaces
Computer Networks
22-44
Multicasting
In multicast routing, the router may forward the received packet through several of its interfaces. Broadcasting is a special case of multicasting
Computer Networks
22-45
Computer Networks
22-46
Multicasting Applications
Access to distributed databases Information dissemination Dissemination of news Teleconferencing Distance learning
Computer Networks
22-47
Multicast tree
Objectives of multicasting:
Every member of the group should receive one, and only one, copy of the multicast packet. Nonmember must not receive a copy
There must be no loops in routing The path traveled from source to each destination must be optimal
In a source-based tree approach, the combination of source and group determines the tree (DVMRP, MOSPF, PIM-DM) In the group-shared tree approach, the group determines the tree (CBT, PIM-SM)
Computer Networks
22-48
Multicast Routing
Optimal routing: Shortest path trees Unicast Routing
Each router in the domain has a table that defines a shortest path tree to possible destinations
Computer Networks
22-49
Source-Based Tree and Group-Shared Tree In the source-based tree approach, each router needs to have one shortest path tree for each group
Computer Networks
22-50
Computer Networks
22-51
Multicast Protocols
Computer Networks
22-52
Computer Networks
22-53
Flooding Reverse Path Forwarding (RPF) Reverse Path Broadcasting (RPB) Reverse Path Multicasting (RPM)
Computer Networks
22-54
DVMRP: Strategies
Flooding broadcasts packets, but creates loops in the systems Reverse path forwarding: RPF eliminates the loop in the flooding process
Computer Networks
22-55
DVMRP: Strategies
Reverse path broadcasting: RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy of the packet Problem with RPF
Computer Networks
22-56
DVMRP: Strategies
Reverse path multicasting: RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes
Computer Networks
22-57
Computer Networks
22-58
Computer Networks
22-59
Computer Networks
22-60
MBONE
To enable multicasting, we make a multicast backbone (MBONE) out of isolated routers, using of the concept of tunneling
Computer Networks
22-61
Logical Tunneling
A logical tunnel is established by encapsulating the multicast packet inside a unicast packet The multicast packet becomes the payload (data) of the unicast packet So far the only protocol supporting MBONE and tunneling is DVMRP
Computer Networks
22-62