SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
s Routing s




                                                 Routing
                                                           (/udd/bcousin/ITI-Caire/Cours/1.Routing-eng.fm- 17 April 2002 14:38)


        PLAN
         • Introduction
         • Addressing
         • Routing
         • Conclusion

        Bibliography:
           • Cnristian Huitema, Routing in the Internet, Prentice Hall, 2000.




____
Bernard Cousin - © IFSIC - Université Rennes I                                                                              1
s Routing s

 1. Introduction

        Routing is the most characteristic function of Network layer (ISO Layer 3):
             - enabling the forwarding of data packets from sender to destination(s)
             - through a network:
                 . hosts
                 . routers
                 . links
         • Data forwarding is the network function
           • Routing is a network management function, but essential
           • Addressing is one among numerous network management functions which is generally
            required to assure routing and forwarding




____
Bernard Cousin - © IFSIC - Université Rennes I                                             2
s Routing s

 2. Address

 2.1. Introduction

        Network layer uses address to identify network systems (hosts and routers).
         • IP forwarding process uses address to determine the next hop
         • Address criteria
             - address uniqueness
                . unique association between an address and a network system
             - address flexibility
                . address can identify many kinds of network entities (hosts, services, etc.)
             - address extensibility
                . addressing system must manage large(r) network

        Address characteristics:
            - address structure
            - address field semantic




____
Bernard Cousin - © IFSIC - Université Rennes I                                                  3
s Routing s

 2.2. Address structure

        Many different address structures exist:
            - structured/non-structured
                . structured: IP address = address class+netid+hostid
                . non-structured: Ethernet address (6 bytes number)
            - fixed/variable field: field length, field position in address
                . fixed: IP address length = 32 bits
                . variable: IP hostid = variable in length and position
            - hierarchical structure: address, fields, sub-fields, etc.




____
Bernard Cousin - © IFSIC - Université Rennes I                            4
s Routing s

 2.3. Address field semantic

        Many different semantics can be given to address fields:
            - none
                . simple identification number
            - functional
                . service identification
                . e.g.: multicast IP address = 224.0.0.9 (RIPv2 routers), TCP port number
            - geographic
                . system location
                . e.g.: national telephone prefix - 202 = Egypt

        st




____
Bernard Cousin - © IFSIC - Université Rennes I                                              5
s Routing s

 2.4. Address characteristics

        Address characteristics versus network functions:
         • Routing
                   hierarchical addresses with geographic semantic
           • Mobility
                   non geographic semantic
           • Broadcasting (multicasting)
                   non geographic semantic
           • Address density
               + unstructured address




____
Bernard Cousin - © IFSIC - Université Rennes I                        6
s Routing s

 2.5. One ISO address format

        s X.121 address format: public network for digital data transmission (80’s)

        Hierarchical addressing with geographic and functional semantics

        14/16 half bytes (DCB representation: one digit = 4 bits)
                              3             1        10                                 1 ou 2
                         Country        Network   Terminal local address              Extensions
                         DCC                N              NTN

        Reserved prefixes: 0=E.163 (telephone), 1=reserved, 8=F.69 (telex), 9=E.164 (ISDN)
         • DCC field (“data country code”)
             - e.g. US = [310-329], France = [208-212]
         • N field (“network code”): no more than 10 networks
             - e.g.: Transpac = (208)0
           • NTN field (“network terminal number”): 10 digits (optionally 12).
               - internal structure of NTN field is locally determined by network administrator
           • E.g.: 20 80 11 42 07 19 68


____
Bernard Cousin - © IFSIC - Université Rennes I                                                     7
s Routing s

 2.6. Internet address

        IPv4 address: fixed length of 32 bits.

        Hierarchical address of 2/3 fields:
             - (address class,) netid, hostid

        3 unicast address classes:
             - variable length and position of netid and hostid fields.
                                     31     24 23           16 15       87            0
                    A class           0 netid                    hostid
                    B class            10        netid                hostid               Eg : 146.84.32.07
                                                                                                B class, netid = 146.84, hostid = 32.07
                    C class            110               netid               hostid
                    D class            1110                      multicast
                                     11110                       reserved


        1 multicast address class:
             - station group identifier

        CIDR (Classless InterDomain Routing)
         • address classes A, B, C have been dropped
         • IP addresses are structured on a bit basis by:
____
Bernard Cousin - © IFSIC - Université Rennes I                                                                                            8
s Routing s

               - prefix address = netid + subnetid
               - suffix address = hostid
           • E.g.: 131.254.8.76 -- “Armor” team subnet of “IRISA” net: 131.254.8/22 + “pondichery”
            host: 76
           • free IP address exhaustion
           • IP address aggregation in routing tables

        IPv6 “new generation”:
          • new packet format
          • new address format
              - address length = 128 bits!
              - anycast type address (+ unicast type+ multicast type)




____
Bernard Cousin - © IFSIC - Université Rennes I                                                   9
s Routing s

 2.7. IEEE 802 address

        Local Network address (Medium Access Control layer): IEEE 802 standard
             - Ethernet, Token Ring, Token Bus, FDDI.

        Unstructured address

        2 formats:
                                 I/G U/L
          Long format                                                  Address number                   6 bytes
                                 I/G
          Short format                           Address number                         (rarely used)
                                                                  2 bytes
                 - I/G bit: individual or group address
                 - U/L bit: universal or local address

        Reserved address:
             - Broadcast = 0xFFFFFFFFFFFF

        Address allocation (by the network card manufacturers):
            - 3 first bytes: manufacturer identification number (Sun= 080020, 3COM= 02608C, etc.)
            - 3 last bytes: serial number of the network card

____
Bernard Cousin - © IFSIC - Université Rennes I                                                                    10
s Routing s

 2.8. Addressing

        Address processing
            - address allocation: uniqueness
                . network management
            - address decoding: efficiency
                . datagram forwarding

        Address allocation
         • Each entity (company, university, etc.) would like to manage its addressing without interfer-
          ence of outside constraints.
            - internal choices: topology, organizational, functional, political, etc.

        But
         • Addressing must be globally coordinated
            - to assure uniqueness and efficiency during datagram forwarding

         one (autonomous) address domain is attributed to each entity
         hierarchical structure of address + delegation

____
Bernard Cousin - © IFSIC - Université Rennes I                                                       11
s Routing s

 2.9. Address domain

    Each address domain is autonomously managed by an entity which acts as authority of the address
 domain.

        A hierarchical tree of address domain can be built.

        Each address domain authority knows:
             - the address set inside its address domain
             - the authority name of its upper address domain
             - the authority names of its address sub-domains (if they exist)
             - the address partitions which are relevant to these sub-domains

        Address domains are hierarchically mapped using prefixes and suffixes:
         • prefixes identify the address domain (its authority)
           • suffixes identify objects managed by the address domain
               - either a concrete object
               - or the authority of a sub-domain from which the object management have been delegated




____
Bernard Cousin - © IFSIC - Université Rennes I                                                       12
s Routing s

        Generic example:
               x∈{1*} -- X1 authority
                   x∈{1[0-2]*}-- Y1 authority
                        x∈{10*}-- Z2 authority
                        x∈{1[1-3]*}-- Z1 authority
                   x∈{1[4-9]*}-- Y2 authority
               x∈{2*} -- X2 authority
               x∈{[3-9]*]} -- X0 objects
                                                              X0                   authorities
                                                             X2               77            address domains
                             address length             X1

                                                       Y1 Y2                  2555
                                                                      2222
                                                 Z1     Z2 1400
                                                       104444
                                                 111
                                                              address space




        Concrete examples:
            - Telephone numbering
            - IP addressing
            - Internet name space (Domain Name System)

____
Bernard Cousin - © IFSIC - Université Rennes I                                                                13
s Routing s

 2.10. Conclusion

        Hierarchical address domain
         • unique address allocation: strict partition of sub-domain
         • efficient decoding: local processing using prefix knowledge

        Delegation
         • each network entity (national country, ISP, company, etc.) can choose its own addressing plan,
          with few coordination
         • length, semantic and location of (sub-)fields are very flexible and variable




____
Bernard Cousin - © IFSIC - Université Rennes I                                                        14
s Routing s

 3. Routing

 3.1. Introduction

     Main function of Network layer is to transmit data packets from sender to destination(s). Packet
 travels through a network based on routers.

     At each packet reception, router selects the next router where the packet has to be forwarded. The
 selected router is the next step on the (shortest) path to the destination.

        In each router, the selection is done based on
                 - packet header information
                     . address but also virtual channel identification, label, etc.
                 - routing table
                     . routing information: next step on the (shortest) path to destination




____
Bernard Cousin - © IFSIC - Université Rennes I                                                      15
s Routing s

 3.2. Routing functions

        Routing is built up of 2 functions:
             - Packet forwarding
             - Routing table update

        Packet forwarding processing phases:
             - Datagram reception and header processing
             - Routing table lookup using IP destination address
             - Datagram forwarding

        Routing table update
             - Network topology changes
                 . numerous station, router and link insertions or failures, anytime
                 . automatic management
             - routing table update protocol(s)
                 . routing messages

                  Routing table update protocol -- Routing protocol


____
Bernard Cousin - © IFSIC - Université Rennes I                                         16
s Routing s

 3.3. Packet forwardings

        Packet forwarding could be based on:
          • datagram forwarding
                 . forwarding is determined on a datagram by datagram basis.
          • virtual channel forwarding
                 . forwarding is determined by the Virtual Channel information.




____
Bernard Cousin - © IFSIC - Université Rennes I                                    17
s Routing s

 3.4. Datagram forwarding

    Each router has an updated routing table. For each destination, the routing table entry points to the
 next router.

        On packet reception, router performs:
             - destination address extraction from the packet header,
             - routing table lookup, and extraction of the next router address from the selected entry,
             - packet forwarding to the next router
                A                                         B                       C routing table
                                       @A - @F
            @A - @F                                                          G
                                                                                   destination      next      additional
                                    (a)          (b) @D - @G                      address          routeur   information
                                           C
                                     (d)         (e)                                    @A           @A          (a)
                                                                                       @G            @B         (b)
            @D - @G                                                                   ...
                                                                                        @F           @B          (c)
      D                                                                   F                                      (e)
                                                                                        @X           @E
                                                          E                             ...
                    datagram frowarding




____
Bernard Cousin - © IFSIC - Université Rennes I                                                                              18
s Routing s

 3.5. Datagram forwarding characteristics

        Datagram forwarding:
         • No connection phase, no disconnection phase
         • The number of entries in routing table is function of the number of destinations
         • Routing table is modified only on topological change
         • Next router is determined on a datagram basis:
             - Successive datagrams coming from the same sender going to the same destination could
               follow different paths
                 - Packet ordering are not assured

        Network example
         • IP: Internet protocol




____
Bernard Cousin - © IFSIC - Université Rennes I                                                  19
s Routing s

 3.6. Virtual channel

      Virtual channel (VC) links sender to destinations. Each VC segment (between 2 adjacent switches)
 is identified by a number (VCI : VC Identifier).

         On packet reception, switch performs:
              - VCI extraction from the packet header,
              - switching table lookup, and extraction of the output link and next VCI from the selected
                entry,
              - packet forwarding to the output link with the new VCI
              A                                         B                             C switching table
                            VCI=1          VCI=7                                  G             input                  output
                                   (a)        (b)                                      link             VCI   link         VCI
                                          C         VCI=4           VCI=6
                                                                                         (a)            1       (b)          7
                                    (d)       (e)                            VCI=1
              VCI=2                                         VCI=1                        (b)            1       (a)          1
                                                                                         (b)            2       (d)          1
                                                                                         (d)            1       (b)          2
     D                                                                       F
                                                                                          (d)            2       (b)         4
                                                                                         (e)            4       (d)          2
             VCI=1        before switching
             VCI=1        after switching                    E

____
Bernard Cousin - © IFSIC - Université Rennes I                                                                                   20
s Routing s

 3.7. Virtual Channel characteristics

        Virtual channel switching:
         • Routing equipment is called “switch”
         • VCI are allocated during connection phase. They are freed during disconnection phase.
         • Number of entries in switching table is function of the number of virtual channels using the
          switch.
             - VCI field could have short length
           • Switching table is modified, every time a new virtual channel is set
           • If the network topology is changed (link or router failure), many virtual channels could be
            incorrect.
           • During connection phase, a switch use routing table to determine the next link
           • Switching table is called “hard state” information
           • Packet ordering is naturally kept by virtual channel
           • All packets inside a virtual channel follow exactly the same route

        Network examples:
         • X25, frame relay, ATM, etc.


____
Bernard Cousin - © IFSIC - Université Rennes I                                                       21
s Routing s

 3.8. Routing types

        Routing table update!

        t Two types of routing:
         • Static routing
             - no routing modification without human intervention
         • Adaptive routing (dynamic, automatic):
             - automatic routing adaptations based on network topology modifications, or more rarely,
               network traffic variations




____
Bernard Cousin - © IFSIC - Université Rennes I                                                   22
s Routing s

 3.9. Routing algorithms
      • centralized:
          - routing data are processed in one central node
          - the central node is a single point of failure
          - all routing traffic goes to and comes from the central node: point of congestion
      • distributed:
          - routing data are processed in several nodes (generally all the routers).
          - routing data synchronization between routers is required
              . current solution: the same algorithm processes the same data on every router
              . theoretically true but practically impossible:
                          Internet routing instability (TTL, tolerant applications to instability, etc.)




____
Bernard Cousin - © IFSIC - Université Rennes I                                                              23
s Routing s

 3.10. Routing data
       • Routing data Location
          - local to routing node
              . immediate access to data but rough information
          - from distant node, transmitted to routing node
              . message transmission delay: data incoherence.
       • Routing data Type
          - topology information
              . link or node existence, link or path nominal bandwidth, economic cost, etc.
                          the most frequently used type of routing data
                 - traffic information
                     . link or path available bandwidth, link or path delay, link or path error rate, buffer occu-
                      pancy, etc.
                          Traffic Engineering
                 - application requirements
                    . data flow QoS (bandwidth, delay, jitter, error rate, economic cost, etc.)
                      .  Connection Access Control

____
Bernard Cousin - © IFSIC - Université Rennes I                                                                 24
s Routing s

 3.11. Main properties of routing algorithms

        t Accuracy

        t Fault tolerance

        t Stability

        t Fairness

        t Efficiency

        t Complexity

                   Good routing algorithm is a trade-off between all these properties.
        Routes must fulfill:
             - application requirements (individual criterion)
             - optimum network resources management (global criterion).




____
Bernard Cousin - © IFSIC - Université Rennes I                                            25
s Routing s

 3.12. Multiple paths routing

     t The shortest path notion is based on evaluation criterion (generically called metric, or distance,
 or cost):
           - geographic distance, hop count, throughput, delay, error rate, financial cost, etc.
           - separate criteria could lead to opposite routes
           - several routing tables could be used to take into account the different routes from different
              criteria.

        t Several routes to the same destination:
            - each routing table entry could have a list of next routers
            - route with exactly the same cost
                . load balancing
            - second choice route
                . alternate route in case of failure




____
Bernard Cousin - © IFSIC - Université Rennes I                                                         26
s Routing s

 3.13. Shortest path first algorithm

        Centralized algorithms
             - positive valuated graphs [Dijkstra (1959), Moore (1957)],
             - matrix representation [Floyd],
         • Determination of shortest paths from a node to every node
             - to build a tree whose root is the initial node
             - to append the link which connects a new node and which has the shortest path

                              A           6       D                                          6       D
                                                           4                        A                         6
                                      2           12                                     2           12
                                     B                                 I                B                                 I
                                              8            3                                                  3
                                                                                                 8
                                       3          F                        2                 3       F                        3
                                                       1       E                                          1       E
                                      C            2                   2       G         C            2                   2       G
                                              6        3       5           4                                      5
                                                                                                 6        3                   4
                                                       H           J                                      H           J
                                     initial graph                                       shortest path tree from root A




____
Bernard Cousin - © IFSIC - Université Rennes I                                                                                        27
s Routing s

 3.14. Some simple routings
         - No routing table!
         - Use few or none local information!

 3.14.1 Broadcasting by flooding
       • received packet are sent to all output links but its input link
           - simple, robust, fast (find all routes hence the shortest),
           - heavy overload
           - multiple occurrence of the same packets in cyclic graph
           - example: path explorer of Source Routing

 3.14.2 Random routing
       • random selection of the next links
           - selective flooding
           - simple, same inconveniences as flooding, less of overload than flooding
           - but random performance.




____
Bernard Cousin - © IFSIC - Université Rennes I                                       28
s Routing s

 3.14.3 Hot potatoes [Baran, 1964]
       • next link selection based on minimum delay:
               . e.g. buffer occupancy.
           - local optimum /= route (global) optimum.

 3.14.4 Backward learning
       • Route learning uses information extracted from data packets.
          - sender address in the data packet header

                   sender could be reached using the input link (backward)
           • no overhead traffic: no routing message
           • but inference information is not stable
           • information lifetime is limited
           • example: Transparent bridging




____
Bernard Cousin - © IFSIC - Université Rennes I                                29
s Routing s

 3.15. Distance vector algorithm

        t Adaptive and distributed routing

        Synthetic routing data transmission between neighbor routers.

        Principle:
             - every node knows all its neighbors,
             - every node sends periodically routing message with a list of all shortest path destinations
                 . routing message is a distance vector where every entry is a distance to a destination
             - On routing message reception, router learns new destinations or shortest routes.

        Example:
            - Internet RIP (“Routing information protocol”)

        Simple routing, limited scalability, mono-criterion (“hop-count”).




____
Bernard Cousin - © IFSIC - Université Rennes I                                                           30
s Routing s

 3.16. Link state algorithm

        t Adaptive and distributed routing

        Two phases protocol:
         • topological data broadcasting between all routers
         • local processing of routes using topological knowledge.

        Principle:
             - Broadcasting of all the local links and neighbors:
                 . all routers get the same view of the current network topology
             - local processing of routes from the router to all destinations:
                 . e.g.: Shortest path first algorithm
                 . several routes to the same destination, using several criteria, could be processed

        Examples:
            - OSPF: Open Shortest Path First (Internet), IS-IS (ISO)




____
Bernard Cousin - © IFSIC - Université Rennes I                                                          31
s Routing s

 3.17. Scalability

        Routers have to process thousands packets per second

        Datagram forwarding optimization:
         • fast hardware
         • algorithm complexity depends of the routing table size
             - search algorithm complexity: n log(n)
             - n: number of destinations inside the network -- some billions!

        Solutions:
         • Aggregation
         • Hierarchy




____
Bernard Cousin - © IFSIC - Université Rennes I                                   32
s Routing s

 3.18. Aggregation
       • Subnetworking
           - every host with same address prefix belongs to the same subnet (“netid”)
           - e.g.: any host on a Ethernet LAN could belong to the same subnet
                                                     Internet

                                                                194.10.0.7                              194.10.0.7
                                                 194.10.0.1                                194.10.0.1
                                                                     Ethernet
                                                                                         subnet 194.10.0.0/24
                                             194.10.0.8           194.10.0.9          194.10.0.8       194.10.0.9
                                                       194.10.0.6                               194.10.0.6

           • CIDR (“Classless Inter Domain Routing”)
              - extension of the previous concept
              - one routing table entry for all host destinations with consecutive IP addresses and same
                next router
                  . european prefix: 194.0.0.0/7 = [194.0.0.0, 195.255.255.255]




____
Bernard Cousin - © IFSIC - Université Rennes I                                                                       33
s Routing s

 3.19. Hierarchical routing

        2 (main) hierarchical routing levels:
          • Interior Gateway Protocol
              - routing data are transmitted between routers inside a routing domain
              - every router inside a routing domain knows the route to reach every destinations inside the
                 same domain
              - Interior routers process IP addresses
              - e.g.: RIP, OSPF, etc.
              - routing domain == “autonomous (routing) system”
           • Exterior Gateway Protocol
              - routing data are transmitted between backbone routers
              - backbone routers use generic informations: #A.S.
              - e.g.: BGP, EIGP, etc.




____
Bernard Cousin - © IFSIC - Université Rennes I                                                          34
s Routing s




   autonomous system 2                      backbone                     backbone



          host                                                              EGP


                 IGP

                                                 IGP
             router

    autonomous system 1              autonomous system 3




        Note: some protocols have a supplementary routing level
                 - “routing area”: routing sub-domain
                     . e.g. OSPF




____
Bernard Cousin - © IFSIC - Université Rennes I                                      35
s Routing s

 4. Conclusion
     • Routing
         - Routing: Network layer essential
         - Addressing: complementary function
     • Packet forwarding
         - Datagram forwarding
         - Virtual Channel
     • Routing table
         - routing table update
         - routing table update protocols
         - routing messages
     • Routing protocols
         - flooding
         - Distance vector algorithm
         - Link state algorithm.




____
Bernard Cousin - © IFSIC - Université Rennes I                 36

Weitere ähnliche Inhalte

Was ist angesagt?

Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgEric Vanderburg
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6cyberjoex
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer AnamikaSinha57
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questionsSrikanth
 
Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernetMapYourTech
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame formatmyrajendra
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Computer networking
Computer networkingComputer networking
Computer networkingChinmoy Jena
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Data communication assignment 1
Data communication assignment 1Data communication assignment 1
Data communication assignment 1MdAbdullahAlShahed
 

Was ist angesagt? (18)

Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
instructor ppt_chapter8.2.2 - i_pv6 addressing with exercises of IPv6
 
CCNA
CCNACCNA
CCNA
 
CCNA question and answer
CCNA question and answer   CCNA question and answer
CCNA question and answer
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
Glimpse of carrier ethernet
Glimpse of carrier ethernetGlimpse of carrier ethernet
Glimpse of carrier ethernet
 
CCNA
CCNACCNA
CCNA
 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
 
Ip addressing3
Ip addressing3Ip addressing3
Ip addressing3
 
IPocalypse
IPocalypseIPocalypse
IPocalypse
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
internet services
internet servicesinternet services
internet services
 
Data communication assignment 1
Data communication assignment 1Data communication assignment 1
Data communication assignment 1
 

Ähnlich wie Routing and Addressing Fundamentals

Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxEric Vyncke
 
IPv6 The Big Move
IPv6 The Big MoveIPv6 The Big Move
IPv6 The Big Movefrenildand
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Summary networking
Summary networkingSummary networking
Summary networkingmugavanest01
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxsayidkhalif
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxDESTROYER39
 
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSProf Ansari
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/Rathodpradip1
 
IPv4-ADDRESSING.pptx
IPv4-ADDRESSING.pptxIPv4-ADDRESSING.pptx
IPv4-ADDRESSING.pptxmicayaseloisa
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4praveenps17
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptJayaprasanna4
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptxFidaBaloch8
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptxNOOR69810
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfPeterOwenje1
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerRubal Sagwal
 

Ähnlich wie Routing and Addressing Fundamentals (20)

Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
IPv6 The Big Move
IPv6 The Big MoveIPv6 The Big Move
IPv6 The Big Move
 
Networking
NetworkingNetworking
Networking
 
Summary networking
Summary networkingSummary networking
Summary networking
 
Routing of netwok protocls and how .pptx
Routing of netwok protocls and how .pptxRouting of netwok protocls and how .pptx
Routing of netwok protocls and how .pptx
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
Index
IndexIndex
Index
 
Index
IndexIndex
Index
 
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPSSYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
SYSTEM NETWORK ADMINISTRATIONS GOALS and TIPS
 
https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/https://diplomasolutionstudents.blogspot.com/
https://diplomasolutionstudents.blogspot.com/
 
IPv4-ADDRESSING.pptx
IPv4-ADDRESSING.pptxIPv4-ADDRESSING.pptx
IPv4-ADDRESSING.pptx
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
Icnd210 s07l02
Icnd210 s07l02Icnd210 s07l02
Icnd210 s07l02
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.pptIDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
IDC lectureA - Network Layer & IP Addressing with Cisco Notes.ppt
 
network-addressing.pptx
network-addressing.pptxnetwork-addressing.pptx
network-addressing.pptx
 
CCN CEP.pptx
CCN CEP.pptxCCN CEP.pptx
CCN CEP.pptx
 
IT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdfIT Networks and Vulnarabilities .pdf
IT Networks and Vulnarabilities .pdf
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
CCNA Icnd110 s01l04
CCNA Icnd110 s01l04CCNA Icnd110 s01l04
CCNA Icnd110 s01l04
 

Mehr von Balaji Ravi

Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Balaji Ravi
 
forgot_administrator_password.htm
forgot_administrator_password.htmforgot_administrator_password.htm
forgot_administrator_password.htmBalaji Ravi
 
lost-xp-password.html
lost-xp-password.htmllost-xp-password.html
lost-xp-password.htmlBalaji Ravi
 
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008Balaji Ravi
 
Practical-LDAP-and-Linux
Practical-LDAP-and-LinuxPractical-LDAP-and-Linux
Practical-LDAP-and-LinuxBalaji Ravi
 
L03-ajc-C-arrays
L03-ajc-C-arraysL03-ajc-C-arrays
L03-ajc-C-arraysBalaji Ravi
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revisedBalaji Ravi
 
Virtualizing_Exchange2003
Virtualizing_Exchange2003Virtualizing_Exchange2003
Virtualizing_Exchange2003Balaji Ravi
 

Mehr von Balaji Ravi (17)

Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007Quest_Software_Best_Practices_for_Exchange_2007
Quest_Software_Best_Practices_for_Exchange_2007
 
forgot_administrator_password.htm
forgot_administrator_password.htmforgot_administrator_password.htm
forgot_administrator_password.htm
 
lost-xp-password.html
lost-xp-password.htmllost-xp-password.html
lost-xp-password.html
 
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008
Upgrading_and_Migrating_to_Exchange_Server_2007_and_Windows_2008
 
Practical-LDAP-and-Linux
Practical-LDAP-and-LinuxPractical-LDAP-and-Linux
Practical-LDAP-and-Linux
 
b
bb
b
 
bldef_ap.htm
bldef_ap.htmbldef_ap.htm
bldef_ap.htm
 
exch2003
exch2003exch2003
exch2003
 
L03-ajc-C-arrays
L03-ajc-C-arraysL03-ajc-C-arrays
L03-ajc-C-arrays
 
10307021
1030702110307021
10307021
 
show.php.htm
show.php.htmshow.php.htm
show.php.htm
 
182
182182
182
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revised
 
a
aa
a
 
cryptography
cryptographycryptography
cryptography
 
Virtualizing_Exchange2003
Virtualizing_Exchange2003Virtualizing_Exchange2003
Virtualizing_Exchange2003
 
Balaji
BalajiBalaji
Balaji
 

Routing and Addressing Fundamentals

  • 1. s Routing s Routing (/udd/bcousin/ITI-Caire/Cours/1.Routing-eng.fm- 17 April 2002 14:38) PLAN • Introduction • Addressing • Routing • Conclusion Bibliography: • Cnristian Huitema, Routing in the Internet, Prentice Hall, 2000. ____ Bernard Cousin - © IFSIC - Université Rennes I 1
  • 2. s Routing s 1. Introduction Routing is the most characteristic function of Network layer (ISO Layer 3): - enabling the forwarding of data packets from sender to destination(s) - through a network: . hosts . routers . links • Data forwarding is the network function • Routing is a network management function, but essential • Addressing is one among numerous network management functions which is generally required to assure routing and forwarding ____ Bernard Cousin - © IFSIC - Université Rennes I 2
  • 3. s Routing s 2. Address 2.1. Introduction Network layer uses address to identify network systems (hosts and routers). • IP forwarding process uses address to determine the next hop • Address criteria - address uniqueness . unique association between an address and a network system - address flexibility . address can identify many kinds of network entities (hosts, services, etc.) - address extensibility . addressing system must manage large(r) network Address characteristics: - address structure - address field semantic ____ Bernard Cousin - © IFSIC - Université Rennes I 3
  • 4. s Routing s 2.2. Address structure Many different address structures exist: - structured/non-structured . structured: IP address = address class+netid+hostid . non-structured: Ethernet address (6 bytes number) - fixed/variable field: field length, field position in address . fixed: IP address length = 32 bits . variable: IP hostid = variable in length and position - hierarchical structure: address, fields, sub-fields, etc. ____ Bernard Cousin - © IFSIC - Université Rennes I 4
  • 5. s Routing s 2.3. Address field semantic Many different semantics can be given to address fields: - none . simple identification number - functional . service identification . e.g.: multicast IP address = 224.0.0.9 (RIPv2 routers), TCP port number - geographic . system location . e.g.: national telephone prefix - 202 = Egypt st ____ Bernard Cousin - © IFSIC - Université Rennes I 5
  • 6. s Routing s 2.4. Address characteristics Address characteristics versus network functions: • Routing hierarchical addresses with geographic semantic • Mobility non geographic semantic • Broadcasting (multicasting) non geographic semantic • Address density + unstructured address ____ Bernard Cousin - © IFSIC - Université Rennes I 6
  • 7. s Routing s 2.5. One ISO address format s X.121 address format: public network for digital data transmission (80’s) Hierarchical addressing with geographic and functional semantics 14/16 half bytes (DCB representation: one digit = 4 bits) 3 1 10 1 ou 2 Country Network Terminal local address Extensions DCC N NTN Reserved prefixes: 0=E.163 (telephone), 1=reserved, 8=F.69 (telex), 9=E.164 (ISDN) • DCC field (“data country code”) - e.g. US = [310-329], France = [208-212] • N field (“network code”): no more than 10 networks - e.g.: Transpac = (208)0 • NTN field (“network terminal number”): 10 digits (optionally 12). - internal structure of NTN field is locally determined by network administrator • E.g.: 20 80 11 42 07 19 68 ____ Bernard Cousin - © IFSIC - Université Rennes I 7
  • 8. s Routing s 2.6. Internet address IPv4 address: fixed length of 32 bits. Hierarchical address of 2/3 fields: - (address class,) netid, hostid 3 unicast address classes: - variable length and position of netid and hostid fields. 31 24 23 16 15 87 0 A class 0 netid hostid B class 10 netid hostid Eg : 146.84.32.07 B class, netid = 146.84, hostid = 32.07 C class 110 netid hostid D class 1110 multicast 11110 reserved 1 multicast address class: - station group identifier CIDR (Classless InterDomain Routing) • address classes A, B, C have been dropped • IP addresses are structured on a bit basis by: ____ Bernard Cousin - © IFSIC - Université Rennes I 8
  • 9. s Routing s - prefix address = netid + subnetid - suffix address = hostid • E.g.: 131.254.8.76 -- “Armor” team subnet of “IRISA” net: 131.254.8/22 + “pondichery” host: 76 • free IP address exhaustion • IP address aggregation in routing tables IPv6 “new generation”: • new packet format • new address format - address length = 128 bits! - anycast type address (+ unicast type+ multicast type) ____ Bernard Cousin - © IFSIC - Université Rennes I 9
  • 10. s Routing s 2.7. IEEE 802 address Local Network address (Medium Access Control layer): IEEE 802 standard - Ethernet, Token Ring, Token Bus, FDDI. Unstructured address 2 formats: I/G U/L Long format Address number 6 bytes I/G Short format Address number (rarely used) 2 bytes - I/G bit: individual or group address - U/L bit: universal or local address Reserved address: - Broadcast = 0xFFFFFFFFFFFF Address allocation (by the network card manufacturers): - 3 first bytes: manufacturer identification number (Sun= 080020, 3COM= 02608C, etc.) - 3 last bytes: serial number of the network card ____ Bernard Cousin - © IFSIC - Université Rennes I 10
  • 11. s Routing s 2.8. Addressing Address processing - address allocation: uniqueness . network management - address decoding: efficiency . datagram forwarding Address allocation • Each entity (company, university, etc.) would like to manage its addressing without interfer- ence of outside constraints. - internal choices: topology, organizational, functional, political, etc. But • Addressing must be globally coordinated - to assure uniqueness and efficiency during datagram forwarding one (autonomous) address domain is attributed to each entity hierarchical structure of address + delegation ____ Bernard Cousin - © IFSIC - Université Rennes I 11
  • 12. s Routing s 2.9. Address domain Each address domain is autonomously managed by an entity which acts as authority of the address domain. A hierarchical tree of address domain can be built. Each address domain authority knows: - the address set inside its address domain - the authority name of its upper address domain - the authority names of its address sub-domains (if they exist) - the address partitions which are relevant to these sub-domains Address domains are hierarchically mapped using prefixes and suffixes: • prefixes identify the address domain (its authority) • suffixes identify objects managed by the address domain - either a concrete object - or the authority of a sub-domain from which the object management have been delegated ____ Bernard Cousin - © IFSIC - Université Rennes I 12
  • 13. s Routing s Generic example: x∈{1*} -- X1 authority x∈{1[0-2]*}-- Y1 authority x∈{10*}-- Z2 authority x∈{1[1-3]*}-- Z1 authority x∈{1[4-9]*}-- Y2 authority x∈{2*} -- X2 authority x∈{[3-9]*]} -- X0 objects X0 authorities X2 77 address domains address length X1 Y1 Y2 2555 2222 Z1 Z2 1400 104444 111 address space Concrete examples: - Telephone numbering - IP addressing - Internet name space (Domain Name System) ____ Bernard Cousin - © IFSIC - Université Rennes I 13
  • 14. s Routing s 2.10. Conclusion Hierarchical address domain • unique address allocation: strict partition of sub-domain • efficient decoding: local processing using prefix knowledge Delegation • each network entity (national country, ISP, company, etc.) can choose its own addressing plan, with few coordination • length, semantic and location of (sub-)fields are very flexible and variable ____ Bernard Cousin - © IFSIC - Université Rennes I 14
  • 15. s Routing s 3. Routing 3.1. Introduction Main function of Network layer is to transmit data packets from sender to destination(s). Packet travels through a network based on routers. At each packet reception, router selects the next router where the packet has to be forwarded. The selected router is the next step on the (shortest) path to the destination. In each router, the selection is done based on - packet header information . address but also virtual channel identification, label, etc. - routing table . routing information: next step on the (shortest) path to destination ____ Bernard Cousin - © IFSIC - Université Rennes I 15
  • 16. s Routing s 3.2. Routing functions Routing is built up of 2 functions: - Packet forwarding - Routing table update Packet forwarding processing phases: - Datagram reception and header processing - Routing table lookup using IP destination address - Datagram forwarding Routing table update - Network topology changes . numerous station, router and link insertions or failures, anytime . automatic management - routing table update protocol(s) . routing messages Routing table update protocol -- Routing protocol ____ Bernard Cousin - © IFSIC - Université Rennes I 16
  • 17. s Routing s 3.3. Packet forwardings Packet forwarding could be based on: • datagram forwarding . forwarding is determined on a datagram by datagram basis. • virtual channel forwarding . forwarding is determined by the Virtual Channel information. ____ Bernard Cousin - © IFSIC - Université Rennes I 17
  • 18. s Routing s 3.4. Datagram forwarding Each router has an updated routing table. For each destination, the routing table entry points to the next router. On packet reception, router performs: - destination address extraction from the packet header, - routing table lookup, and extraction of the next router address from the selected entry, - packet forwarding to the next router A B C routing table @A - @F @A - @F G destination next additional (a) (b) @D - @G address routeur information C (d) (e) @A @A (a) @G @B (b) @D - @G ... @F @B (c) D F (e) @X @E E ... datagram frowarding ____ Bernard Cousin - © IFSIC - Université Rennes I 18
  • 19. s Routing s 3.5. Datagram forwarding characteristics Datagram forwarding: • No connection phase, no disconnection phase • The number of entries in routing table is function of the number of destinations • Routing table is modified only on topological change • Next router is determined on a datagram basis: - Successive datagrams coming from the same sender going to the same destination could follow different paths - Packet ordering are not assured Network example • IP: Internet protocol ____ Bernard Cousin - © IFSIC - Université Rennes I 19
  • 20. s Routing s 3.6. Virtual channel Virtual channel (VC) links sender to destinations. Each VC segment (between 2 adjacent switches) is identified by a number (VCI : VC Identifier). On packet reception, switch performs: - VCI extraction from the packet header, - switching table lookup, and extraction of the output link and next VCI from the selected entry, - packet forwarding to the output link with the new VCI A B C switching table VCI=1 VCI=7 G input output (a) (b) link VCI link VCI C VCI=4 VCI=6 (a) 1 (b) 7 (d) (e) VCI=1 VCI=2 VCI=1 (b) 1 (a) 1 (b) 2 (d) 1 (d) 1 (b) 2 D F (d) 2 (b) 4 (e) 4 (d) 2 VCI=1 before switching VCI=1 after switching E ____ Bernard Cousin - © IFSIC - Université Rennes I 20
  • 21. s Routing s 3.7. Virtual Channel characteristics Virtual channel switching: • Routing equipment is called “switch” • VCI are allocated during connection phase. They are freed during disconnection phase. • Number of entries in switching table is function of the number of virtual channels using the switch. - VCI field could have short length • Switching table is modified, every time a new virtual channel is set • If the network topology is changed (link or router failure), many virtual channels could be incorrect. • During connection phase, a switch use routing table to determine the next link • Switching table is called “hard state” information • Packet ordering is naturally kept by virtual channel • All packets inside a virtual channel follow exactly the same route Network examples: • X25, frame relay, ATM, etc. ____ Bernard Cousin - © IFSIC - Université Rennes I 21
  • 22. s Routing s 3.8. Routing types Routing table update! t Two types of routing: • Static routing - no routing modification without human intervention • Adaptive routing (dynamic, automatic): - automatic routing adaptations based on network topology modifications, or more rarely, network traffic variations ____ Bernard Cousin - © IFSIC - Université Rennes I 22
  • 23. s Routing s 3.9. Routing algorithms • centralized: - routing data are processed in one central node - the central node is a single point of failure - all routing traffic goes to and comes from the central node: point of congestion • distributed: - routing data are processed in several nodes (generally all the routers). - routing data synchronization between routers is required . current solution: the same algorithm processes the same data on every router . theoretically true but practically impossible: Internet routing instability (TTL, tolerant applications to instability, etc.) ____ Bernard Cousin - © IFSIC - Université Rennes I 23
  • 24. s Routing s 3.10. Routing data • Routing data Location - local to routing node . immediate access to data but rough information - from distant node, transmitted to routing node . message transmission delay: data incoherence. • Routing data Type - topology information . link or node existence, link or path nominal bandwidth, economic cost, etc. the most frequently used type of routing data - traffic information . link or path available bandwidth, link or path delay, link or path error rate, buffer occu- pancy, etc. Traffic Engineering - application requirements . data flow QoS (bandwidth, delay, jitter, error rate, economic cost, etc.) . Connection Access Control ____ Bernard Cousin - © IFSIC - Université Rennes I 24
  • 25. s Routing s 3.11. Main properties of routing algorithms t Accuracy t Fault tolerance t Stability t Fairness t Efficiency t Complexity Good routing algorithm is a trade-off between all these properties. Routes must fulfill: - application requirements (individual criterion) - optimum network resources management (global criterion). ____ Bernard Cousin - © IFSIC - Université Rennes I 25
  • 26. s Routing s 3.12. Multiple paths routing t The shortest path notion is based on evaluation criterion (generically called metric, or distance, or cost): - geographic distance, hop count, throughput, delay, error rate, financial cost, etc. - separate criteria could lead to opposite routes - several routing tables could be used to take into account the different routes from different criteria. t Several routes to the same destination: - each routing table entry could have a list of next routers - route with exactly the same cost . load balancing - second choice route . alternate route in case of failure ____ Bernard Cousin - © IFSIC - Université Rennes I 26
  • 27. s Routing s 3.13. Shortest path first algorithm Centralized algorithms - positive valuated graphs [Dijkstra (1959), Moore (1957)], - matrix representation [Floyd], • Determination of shortest paths from a node to every node - to build a tree whose root is the initial node - to append the link which connects a new node and which has the shortest path A 6 D 6 D 4 A 6 2 12 2 12 B I B I 8 3 3 8 3 F 2 3 F 3 1 E 1 E C 2 2 G C 2 2 G 6 3 5 4 5 6 3 4 H J H J initial graph shortest path tree from root A ____ Bernard Cousin - © IFSIC - Université Rennes I 27
  • 28. s Routing s 3.14. Some simple routings - No routing table! - Use few or none local information! 3.14.1 Broadcasting by flooding • received packet are sent to all output links but its input link - simple, robust, fast (find all routes hence the shortest), - heavy overload - multiple occurrence of the same packets in cyclic graph - example: path explorer of Source Routing 3.14.2 Random routing • random selection of the next links - selective flooding - simple, same inconveniences as flooding, less of overload than flooding - but random performance. ____ Bernard Cousin - © IFSIC - Université Rennes I 28
  • 29. s Routing s 3.14.3 Hot potatoes [Baran, 1964] • next link selection based on minimum delay: . e.g. buffer occupancy. - local optimum /= route (global) optimum. 3.14.4 Backward learning • Route learning uses information extracted from data packets. - sender address in the data packet header sender could be reached using the input link (backward) • no overhead traffic: no routing message • but inference information is not stable • information lifetime is limited • example: Transparent bridging ____ Bernard Cousin - © IFSIC - Université Rennes I 29
  • 30. s Routing s 3.15. Distance vector algorithm t Adaptive and distributed routing Synthetic routing data transmission between neighbor routers. Principle: - every node knows all its neighbors, - every node sends periodically routing message with a list of all shortest path destinations . routing message is a distance vector where every entry is a distance to a destination - On routing message reception, router learns new destinations or shortest routes. Example: - Internet RIP (“Routing information protocol”) Simple routing, limited scalability, mono-criterion (“hop-count”). ____ Bernard Cousin - © IFSIC - Université Rennes I 30
  • 31. s Routing s 3.16. Link state algorithm t Adaptive and distributed routing Two phases protocol: • topological data broadcasting between all routers • local processing of routes using topological knowledge. Principle: - Broadcasting of all the local links and neighbors: . all routers get the same view of the current network topology - local processing of routes from the router to all destinations: . e.g.: Shortest path first algorithm . several routes to the same destination, using several criteria, could be processed Examples: - OSPF: Open Shortest Path First (Internet), IS-IS (ISO) ____ Bernard Cousin - © IFSIC - Université Rennes I 31
  • 32. s Routing s 3.17. Scalability Routers have to process thousands packets per second Datagram forwarding optimization: • fast hardware • algorithm complexity depends of the routing table size - search algorithm complexity: n log(n) - n: number of destinations inside the network -- some billions! Solutions: • Aggregation • Hierarchy ____ Bernard Cousin - © IFSIC - Université Rennes I 32
  • 33. s Routing s 3.18. Aggregation • Subnetworking - every host with same address prefix belongs to the same subnet (“netid”) - e.g.: any host on a Ethernet LAN could belong to the same subnet Internet 194.10.0.7 194.10.0.7 194.10.0.1 194.10.0.1 Ethernet subnet 194.10.0.0/24 194.10.0.8 194.10.0.9 194.10.0.8 194.10.0.9 194.10.0.6 194.10.0.6 • CIDR (“Classless Inter Domain Routing”) - extension of the previous concept - one routing table entry for all host destinations with consecutive IP addresses and same next router . european prefix: 194.0.0.0/7 = [194.0.0.0, 195.255.255.255] ____ Bernard Cousin - © IFSIC - Université Rennes I 33
  • 34. s Routing s 3.19. Hierarchical routing 2 (main) hierarchical routing levels: • Interior Gateway Protocol - routing data are transmitted between routers inside a routing domain - every router inside a routing domain knows the route to reach every destinations inside the same domain - Interior routers process IP addresses - e.g.: RIP, OSPF, etc. - routing domain == “autonomous (routing) system” • Exterior Gateway Protocol - routing data are transmitted between backbone routers - backbone routers use generic informations: #A.S. - e.g.: BGP, EIGP, etc. ____ Bernard Cousin - © IFSIC - Université Rennes I 34
  • 35. s Routing s autonomous system 2 backbone backbone host EGP IGP IGP router autonomous system 1 autonomous system 3 Note: some protocols have a supplementary routing level - “routing area”: routing sub-domain . e.g. OSPF ____ Bernard Cousin - © IFSIC - Université Rennes I 35
  • 36. s Routing s 4. Conclusion • Routing - Routing: Network layer essential - Addressing: complementary function • Packet forwarding - Datagram forwarding - Virtual Channel • Routing table - routing table update - routing table update protocols - routing messages • Routing protocols - flooding - Distance vector algorithm - Link state algorithm. ____ Bernard Cousin - © IFSIC - Université Rennes I 36