SlideShare ist ein Scribd-Unternehmen logo
1 von 37
William Stallings
Data and Computer
Communications
7th Edition

Chapter 12
Routing
Routing in Circuit Switched
Network
• Many connections will need paths through more
  than one switch
• Need to find a route
  —Efficiency
  —Resilience
• Public telephone switches are a tree structure
  —Static routing uses the same approach all the time
• Dynamic routing allows for changes in routing
  depending on traffic
  —Uses a peer structure for nodes
Alternate Routing
•   Possible routes between end offices predefined
•   Originating switch selects appropriate route
•   Routes listed in preference order
•   Different sets of routes may be used at different
    times
Alternate
Routing
Diagram
Routing in Packet Switched
Network
• Complex, crucial aspect of packet switched
  networks
• Characteristics required
  —Correctness
  —Simplicity
  —Robustness
  —Stability
  —Fairness
  —Optimality
  —Efficiency
Performance Criteria
• Used for selection of route
• Minimum hop
• Least cost
  —See Stallings appendix 10A for routing algorithms
Example Packet Switched
Network
Decision Time and Place
• Time
  —Packet or virtual circuit basis
• Place
  —Distributed
     • Made by each node
  —Centralized
  —Source
Network Information Source
and Update Timing
• Routing decisions usually based on knowledge of
  network (not always)
• Distributed routing
   — Nodes use local knowledge
   — May collect info from adjacent nodes
   — May collect info from all nodes on a potential route
• Central routing
   — Collect info from all nodes
• Update timing
   — When is network info held by nodes updated
   — Fixed - never updated
   — Adaptive - regular updates
Routing Strategies
•   Fixed
•   Flooding
•   Random
•   Adaptive
Fixed Routing
• Single permanent route for each source to
  destination pair
• Determine routes using a least cost algorithm
  (appendix 10A)
• Route fixed, at least until a change in network
  topology
Fixed Routing
Tables
Flooding
• No network info required
• Packet sent by node to every neighbor
• Incoming packets retransmitted on every link except
  incoming link
• Eventually a number of copies will arrive at destination
• Each packet is uniquely numbered so duplicates can be
  discarded
• Nodes can remember packets already forwarded to
  keep network load in bounds
• Can include a hop count in packets
Flooding
Example
Properties of Flooding
• All possible routes are tried
   —Very robust
• At least one packet will have taken minimum
  hop count route
   —Can be used to set up virtual circuit
• All nodes are visited
   —Useful to distribute information (e.g. routing)
Random Routing
• Node selects one outgoing path for
  retransmission of incoming packet
• Selection can be random or round robin
• Can select outgoing path based on probability
  calculation
• No network info needed
• Route is typically not least cost nor minimum
  hop
Adaptive Routing
• Used by almost all packet switching networks
• Routing decisions change as conditions on the network
  change
    — Failure
    — Congestion
•   Requires info about network
•   Decisions more complex
•   Tradeoff between quality of network info and overhead
•   Reacting too quickly can cause oscillation
•   Too slowly to be relevant
Adaptive Routing - Advantages
• Improved performance
• Aid congestion control (See chapter 13)
• Complex system
  —May not realize theoretical benefits
Classification
• Based on information sources
  —Local (isolated)
     • Route to outgoing link with shortest queue
     • Can include bias for each destination
     • Rarely used - do not make use of easily available info
  —Adjacent nodes
  —All nodes
Isolated Adaptive Routing
ARPANET Routing Strategies(1)
• First Generation
   —1969
  —Distributed adaptive
  —Estimated delay as performance criterion
  —Bellman-Ford algorithm (appendix 10a)
  —Node exchanges delay vector with neighbors
  —Update routing table based on incoming info
  —Doesn't consider line speed, just queue length
  —Queue length not a good measurement of delay
  —Responds slowly to congestion
ARPANET Routing Strategies(2)
• Second Generation
  —1979
  —Uses delay as performance criterion
  —Delay measured directly
  —Uses Dijkstra’s algorithm (appendix 10a)
  —Good under light and medium loads
  —Under heavy loads, little correlation between reported
   delays and those experienced
ARPANET Routing Strategies(3)
• Third Generation
  —1987
  —Link cost calculations changed
  —Measure average delay over last 10 seconds
  —Normalize based on current value and previous
   results
Least Cost Algorithms
• Basis for routing decisions
   — Can minimize hop with each link cost 1
   — Can have link value inversely proportional to capacity
• Given network of nodes connected by bi-directional links
• Each link has a cost in each direction
• Define cost of path between two nodes as sum of costs
  of links traversed
• For each pair of nodes, find a path with the least cost
• Link costs in different directions may be different
   — E.g. length of packet queue
Dijkstra’s Algorithm Definitions
• Find shortest paths from given source node to all other
  nodes, by developing paths in order of increasing path
  length
• N = set of nodes in the network
• s = source node
• T = set of nodes so far incorporated by the algorithm
• w(i, j) =  link cost from node i to node j
   — w(i, i) = 0
   — w(i, j) = ∞ if the two nodes are not directly connected
   — w(i, j) ≥ 0 if the two nodes are directly connected
• L(n) = cost of least-cost path from node s to node n
  currently known
   — At termination, L(n) is cost of least-cost path from s to n
Dijkstra’s Algorithm Method
• Step 1 [Initialization]
    — T = {s} Set of nodes so far incorporated consists of only source node
    — L(n) = w(s, n) for n ≠ s
    — Initial path costs to neighboring nodes are simply link costs
• Step 2 [Get Next Node]
    — Find neighboring node not in T with least-cost path from s
    — Incorporate node into T
    — Also incorporate the edge that is incident on that node and a node in T
      that contributes to the path
• Step 3 [Update Least-Cost Paths]
    — L(n) = min[L(n), L(x) + w(x, n)] for all n ∉ T
    — If latter term is minimum, path from s to n is path from s to x
      concatenated with edge from x to n
• Algorithm terminates when all nodes have been added to T
Dijkstra’s Algorithm Notes
• At termination, value L(x) associated with each
  node x is cost (length) of least-cost path from s
  to x.
• In addition, T defines least-cost path from s to
  each other node
• One iteration of steps 2 and 3 adds one new
  node to T
   —Defines least cost path from s tothat node
Example of Dijkstra’s Algorithm
Results of Example
       Dijkstra’s Algorithm
 Ite      T        L(2)   Path   L(3)    Path     L(4)   Path   L(5)   Path    L(6    Path
rat                                                                             )
ion
  1      {1}        2     1–2     5       1-3      1     1–4    ∞        -     ∞        -


 2      {1,4}       2     1–2     4      1-4-3     1     1–4     2     1-4–5   ∞        -


 3     {1, 2, 4}    2     1–2     4      1-4-3     1     1–4     2     1-4–5   ∞        -


 4     {1, 2, 4,    2     1–2     3     1-4-5–3    1     1–4     2     1-4–5   4     1-4-5–6
          5}

 5     {1, 2, 3,    2     1–2     3     1-4-5–3    1     1–4     2     1-4–5   4     1-4-5–6
         4, 5}

 6     {1, 2, 3,    2     1-2     3     1-4-5-3    1     1-4     2     1-4–5   4     1-4-5-6
       4, 5, 6}
Bellman-Ford Algorithm
Definitions
• Find shortest paths from given node subject to
  constraint that paths contain at most one link
• Find the shortest paths with a constraint of paths of at
  most two links
• And so on 
• s = source node
• w(i, j) = link cost from node i to node j
   — w(i, i) = 0
   — w(i, j) = ∞ if the two nodes are not directly connected
   — w(i, j) ≥ 0 if the two nodes are directly connected
• h = maximum number of links in path at current stage of
  the algorithm
• Lh(n) = cost of least-cost path from s to n under
  constraint of no more than h links
Bellman-Ford Algorithm Method
• Step 1 [Initialization]
   — L0(n) = ∞, for all n ≠ s
   — Lh(s) = 0, for all h
• Step 2 [Update]
• For each successive h ≥ 0
   — For each n ≠ s, compute
   — Lh+1(n)=minj[Lh(j)+w(j,n)]
• Connect n with predecessor node j that achieves
  minimum
• Eliminate any connection of n with different predecessor
  node formed during an earlier iteration
• Path from s to n terminates with link from j to n
Bellman-Ford Algorithm Notes
• For each iteration of step 2 with h=K and for
  each destination node n, algorithm compares
  paths from s to n of length K=1 with path from
  previous iteration
• If previous path shorter it is retained
• Otherwise new path is defined
Example of Bellman-Ford
Algorithm
Results of Bellman-Ford
 Example
h Lh(2) Pat   Lh(3) Path   Lh(4) Pat   Lh(5) Path   Lh(6) Path
        h                        h


0 ∞     -     ∞    -       ∞     -     ∞    -       ∞    -


1 2     1-2   5    1-3     1     1-4   ∞    -       ∞    -


2 2     1-2   4    1-4-3   1     1-4   2    1-4-5 10     1-3-6


3 2     1-2   3    1-4-5-3 1     1-4   2    1-4-5 4      1-4-5-6


4 2     1-2   3    1-4-5-3 1     1-4   2    1-4-5 4      1-4-5-6
Comparison
• Results from two algorithms agree
• Information gathered
   — Bellman-Ford
       • Calculation for node n involves knowledge of link cost to all
         neighboring nodes plus total cost to each neighbor from s
       • Each node can maintain set of costs and paths for every other node
       • Can exchange information with direct neighbors
       • Can update costs and paths based on information from neighbors
         and knowledge of link costs
   — Dijkstra
       • Each node needs complete topology
       • Must know link costs of all links in network
       • Must exchange information with all other nodes
Evaluation
• Dependent on processing time of algorithms
• Dependent on amount of information required
  from other nodes
• Implementation specific
• Both converge under static topology and costs
• Converge to same solution
• If link costs change, algorithms will attempt to
  catch up
• If link costs depend on traffic, which depends on
  routes chosen, then feedback
  —May result in instability
Required Reading
• Stalling Chapter 12
• Routing information from Comer D.
  Internetworking with TCP/IP Volume 1, Prentice
  Hall, Upper Saddle River NJ.

Weitere ähnliche Inhalte

Was ist angesagt?

Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Ankush Mehta
 
Network Layer
Network LayerNetwork Layer
Network Layerreshmadayma
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...ijwmn
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Network Layer
Network LayerNetwork Layer
Network Layerreshmadayma
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer ScienceTransweb Global Inc
 

Was ist angesagt? (20)

Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols Performance Evaluation of Routing Protocols
Performance Evaluation of Routing Protocols
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...Design and implementation of low latency weighted round robin (ll wrr) schedu...
Design and implementation of low latency weighted round robin (ll wrr) schedu...
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Network layer - design Issues
Network layer - design IssuesNetwork layer - design Issues
Network layer - design Issues
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
 

Andere mochten auch

Frame relay
Frame relay Frame relay
Frame relay balub4
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not AppsNatasha Murashev
 

Andere mochten auch (7)

X.25 and frame relay
X.25 and frame relayX.25 and frame relay
X.25 and frame relay
 
X.25
X.25X.25
X.25
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Frame relay
Frame relay Frame relay
Frame relay
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Ähnlich wie 12 routing

routing 23.pptx
routing 23.pptxrouting 23.pptx
routing 23.pptxzulhelmanz
 
11 routing
11 routing11 routing
11 routingshefali84
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram  SnehiRouting and IP in Advance Computer Network,Vikram  Snehi
Routing and IP in Advance Computer Network,Vikram SnehiMR. VIKRAM SNEHI
 
Dc ch11 : routing in switched networks
Dc ch11 : routing in switched networksDc ch11 : routing in switched networks
Dc ch11 : routing in switched networksSyaiful Ahdan
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt21121A0594
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptanushaj46
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxHODElex
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5Gopi Saiteja
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iiiJAIGANESH SEKAR
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing AlgorithmKamal Acharya
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Mugabo4
 

Ähnlich wie 12 routing (20)

routing 23.pptx
routing 23.pptxrouting 23.pptx
routing 23.pptx
 
11 routing
11 routing11 routing
11 routing
 
Routing and IP in Advance Computer Network,Vikram Snehi
Routing and IP in Advance Computer Network,Vikram  SnehiRouting and IP in Advance Computer Network,Vikram  Snehi
Routing and IP in Advance Computer Network,Vikram Snehi
 
Dc ch11 : routing in switched networks
Dc ch11 : routing in switched networksDc ch11 : routing in switched networks
Dc ch11 : routing in switched networks
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
routing
routingrouting
routing
 
Routing
RoutingRouting
Routing
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 

KĂźrzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

KĂźrzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

12 routing

  • 1. William Stallings Data and Computer Communications 7th Edition Chapter 12 Routing
  • 2. Routing in Circuit Switched Network • Many connections will need paths through more than one switch • Need to find a route —Efficiency —Resilience • Public telephone switches are a tree structure —Static routing uses the same approach all the time • Dynamic routing allows for changes in routing depending on traffic —Uses a peer structure for nodes
  • 3. Alternate Routing • Possible routes between end offices predefined • Originating switch selects appropriate route • Routes listed in preference order • Different sets of routes may be used at different times
  • 5. Routing in Packet Switched Network • Complex, crucial aspect of packet switched networks • Characteristics required —Correctness —Simplicity —Robustness —Stability —Fairness —Optimality —Efficiency
  • 6. Performance Criteria • Used for selection of route • Minimum hop • Least cost —See Stallings appendix 10A for routing algorithms
  • 8. Decision Time and Place • Time —Packet or virtual circuit basis • Place —Distributed • Made by each node —Centralized —Source
  • 9. Network Information Source and Update Timing • Routing decisions usually based on knowledge of network (not always) • Distributed routing — Nodes use local knowledge — May collect info from adjacent nodes — May collect info from all nodes on a potential route • Central routing — Collect info from all nodes • Update timing — When is network info held by nodes updated — Fixed - never updated — Adaptive - regular updates
  • 10. Routing Strategies • Fixed • Flooding • Random • Adaptive
  • 11. Fixed Routing • Single permanent route for each source to destination pair • Determine routes using a least cost algorithm (appendix 10A) • Route fixed, at least until a change in network topology
  • 13. Flooding • No network info required • Packet sent by node to every neighbor • Incoming packets retransmitted on every link except incoming link • Eventually a number of copies will arrive at destination • Each packet is uniquely numbered so duplicates can be discarded • Nodes can remember packets already forwarded to keep network load in bounds • Can include a hop count in packets
  • 15. Properties of Flooding • All possible routes are tried —Very robust • At least one packet will have taken minimum hop count route —Can be used to set up virtual circuit • All nodes are visited —Useful to distribute information (e.g. routing)
  • 16. Random Routing • Node selects one outgoing path for retransmission of incoming packet • Selection can be random or round robin • Can select outgoing path based on probability calculation • No network info needed • Route is typically not least cost nor minimum hop
  • 17. Adaptive Routing • Used by almost all packet switching networks • Routing decisions change as conditions on the network change — Failure — Congestion • Requires info about network • Decisions more complex • Tradeoff between quality of network info and overhead • Reacting too quickly can cause oscillation • Too slowly to be relevant
  • 18. Adaptive Routing - Advantages • Improved performance • Aid congestion control (See chapter 13) • Complex system —May not realize theoretical benefits
  • 19. Classification • Based on information sources —Local (isolated) • Route to outgoing link with shortest queue • Can include bias for each destination • Rarely used - do not make use of easily available info —Adjacent nodes —All nodes
  • 21. ARPANET Routing Strategies(1) • First Generation —1969 —Distributed adaptive —Estimated delay as performance criterion —Bellman-Ford algorithm (appendix 10a) —Node exchanges delay vector with neighbors —Update routing table based on incoming info —Doesn't consider line speed, just queue length —Queue length not a good measurement of delay —Responds slowly to congestion
  • 22. ARPANET Routing Strategies(2) • Second Generation —1979 —Uses delay as performance criterion —Delay measured directly —Uses Dijkstra’s algorithm (appendix 10a) —Good under light and medium loads —Under heavy loads, little correlation between reported delays and those experienced
  • 23. ARPANET Routing Strategies(3) • Third Generation —1987 —Link cost calculations changed —Measure average delay over last 10 seconds —Normalize based on current value and previous results
  • 24. Least Cost Algorithms • Basis for routing decisions — Can minimize hop with each link cost 1 — Can have link value inversely proportional to capacity • Given network of nodes connected by bi-directional links • Each link has a cost in each direction • Define cost of path between two nodes as sum of costs of links traversed • For each pair of nodes, find a path with the least cost • Link costs in different directions may be different — E.g. length of packet queue
  • 25. Dijkstra’s Algorithm Definitions • Find shortest paths from given source node to all other nodes, by developing paths in order of increasing path length • N = set of nodes in the network • s = source node • T = set of nodes so far incorporated by the algorithm • w(i, j) = link cost from node i to node j — w(i, i) = 0 — w(i, j) = ∞ if the two nodes are not directly connected — w(i, j) ≥ 0 if the two nodes are directly connected • L(n) = cost of least-cost path from node s to node n currently known — At termination, L(n) is cost of least-cost path from s to n
  • 26. Dijkstra’s Algorithm Method • Step 1 [Initialization] — T = {s} Set of nodes so far incorporated consists of only source node — L(n) = w(s, n) for n ≠ s — Initial path costs to neighboring nodes are simply link costs • Step 2 [Get Next Node] — Find neighboring node not in T with least-cost path from s — Incorporate node into T — Also incorporate the edge that is incident on that node and a node in T that contributes to the path • Step 3 [Update Least-Cost Paths] — L(n) = min[L(n), L(x) + w(x, n)] for all n ∉ T — If latter term is minimum, path from s to n is path from s to x concatenated with edge from x to n • Algorithm terminates when all nodes have been added to T
  • 27. Dijkstra’s Algorithm Notes • At termination, value L(x) associated with each node x is cost (length) of least-cost path from s to x. • In addition, T defines least-cost path from s to each other node • One iteration of steps 2 and 3 adds one new node to T —Defines least cost path from s tothat node
  • 29. Results of Example Dijkstra’s Algorithm Ite T L(2) Path L(3) Path L(4) Path L(5) Path L(6 Path rat ) ion 1 {1} 2 1–2 5 1-3 1 1–4 ∞ - ∞ - 2 {1,4} 2 1–2 4 1-4-3 1 1–4 2 1-4–5 ∞ - 3 {1, 2, 4} 2 1–2 4 1-4-3 1 1–4 2 1-4–5 ∞ - 4 {1, 2, 4, 2 1–2 3 1-4-5–3 1 1–4 2 1-4–5 4 1-4-5–6 5} 5 {1, 2, 3, 2 1–2 3 1-4-5–3 1 1–4 2 1-4–5 4 1-4-5–6 4, 5} 6 {1, 2, 3, 2 1-2 3 1-4-5-3 1 1-4 2 1-4–5 4 1-4-5-6 4, 5, 6}
  • 30. Bellman-Ford Algorithm Definitions • Find shortest paths from given node subject to constraint that paths contain at most one link • Find the shortest paths with a constraint of paths of at most two links • And so on  • s = source node • w(i, j) = link cost from node i to node j — w(i, i) = 0 — w(i, j) = ∞ if the two nodes are not directly connected — w(i, j) ≥ 0 if the two nodes are directly connected • h = maximum number of links in path at current stage of the algorithm • Lh(n) = cost of least-cost path from s to n under constraint of no more than h links
  • 31. Bellman-Ford Algorithm Method • Step 1 [Initialization] — L0(n) = ∞, for all n ≠ s — Lh(s) = 0, for all h • Step 2 [Update] • For each successive h ≥ 0 — For each n ≠ s, compute — Lh+1(n)=minj[Lh(j)+w(j,n)] • Connect n with predecessor node j that achieves minimum • Eliminate any connection of n with different predecessor node formed during an earlier iteration • Path from s to n terminates with link from j to n
  • 32. Bellman-Ford Algorithm Notes • For each iteration of step 2 with h=K and for each destination node n, algorithm compares paths from s to n of length K=1 with path from previous iteration • If previous path shorter it is retained • Otherwise new path is defined
  • 34. Results of Bellman-Ford Example h Lh(2) Pat Lh(3) Path Lh(4) Pat Lh(5) Path Lh(6) Path h h 0 ∞ - ∞ - ∞ - ∞ - ∞ - 1 2 1-2 5 1-3 1 1-4 ∞ - ∞ - 2 2 1-2 4 1-4-3 1 1-4 2 1-4-5 10 1-3-6 3 2 1-2 3 1-4-5-3 1 1-4 2 1-4-5 4 1-4-5-6 4 2 1-2 3 1-4-5-3 1 1-4 2 1-4-5 4 1-4-5-6
  • 35. Comparison • Results from two algorithms agree • Information gathered — Bellman-Ford • Calculation for node n involves knowledge of link cost to all neighboring nodes plus total cost to each neighbor from s • Each node can maintain set of costs and paths for every other node • Can exchange information with direct neighbors • Can update costs and paths based on information from neighbors and knowledge of link costs — Dijkstra • Each node needs complete topology • Must know link costs of all links in network • Must exchange information with all other nodes
  • 36. Evaluation • Dependent on processing time of algorithms • Dependent on amount of information required from other nodes • Implementation specific • Both converge under static topology and costs • Converge to same solution • If link costs change, algorithms will attempt to catch up • If link costs depend on traffic, which depends on routes chosen, then feedback —May result in instability
  • 37. Required Reading • Stalling Chapter 12 • Routing information from Comer D. Internetworking with TCP/IP Volume 1, Prentice Hall, Upper Saddle River NJ.