SlideShare ist ein Scribd-Unternehmen logo
1 von 64
Network Layer: 
Delivery, Forwarding, and Routing 
21.1 Delivery 
21.2 Forwarding 
21.3 Unicast Routing Protocols 
21.4 Multicast Routing Protocols
Delivery 
• The network layer supervises the handling of the packets by the underlying 
physical networks. We define this handling as the delivery of a packet. 
Direct versus Indirect Delivery
Forwarding 
• Forwarding means to place the packet in its route to its 
destination. 
• Forwarding requires a host or a router to have a routing table
Forwarding techniques to make the size of the 
routing table manageable 
•Next-hop method versus route method 
•Network-specific method versus host-specific 
method 
•Default method
Forwarding Techniques 
1) Route method versus next-hop method :
Host –specific versus network-specific method
Default method
Forwarding Process 
• In classless addressing, we need at least four columns in a routing table
Example 
• Make a routing table for router R1, using the configuration in Figure
Example 
• Routing table for router R1 
• Forwarding process for the destination address 180.70.65.140 ? 
• Forwarding process for the destination address 18.24.32.78 ?
Address Aggregation 
• Classless addressing increases the number of routing table entries 
• To alleviate the problem, the address aggregation is used
Longest Mask Matching
Hierarchical Routing 
• To solve the problem of gigantic routing tables
RIP (Routing Information Protocol), OSPF (Open Shortest Path 
First), BGP (Border Gateway Protocol)
Intra domain : link state and distance vector 
Interdomain : path vector
Popular (Unicast) Routing Protocols
Distance Vector Routing
Distance Vector Routing: Initialization 
• At the beginning, each node can know only the distance between itself and its 
immediate neighbors
Distance Vector Routing: Sharing 
• In distance vector routing, each node shares its routing table (with first two cols) 
with its immediate neighbors periodically and when there is a change
Distance Vector Routing: Updating 
• When a node receives a two-column table from a neighbor, it 
need to update its routing table 
• Updating rule: 
– Choose the smaller cost. If the same, keep the old one 
– If the next-node entry is the same, the receiving node chooses the new row
Ccost+2
When to Share 
• Periodic update: A node sends its routing table, normally 
every 30 s 
• Triggered update: Anode sends its two-column routing table to 
its neighbors anytime there is a change in its routing table
Solutions for Instability
Three-Node Instability 
• If the instability is between three nodes, stability cannot be 
guaranteed.
RRoouuttiinngg IInnffoorrmmaattiioonn PPrroottooccooll
LLiinnkk SSttaattee RRoouuttiinngg 
• Each node has the entire topology of the domain- the list of nodes and links, how 
they are connected including type, cost, and condition of the links(up or down) 
• Node can use Dijkstra’s algorithm to build a routing table
LLiinnkk SSttaattee RRoouuttiinngg 
• Each node has partial knowledge: it know the state (type, condition, and cost) of its links. 
The whole topology can be compiled from the partial knowledge of each node
BBuuiillddiinngg RRoouuttiinngg TTaabbllee 
1. Creation of the states of the links by each node, called the link state packet 
(LSP) 
2. Dissemination of LSPs to every other router, called flooding, in an 
efficient and reliable way 
3. Formation of a shortest path tree for each node 
4. Calculation of a routing table based on the shortest path tree 
• Creation of LSP 
– LSP contains node identity, the list of links (to make the topology), 
sequence number (to facilitate flooding and distinguish new LSPs 
from old ones 
– LSPs are generated (1) when there is a change in the topology of the 
domain, (2) on a periodic basis, normally 60 min or 2 h
BBuuiillddiinngg RRoouuttiinngg TTaabbllee 
• Flooding of LSPs 
– The creating node sends a copy of the LSP out of each interface 
– A node compares it with the copy it may already have. If the newly 
arrived LSP is older than the one it has, it discards the LSP. If it is 
newer, 
1. It discards the old LSP and keeps the new one 
2. It sends a copy of it out of each interface except the one from which 
the packet arrived 
• Formation of shortest path tree: Dijkstra Algorithm 
– After receiving all LSPs, each node will have a copy of the whole 
topology. Need to find the shortest path to every other node 
– The Dijkstra algorithm creates a shortest path tree from a graph
DDiijjkkssttrraa AAllggoorriitthhmm
EExxaammppllee ooff DDiijjkkssttrraa AAllggoorriitthhmm
Open Shortest Path First (OSPF) 
• Popular intra domain routing protocol based on link state routing 
• To handle routing efficiently and in a timely manner, OSPF divides an autonomous 
system into area 
• Area is a collection of network, hosts, and routers all contained within an AS 
• AS can also be divided into many different areas
Metric 
• The OSPF allows the administrator to assign a cost, called the metric, to each route 
• The metric can be based on a type of service (minimum delay, maximum 
throughput, and so on) 
Types of Links
Point-to-Point Link 
• To connect two routers without any other host or router in between 
Transient Link 
• A network with several routers attached to it
Stub Link 
Virtual Link
Path Vector Routing 
• Distance vector routing is subject to instability if there are 
more than a few hops in the domain of operation 
• Link state routing needs a huge amount of resources to 
calculate routing tables. It also create heavy traffic because 
of flooding 
• Need for a third routing algorithm for interdomain routing, 
called path vector routing 
• Path vector routing is similar to distance vector routing 
• But, only speaker node (one node that acts on behalf of 
entire AS) creates a routing table and advertises it to speaker 
nodes in each AS in its neighbour. 
• A speaker node advertises the path, not the metric of nodes
Path Vector Routing: Initialization
Path Vector Routing: Sharing and Updating 
Sharing: Like distance vector routing, a speaker shares its 
table with immediate neighbors 
Updating: When a speaker receives a two-column table from 
a neighbor, it updates its own table 
• Loop prevention 
• Policy routing 
• Optimum path
Border Gateway Protocol (BGP) 
• Interdomain routing protocol using path vector routing 
• Types of autonomous systems (ASs) 
– Stub AS: only one connection to another AS. A stub AS is 
either a sink or source. 
– Multihomed AS: more than one connection to other ASs, 
– Transit AS: A multihomed AS that also allows transient 
traffic
Path attributes 
1. Well-known attribute 
Well-known mandatory attribute: that must appear in 
the description of a router. 
ORIGIN (source of the routing information) 
AS_PATH (the list of ASs) 
NEXT-HOP(the next router) 
Well-known discretionary attribute that not required 
in every update message. 
2. Optional attribute :
BGP Sessions 
• A session is a connection between BGP routers for the 
exchange of router information 
• To create a reliable environment, BGP uses the services of 
TCP as semipermanent connections 
• External and internal BGP 
– E-BGP sessions: used to exchange information between 
two speaker nodes belonging to two different ASs 
– I-BGP sessions: used to exchange information between two 
routers inside an AS

Weitere ähnliche Inhalte

Was ist angesagt?

Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Anshul gour
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer NetworksIIIT Manipur
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44Jisc
 

Was ist angesagt? (20)

Congestion control
Congestion controlCongestion control
Congestion control
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)Dijkstra & flooding ppt(Routing algorithm)
Dijkstra & flooding ppt(Routing algorithm)
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Ipv6
Ipv6Ipv6
Ipv6
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Transport layer
Transport layer Transport layer
Transport layer
 
HDLC
HDLCHDLC
HDLC
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 

Andere mochten auch

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmfarimoin
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding techniquerajib_
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagraminternetstreams
 
The Network Layer
The Network LayerThe Network Layer
The Network Layeradil raja
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1Hossam El-Deen Osama
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Dijkstra’S Algorithm
Dijkstra’S AlgorithmDijkstra’S Algorithm
Dijkstra’S Algorithmami_01
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing TechniquesTusharadri Sarkar
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slideslara_ays
 
Routing Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.pptRouting Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.pptumardanjumamaiwada
 

Andere mochten auch (20)

Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Routing
RoutingRouting
Routing
 
Routing
RoutingRouting
Routing
 
Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagram
 
Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
The Network Layer
The Network LayerThe Network Layer
The Network Layer
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
Ch 21
Ch 21Ch 21
Ch 21
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Dijkstra’S Algorithm
Dijkstra’S AlgorithmDijkstra’S Algorithm
Dijkstra’S Algorithm
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Evolution of Routing Techniques
Evolution of  Routing TechniquesEvolution of  Routing Techniques
Evolution of Routing Techniques
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slides
 
Routing Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.pptRouting Technique Table Type by Umar danjuma maiwada.ppt
Routing Technique Table Type by Umar danjuma maiwada.ppt
 

Ähnlich wie Routing protocols-network-layer

Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxHODElex
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iiiJAIGANESH SEKAR
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layerSendhil Kumar
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptanushaj46
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Mugabo4
 

Ähnlich wie Routing protocols-network-layer (20)

Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
computer communications
computer communicationscomputer communications
computer communications
 
Computer networks unit iii
Computer networks    unit iiiComputer networks    unit iii
Computer networks unit iii
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Ospf
OspfOspf
Ospf
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
computer Netwoks - network layer
computer Netwoks - network layercomputer Netwoks - network layer
computer Netwoks - network layer
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
routing
routingrouting
routing
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Chapter07
Chapter07Chapter07
Chapter07
 
Network layer
Network layerNetwork layer
Network layer
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
11 routing
11 routing11 routing
11 routing
 

Mehr von Nitesh Singh

Mehr von Nitesh Singh (20)

Risk taking and emotions
Risk taking and emotionsRisk taking and emotions
Risk taking and emotions
 
Project report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SADProject report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SAD
 
The real comedy behind comedy
The real comedy behind comedyThe real comedy behind comedy
The real comedy behind comedy
 
Project report Rs Dry celaners
Project report Rs Dry celaners Project report Rs Dry celaners
Project report Rs Dry celaners
 
BIG DATA ANALYSIS
BIG DATA ANALYSISBIG DATA ANALYSIS
BIG DATA ANALYSIS
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
New udp
New udpNew udp
New udp
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
I pv4 addressing
I pv4 addressingI pv4 addressing
I pv4 addressing
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
Ftp
FtpFtp
Ftp
 
Email ftp
Email ftpEmail ftp
Email ftp
 
Www and http
Www and httpWww and http
Www and http
 
Transmission main
Transmission mainTransmission main
Transmission main
 
Ta 104-topology
Ta 104-topologyTa 104-topology
Ta 104-topology
 
Ta 104-topology (1)
Ta 104-topology (1)Ta 104-topology (1)
Ta 104-topology (1)
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Ta 104-media-3
Ta 104-media-3Ta 104-media-3
Ta 104-media-3
 
Ta 104-media-2
Ta 104-media-2Ta 104-media-2
Ta 104-media-2
 

Kürzlich hochgeladen

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 

Kürzlich hochgeladen (20)

CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 

Routing protocols-network-layer

  • 1. Network Layer: Delivery, Forwarding, and Routing 21.1 Delivery 21.2 Forwarding 21.3 Unicast Routing Protocols 21.4 Multicast Routing Protocols
  • 2. Delivery • The network layer supervises the handling of the packets by the underlying physical networks. We define this handling as the delivery of a packet. Direct versus Indirect Delivery
  • 3.
  • 4.
  • 5. Forwarding • Forwarding means to place the packet in its route to its destination. • Forwarding requires a host or a router to have a routing table
  • 6. Forwarding techniques to make the size of the routing table manageable •Next-hop method versus route method •Network-specific method versus host-specific method •Default method
  • 7. Forwarding Techniques 1) Route method versus next-hop method :
  • 8.
  • 9. Host –specific versus network-specific method
  • 10.
  • 12. Forwarding Process • In classless addressing, we need at least four columns in a routing table
  • 13. Example • Make a routing table for router R1, using the configuration in Figure
  • 14. Example • Routing table for router R1 • Forwarding process for the destination address 180.70.65.140 ? • Forwarding process for the destination address 18.24.32.78 ?
  • 15. Address Aggregation • Classless addressing increases the number of routing table entries • To alleviate the problem, the address aggregation is used
  • 17. Hierarchical Routing • To solve the problem of gigantic routing tables
  • 18.
  • 19. RIP (Routing Information Protocol), OSPF (Open Shortest Path First), BGP (Border Gateway Protocol)
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Intra domain : link state and distance vector Interdomain : path vector
  • 27.
  • 29. Distance Vector Routing: Initialization • At the beginning, each node can know only the distance between itself and its immediate neighbors
  • 30. Distance Vector Routing: Sharing • In distance vector routing, each node shares its routing table (with first two cols) with its immediate neighbors periodically and when there is a change
  • 31. Distance Vector Routing: Updating • When a node receives a two-column table from a neighbor, it need to update its routing table • Updating rule: – Choose the smaller cost. If the same, keep the old one – If the next-node entry is the same, the receiving node chooses the new row
  • 32.
  • 34. When to Share • Periodic update: A node sends its routing table, normally every 30 s • Triggered update: Anode sends its two-column routing table to its neighbors anytime there is a change in its routing table
  • 35.
  • 37.
  • 38.
  • 39. Three-Node Instability • If the instability is between three nodes, stability cannot be guaranteed.
  • 40.
  • 42. LLiinnkk SSttaattee RRoouuttiinngg • Each node has the entire topology of the domain- the list of nodes and links, how they are connected including type, cost, and condition of the links(up or down) • Node can use Dijkstra’s algorithm to build a routing table
  • 43. LLiinnkk SSttaattee RRoouuttiinngg • Each node has partial knowledge: it know the state (type, condition, and cost) of its links. The whole topology can be compiled from the partial knowledge of each node
  • 44. BBuuiillddiinngg RRoouuttiinngg TTaabbllee 1. Creation of the states of the links by each node, called the link state packet (LSP) 2. Dissemination of LSPs to every other router, called flooding, in an efficient and reliable way 3. Formation of a shortest path tree for each node 4. Calculation of a routing table based on the shortest path tree • Creation of LSP – LSP contains node identity, the list of links (to make the topology), sequence number (to facilitate flooding and distinguish new LSPs from old ones – LSPs are generated (1) when there is a change in the topology of the domain, (2) on a periodic basis, normally 60 min or 2 h
  • 45. BBuuiillddiinngg RRoouuttiinngg TTaabbllee • Flooding of LSPs – The creating node sends a copy of the LSP out of each interface – A node compares it with the copy it may already have. If the newly arrived LSP is older than the one it has, it discards the LSP. If it is newer, 1. It discards the old LSP and keeps the new one 2. It sends a copy of it out of each interface except the one from which the packet arrived • Formation of shortest path tree: Dijkstra Algorithm – After receiving all LSPs, each node will have a copy of the whole topology. Need to find the shortest path to every other node – The Dijkstra algorithm creates a shortest path tree from a graph
  • 48.
  • 49.
  • 50. Open Shortest Path First (OSPF) • Popular intra domain routing protocol based on link state routing • To handle routing efficiently and in a timely manner, OSPF divides an autonomous system into area • Area is a collection of network, hosts, and routers all contained within an AS • AS can also be divided into many different areas
  • 51.
  • 52. Metric • The OSPF allows the administrator to assign a cost, called the metric, to each route • The metric can be based on a type of service (minimum delay, maximum throughput, and so on) Types of Links
  • 53. Point-to-Point Link • To connect two routers without any other host or router in between Transient Link • A network with several routers attached to it
  • 55. Path Vector Routing • Distance vector routing is subject to instability if there are more than a few hops in the domain of operation • Link state routing needs a huge amount of resources to calculate routing tables. It also create heavy traffic because of flooding • Need for a third routing algorithm for interdomain routing, called path vector routing • Path vector routing is similar to distance vector routing • But, only speaker node (one node that acts on behalf of entire AS) creates a routing table and advertises it to speaker nodes in each AS in its neighbour. • A speaker node advertises the path, not the metric of nodes
  • 56. Path Vector Routing: Initialization
  • 57. Path Vector Routing: Sharing and Updating Sharing: Like distance vector routing, a speaker shares its table with immediate neighbors Updating: When a speaker receives a two-column table from a neighbor, it updates its own table • Loop prevention • Policy routing • Optimum path
  • 58.
  • 59.
  • 60.
  • 61.
  • 62. Border Gateway Protocol (BGP) • Interdomain routing protocol using path vector routing • Types of autonomous systems (ASs) – Stub AS: only one connection to another AS. A stub AS is either a sink or source. – Multihomed AS: more than one connection to other ASs, – Transit AS: A multihomed AS that also allows transient traffic
  • 63. Path attributes 1. Well-known attribute Well-known mandatory attribute: that must appear in the description of a router. ORIGIN (source of the routing information) AS_PATH (the list of ASs) NEXT-HOP(the next router) Well-known discretionary attribute that not required in every update message. 2. Optional attribute :
  • 64. BGP Sessions • A session is a connection between BGP routers for the exchange of router information • To create a reliable environment, BGP uses the services of TCP as semipermanent connections • External and internal BGP – E-BGP sessions: used to exchange information between two speaker nodes belonging to two different ASs – I-BGP sessions: used to exchange information between two routers inside an AS