SlideShare a Scribd company logo
Routing Protocols
Next Hop Method
Network-Specific Method
• To reduce the routing table and simplify the searching
process
• Here, instead of having an entry for every destination
host connected to the same physical network, we
• have only one entry that defines the address of the
destination network itself.
• In other words, we treat all hosts connected to the
same network as one single entity.
• For example, if 1000 hosts are attached to the same
network, only one entry exists in the routing
• table instead of 1000.
Network-Specific Method
Host-specific method
• The destination host address is given in the
routing table. The rationale behind this method is
the inverse of the network-specific method.
• Figure 6.5 if the administrator wants all packets
arriving for host B delivered to router R3 instead
of R1, one single entry in the routing table of host
A can explicitly define the route.
• Host-specific routing is used for purposes such as
checking the route or providing security measure
Host-specific method
Default Method
• To simplify routing
• In Figure 6.6 host A is connected to a network
with two routers. Router R1 routes the
packets to hosts connected to network N2.
However, for the rest of the Internet, router
• R2 is used. So instead of listing all networks in
the entire Internet, host A can just have one
entry called the default
• (normally defined as network address 0.0.0.0).
Default Routing
Routing Based on Label
• In a connection-oriented network (virtual-
circuit approach), a switch forwards a packet
based on the label attached to a packet.
• Routing is normally based on searching the
contents of a table; switching can be done by
accessing a table using an index.
• Routing involves searching; switching
involves accessing.
Routing Protocols
Forwarding based on label
MPLS routers
• Some conventional routers in the Internet can
be replaced by MPLS routers that can behave
like a router and a switch. When behaving like
a router, MPLS can forward the packet based
on the destination address; when behaving
like a switch, it can forward a packet based on
the label.(Multiprotocol)
Structure of Router
• four components: input ports,
• output ports,
• the routing processor,
• and the switching fabric,
Router Components
An input port
• An input port performs the physical and data link
layer functions of the router. The bits are
constructed from the received signal. The packet
is decapsulated from the frame.
• Errors are detected and corrected.
• The packet is ready to be forwarded by the
network layer. In addition to a physical layer
processor and a data link processor, the input
port has buffers (queues) to hold the packets
before they are directed to the switching fabric.
Routing Protocols
Output Ports
• An output port performs the same functions
as the input port, but in the reverse order.
• First the outgoing packets are queued, then
the packet is encapsulated in a frame, and
finally the physical layer functions are applied
to the frame to create the signal to be sent on
the line.
Output port
Routing Processor
• The routing processor performs the functions of
the network layer. The destination address is
used to find the address of the next hop and, at
the same time, the output port number from
which the packet is sent out.
• This activity is sometimes referred to as table
lookup because the routing processor searches
the routing table.
• In the newer routers, this function of the routing
processor is being moved to the input ports to
facilitate and expedite the process.
Switching Fabrics
• The most difficult task in a router is to move
the packet from the input queue to the output
queue. The speed with which this is done
affects the size of the input/output queue and
the overall delay in packet delivery.
• In the past, when a router was actually a
dedicated computer, the memory of the
computer or a bus was used as the switching
fabric.
• The input port stored the packet in memory;
the output port got the packet from the
memory.
Crossbar Switch
• The simplest type of switching fabric is the
crossbar switch .
• A crossbar switch connects n inputs to n
outputs in a grid, using electronic
microswitches at each crosspoint.
Banyan Switch
• More realistic than the crossbar switch is the
banyan switch
• A banyan switch is a multistage switch with
microswitches at each stage that route the
packets based on the output port represented
as a binary string. For n inputs and n outputs,
we have log2(n) stages with n/2 microswitches
at each stage
Routing Protocols
Batcher-Banyan Switch
• The problem with the banyan switch is the
possibility of internal collision even when two
packets are not heading for the same output
port. We can solve this problem by sorting the
arriving packets based on their destination port.
• K. E. Batcher designed a switch that comes before
the banyan switch and sorts the incoming packets
according to their final destination. The
combination is called the Batcher-banyan switch
K.E Batcher
• Normally, another hardware module called a
trap is added between the Batcher switch and
the banyan switch. The trap module prevents
duplicate packets (packets with the same
output destination) from passing to the
banyan switch simultaneously. Only one
packet for each destination is allowed at each
tick; if there is more than one, they wait for
the next tick.
Routing Tables
• “An internet is a combination of networks
connected by routers. When a datagram goes
from a source to a destination, it will probably
pass through many routers until it reaches the
router attached to the destination network”
Cost or Metric
• A router receives a packet from a network and passes it
to another network. A router is usually attached to
several networks. When it receives a packet, to which
network should it pass the packet? The decision is
based on optimization:
• Which of the available pathways is the optimum
pathway?
• What is the definition of the term optimum?
• One approach is to assign a cost for passing through a
network.
• We call this cost or a metric.
• High cost can be thought of as something bad; low
cost can be thought of
• something good.
Example “Optimization”
• For example, if we want to maximize the
throughput in a network, the high throughput
means low cost and the low throughput
means high cost.
• As another example, if we want to minimize
the delay, low delay is low cost and high delay
is high cost.
Static versus Dynamic Routing Tables
• A routing table can be either static or
dynamic.
• A static table is one with manual entries.
• A dynamic table is updated automatically
when there is a change somewhere in the
internet.
Static or Dynamic ??
• Today, an internet needs dynamic routing
tables. The tables need to be updated as soon
as there is a change in the internet. For
instance, they need to be updated when a link
is down, and they need to be updated
whenever a better route has been found.
Routing Protocol
• Routing protocols have been created in response
to the demand for dynamic routing tables. A
• routing protocol is a combination of rules and
procedures that lets routers in the internet
inform each other of changes.
• It allows routers to share whatever they know
about the internet or their neighborhood. The
sharing of information allows a router in Mumbai
to know about the failure of a network in
NewYork.
• The routing protocols also include procedures
for combining information received from
other routers.
• Routing protocols can be either an interior
protocol or an exterior protocol.
• An interior protocol handles intradomain
routing; an exterior protocol handles
interdomain routing.
Intradomain routing and Interdomain
Routing
• An internet is divided into autonomous
systems. An autonomous system (AS) is a
group of networks and routers under the
authority of a single administration.
• Routing inside an autonomous system is
referred to as intra-domain routing.
• Routing between autonomous systems is
referred to as inter-domain routing.
Autonomous Systems
Popular Routing Protocols
Distance vector routing
• AS, with all routers and networks, as a graph, a
set of nodes and lines (edges) connecting the
nodes.
• A router can normally be represented by a node
and a network by a link connecting two nodes.
• The graph theory used an algorithm called
Bellman-Ford (also called Ford-Fulkerson) for a
while to find the shortest path between nodes in
a graph given the distance between nodes.
Bellman ford Algorithm
Routing Protocols
A sends four records to its neighbors,
routers B, D, and C.
Count to Infinity
• A problem with distance vector routing is that any
decrease in cost (good news) propagates quickly,
but any increase in cost (bad news) propagates
slowly.
• For a routing protocol to work properly, if a link
is broken (cost becomes infinity), every other
router should be aware of it immediately, but in
distance vector routing, this takes some time. The
problem is referred to as count to infinity. It
takes several updates before the cost for a broken
link is recorded as infinity by all routers.
Two Node Loop
• Two-Node Loop
• Three-Node Instability
Three node instantiability
Routing Information Protocol (RIP)
• The Routing Information Protocol (RIP) is an intradomain (interior) routing protocol
used inside an autonomous system. It is a very simple protocol based on distance vector
routing. RIP implements distance vector routing directly with some considerations:
• 1. In an autonomous system, we are dealing with routers and networks (links), what
• was described as a node.
• 2. The destination in a routing table is a network, which means the first column
• defines a network address.
• 3. The metric used by RIP is very simple; the distance is defined as the number of links
(networks) that have to be used to reach the destination. For this reason, the metric in
RIP is called a hop count.
• 4. Infinity is defined as 16, which means that any route in an autonomous system using
RIP cannot have more than 15 hops.
• 5. The next node column defines the address of the router to which the packet is to be
sent to reach its destination.
Routing Protocols
RIP Message Format
Fields
• ❑ Command. This 8-bit field specifies the type of
message: request (1) or response (2).
• ❑ Version. This 8-bit field defines the version.
• ❑ Family. This 16-bit field defines the family of the
protocol used. For TCP/IP the value is 2.
• ❑ Network address. The address field defines the address
of the destination network.
• RIP has allocated 14 bytes for this field to be applicable to
any protocol.
• However, IP currently uses only 4 bytes. The rest of the
address is filled with 0s.
• ❑ Distance. This 32-bit field defines the hop count (cost)
from the advertising router to the destination network
Requests and Responses
.
• RIP has two types of messages: request and
response
• Request
• A request message is sent by a router that has
just come up or by a router that has some
time-out entries. A request can ask about
specific entries or all entries
Routing Protocols
Response
• A response can be either solicited or unsolicited.
A solicited response is sent only in answer to a
request. It contains information about the
destination specified in the corresponding
request.
• An unsolicited response, on the other hand, is
sent periodically, every 30 seconds or when there
is a change in the routing table. The response is
sometimes called an update packet.
RIP Version 2
• RIP version 2 was designed to overcome some
of the shortcomings of version 1.
• The designers of version 2 have not
augmented the length of the message for
each entry.
• They have only replaced those fields in version
1 that were filled with 0s for the TCP/IP
protocol with some new fields.
Message Format
❑ Route tag. This field carries information such as the
autonomous system number. It can be used to enable RIP to
receive information from an interdomain routing protocol.
❑ Subnet mask. This is a 4-byte field that carries the subnet
mask (or prefix). This means that RIP2 supports classless ID
addressing and CIDR.
❑ Next-hop address. This field shows the address of the next
hop. This is particularly useful if two autonomous systems
share a network (a backbone, for example). Then the message
can define the router, in the same autonomous system or
another autonomous system, to which the packet next goes.
RIP Version 2 Format
• RIPv1 uses classful addressing.
• The only entry in the message format is the
network address (with a default mask). RIPv2
adds one field for the subnet mask, which can
be used to define a network prefix length.
This means that in this version, we can use
classless addressing. A group of networks can
be combined into one prefix and advertised
collectively.
Classless Addressing
Authentication
• Authentication is added to protect the message
against unauthorized advertisement. No new fields
are added to the packet; instead, the first entry of the
message is set aside for authentication information.
• To indicate that the entry is authentication
information and not routing information, the value of
FFFF16 is entered in the family field
• The second field, the authentication type, defines the
protocol used for authentication, and the third field
contains the actual authentication data
Format
Multicasting
• Version 1 of RIP uses broadcasting to send RIP
messages to every neighbor.
• In this way, all the routers on the network
receive the packets, as well as the hosts.
• RIP version 2, on the other hand, uses the all-
router multicast address to send the RIP
messages only to RIP routers in the network.
Encapsulation
• RIP messages are encapsulated in UDP user
datagrams.
• A RIP message does not include a field that
indicates the length of the message.
• This can be determined from the UDP packet.
The well-known port assigned to RIP in UDP is
port 520.
• RIP uses the services of UDP on well-known
port 520.
Link state Routing
Open Shortest Path First (OSPF)
protocol
• The Open Shortest Path First (OSPF) protocol
is an intradomain routing protocol based on
link state routing. Its domain is also an
autonomous system
• To handle routing efficiently and in a timely
manner, OSPF divides an autonomous system
into areas.
• An area is a collection of networks, hosts, and
routers all contained within an autonomous
system.
• An autonomous system can be divided into
many different areas. All networks inside an
area must be connected.
• Routers inside an area flood the area with
routing information
• At the border of an area, special routers called
area border routers summarize the
information about the area and send it to
other areas.
• Among the areas inside an autonomous
system is a special area called the backbone;
• The routers inside the backbone are called the
backbone routers.
• Backbone router can also be an area border
router.
• If, because of some problem, the connectivity
between a backbone and an area is
• broken, a virtual link between routers must be
created by the administration to allow
continuity of the functions of the backbone as
the primary area.
• Each area has an area identification. The area
identification of the backbone is zero.
Areas in an autonomous system
Metric
• The OSPF protocol allows the administrator to
assign a cost, called the metric, to each route.
The metric can be based on a type of service
(minimum delay, maximum throughput, and
so on).
• As a matter of fact, a router can have multiple
routing tables, each based on a different type
of service.
• Types of Links
• In OSPF terminology, a connection is called a
link. Four types of links have been defined:
point-to-point, transient, stub, and virtual
Types of links
• Point-to-Point Link
• A point-to-point link connects two routers
without any other host or router in between.
In other words, the purpose of the link
(network) is just to connect the two routers.
An example of this type of link is two routers
connected by a telephone line or
• a T-line. There is no need to assign a network
address to this type of link.
Point to Point
Transient Link
• A transient link is a network with several routers
attached to it. The data can enter through any of the
routers and leave through any router. All LANs and
some WANs with two or more routers are of this
type. In this case, each router has many neighbors.
• For example, consider the Ethernet Router A has
routers B, C, D, and E as neighbors. Router B has
routers A, C, D, and E as neighbors. If we want to
show the neighborhood relationship in this situation.
Transient Link
Stub Link
• A stub link is a network that is connected to only one
router. The data packets enter the network through
this single router and leave the network through this
same router.
• This is a special case of the transient network. We can
show this situation using the router as a node and
using the designated router for the network.
• However, the link is only one directional, from the
router to the network.
Stub Network
Virtual Link
• When the link between two routers is broken,
the administration may create a virtual link
between them using a longer path that
probably goes through several routers
Graphical Representation of Network
• Small AS with seven networks and six routers.
• Two of the networks are point-to-point networks.
• We use symbols such as N1 and N2 for transient and stub
networks.
• There is no need to assign an identity to a point-to-point
network.
• The figure also shows the graphical representation of the AS as
seen by OSPF.
• We have used color nodes for the routers and shaded nodes for
the networks (represented by designated routers).
• However, OSPF sees both as nodes. Note that we have three
stub networks.
Routing Protocols
Border Gateway Protocol (BGP)
• Border Gateway Protocol (BGP) is an
interdomain routing protocol using path
vector routing. It first appeared in 1989 and
has gone through four versions.
• Types of Autonomous Systems
Types of Autonomous Systems
• Stub AS
• A stub AS has only one connection to another AS.
The interdomain data traffic in a stub
• AS can be either created or terminated in the AS.
• The hosts in the AS can send data traffic to other
ASs. The hosts in the AS can receive data coming
from hosts in other ASs.
• Data traffic, however, cannot pass through a stub
AS. A stub AS is either a source or a sink. A good
example of a stub AS is a small corporation or a
small local ISP.
Multihomed AS
• A multihomed AS has more than one connection to
other ASs, but it is still only a source or sink for data
traffic. It can receive data traffic from more than one
AS.
• It can send data traffic to more than one AS, but there
is no transient traffic.
• It does not allow data coming from one AS and going
to another AS to pass through.
• A good example of a multihomed AS is a large
corporation that is connected to more than one
regional or national AS that does not allow transient
traffic.
Transit AS
• A transit AS is a multihomed AS that also
allows transient traffic.
• Good examples of transit ASs are national and
international ISPs (Internet backbones).
• CIDR
• BGP uses classless interdomain routing
addresses. In other words, BGP uses a prefix,
to define a destination address.
• The address and the number of bits (prefix
length) are used in updating messages.
Attributes
• The path was presented as a list of
autonomous systems, but is, in fact, a list of
attributes. Each attribute gives some
information about the path.
• The list of attributes helps the receiving router
make a better decision when applying its
policy
• Attributes are divided into two broad
categories: well-known and optional. A
wellknown attribute is one that every BGP
router must recognize.
• An optional attribute is one that needs not
be recognized by every router.
BGP Sessions
• The exchange of routing information between
two routers using BGP takes place in a session.
• A session is a connection that is established
between two BGP routers only for the sake of
exchanging routing information. To create a
reliable environment, BGP uses the services of
TCP.
External and Internal BGP
• The E-BGP session is used to exchange
information between two speaker nodes
belonging to two different autonomous
systems.
• The IBGP session, on the other hand, is used
to exchange routing information between two
routers inside an autonomous system.
Routing Protocols
Types of Packets
Packet Format
• All BGP packets share the same common header
• ❑ Marker. The 16-byte marker field is reserved
for authentication.
• ❑ Length. This 2-byte field defines the length of
the total message including the header.
• ❑ Type. This 1-byte field defines the type of the
packet. As we said before, we have four types,
and the values 1 to 4 define those types.
Common Header
Open Message
• To create a neighborhood relationship, a
router running BGP opens a TCP connection
with a neighbor and sends an open message.
• If the neighbor accepts the neighborhood
relationship, it responds with a keepalive
message, which means that a relationship has
been established between the two routers
• The fields of the open message are as follows:
• ❑ Version. This 1-byte field defines the version of
BGP. The current version is 4.
• ❑ My autonomous system. This 2-byte field
defines the autonomous system number.
• ❑ Hold time. This 2-byte field defines the
maximum number of seconds that can elapse
until one of the parties receives a keepalive or
update message from the other. If a router does
not receive one of these messages during the
hold time period, it considers the other party
dead.
• BGP identifier. This 4-byte field defines the router
that sends the open message. The router usually
uses one of its IP addresses (because it is unique)
for this purpose.
• Option length. The open message may contain
some option parameters. In this case, this 1-byte
field defines the length of the total option
parameters. If there are no option parameters,
the value of this field is zero.
• Option parameters. If the value of the option
parameter length is not zero, it means that there
are some option parameters.
Update Message
• The update message is the heart of the BGP
protocol. It is used by a router to withdraw
destinations that have been advertised
previously, announce a route to a new
destination, or both.
• Note that BGP can withdraw several
destinations that were advertise before, but it
can only advertise one new destination in a
single update message.
Keepalive Message
• The routers (called peers in BGP parlance)
running the BGP protocols exchange keepalive
messages regularly (before their hold time
expires) to tell each other that they are alive..
Notification Message
• A notification message is sent by a router
whenever an error condition is detected or a
router wants to close the connection.
Encapsulation
• BGP messages are encapsulated in TCP
segments using the well-known port 179.
• This means that there is no need for error
control and flow control.
• When a TCP connection is opened, the
exchange of update, keepalive, and
notification messages is continued until a
notification message of type cease is sent.
Ad

More Related Content

What's hot (20)

Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
Harsh Mehta
 
Static Routing
Static RoutingStatic Routing
Static Routing
Kishore Kumar
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Kashif Latif
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
Heba_a
 
Routing
RoutingRouting
Routing
Saima Azam
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Tharindu Kumara
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
Aditya Rawat
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
Hema Dhariwal
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Rip presentation
Rip presentationRip presentation
Rip presentation
Ebrahim AlRahawe
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
zameer Abbas
 
Dynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And BasicsDynamic Routing All Algorithms, Working And Basics
Dynamic Routing All Algorithms, Working And Basics
Harsh Mehta
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)BGP (Border Gateway Protocol)
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Kashif Latif
 
IPv6 header
IPv6 headerIPv6 header
IPv6 header
Heba_a
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
KalpanaC14
 

Viewers also liked (12)

Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
Raghu Kiran
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
tmavroidis
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
Network_Administration_PPT
Network_Administration_PPTNetwork_Administration_PPT
Network_Administration_PPT
Abhishek Kumar Ravi
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
Sangeetha Rangarajan
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
Abdelkhalik Mosa
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
Santosh Kumar
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
ShortestPathFirst
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
tmavroidis
 
network administration directory access and remote access
network administration directory access and remote accessnetwork administration directory access and remote access
network administration directory access and remote access
Sangeetha Rangarajan
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
phanleson
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
Abdelkhalik Mosa
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
CAVC
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
Santosh Kumar
 
Ad

Similar to Routing Protocols (20)

Routing
RoutingRouting
Routing
Sisir Ghosh
 
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
nyalawemgunga
 
Routing
RoutingRouting
Routing
RJ Fahim
 
computer communications
computer communicationscomputer communications
computer communications
JAYASHSINGHRA2111003
 
Lecture 04 networking
Lecture 04 networkingLecture 04 networking
Lecture 04 networking
HNDE Labuduwa Galle
 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
PocketRocketDC
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
CYBERINTELLIGENTS
 
routing
routingrouting
routing
radhika477746
 
Chapter07
Chapter07Chapter07
Chapter07
Muhammad Ahad
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
7-ROUTING IN COMPUTER NETWORKS .pptx
7-ROUTING IN COMPUTER NETWORKS     .pptx7-ROUTING IN COMPUTER NETWORKS     .pptx
7-ROUTING IN COMPUTER NETWORKS .pptx
shawwalrashed
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
Aksum Institute of Technology(AIT, @Letsgo)
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
module10-rip (1).ppt
module10-rip (1).pptmodule10-rip (1).ppt
module10-rip (1).ppt
Rakesh Dhiman
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
CYBERINTELLIGENTS
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
GirT2
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
IRJET Journal
 
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
1737674082397_LEnnnnnnCTURE 0nn2 (a).pptx
nyalawemgunga
 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
PocketRocketDC
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
CYBERINTELLIGENTS
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
7-ROUTING IN COMPUTER NETWORKS .pptx
7-ROUTING IN COMPUTER NETWORKS     .pptx7-ROUTING IN COMPUTER NETWORKS     .pptx
7-ROUTING IN COMPUTER NETWORKS .pptx
shawwalrashed
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
module10-rip (1).ppt
module10-rip (1).pptmodule10-rip (1).ppt
module10-rip (1).ppt
Rakesh Dhiman
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
GirT2
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
IRJET Journal
 
Ad

Recently uploaded (20)

How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18
Celine George
 
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdfGENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
GENERAL QUIZ PRELIMS | QUIZ CLUB OF PSGCAS | 4 MARCH 2025 .pdf
Quiz Club of PSG College of Arts & Science
 
Aerospace Engineering Homework Help Guide – Expert Support for Academic Success
Aerospace Engineering Homework Help Guide – Expert Support for Academic SuccessAerospace Engineering Homework Help Guide – Expert Support for Academic Success
Aerospace Engineering Homework Help Guide – Expert Support for Academic Success
online college homework help
 
How to Manage Cross Selling in Odoo 18 Sales
How to Manage Cross Selling in Odoo 18 SalesHow to Manage Cross Selling in Odoo 18 Sales
How to Manage Cross Selling in Odoo 18 Sales
Celine George
 
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
lsitinova
 
PUBH1000 Slides - Module 10: Health Promotion
PUBH1000 Slides - Module 10: Health PromotionPUBH1000 Slides - Module 10: Health Promotion
PUBH1000 Slides - Module 10: Health Promotion
JonathanHallett4
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdfAntepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Dr H.K. Cheema
 
Statement by Linda McMahon on May 21, 2025
Statement by Linda McMahon on May 21, 2025Statement by Linda McMahon on May 21, 2025
Statement by Linda McMahon on May 21, 2025
Mebane Rash
 
PUBH1000 Slides - Module 11: Governance for Health
PUBH1000 Slides - Module 11: Governance for HealthPUBH1000 Slides - Module 11: Governance for Health
PUBH1000 Slides - Module 11: Governance for Health
JonathanHallett4
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdfIPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
IPL QUIZ | THE QUIZ CLUB OF PSGCAS | 2025.pdf
Quiz Club of PSG College of Arts & Science
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
Letter to Secretary Linda McMahon from U.S. Senators
Letter to Secretary Linda McMahon from U.S. SenatorsLetter to Secretary Linda McMahon from U.S. Senators
Letter to Secretary Linda McMahon from U.S. Senators
Mebane Rash
 
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docxPeer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
19lburrell
 
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit..."Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
AlionaBujoreanu
 
Conditions for Boltzmann Law – Biophysics Lecture Slide
Conditions for Boltzmann Law – Biophysics Lecture SlideConditions for Boltzmann Law – Biophysics Lecture Slide
Conditions for Boltzmann Law – Biophysics Lecture Slide
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
ITI COPA Question Paper PDF 2017 Theory MCQ
ITI COPA Question Paper PDF 2017 Theory MCQITI COPA Question Paper PDF 2017 Theory MCQ
ITI COPA Question Paper PDF 2017 Theory MCQ
SONU HEETSON
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 
How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18How to Use Upgrade Code Command in Odoo 18
How to Use Upgrade Code Command in Odoo 18
Celine George
 
Aerospace Engineering Homework Help Guide – Expert Support for Academic Success
Aerospace Engineering Homework Help Guide – Expert Support for Academic SuccessAerospace Engineering Homework Help Guide – Expert Support for Academic Success
Aerospace Engineering Homework Help Guide – Expert Support for Academic Success
online college homework help
 
How to Manage Cross Selling in Odoo 18 Sales
How to Manage Cross Selling in Odoo 18 SalesHow to Manage Cross Selling in Odoo 18 Sales
How to Manage Cross Selling in Odoo 18 Sales
Celine George
 
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
UNITED_KINGDOM.pptUNITED_KINGDOM.pptUNITED_KINGDOM.ppt
lsitinova
 
PUBH1000 Slides - Module 10: Health Promotion
PUBH1000 Slides - Module 10: Health PromotionPUBH1000 Slides - Module 10: Health Promotion
PUBH1000 Slides - Module 10: Health Promotion
JonathanHallett4
 
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales moduleHow To Maximize Sales Performance using Odoo 18 Diverse views in sales module
How To Maximize Sales Performance using Odoo 18 Diverse views in sales module
Celine George
 
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdfAntepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Antepartum fetal surveillance---Dr. H.K.Cheema pdf.pdf
Dr H.K. Cheema
 
Statement by Linda McMahon on May 21, 2025
Statement by Linda McMahon on May 21, 2025Statement by Linda McMahon on May 21, 2025
Statement by Linda McMahon on May 21, 2025
Mebane Rash
 
PUBH1000 Slides - Module 11: Governance for Health
PUBH1000 Slides - Module 11: Governance for HealthPUBH1000 Slides - Module 11: Governance for Health
PUBH1000 Slides - Module 11: Governance for Health
JonathanHallett4
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
Module_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptxModule_2_Types_and_Approaches_of_Research (2).pptx
Module_2_Types_and_Approaches_of_Research (2).pptx
drroxannekemp
 
Letter to Secretary Linda McMahon from U.S. Senators
Letter to Secretary Linda McMahon from U.S. SenatorsLetter to Secretary Linda McMahon from U.S. Senators
Letter to Secretary Linda McMahon from U.S. Senators
Mebane Rash
 
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docxPeer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
Peer Assessment_ Unit 2 Skills Development for Live Performance - for Libby.docx
19lburrell
 
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit..."Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
"Bridging Cultures Through Holiday Cards: 39 Students Celebrate Global Tradit...
AlionaBujoreanu
 
ITI COPA Question Paper PDF 2017 Theory MCQ
ITI COPA Question Paper PDF 2017 Theory MCQITI COPA Question Paper PDF 2017 Theory MCQ
ITI COPA Question Paper PDF 2017 Theory MCQ
SONU HEETSON
 
MICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdfMICROBIAL GENETICS -tranformation and tranduction.pdf
MICROBIAL GENETICS -tranformation and tranduction.pdf
DHARMENDRA SAHU
 

Routing Protocols

  • 3. Network-Specific Method • To reduce the routing table and simplify the searching process • Here, instead of having an entry for every destination host connected to the same physical network, we • have only one entry that defines the address of the destination network itself. • In other words, we treat all hosts connected to the same network as one single entity. • For example, if 1000 hosts are attached to the same network, only one entry exists in the routing • table instead of 1000.
  • 5. Host-specific method • The destination host address is given in the routing table. The rationale behind this method is the inverse of the network-specific method. • Figure 6.5 if the administrator wants all packets arriving for host B delivered to router R3 instead of R1, one single entry in the routing table of host A can explicitly define the route. • Host-specific routing is used for purposes such as checking the route or providing security measure
  • 7. Default Method • To simplify routing • In Figure 6.6 host A is connected to a network with two routers. Router R1 routes the packets to hosts connected to network N2. However, for the rest of the Internet, router • R2 is used. So instead of listing all networks in the entire Internet, host A can just have one entry called the default • (normally defined as network address 0.0.0.0).
  • 9. Routing Based on Label • In a connection-oriented network (virtual- circuit approach), a switch forwards a packet based on the label attached to a packet. • Routing is normally based on searching the contents of a table; switching can be done by accessing a table using an index. • Routing involves searching; switching involves accessing.
  • 12. MPLS routers • Some conventional routers in the Internet can be replaced by MPLS routers that can behave like a router and a switch. When behaving like a router, MPLS can forward the packet based on the destination address; when behaving like a switch, it can forward a packet based on the label.(Multiprotocol)
  • 13. Structure of Router • four components: input ports, • output ports, • the routing processor, • and the switching fabric,
  • 15. An input port • An input port performs the physical and data link layer functions of the router. The bits are constructed from the received signal. The packet is decapsulated from the frame. • Errors are detected and corrected. • The packet is ready to be forwarded by the network layer. In addition to a physical layer processor and a data link processor, the input port has buffers (queues) to hold the packets before they are directed to the switching fabric.
  • 17. Output Ports • An output port performs the same functions as the input port, but in the reverse order. • First the outgoing packets are queued, then the packet is encapsulated in a frame, and finally the physical layer functions are applied to the frame to create the signal to be sent on the line.
  • 19. Routing Processor • The routing processor performs the functions of the network layer. The destination address is used to find the address of the next hop and, at the same time, the output port number from which the packet is sent out. • This activity is sometimes referred to as table lookup because the routing processor searches the routing table. • In the newer routers, this function of the routing processor is being moved to the input ports to facilitate and expedite the process.
  • 20. Switching Fabrics • The most difficult task in a router is to move the packet from the input queue to the output queue. The speed with which this is done affects the size of the input/output queue and the overall delay in packet delivery. • In the past, when a router was actually a dedicated computer, the memory of the computer or a bus was used as the switching fabric.
  • 21. • The input port stored the packet in memory; the output port got the packet from the memory.
  • 22. Crossbar Switch • The simplest type of switching fabric is the crossbar switch . • A crossbar switch connects n inputs to n outputs in a grid, using electronic microswitches at each crosspoint.
  • 23. Banyan Switch • More realistic than the crossbar switch is the banyan switch
  • 24. • A banyan switch is a multistage switch with microswitches at each stage that route the packets based on the output port represented as a binary string. For n inputs and n outputs, we have log2(n) stages with n/2 microswitches at each stage
  • 26. Batcher-Banyan Switch • The problem with the banyan switch is the possibility of internal collision even when two packets are not heading for the same output port. We can solve this problem by sorting the arriving packets based on their destination port. • K. E. Batcher designed a switch that comes before the banyan switch and sorts the incoming packets according to their final destination. The combination is called the Batcher-banyan switch
  • 28. • Normally, another hardware module called a trap is added between the Batcher switch and the banyan switch. The trap module prevents duplicate packets (packets with the same output destination) from passing to the banyan switch simultaneously. Only one packet for each destination is allowed at each tick; if there is more than one, they wait for the next tick.
  • 29. Routing Tables • “An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many routers until it reaches the router attached to the destination network”
  • 30. Cost or Metric • A router receives a packet from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: • Which of the available pathways is the optimum pathway? • What is the definition of the term optimum? • One approach is to assign a cost for passing through a network. • We call this cost or a metric. • High cost can be thought of as something bad; low cost can be thought of • something good.
  • 31. Example “Optimization” • For example, if we want to maximize the throughput in a network, the high throughput means low cost and the low throughput means high cost. • As another example, if we want to minimize the delay, low delay is low cost and high delay is high cost.
  • 32. Static versus Dynamic Routing Tables • A routing table can be either static or dynamic. • A static table is one with manual entries. • A dynamic table is updated automatically when there is a change somewhere in the internet.
  • 33. Static or Dynamic ?? • Today, an internet needs dynamic routing tables. The tables need to be updated as soon as there is a change in the internet. For instance, they need to be updated when a link is down, and they need to be updated whenever a better route has been found.
  • 34. Routing Protocol • Routing protocols have been created in response to the demand for dynamic routing tables. A • routing protocol is a combination of rules and procedures that lets routers in the internet inform each other of changes. • It allows routers to share whatever they know about the internet or their neighborhood. The sharing of information allows a router in Mumbai to know about the failure of a network in NewYork.
  • 35. • The routing protocols also include procedures for combining information received from other routers. • Routing protocols can be either an interior protocol or an exterior protocol. • An interior protocol handles intradomain routing; an exterior protocol handles interdomain routing.
  • 36. Intradomain routing and Interdomain Routing • An internet is divided into autonomous systems. An autonomous system (AS) is a group of networks and routers under the authority of a single administration. • Routing inside an autonomous system is referred to as intra-domain routing. • Routing between autonomous systems is referred to as inter-domain routing.
  • 39. Distance vector routing • AS, with all routers and networks, as a graph, a set of nodes and lines (edges) connecting the nodes. • A router can normally be represented by a node and a network by a link connecting two nodes. • The graph theory used an algorithm called Bellman-Ford (also called Ford-Fulkerson) for a while to find the shortest path between nodes in a graph given the distance between nodes.
  • 42. A sends four records to its neighbors, routers B, D, and C.
  • 43. Count to Infinity • A problem with distance vector routing is that any decrease in cost (good news) propagates quickly, but any increase in cost (bad news) propagates slowly. • For a routing protocol to work properly, if a link is broken (cost becomes infinity), every other router should be aware of it immediately, but in distance vector routing, this takes some time. The problem is referred to as count to infinity. It takes several updates before the cost for a broken link is recorded as infinity by all routers.
  • 45. • Two-Node Loop • Three-Node Instability
  • 47. Routing Information Protocol (RIP) • The Routing Information Protocol (RIP) is an intradomain (interior) routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing. RIP implements distance vector routing directly with some considerations: • 1. In an autonomous system, we are dealing with routers and networks (links), what • was described as a node. • 2. The destination in a routing table is a network, which means the first column • defines a network address. • 3. The metric used by RIP is very simple; the distance is defined as the number of links (networks) that have to be used to reach the destination. For this reason, the metric in RIP is called a hop count. • 4. Infinity is defined as 16, which means that any route in an autonomous system using RIP cannot have more than 15 hops. • 5. The next node column defines the address of the router to which the packet is to be sent to reach its destination.
  • 50. Fields • ❑ Command. This 8-bit field specifies the type of message: request (1) or response (2). • ❑ Version. This 8-bit field defines the version. • ❑ Family. This 16-bit field defines the family of the protocol used. For TCP/IP the value is 2. • ❑ Network address. The address field defines the address of the destination network. • RIP has allocated 14 bytes for this field to be applicable to any protocol. • However, IP currently uses only 4 bytes. The rest of the address is filled with 0s. • ❑ Distance. This 32-bit field defines the hop count (cost) from the advertising router to the destination network
  • 51. Requests and Responses . • RIP has two types of messages: request and response • Request • A request message is sent by a router that has just come up or by a router that has some time-out entries. A request can ask about specific entries or all entries
  • 53. Response • A response can be either solicited or unsolicited. A solicited response is sent only in answer to a request. It contains information about the destination specified in the corresponding request. • An unsolicited response, on the other hand, is sent periodically, every 30 seconds or when there is a change in the routing table. The response is sometimes called an update packet.
  • 54. RIP Version 2 • RIP version 2 was designed to overcome some of the shortcomings of version 1. • The designers of version 2 have not augmented the length of the message for each entry. • They have only replaced those fields in version 1 that were filled with 0s for the TCP/IP protocol with some new fields.
  • 55. Message Format ❑ Route tag. This field carries information such as the autonomous system number. It can be used to enable RIP to receive information from an interdomain routing protocol. ❑ Subnet mask. This is a 4-byte field that carries the subnet mask (or prefix). This means that RIP2 supports classless ID addressing and CIDR. ❑ Next-hop address. This field shows the address of the next hop. This is particularly useful if two autonomous systems share a network (a backbone, for example). Then the message can define the router, in the same autonomous system or another autonomous system, to which the packet next goes.
  • 56. RIP Version 2 Format
  • 57. • RIPv1 uses classful addressing. • The only entry in the message format is the network address (with a default mask). RIPv2 adds one field for the subnet mask, which can be used to define a network prefix length. This means that in this version, we can use classless addressing. A group of networks can be combined into one prefix and advertised collectively. Classless Addressing
  • 58. Authentication • Authentication is added to protect the message against unauthorized advertisement. No new fields are added to the packet; instead, the first entry of the message is set aside for authentication information. • To indicate that the entry is authentication information and not routing information, the value of FFFF16 is entered in the family field • The second field, the authentication type, defines the protocol used for authentication, and the third field contains the actual authentication data
  • 60. Multicasting • Version 1 of RIP uses broadcasting to send RIP messages to every neighbor. • In this way, all the routers on the network receive the packets, as well as the hosts. • RIP version 2, on the other hand, uses the all- router multicast address to send the RIP messages only to RIP routers in the network.
  • 61. Encapsulation • RIP messages are encapsulated in UDP user datagrams. • A RIP message does not include a field that indicates the length of the message. • This can be determined from the UDP packet. The well-known port assigned to RIP in UDP is port 520. • RIP uses the services of UDP on well-known port 520.
  • 63. Open Shortest Path First (OSPF) protocol • The Open Shortest Path First (OSPF) protocol is an intradomain routing protocol based on link state routing. Its domain is also an autonomous system
  • 64. • To handle routing efficiently and in a timely manner, OSPF divides an autonomous system into areas. • An area is a collection of networks, hosts, and routers all contained within an autonomous system. • An autonomous system can be divided into many different areas. All networks inside an area must be connected.
  • 65. • Routers inside an area flood the area with routing information • At the border of an area, special routers called area border routers summarize the information about the area and send it to other areas. • Among the areas inside an autonomous system is a special area called the backbone;
  • 66. • The routers inside the backbone are called the backbone routers. • Backbone router can also be an area border router.
  • 67. • If, because of some problem, the connectivity between a backbone and an area is • broken, a virtual link between routers must be created by the administration to allow continuity of the functions of the backbone as the primary area. • Each area has an area identification. The area identification of the backbone is zero.
  • 68. Areas in an autonomous system
  • 69. Metric • The OSPF protocol allows the administrator to assign a cost, called the metric, to each route. The metric can be based on a type of service (minimum delay, maximum throughput, and so on). • As a matter of fact, a router can have multiple routing tables, each based on a different type of service.
  • 70. • Types of Links • In OSPF terminology, a connection is called a link. Four types of links have been defined: point-to-point, transient, stub, and virtual
  • 72. • Point-to-Point Link • A point-to-point link connects two routers without any other host or router in between. In other words, the purpose of the link (network) is just to connect the two routers. An example of this type of link is two routers connected by a telephone line or • a T-line. There is no need to assign a network address to this type of link.
  • 74. Transient Link • A transient link is a network with several routers attached to it. The data can enter through any of the routers and leave through any router. All LANs and some WANs with two or more routers are of this type. In this case, each router has many neighbors. • For example, consider the Ethernet Router A has routers B, C, D, and E as neighbors. Router B has routers A, C, D, and E as neighbors. If we want to show the neighborhood relationship in this situation.
  • 76. Stub Link • A stub link is a network that is connected to only one router. The data packets enter the network through this single router and leave the network through this same router. • This is a special case of the transient network. We can show this situation using the router as a node and using the designated router for the network. • However, the link is only one directional, from the router to the network.
  • 78. Virtual Link • When the link between two routers is broken, the administration may create a virtual link between them using a longer path that probably goes through several routers
  • 79. Graphical Representation of Network • Small AS with seven networks and six routers. • Two of the networks are point-to-point networks. • We use symbols such as N1 and N2 for transient and stub networks. • There is no need to assign an identity to a point-to-point network. • The figure also shows the graphical representation of the AS as seen by OSPF. • We have used color nodes for the routers and shaded nodes for the networks (represented by designated routers). • However, OSPF sees both as nodes. Note that we have three stub networks.
  • 81. Border Gateway Protocol (BGP) • Border Gateway Protocol (BGP) is an interdomain routing protocol using path vector routing. It first appeared in 1989 and has gone through four versions. • Types of Autonomous Systems
  • 82. Types of Autonomous Systems • Stub AS • A stub AS has only one connection to another AS. The interdomain data traffic in a stub • AS can be either created or terminated in the AS. • The hosts in the AS can send data traffic to other ASs. The hosts in the AS can receive data coming from hosts in other ASs. • Data traffic, however, cannot pass through a stub AS. A stub AS is either a source or a sink. A good example of a stub AS is a small corporation or a small local ISP.
  • 83. Multihomed AS • A multihomed AS has more than one connection to other ASs, but it is still only a source or sink for data traffic. It can receive data traffic from more than one AS. • It can send data traffic to more than one AS, but there is no transient traffic. • It does not allow data coming from one AS and going to another AS to pass through. • A good example of a multihomed AS is a large corporation that is connected to more than one regional or national AS that does not allow transient traffic.
  • 84. Transit AS • A transit AS is a multihomed AS that also allows transient traffic. • Good examples of transit ASs are national and international ISPs (Internet backbones).
  • 85. • CIDR • BGP uses classless interdomain routing addresses. In other words, BGP uses a prefix, to define a destination address. • The address and the number of bits (prefix length) are used in updating messages.
  • 86. Attributes • The path was presented as a list of autonomous systems, but is, in fact, a list of attributes. Each attribute gives some information about the path. • The list of attributes helps the receiving router make a better decision when applying its policy
  • 87. • Attributes are divided into two broad categories: well-known and optional. A wellknown attribute is one that every BGP router must recognize. • An optional attribute is one that needs not be recognized by every router.
  • 88. BGP Sessions • The exchange of routing information between two routers using BGP takes place in a session. • A session is a connection that is established between two BGP routers only for the sake of exchanging routing information. To create a reliable environment, BGP uses the services of TCP.
  • 89. External and Internal BGP • The E-BGP session is used to exchange information between two speaker nodes belonging to two different autonomous systems. • The IBGP session, on the other hand, is used to exchange routing information between two routers inside an autonomous system.
  • 92. Packet Format • All BGP packets share the same common header • ❑ Marker. The 16-byte marker field is reserved for authentication. • ❑ Length. This 2-byte field defines the length of the total message including the header. • ❑ Type. This 1-byte field defines the type of the packet. As we said before, we have four types, and the values 1 to 4 define those types.
  • 94. Open Message • To create a neighborhood relationship, a router running BGP opens a TCP connection with a neighbor and sends an open message. • If the neighbor accepts the neighborhood relationship, it responds with a keepalive message, which means that a relationship has been established between the two routers
  • 95. • The fields of the open message are as follows: • ❑ Version. This 1-byte field defines the version of BGP. The current version is 4. • ❑ My autonomous system. This 2-byte field defines the autonomous system number. • ❑ Hold time. This 2-byte field defines the maximum number of seconds that can elapse until one of the parties receives a keepalive or update message from the other. If a router does not receive one of these messages during the hold time period, it considers the other party dead.
  • 96. • BGP identifier. This 4-byte field defines the router that sends the open message. The router usually uses one of its IP addresses (because it is unique) for this purpose. • Option length. The open message may contain some option parameters. In this case, this 1-byte field defines the length of the total option parameters. If there are no option parameters, the value of this field is zero. • Option parameters. If the value of the option parameter length is not zero, it means that there are some option parameters.
  • 97. Update Message • The update message is the heart of the BGP protocol. It is used by a router to withdraw destinations that have been advertised previously, announce a route to a new destination, or both. • Note that BGP can withdraw several destinations that were advertise before, but it can only advertise one new destination in a single update message.
  • 98. Keepalive Message • The routers (called peers in BGP parlance) running the BGP protocols exchange keepalive messages regularly (before their hold time expires) to tell each other that they are alive..
  • 99. Notification Message • A notification message is sent by a router whenever an error condition is detected or a router wants to close the connection.
  • 100. Encapsulation • BGP messages are encapsulated in TCP segments using the well-known port 179. • This means that there is no need for error control and flow control. • When a TCP connection is opened, the exchange of update, keepalive, and notification messages is continued until a notification message of type cease is sent.
  翻译: