尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
N.Jagadish kumar
Assistant Professor-IT
ROUTING
2
11.1 Introduction11.1 Introduction
11.2 Intra- and Inter-Domain11.2 Intra- and Inter-Domain
RoutingRouting
11.3 Distance Vector Routing11.3 Distance Vector Routing
11.4 RIP11.4 RIP
11.5 Link State Routing11.5 Link State Routing
11.6 OSPF11.6 OSPF
11.7 Path Vector Routing11.7 Path Vector Routing
11.8 BGP11.8 BGP
An internet is a combination of networks connected
by routers. When a datagram goes from a source to
a destination, it will probably pass through many
routers until it reaches the router attached to the
destination network.
INTER- AND INTRA-DOMAIN ROUTING
Today, an internet can be so large that one routing
protocol cannot handle the task of updating the
routing tables of all routers. For this reason, an
internet is divided into autonomous systems.
An autonomous system (AS) is a group of
networks and routers under the authority of a single
administration. Routing inside an autonomous
system is called intra-domain routing. Routing
between autonomous systems is called inter-domain
routing
Autonomous systems
Popular routing protocols
DISTANCE VECTOR ROUTING
Today, an internet can be so large that one routing
protocol cannot handle the task of updating the
routing tables of all routers. For this reason, an
internet is divided into autonomous systems.
An autonomous system (AS) is a group of networks
and routers under the authority of a single
administration. Routing inside an autonomous
system is called intra-domain routing. Routing
between autonomous systems is called inter-domain
routing
Updating Routing Table
If the next-node entry is different
The receiving node chooses the row with the smaller cost
If there is a tie, the old one is kept
If the next-node entry is the same
i.e. the sender of the new row is the provider of the old
entry
The receiving node chooses the new row, even though
the new value is infinity.
When to Share
Periodic Update
A node sends its routing table, normally 30 seconds, in a
periodic update
Triggered Update
A node sends its routing table to its neighbors any time
when there is a change in its routing table
1. After updating its routing table, or
2. Detects some failure in the neighboring links
Example 11.2
Net4 , 1
3
Net5 , 1
4
Net2 , 1
2
Two-node instability
RIP
The Routing Information Protocol (RIP) is an intra-
domain (interior) routing protocol used inside an
autonomous system.
It is a very simple protocol based on distance vector
routing. RIP implements distance vector routing
directly with some considerations.
Topics Discussed in the SectionTopics Discussed in the Section
 RIP Message Format
 Request and Response
Timers in RIP
 RIP Version 2
 Encapsulation
RIP messages
Request
A request message is sent by a router that has just come
up or by a router that has some time-out entries
A request can ask about specific entries or all entries
Response
A response can be either solicited or unsolicited (30s or
when there is a change in the routing table)
RIP Timers
Periodic timer
It controls the advertising of regular update message (25 ~ 30 sec)
Expiration timer
It governs the validity of a route (180 sec)
The route is considered expired and the hop count of the route is set
to 16
Garbage collection timer
A invalid route is not purged from the routing table until this
timer expires (120 sec)
RIPv2 vs. RIPv1
Classless Addressing
Authentication
Multicasting
RIPv1 uses broadcasting to send RIP messages to every
neighbors. Routers as well as hosts receive the packets
RIPv2 uses the all-router multicast address to send the RIP
messages only to RIP routers in the network
Example of a domain using RIP
RIP message format
Request messages
LINK STATE ROUTING
Link state routing has a different philosophy from
that of distance vector routing.
In link state routing, if each node in the domain has
the entire topology of the domain—the list of nodes
and links, how they are connected including the
type, cost (metric), and the condition of the links (up
or down)—the node can use the Dijkstra algorithm to
build a routing table.
Concept of Link state routing
Link state knowledge
Building Routing Tables
Creation of the states of the links by each node, called the
link state packets (LSP)
Dissemination of LSPs to every other routers,
called flooding (efficiently)
Formation of a shortest path tree for each node
Calculation of a routing table based on the
shortest path tree
Creation of LSP
LSP data: E.g. the node ID, the list of links, a
sequence number, and age.
LSP Generation
When there is a change in the topology of the
domain
On a periodic basis
There is no actual need for this type of LSP, normally
60 minutes or 2 hours
Forming shortest path three for router A in a graph
OSPF
The Open Shortest Path First (OSPF) protocol is an
intra-domain routing protocol based on link state
routing. Its domain is also an autonomous system.
Areas in an autonomous system
Area in OSPF (1)
A collection of networks with area ID
Routers inside an area flood the area with routing
information
Area border routers summarize the information about the
area and send it to other areas
Backbone area and backbone routers
All of the area inside an AS must be connected to the
backbone
Area in OSPF (2)
Virtual link
If, because of some problem, the connectivity
between a backbone and an area is broken, a
virtual link between routers must be created
by the administration to allow continuity of the
functions of the backbone as the primary area
Types of links
Point-to-point link
Transient link
Stub link
Example of an AS and its graphical representation in OSPF
Types of OSPF packet
OSPF common header
BGP
Border Gateway Protocol (BGP) is an interdomain
routing protocol using path vector routing. It first
appeared in 1989 and has gone through four
versions.
Topics Discussed in the SectionTopics Discussed in the Section
 Types of Autonomous Systems
 Path Attributes
 BGP Sessions
 External and Internal BGP
 Types of Packets
 Packet Format
 Encapsulation
Internal and external BGP sessions
A speaker node advertises the
path, not the metric of the
nodes, in its AS or other ASs.
Path Vector Routing (1)
• Sharing
– A speaker in an AS shares its table with
immediate neighbors
• Updating
– Adding the nodes that are not in its
routing table and adding its own AS and
the AS that sent the table
– The routing table shows the path
completely
Path Vector Routing (2)
• Loop prevention
– A route checks to see if its AS is in the
path list to the destination
• Policy routing
– If one of the ASs listed in the path is
against its policy, it can ignore that path
and that destination
– It does not update its routing table with
the path, and it does not send this
message to its neighbors
Path Vector Routing (3)
• Optimum path
– Problem: each AS that is included in the
path may use a different criteria for
the metric
– The optimum path is the path that fits
the organization
– For Fig. 14-49, the author chose the one
that had the smaller number of ASs
– Other criteria: security, safety,
reliability, etc.
Types of AS
• Stub AS
– Only one connection to another AS (only
a source or sink for data traffic)
• Multihomed AS
– More than one connection to other AS,
but it is still only a source or sink for
data traffic
• Transit AS
– Multihomed AS that also allows
transient traffic
Types of BGP messages
BGP packet header
Open message
Update message
Unicasting
In unicasting, the router forwards the received
packet through only one of its interfaces
Multicasting
In multicast routing, the router may forward the
received packet through several of its interfaces.
Broadcasting is a special case of multicasting
Multicasting
In multicast routing, the router may forward the received packet
through several of its interfaces.
Broadcasting is a special case of multicasting
Multicasting Applications
Access to distributed databases
Information dissemination
Dissemination of news
Teleconferencing
Distance learning
Multicast tree
Objectives of multicasting:
• Every member of the group should receive one, and only one, copy
of the multicast packet. Nonmember must not receive a copy
• There must be no loops in routing
• The path traveled from source to each destination must be optimal
In a source-based tree approach, the combination of source and group
determines the tree (DVMRP, MOSPF, PIM-DM)
In the group-shared tree approach, the group determines the tree
(CBT, PIM-SM)
Multicast Routing
Optimal routing: Shortest path trees
Unicast Routing
Each router in the domain has a table that defines a shortest path
tree to possible destinations
Shortest Path Tree
 Multicast Routing
Each involved router needs to construct a shortest path tree for each group
 Source-Based Tree and Group-Shared Tree
 In the source-based tree approach, each router needs to have one shortest path
tree for each group
Shortest Path Tree
In the group-shared tree approach, only the core router, which has
a shortest path tree for each group, is involved in multicasting
Multicast Protocols
Multicast Link State Routing: MOSPF
Multicast link state routing uses the source-based tree approach
n (the number of group) topologies and n shortest path trees made
Each router has a routing table that represents as many shortest
path trees as there are groups
MOSPF is an extension of the OSPF protocol that uses multicast
link state routing to create source-based trees
MOSPF requires a new link state update packet to associate the
unicast address of a host with the group address or addresses the
host is sponsoring
MOSPF is a data-driven protocol; the first time an MOSPF router
see a datagram with a given source and group address, the router
constructs the Dijkstra shortest path tree
Multicast Distance Vector: DVMRP
Multicast distance vector routing uses the source-based trees, but
the router never actually makes a routing table
Multicast routing does not allow a router to send its routing table
to its neighbors. The idea is to create a table from scratch by using
the information from the unicast distance vector tables
Process based on four decision-making strategies. Each strategy is
built on its predecessor
Flooding
Reverse Path Forwarding (RPF)
Reverse Path Broadcasting (RPB)
Reverse Path Multicasting (RPM)
DVMRP: Strategies
Flooding broadcasts packets, but creates loops in the systems
Reverse path forwarding: RPF eliminates the loop in the flooding
process
DVMRP: Strategies
Reverse path broadcasting: RPB creates a shortest path broadcast
tree from the source to each destination. It guarantees that each
destination receives one and only one copy of the packet
Problem with RPF
DVMRP: Strategies
Reverse path multicasting: RPM adds pruning and grafting to RPB
to create a multicast shortest path tree that supports dynamic
membership changes
Core-Based Tree (CBT)
CBT is a group-shared protocol that uses a core as the root of the tree
AS is divided into regions, and core (center router or rendezvous
router) is chosen for each region
Each router sends a unicast join message to rendezvous router
When the rendezvous router has received all join messages from every
member of the group, the tree is formed
Sending Multicast Packets
The source sends the multicast packet (encapsulated in a unicast
packet) to the core router. The core router decapsulates the packet
and forwards it to all interested hosts. Each router that receives the
multicast packet, in turn, forwards it to all interested ports
Protocol Independent Multicast (PIM)
PIM-DM (Dense Mode) and PIM-SM (Sparse Mode)
PIM-DM is used in a dense multicast environment, such as a LAN
PIM-DM is a source-based tree routing protocol that uses RPF and
pruning and grafting strategies for multicasting. However, it is
independent of the underlying unicast protocol.
PIM-SM is used in a sparse multicast environment such as a WAN
PIM-SM is a group-shared routing protocol that has a rendezvous
point as the source of the tree
PIM-SM is similar to CBT but uses a simpler procedure.

More Related Content

What's hot

Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
Kashif Latif
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
Nitesh Singh
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
Respa Peter
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
Iffat Anjum
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
IP Routing
IP RoutingIP Routing
IP Routing
Ravi Shairaywal
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
Unni Kannan VijayaKumar
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
Shawn Zandi
 
HDLC
HDLCHDLC
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Nita Dalla
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
DHCP
DHCPDHCP
DHCP basics
DHCP basicsDHCP basics
DHCP basics
Mansi Kansara
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
KABILESH RAMAR
 
Routing
RoutingRouting
Routing
Saima Azam
 
HiperLAN.ppt
HiperLAN.pptHiperLAN.ppt
HiperLAN.ppt
SwarnaKumariChinni
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
Ameer Agel
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 

What's hot (20)

Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
IP Routing
IP RoutingIP Routing
IP Routing
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
HDLC
HDLCHDLC
HDLC
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
 
DHCP
DHCPDHCP
DHCP
 
DHCP basics
DHCP basicsDHCP basics
DHCP basics
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Routing
RoutingRouting
Routing
 
HiperLAN.ppt
HiperLAN.pptHiperLAN.ppt
HiperLAN.ppt
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 

Similar to Routing protocols

Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
assinha
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
niran10
 
Arun project-Final
Arun project-FinalArun project-Final
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
muazumuhammad6
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
Munnakumar518378
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
SagarR24
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
Vignesh kumar
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
AIRTEL
 
OSPF.pdf
OSPF.pdfOSPF.pdf
OSPF.pdf
Jayaprasanna4
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Reetesh Gupta
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
SolWeje
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
tmavroidis
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
MNSUAM
 
Ccna day3
Ccna day3Ccna day3
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
Sachin Morya
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
Ccna day3Ccna day3
Ccna day3
danishrafiq
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
NilsJuanSoncoMedina
 

Similar to Routing protocols (20)

Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
3 ip routing eigrp
3 ip routing eigrp3 ip routing eigrp
3 ip routing eigrp
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
OSPF Open Shortest Path First protocol full details
OSPF Open Shortest Path First  protocol full detailsOSPF Open Shortest Path First  protocol full details
OSPF Open Shortest Path First protocol full details
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
OSPF.pdf
OSPF.pdfOSPF.pdf
OSPF.pdf
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
ospf.ppt
ospf.pptospf.ppt
ospf.ppt
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Routing protocols.pptx
Routing protocols.pptxRouting protocols.pptx
Routing protocols.pptx
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
ch2_p3_ospf.pptx
ch2_p3_ospf.pptxch2_p3_ospf.pptx
ch2_p3_ospf.pptx
 

More from N.Jagadish Kumar

Human computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco systemHuman computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco system
N.Jagadish Kumar
 
Human computer interaction -Design and software process
Human computer interaction -Design and software processHuman computer interaction -Design and software process
Human computer interaction -Design and software process
N.Jagadish Kumar
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
N.Jagadish Kumar
 
Human computer interaction -Input output channel with Scenario
Human computer interaction -Input output channel with ScenarioHuman computer interaction -Input output channel with Scenario
Human computer interaction -Input output channel with Scenario
N.Jagadish Kumar
 
Human computer interaction -Input output channel
Human computer interaction -Input output channelHuman computer interaction -Input output channel
Human computer interaction -Input output channel
N.Jagadish Kumar
 
Human Computer Interaction Introduction
Human Computer Interaction IntroductionHuman Computer Interaction Introduction
Human Computer Interaction Introduction
N.Jagadish Kumar
 
HDFS
HDFSHDFS
Big data explanation with real time use case
 Big data explanation with real time use case Big data explanation with real time use case
Big data explanation with real time use case
N.Jagadish Kumar
 
AWS INTRODUCTION
AWS INTRODUCTIONAWS INTRODUCTION
AWS INTRODUCTION
N.Jagadish Kumar
 
Database mangement system a simple introduction
Database mangement system a  simple introductionDatabase mangement system a  simple introduction
Database mangement system a simple introduction
N.Jagadish Kumar
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
N.Jagadish Kumar
 
Datawarehouse
DatawarehouseDatawarehouse
Datawarehouse
N.Jagadish Kumar
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
N.Jagadish Kumar
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
N.Jagadish Kumar
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
N.Jagadish Kumar
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
N.Jagadish Kumar
 
Beginers guide for oracle sql
Beginers guide for oracle sqlBeginers guide for oracle sql
Beginers guide for oracle sql
N.Jagadish Kumar
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 

More from N.Jagadish Kumar (18)

Human computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco systemHuman computer interaction-web interface design and mobile eco system
Human computer interaction-web interface design and mobile eco system
 
Human computer interaction -Design and software process
Human computer interaction -Design and software processHuman computer interaction -Design and software process
Human computer interaction -Design and software process
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
 
Human computer interaction -Input output channel with Scenario
Human computer interaction -Input output channel with ScenarioHuman computer interaction -Input output channel with Scenario
Human computer interaction -Input output channel with Scenario
 
Human computer interaction -Input output channel
Human computer interaction -Input output channelHuman computer interaction -Input output channel
Human computer interaction -Input output channel
 
Human Computer Interaction Introduction
Human Computer Interaction IntroductionHuman Computer Interaction Introduction
Human Computer Interaction Introduction
 
HDFS
HDFSHDFS
HDFS
 
Big data explanation with real time use case
 Big data explanation with real time use case Big data explanation with real time use case
Big data explanation with real time use case
 
AWS INTRODUCTION
AWS INTRODUCTIONAWS INTRODUCTION
AWS INTRODUCTION
 
Database mangement system a simple introduction
Database mangement system a  simple introductionDatabase mangement system a  simple introduction
Database mangement system a simple introduction
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Datawarehouse
DatawarehouseDatawarehouse
Datawarehouse
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Beginers guide for oracle sql
Beginers guide for oracle sqlBeginers guide for oracle sql
Beginers guide for oracle sql
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Recently uploaded

pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
BiplabHalder13
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
Kalna College
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
Ben Aldrich
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
MattVassar1
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
Infosec
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 

Recently uploaded (20)

pol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdfpol sci Election and Representation Class 11 Notes.pdf
pol sci Election and Representation Class 11 Notes.pdf
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 

Routing protocols

  • 2. 2 11.1 Introduction11.1 Introduction 11.2 Intra- and Inter-Domain11.2 Intra- and Inter-Domain RoutingRouting 11.3 Distance Vector Routing11.3 Distance Vector Routing 11.4 RIP11.4 RIP 11.5 Link State Routing11.5 Link State Routing 11.6 OSPF11.6 OSPF 11.7 Path Vector Routing11.7 Path Vector Routing 11.8 BGP11.8 BGP
  • 3. An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many routers until it reaches the router attached to the destination network.
  • 4. INTER- AND INTRA-DOMAIN ROUTING Today, an internet can be so large that one routing protocol cannot handle the task of updating the routing tables of all routers. For this reason, an internet is divided into autonomous systems. An autonomous system (AS) is a group of networks and routers under the authority of a single administration. Routing inside an autonomous system is called intra-domain routing. Routing between autonomous systems is called inter-domain routing
  • 7. DISTANCE VECTOR ROUTING Today, an internet can be so large that one routing protocol cannot handle the task of updating the routing tables of all routers. For this reason, an internet is divided into autonomous systems. An autonomous system (AS) is a group of networks and routers under the authority of a single administration. Routing inside an autonomous system is called intra-domain routing. Routing between autonomous systems is called inter-domain routing
  • 8. Updating Routing Table If the next-node entry is different The receiving node chooses the row with the smaller cost If there is a tie, the old one is kept If the next-node entry is the same i.e. the sender of the new row is the provider of the old entry The receiving node chooses the new row, even though the new value is infinity.
  • 9. When to Share Periodic Update A node sends its routing table, normally 30 seconds, in a periodic update Triggered Update A node sends its routing table to its neighbors any time when there is a change in its routing table 1. After updating its routing table, or 2. Detects some failure in the neighboring links
  • 10.
  • 11. Example 11.2 Net4 , 1 3 Net5 , 1 4 Net2 , 1 2
  • 12.
  • 14. RIP The Routing Information Protocol (RIP) is an intra- domain (interior) routing protocol used inside an autonomous system. It is a very simple protocol based on distance vector routing. RIP implements distance vector routing directly with some considerations.
  • 15. Topics Discussed in the SectionTopics Discussed in the Section  RIP Message Format  Request and Response Timers in RIP  RIP Version 2  Encapsulation
  • 16. RIP messages Request A request message is sent by a router that has just come up or by a router that has some time-out entries A request can ask about specific entries or all entries Response A response can be either solicited or unsolicited (30s or when there is a change in the routing table)
  • 17. RIP Timers Periodic timer It controls the advertising of regular update message (25 ~ 30 sec) Expiration timer It governs the validity of a route (180 sec) The route is considered expired and the hop count of the route is set to 16 Garbage collection timer A invalid route is not purged from the routing table until this timer expires (120 sec)
  • 18. RIPv2 vs. RIPv1 Classless Addressing Authentication Multicasting RIPv1 uses broadcasting to send RIP messages to every neighbors. Routers as well as hosts receive the packets RIPv2 uses the all-router multicast address to send the RIP messages only to RIP routers in the network
  • 19. Example of a domain using RIP
  • 22. LINK STATE ROUTING Link state routing has a different philosophy from that of distance vector routing. In link state routing, if each node in the domain has the entire topology of the domain—the list of nodes and links, how they are connected including the type, cost (metric), and the condition of the links (up or down)—the node can use the Dijkstra algorithm to build a routing table.
  • 23. Concept of Link state routing
  • 25. Building Routing Tables Creation of the states of the links by each node, called the link state packets (LSP) Dissemination of LSPs to every other routers, called flooding (efficiently) Formation of a shortest path tree for each node Calculation of a routing table based on the shortest path tree
  • 26. Creation of LSP LSP data: E.g. the node ID, the list of links, a sequence number, and age. LSP Generation When there is a change in the topology of the domain On a periodic basis There is no actual need for this type of LSP, normally 60 minutes or 2 hours
  • 27. Forming shortest path three for router A in a graph
  • 28.
  • 29.
  • 30. OSPF The Open Shortest Path First (OSPF) protocol is an intra-domain routing protocol based on link state routing. Its domain is also an autonomous system.
  • 31. Areas in an autonomous system
  • 32. Area in OSPF (1) A collection of networks with area ID Routers inside an area flood the area with routing information Area border routers summarize the information about the area and send it to other areas Backbone area and backbone routers All of the area inside an AS must be connected to the backbone
  • 33. Area in OSPF (2) Virtual link If, because of some problem, the connectivity between a backbone and an area is broken, a virtual link between routers must be created by the administration to allow continuity of the functions of the backbone as the primary area
  • 38. Example of an AS and its graphical representation in OSPF
  • 39. Types of OSPF packet
  • 41. BGP Border Gateway Protocol (BGP) is an interdomain routing protocol using path vector routing. It first appeared in 1989 and has gone through four versions.
  • 42. Topics Discussed in the SectionTopics Discussed in the Section  Types of Autonomous Systems  Path Attributes  BGP Sessions  External and Internal BGP  Types of Packets  Packet Format  Encapsulation
  • 43. Internal and external BGP sessions A speaker node advertises the path, not the metric of the nodes, in its AS or other ASs.
  • 44. Path Vector Routing (1) • Sharing – A speaker in an AS shares its table with immediate neighbors • Updating – Adding the nodes that are not in its routing table and adding its own AS and the AS that sent the table – The routing table shows the path completely
  • 45. Path Vector Routing (2) • Loop prevention – A route checks to see if its AS is in the path list to the destination • Policy routing – If one of the ASs listed in the path is against its policy, it can ignore that path and that destination – It does not update its routing table with the path, and it does not send this message to its neighbors
  • 46. Path Vector Routing (3) • Optimum path – Problem: each AS that is included in the path may use a different criteria for the metric – The optimum path is the path that fits the organization – For Fig. 14-49, the author chose the one that had the smaller number of ASs – Other criteria: security, safety, reliability, etc.
  • 47. Types of AS • Stub AS – Only one connection to another AS (only a source or sink for data traffic) • Multihomed AS – More than one connection to other AS, but it is still only a source or sink for data traffic • Transit AS – Multihomed AS that also allows transient traffic
  • 48. Types of BGP messages
  • 51. Unicasting In unicasting, the router forwards the received packet through only one of its interfaces
  • 52. Multicasting In multicast routing, the router may forward the received packet through several of its interfaces. Broadcasting is a special case of multicasting
  • 53. Multicasting In multicast routing, the router may forward the received packet through several of its interfaces. Broadcasting is a special case of multicasting
  • 54. Multicasting Applications Access to distributed databases Information dissemination Dissemination of news Teleconferencing Distance learning
  • 55. Multicast tree Objectives of multicasting: • Every member of the group should receive one, and only one, copy of the multicast packet. Nonmember must not receive a copy • There must be no loops in routing • The path traveled from source to each destination must be optimal In a source-based tree approach, the combination of source and group determines the tree (DVMRP, MOSPF, PIM-DM) In the group-shared tree approach, the group determines the tree (CBT, PIM-SM)
  • 56. Multicast Routing Optimal routing: Shortest path trees Unicast Routing Each router in the domain has a table that defines a shortest path tree to possible destinations
  • 57. Shortest Path Tree  Multicast Routing Each involved router needs to construct a shortest path tree for each group  Source-Based Tree and Group-Shared Tree  In the source-based tree approach, each router needs to have one shortest path tree for each group
  • 58. Shortest Path Tree In the group-shared tree approach, only the core router, which has a shortest path tree for each group, is involved in multicasting
  • 60. Multicast Link State Routing: MOSPF Multicast link state routing uses the source-based tree approach n (the number of group) topologies and n shortest path trees made Each router has a routing table that represents as many shortest path trees as there are groups MOSPF is an extension of the OSPF protocol that uses multicast link state routing to create source-based trees MOSPF requires a new link state update packet to associate the unicast address of a host with the group address or addresses the host is sponsoring MOSPF is a data-driven protocol; the first time an MOSPF router see a datagram with a given source and group address, the router constructs the Dijkstra shortest path tree
  • 61. Multicast Distance Vector: DVMRP Multicast distance vector routing uses the source-based trees, but the router never actually makes a routing table Multicast routing does not allow a router to send its routing table to its neighbors. The idea is to create a table from scratch by using the information from the unicast distance vector tables Process based on four decision-making strategies. Each strategy is built on its predecessor Flooding Reverse Path Forwarding (RPF) Reverse Path Broadcasting (RPB) Reverse Path Multicasting (RPM)
  • 62. DVMRP: Strategies Flooding broadcasts packets, but creates loops in the systems Reverse path forwarding: RPF eliminates the loop in the flooding process
  • 63. DVMRP: Strategies Reverse path broadcasting: RPB creates a shortest path broadcast tree from the source to each destination. It guarantees that each destination receives one and only one copy of the packet Problem with RPF
  • 64. DVMRP: Strategies Reverse path multicasting: RPM adds pruning and grafting to RPB to create a multicast shortest path tree that supports dynamic membership changes
  • 65. Core-Based Tree (CBT) CBT is a group-shared protocol that uses a core as the root of the tree AS is divided into regions, and core (center router or rendezvous router) is chosen for each region Each router sends a unicast join message to rendezvous router When the rendezvous router has received all join messages from every member of the group, the tree is formed
  • 66. Sending Multicast Packets The source sends the multicast packet (encapsulated in a unicast packet) to the core router. The core router decapsulates the packet and forwards it to all interested hosts. Each router that receives the multicast packet, in turn, forwards it to all interested ports
  • 67. Protocol Independent Multicast (PIM) PIM-DM (Dense Mode) and PIM-SM (Sparse Mode) PIM-DM is used in a dense multicast environment, such as a LAN PIM-DM is a source-based tree routing protocol that uses RPF and pruning and grafting strategies for multicasting. However, it is independent of the underlying unicast protocol. PIM-SM is used in a sparse multicast environment such as a WAN PIM-SM is a group-shared routing protocol that has a rendezvous point as the source of the tree PIM-SM is similar to CBT but uses a simpler procedure.
  翻译: