SlideShare una empresa de Scribd logo
1 de 66
RMK College of Engineering and Technology
CS 6551
Computer Networks
Department
of
Electronics and Communication Engineering
Unit 3
Routing
Prepared by
Jai Ganesh S
Asst.Professor - ECE
Syllabus
• Routing
• RIP
• OSPF
• Metrics
• Switch basics
• Global internet
• Areas
• BGP
• IPV6
• Multicast Addresses
• Multicast Routing
• DVMRP
• PIM
Routing
Introduction
• Routing is the most important task in the networks to forward packets from source to
destination
• The devices like switches and routers take the responsibility of delivering the packets to right
destination
• This is accomplished by referring to their forwarding table and routing table respectively
• The fundamental problem is “how routers acquire the information about the network in their
routing table?”
Understanding – Routing in Real time
Understanding – Routing in Networks
Representing Network as a graph
• The routing process is well understood by representing
a network as a graph.
• Each node on the network may represent any host or
switch or router.
• Each link on the network is associated with a cost.
• The ultimate work of the router is to find the path with the
lowest cost between any nodes.
• These are performed by routing algorithm or routing
protocols.
Types of routing protocols
Distance Vector Algorithm
• The idea behind the DVR is that it maintains a table
with distance to every node
Assumptions:
• Each node contains the cost of link to the other node. These cost are configured by the administrator.
• The link that is down is assign with infinite cost.
Stages in DVR
• There are 3 stages in DVR
Initialization
Sharing
Updating
1. Initialization
Consider the given example network
Each node creates an initialization table with the cost to reach all other nodes. Since they do not know about all the
nodes, they create only for the neighboring node.
2. Sharing
From the given network Node A do not know about Node E but Node C knows about Node E.
Similarly Node C do not know about Node D
but Node A knows about Node D
Thus by sharing Node A’s Table to Node C ,
Node C learns about Node D.
By sharing Node C’s Table to Node A ,
Node A learns about Node E
3. Updating
Each and every node in the network updates its own table from the table received from the neighbor nodes.Updating process happens in 3 steps
1. Receiving node need to add the cost between itself (A) and sending node(C). (Cost of A  C is 2)2. Receiving node have to add the name of the sending node to each row as third column. This acts as the next node
information when the table is updated
3. The receiving node compares each row of its old table with the modified table.
If the next node entry is different, then the receiving node chooses the lowest value.
If the there is a tie, then old value is maintained
After several sharing and updates process all nodes in the network becomes stable and knows about the path to
reach any node on the network.
When to update??
• 2 methods
• Periodic update
• Triggered update
Instability problem
• 2 node instability
• 3 node instability
2 node instability
Remedies for 2 node instability
• Defining infinity
• Split horizon
• Split horizon with poison reverse
3 node instability
Routing Information Protocol
• Considerations
• Only networks have routing table not networks
• Metric used in Hop Count
• Infinity is 16
• Next node column defines the address of the router to reach the destination
Example scenario
Link State Routing Alg
Steps in Link state alg
• Reliable dissemination of LSP
• Creation of LSP
• Flooding of LSP
• Calculation of Routes from all received LSP
• Formation of Shortest path tree for each node
• Calculation of Routing Table
Creation of LSP
• LSP are created with 4 main information
• Node identity
• The list of links
• Sequence numbers
• Age (TTL)
Flooding
• Steps in flooding
• Creating node floods the LSP
• Receiving node compares the LSP with old LSP
• If received is old – discarded
• If received is new – old is discarded and new LSP is Flooded
• Old and new are differentiated by sequence numbers
• TTL helps in removing the old packets from the network.
Formation of shortest path
• It is created by using “Dijkstra Algorithm”
Calculation of Routing Table
OSPF Protocol
• One of the widely used link state routing is OSPF.
• OSPF offers many features
• Authentication of routing messages
 Routing messages are sent to all the nodes. Thus they should be authenticated.
• Additional hierarchy
 This is the tool to make the system more scalable. It allows many networks to be grouped as “Areas”
• Load balancing
 OSPF allows multiple routes with the same cost. Thus the traffic gets distributed all over the network.
Example Network
OSPF Header Format
Describes the version of the OSPFDescribes the total length of the mesasage
Used to identify the sender of the message
Used to identify in which area the node is locatedEntire packet except the data field is protected by check sum
Defines the type of authentication
0 - No Authentication
1 – simple password
2 – cryptographic authentication
Data
LSP Advertising Packet
• The basic building block of OSPF is creating the link state packet and
advertising them. There are 2 types of advertisements.
• Router should advertise the LSP packets to the directly connected networks
• Router should advertise information about the loss of link throughout the
network.
LSP Advertisement Packet Format
They are equal to the TTL.Defines the router that created the advertisementThey are used to detect the old or duplicate LSA’sThey are used to protect the entire advertisement packet.It defines the length of the complete LSA in bytes
Link ID and Link Data
They are used to identify the link along with the router IDThey are used to define the cost of the link
It defines the type of the link. There are 4 types of links
1. Point to point link
2. Transient link
3. Stub link
4. Virtual link
It is used for defining the type of service. It is possible to assign
different cost for the same route based on the type of service
Metrics
• The metrics that we have discussed so far were assumed that they are a known
factor for executing the algorithm.
• Drawbacks in simply assuming the metric
• They do not distinguish links on latency basis
• They do no distinguish links in capacity basis
• They do no distinguish links based on their current load.
Solution
• There are several methods evolved to calculate the metrics.
• But all we need is to test the various methods on a common flat form.
• One such flat form is known as ARPANET
• Further details about the ARPANET can be studied in the given link.
https://en.wikipedia.org/wiki/ARPANET
3 stages of ARPANET
• Original ARPANET
• New Routing Mechanism
• Revised ARPANET Routing Metric
• Each version uses different logics to compute the metric.
Original ARPANET
• In this method the metric is computed based on the “ Number of packets
queued for transmission on each link”
• Link with 10 packets queued for the transmission is assigned larger cost than
the link which has 5 packets queued for transmission.
New Routing Mechanism
• In this mechanism both latency and bandwidth is considered for calculation of metrics.
• The arrival time and depart time are captured from the time stamp added to the packet.
• Delay is computed as
• Delay = (depart time – arrival time) + Transmission time + latency.
• Based on this delay the cost will be assigned.
Revised ARPANET Routing Metric
• The major changes done in this versions are
• Compress the dynamic range of metric considerably
• Smoothen the variation of the metric with time
• Compression is achieved by taking the function of measured utilization , link type and link
speed.
• Smoothing can be achieved in 2 ways
• Averaging the delay instead of taking the trials
• Setting up a hard limit on how much the metric could change from one cycle to another cycle.
Switch Basics
• The conceptual structure of the switch is shown in the figure.
1. Control processor
• This block is responsible for moving the data from interface to memory
without the intervention of the CPU
2. Ports
• The ports communicates with the outside worlds
• It contains fiber optic receivers, buffers for holding the packets that are to be
transmitted.
• In case of virtual circuit, the port contains the virtual circuit identifier
• In case of ethernet, the port contains the forwarding table .
3. Fabrics
• They are very Basic and important function of a switch.
• They are responsible for forwarding the packets from input port to output port with minimal delay and max throughput.
• Types of Fabrics:
• Shared Bus:
• They are found in conventional processors. The bus is shared because in the conventional system the bus bandwidth determines the throughput.
• Shared Memory:
• They are found in the modern switches. They have common memory for both input and output port. Here the memory decides the throughput.
• Cross Bar:
• They are the matrix of pathways that can be configured to connect any input port to any output port.
• Self Routing:
• Self routing fabrics relay on some information in a pack header to direct each packet to its correct destination.
Global Internet
Some Techniques to address the Problems
• Areas
• Border gateway Protocol
• IP Version 6
Areas
Back bone Area or Area 0
• Inter domain Routing
• Intra domain Routing
BGP
Inter domain routing
Types of autonomous systems
• There are 3 types
• Stub autonomous system
• This type of as carries only local traffic. Ex. Small corporation
• Multi homed autonomous system
• They carries traffic for more than 2 AS. Ex. Large Corporation
• Transit autonomous system
• They carry traffic for more than 1 AS. This carries both transit traffic and local traffic.. Ex. Back bone
Providers
Challenges in Intra domain routing
• It should focus on finding the non looping path
• Backbone router should be able to route the packet anywhere in the network
• Varying nature of the AS should be addressed
• Multiple ISP’s may create a problem of reliability coz, different ISP have Different
Policies.
Path Vector Routing
• 3 stages
• Initialization
• Sharing
• Updating
1.Initialization
2. Sharing
• A1 shares with B1 and C1
• B1 shares with A1 and C1
• C1 shares with A1, B1, and C1
• D1 shares with C1
3.Updating
Looping problem
Multicast Addresses
Multicast Protocols
DVMRP
• Distance Vector Multicast Routing Protocol.
• Sharing of routing tables with the neighboring routers are not possible here.
• Each router have to create routing table from the scratch. Based on the information of the uni cast
routing.
• This can be achieved in 4 methods:
• Flooding
• Reverse Path Forwarding (RPF)
• Reverse Path Broadcasting (RPB)
• Reverse Path Multicasting (RPM)
1. Flooding
• default flooding concept.
• Router floods the all the received packets to all the ports, except the incoming
port.
• Drawbacks:
• By this method only broad casting is achieved not the multicasting.
• A router may receive multiple packets.
Reverse path Forwarding (RPF)
• In this method the packets are sent only to the
shortest path.
• This shortest path information is obtained from the
unicast routing tables.
• The router will not forward the table if the source
address and destination address are same. (in case of
receiving multiple copies)
Multicast Addresses
Ipv6 header
End
of
Unit - 3

Más contenido relacionado

La actualidad más candente

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsPeter R. Egli
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)shilpa patel
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 

La actualidad más candente (20)

Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
TCP/IP MODEL
TCP/IP MODEL TCP/IP MODEL
TCP/IP MODEL
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Error control
Error controlError control
Error control
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)Sliding window protocol(ARQ technique)
Sliding window protocol(ARQ technique)
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Multicast routing
Multicast routingMulticast routing
Multicast routing
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 

Destacado

Unit 3 computer system presention
Unit 3 computer system presentionUnit 3 computer system presention
Unit 3 computer system presentionMat_J
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answersAmit Tiwari
 
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...
1. Introduction to Association Rule2. Frequent Item Set Mining3. Market Bas...1. Introduction to Association Rule2. Frequent Item Set Mining3. Market Bas...
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...Surabhi Gosavi
 
Sliding window
 Sliding window Sliding window
Sliding windowradhaswam
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Pointers, virtual function and polymorphism
Pointers, virtual function and polymorphismPointers, virtual function and polymorphism
Pointers, virtual function and polymorphismlalithambiga kamaraj
 
Unit 3 principles of programming language
Unit 3 principles of programming languageUnit 3 principles of programming language
Unit 3 principles of programming languageVasavi College of Engg
 

Destacado (14)

Unit 3 computer system presention
Unit 3 computer system presentionUnit 3 computer system presention
Unit 3 computer system presention
 
Networking interview questions and answers
Networking interview questions and answersNetworking interview questions and answers
Networking interview questions and answers
 
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...
1. Introduction to Association Rule2. Frequent Item Set Mining3. Market Bas...1. Introduction to Association Rule2. Frequent Item Set Mining3. Market Bas...
1. Introduction to Association Rule 2. Frequent Item Set Mining 3. Market Bas...
 
Threads in Java
Threads in JavaThreads in Java
Threads in Java
 
Sliding window
 Sliding window Sliding window
Sliding window
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
Unit 5
Unit 5Unit 5
Unit 5
 
07. Virtual Functions
07. Virtual Functions07. Virtual Functions
07. Virtual Functions
 
Pointers, virtual function and polymorphism
Pointers, virtual function and polymorphismPointers, virtual function and polymorphism
Pointers, virtual function and polymorphism
 
Unit 3 principles of programming language
Unit 3 principles of programming languageUnit 3 principles of programming language
Unit 3 principles of programming language
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Ppt of types of-network
Ppt of types of-network Ppt of types of-network
Ppt of types of-network
 

Similar a Computer networks unit iii

Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptanushaj46
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxHODElex
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptRamya Nellutla
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7Tutun Juhana
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Mugabo4
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxAayushMishra89
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)ZainabShahzad9
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingAashif Raza
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 

Similar a Computer networks unit iii (20)

Routing Protocols
Routing ProtocolsRouting Protocols
Routing Protocols
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
Unit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].pptUnit-3-Part-1 [Autosaved].ppt
Unit-3-Part-1 [Autosaved].ppt
 
Network layer Part 7
Network layer Part 7Network layer Part 7
Network layer Part 7
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
Network layer
Network layerNetwork layer
Network layer
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Network layer
Network layerNetwork layer
Network layer
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
NETWORK LAYER.ppt
NETWORK LAYER.pptNETWORK LAYER.ppt
NETWORK LAYER.ppt
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 

Más de JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15JAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 

Más de JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 

Último

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 

Computer networks unit iii

  • 1. RMK College of Engineering and Technology CS 6551 Computer Networks Department of Electronics and Communication Engineering
  • 2. Unit 3 Routing Prepared by Jai Ganesh S Asst.Professor - ECE
  • 3. Syllabus • Routing • RIP • OSPF • Metrics • Switch basics • Global internet • Areas • BGP • IPV6 • Multicast Addresses • Multicast Routing • DVMRP • PIM
  • 5. Introduction • Routing is the most important task in the networks to forward packets from source to destination • The devices like switches and routers take the responsibility of delivering the packets to right destination • This is accomplished by referring to their forwarding table and routing table respectively • The fundamental problem is “how routers acquire the information about the network in their routing table?”
  • 8. Representing Network as a graph • The routing process is well understood by representing a network as a graph. • Each node on the network may represent any host or switch or router. • Each link on the network is associated with a cost. • The ultimate work of the router is to find the path with the lowest cost between any nodes. • These are performed by routing algorithm or routing protocols.
  • 9. Types of routing protocols
  • 10. Distance Vector Algorithm • The idea behind the DVR is that it maintains a table with distance to every node Assumptions: • Each node contains the cost of link to the other node. These cost are configured by the administrator. • The link that is down is assign with infinite cost.
  • 11. Stages in DVR • There are 3 stages in DVR Initialization Sharing Updating
  • 12. 1. Initialization Consider the given example network Each node creates an initialization table with the cost to reach all other nodes. Since they do not know about all the nodes, they create only for the neighboring node.
  • 13. 2. Sharing From the given network Node A do not know about Node E but Node C knows about Node E. Similarly Node C do not know about Node D but Node A knows about Node D Thus by sharing Node A’s Table to Node C , Node C learns about Node D. By sharing Node C’s Table to Node A , Node A learns about Node E
  • 14. 3. Updating Each and every node in the network updates its own table from the table received from the neighbor nodes.Updating process happens in 3 steps 1. Receiving node need to add the cost between itself (A) and sending node(C). (Cost of A  C is 2)2. Receiving node have to add the name of the sending node to each row as third column. This acts as the next node information when the table is updated 3. The receiving node compares each row of its old table with the modified table. If the next node entry is different, then the receiving node chooses the lowest value. If the there is a tie, then old value is maintained After several sharing and updates process all nodes in the network becomes stable and knows about the path to reach any node on the network.
  • 15. When to update?? • 2 methods • Periodic update • Triggered update
  • 16. Instability problem • 2 node instability • 3 node instability
  • 18. Remedies for 2 node instability • Defining infinity • Split horizon • Split horizon with poison reverse
  • 20. Routing Information Protocol • Considerations • Only networks have routing table not networks • Metric used in Hop Count • Infinity is 16 • Next node column defines the address of the router to reach the destination
  • 23. Steps in Link state alg • Reliable dissemination of LSP • Creation of LSP • Flooding of LSP • Calculation of Routes from all received LSP • Formation of Shortest path tree for each node • Calculation of Routing Table
  • 24. Creation of LSP • LSP are created with 4 main information • Node identity • The list of links • Sequence numbers • Age (TTL)
  • 25. Flooding • Steps in flooding • Creating node floods the LSP • Receiving node compares the LSP with old LSP • If received is old – discarded • If received is new – old is discarded and new LSP is Flooded • Old and new are differentiated by sequence numbers • TTL helps in removing the old packets from the network.
  • 26. Formation of shortest path • It is created by using “Dijkstra Algorithm”
  • 27.
  • 28.
  • 30. OSPF Protocol • One of the widely used link state routing is OSPF. • OSPF offers many features • Authentication of routing messages  Routing messages are sent to all the nodes. Thus they should be authenticated. • Additional hierarchy  This is the tool to make the system more scalable. It allows many networks to be grouped as “Areas” • Load balancing  OSPF allows multiple routes with the same cost. Thus the traffic gets distributed all over the network.
  • 32. OSPF Header Format Describes the version of the OSPFDescribes the total length of the mesasage Used to identify the sender of the message Used to identify in which area the node is locatedEntire packet except the data field is protected by check sum Defines the type of authentication 0 - No Authentication 1 – simple password 2 – cryptographic authentication Data
  • 33. LSP Advertising Packet • The basic building block of OSPF is creating the link state packet and advertising them. There are 2 types of advertisements. • Router should advertise the LSP packets to the directly connected networks • Router should advertise information about the loss of link throughout the network.
  • 34. LSP Advertisement Packet Format They are equal to the TTL.Defines the router that created the advertisementThey are used to detect the old or duplicate LSA’sThey are used to protect the entire advertisement packet.It defines the length of the complete LSA in bytes Link ID and Link Data They are used to identify the link along with the router IDThey are used to define the cost of the link It defines the type of the link. There are 4 types of links 1. Point to point link 2. Transient link 3. Stub link 4. Virtual link It is used for defining the type of service. It is possible to assign different cost for the same route based on the type of service
  • 35. Metrics • The metrics that we have discussed so far were assumed that they are a known factor for executing the algorithm. • Drawbacks in simply assuming the metric • They do not distinguish links on latency basis • They do no distinguish links in capacity basis • They do no distinguish links based on their current load.
  • 36. Solution • There are several methods evolved to calculate the metrics. • But all we need is to test the various methods on a common flat form. • One such flat form is known as ARPANET • Further details about the ARPANET can be studied in the given link. https://en.wikipedia.org/wiki/ARPANET
  • 37. 3 stages of ARPANET • Original ARPANET • New Routing Mechanism • Revised ARPANET Routing Metric • Each version uses different logics to compute the metric.
  • 38. Original ARPANET • In this method the metric is computed based on the “ Number of packets queued for transmission on each link” • Link with 10 packets queued for the transmission is assigned larger cost than the link which has 5 packets queued for transmission.
  • 39. New Routing Mechanism • In this mechanism both latency and bandwidth is considered for calculation of metrics. • The arrival time and depart time are captured from the time stamp added to the packet. • Delay is computed as • Delay = (depart time – arrival time) + Transmission time + latency. • Based on this delay the cost will be assigned.
  • 40. Revised ARPANET Routing Metric • The major changes done in this versions are • Compress the dynamic range of metric considerably • Smoothen the variation of the metric with time • Compression is achieved by taking the function of measured utilization , link type and link speed. • Smoothing can be achieved in 2 ways • Averaging the delay instead of taking the trials • Setting up a hard limit on how much the metric could change from one cycle to another cycle.
  • 41. Switch Basics • The conceptual structure of the switch is shown in the figure.
  • 42. 1. Control processor • This block is responsible for moving the data from interface to memory without the intervention of the CPU
  • 43. 2. Ports • The ports communicates with the outside worlds • It contains fiber optic receivers, buffers for holding the packets that are to be transmitted. • In case of virtual circuit, the port contains the virtual circuit identifier • In case of ethernet, the port contains the forwarding table .
  • 44. 3. Fabrics • They are very Basic and important function of a switch. • They are responsible for forwarding the packets from input port to output port with minimal delay and max throughput. • Types of Fabrics: • Shared Bus: • They are found in conventional processors. The bus is shared because in the conventional system the bus bandwidth determines the throughput. • Shared Memory: • They are found in the modern switches. They have common memory for both input and output port. Here the memory decides the throughput. • Cross Bar: • They are the matrix of pathways that can be configured to connect any input port to any output port. • Self Routing: • Self routing fabrics relay on some information in a pack header to direct each packet to its correct destination.
  • 46. Some Techniques to address the Problems • Areas • Border gateway Protocol • IP Version 6
  • 47. Areas
  • 48. Back bone Area or Area 0
  • 49. • Inter domain Routing • Intra domain Routing BGP
  • 51. Types of autonomous systems • There are 3 types • Stub autonomous system • This type of as carries only local traffic. Ex. Small corporation • Multi homed autonomous system • They carries traffic for more than 2 AS. Ex. Large Corporation • Transit autonomous system • They carry traffic for more than 1 AS. This carries both transit traffic and local traffic.. Ex. Back bone Providers
  • 52. Challenges in Intra domain routing • It should focus on finding the non looping path • Backbone router should be able to route the packet anywhere in the network • Varying nature of the AS should be addressed • Multiple ISP’s may create a problem of reliability coz, different ISP have Different Policies.
  • 53. Path Vector Routing • 3 stages • Initialization • Sharing • Updating
  • 55. 2. Sharing • A1 shares with B1 and C1 • B1 shares with A1 and C1 • C1 shares with A1, B1, and C1 • D1 shares with C1
  • 60. DVMRP • Distance Vector Multicast Routing Protocol. • Sharing of routing tables with the neighboring routers are not possible here. • Each router have to create routing table from the scratch. Based on the information of the uni cast routing. • This can be achieved in 4 methods: • Flooding • Reverse Path Forwarding (RPF) • Reverse Path Broadcasting (RPB) • Reverse Path Multicasting (RPM)
  • 61. 1. Flooding • default flooding concept. • Router floods the all the received packets to all the ports, except the incoming port. • Drawbacks: • By this method only broad casting is achieved not the multicasting. • A router may receive multiple packets.
  • 62. Reverse path Forwarding (RPF) • In this method the packets are sent only to the shortest path. • This shortest path information is obtained from the unicast routing tables. • The router will not forward the table if the source address and destination address are same. (in case of receiving multiple copies)
  • 63.

Notas del editor

  1. View in Slide Show Mode