(GRE) Tunnel Over Ipsec VPN Using Transport Mode with Open Shortest

Total Page:16

File Type:pdf, Size:1020Kb

(GRE) Tunnel Over Ipsec VPN Using Transport Mode with Open Shortest Avaya Solution & Interoperability Test Lab Configuring a Generic Routing Encapsulation (GRE) Tunnel Over IPSec VPN Using Transport Mode with Open Shortest Path First (OSPF) Routing Protocol between an Avaya G250 Media Gateway and a Cisco Access Router - Issue 1.0 Abstract These Application Notes present the steps necessary to configure a Generic Routing Encapsulation (GRE) tunnel over IPSec VPN using transport mode for Open Shortest Path First (OSPF) routing protocol between the Avaya G250 Media Gateway and a Cisco Access Router. Without a GRE tunnel, an IPSec configuration cannot transfer routing protocols, such as OSPF. JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc 1. Introduction The network diagram in Figure 1 shows two offices. The office labeled “Main Office” uses an Avaya S8500 Media Server and an Avaya G650 Media Gateway. The office labeled “Small Office” contains an Avaya G250-BRI Media Gateway. As shown in Figure 1, a VPN tunnel across the Internet between the Avaya G250-BRI Media Gateway and the Cisco 3745 Access Router is used between the Main and Small Offices. Normal IP Security (IPSec) configurations cannot transfer routing protocols, such as Open Shortest Path First (OSPF). These Application Notes illustrate how to configure a Generic Routing Encapsulation (GRE) tunnel to accomplish the routing between the different networks. The access to the Internet from the Avaya G250-BRI Media Gateway and the Cisco Access Router are configured to use PPP over T1 in the sample configuration. The Avaya Inter-Gateway Alternate Routing (IGAR) feature provides a means of alternately using PSTN facilities when the IP link is incapable of carrying the bearer connection. The number of VoIP calls allowed on the IP link is determined by the Call Admission Control – Bandwidth Limit (CAC-BL) reported from the Avaya G250-BRI Media Gateway and the IP Codec used. Once the bandwidth limit is reached, subsequent calls will use the PSTN facilities. Main Office Small Office Avaya IP Telephones Avaya IP Telephones Cisco Avaya S8300 LSP With Catalyst Avaya S8500 6509 Avaya G250-BRI Media Gateway Media Server PMI: 192.168.203.1 12.160.179.124 68.38.206.100 Internet IPSI-2 Cisco 3745 C-LAN IPSe c Tunne l MEDPRO 10.10.11.2 10.10.11.1 Avaya Analog Phone Avaya G650 GRE Tunnel Media Gateway Avaya Analog Phone PSTN ISDN PRI ISDN BRI Figure 1: GRE Tunnel Over IPSec Configuration Between an Avaya G250-BRI Media Gateway and a Cisco Access Router JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 2 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc 2. Equipment and Software Validated Table 1 below shows the versions verified in these Application Notes. Equipment Software Avaya Communication Manager Avaya S8500 Media Server 3.0 (load 337.0) Avaya S8300 Media Server (LSP) 3.0 (load 337.0) Avaya G650 Media Gateway IPSI (TN2312AP) HW03 FW012 C-LAN (TN799DP) HW01 FW012 MEDPRO (TN2302AP) HW15 FW102 Avaya G250-BRI Media Gateway 24.11.1 Avaya 4600 Series IP Telephones 2.1.3 Cisco 3745 Access Router 12.3(13) Cisco Catalyst 6509 Switch Layer 2 8.3(4) Layer 3 12.1(13)E6 Table 1: Software Versions 3. Configurations The Avaya IGAR is a single-server feature that provides an alternate bearer path between the Port Networks (PNs) and Gateways (GWs). In order to keep a single-server system, the IP connection must exist between the Avaya Media Server and Avaya PNs/GWs. As shown in Figure 1, the Avaya G250-BRI Media Gateway will register to the Avaya S8300 Local Survivable Processor (LSP) when there is no IP connection between the Main and Small Offices. Sections 3.1 and 3.2 focus on the VPN related configuration between the Avaya G250-BRI Media Gateway and the Cisco Access Router. Refer to reference [1] for how to configure the Avaya IGAR feature based on Figure 1. 3.1 Configure Avaya G250-BRI Media Gateway 3.1.1. Configure IP Routing on the Avaya G250-BRI Media Gateway The following screen shows VLAN configurations of VLAN 202 and 203. VLAN 203 is configured as the Primary Management Interface (PMI). The G250-BRI Media Gateway will use the PMI to register to the Media Gateway Controllers (MGC). interface Vlan 202 ip address 192.168.202.1 255.255.255.0 interface Vlan 203 icc-vlan ip address 192.168.203.1 255.255.255.0 pmi JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 3 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc In the following screen, a MM340 T1/E1 data module on the G250-BRI Media Gateway is connected to the Internet with a public IP address. The module is configured to T1 by default. Channel group 1 is configured with 24 channels. The corresponding Serial interface 2/1:1 is configured to PPP encapsulation. ds-mode t1 controller t1 2/1 linecode b8zs framing esf channel-group 1 timeslots 1-24 speed 64 interface Serial 2/1:1 encapsulation ppp ip address 68.38.206.100 255.255.255.0 In the following screen, a GRE tunnel interface is configured. The tunnel source IP address is the IP address of Serial 2/1:1 and the tunnel destination is the Cisco Access Router’s public IP address. The tunnel IP addresses on the Avaya G250-BRI Media Gateway and Cisco Access Router must be configured on the same network for OSPF routing protocol. interface Tunnel 1 tunnel source 68.38.206.100 tunnel destination 12.160.179.124 ip address 10.10.11.1 255.255.255.252 The following screen shows the OSPF and default route configuration. The tunnel interface must be included in the OSPF configuration. The default route is configured to the Internet gateway IP address. router ospf network 10.10.11.0 0.0.0.3 area 0.0.0.0 network 192.168.202.0 0.0.0.255 area 0.0.0.0 network 192.168.203.0 0.0.0.255 area 0.0.0.0 ip default-gateway 68.38.206.1 JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 4 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc 3.1.2. Configure VPN on the Avaya G250-BRI Media Gateway The Avaya G250-BRI Media Gateway is also a VPN appliance. The following shows the IKE phase 1 policy configuration. Configurations on the Cisco Access Router and Avaya G250-BRI Media Gateway must match for IKE phase 1 proposal. crypto isakmp policy 1 description "Phase 1 Proposal" encryption aes hash md5 group 2 authentication pre-share The following screen shows ISAKMP peer configuration with the Cisco Access Router. The Avaya G250-BRI Media Gateway is configured to initiate the IKE connection (aggressive mode). The Avaya G250-BRI Media Gateway supports standard VPN Dead Peer Detection (DPD) keepalives. The command keepalive 10 retry 2 on-demand is used to configure the DPD keepalives. With the on-demand approach, the G250-BRI Media Gateway never sends a DPD message if it has no traffic to send. If the G250-BRI Media Gateway has to send outbound traffic and the liveliness of the peer is questionable, the G250-BRI Media Gateway will send a DPD message to query the status of the peer. In the example, the G250-BRI Media Gateway will send a DPD keepalive message every 10 seconds, and to retry every two seconds if the DPD messages fail. crypto isakmp peer address 12.160.179.124 pre-shared-key **** isakmp-policy 1 initiate mode aggressive keepalive 10 retry 2 on-demand The following creates an IPSec Phase 2 transform-set proposal using the transport mode. In transport mode, only the IP payload is encrypted, and the original IP headers are left intact. With tunnel mode, the entire original IP packet is encrypted, and a new VPN header is added. Compared to tunnel mode, transport mode results in less overhead, and therefore uses less bandwidth for a VoIP call. Perfect Forward Secrecy (PFS) is enabled to strengthen the tunnel against brute force attacks. crypto ipsec transform-set H2 esp-aes esp-sha-hmac mode transport set pfs group2 JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 5 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc The following assigns an IPSec phase 2 proposal to the Cisco Access Router via a crypto map: crypto map 1 description "Phase 2 Proposal" set peer 12.160.179.124 set transform-set H2 The following screen configures a crypto-list 901 to define the VPN traffic between the Avaya G250-BRI Media Gateway and Cisco Access Router. Note that the source IP address must be configured to the GRE tunnel source IP address and the destination IP address to the public IP address of the Cisco Access Router. ip crypto-list 901 name "To-Cisco-3745" local-address Serial 2/1:1 ip-rule 1 protect crypto map 1 source-ip host 68.38.206.100 destination-ip host 12.160.179.124 Use the command ip crypto-group to apply IP crypto-list 901 to the public facing interface, which is Serial 2/1:1 in the sample. interface Serial 2/1:1 encapsulation ppp ip crypto-group 901 ip address 68.38.206.100 255.255.255.0 JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 6 of 21 GAK 6/16/2005 ©2005 Avaya Inc.
Recommended publications
  • OSPF: Open Shortest Path First a Routing Protocol Based on the Link-State Algorithm
    LAB 7 OSPF: Open Shortest Path First A Routing Protocol Based on the Link-State Algorithm OBJECTIVES The objective of this lab is to confi gure and analyze the performance of the Open Shortest Path First (OSPF) routing protocol. OVERVIEW 65 In the RIP lab, we discussed a routing protocol that is the canonical example of a routing protocol built on the distance-vector algorithm. Each node constructs a vector containing the distances (costs) to all other nodes and distributes that vector to its immediate neighbors. Link- state routing is the second major class of intradomain routing protocol. The basic idea behind link-state protocols is very simple: Every node knows how to reach its directly connected neigh- bors, and if we make sure that the totality of this knowledge is disseminated to every node, then every node will have enough knowledge of the network to build a complete map of the network. Once a given node has a complete map for the topology of the network, it is able to decide the best route to each destination. Calculating those routes is based on a well-known algo- rithm from graph theory—Dijkstra’s shortest-path algorithm. OSPF introduces another layer of hierarchy into routing by allowing a domain to be partitioned into areas. This means that a router within a domain does not necessarily need to know how to reach every network within that domain; it may be suffi cient for it to know how to get to the right area. Thus, there is a reduction in the amount of information that must be transmitted to and stored in each node.
    [Show full text]
  • Open Shortest Path First Routing Protocol Simulation
    Open Shortest Path First Routing Protocol Simulation Sloan is settleable: she queen reparably and parallels her drabbet. Fagged See yawps that cheesecake pacificated fraternally and interact centrically. Bivalve and dern Benton always mound but and imbrue his glyph. For large simulation model parts in simulated and languages to open capabilities. Initial Configurations for OSPF over Non-Broadcast Links Cisco. Cognitive OSPF Open Shortest Path mode and EIGRP Enhanced Interior. Simulation study Three priority scenarios and small network scenarios tested. The concept called as. Instead of open shortest routing protocol is open shortest path, and service as the eigrp_ospf network. The other protocols determine paths to be responsible for hello packet delay variation, as a stub domains would be used in traffic sent data. Introduction other and mtu for use in the open shortest path to recognize the first protocol using this address planning and mobilenetwork is open shortest routing protocol? Distribution of Dynamic Routing Protocols Is-Is EIGRP OSPF. DESIGN OF OPEN SHORTEST PATH FIRST PROTOCOL A. Solution is normally one place this topology changes to verify that makes routing table in green, eigrp has been used. When a simulated work? The manufacturers began to deliver such a computer and sends complete. Obtain acomplete view, a routing protocol focused on a network topology activity was concerned with faster to a to infect others. OSPF Open Shortest Path order is compulsory most widely used IOSPF is based on. OSPF is a routing protocol Two routers speaking OSPF to seed other exchange information about the routes they seen about and the place for.
    [Show full text]
  • Networking Open Shortest Path First (OSPF) Support 7.1
    IBM IBM i Networking Open Shortest Path First (OSPF) support 7.1 IBM IBM i Networking Open Shortest Path First (OSPF) support 7.1 Note Before using this information and the product it supports, read the information in “Notices,” on page 27. This edition applies to IBM i 7.1 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright IBM Corporation 2002, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Open Shortest Path First support.... 1 Enabling of i5/OS OSPF job tracing ..... 13 What's new for IBM i 7.1 .......... 1 Open Shortest Path First support tasks ..... 13 PDF file for Open Shortest Path First support ... 1 Configuring i5/OS for OSPF networking ... 13 Open Shortest Path First support concepts .... 2 Enabling TCP/IP for OSPF on i5/OS ..... 14 OSPF routing domain and areas ....... 2 Open Shortest Path First support reference .... 14 OSPF area aggregation .......... 5 Open Shortest Path First API and commands .. 15 Link-state advertisements ......... 6 Scenarios: Configuring OSPF ....... 16 Aging of link-state records......... 8 Packet types for OSPF .......... 8 Appendix. Notices .......... 27 OSPF for IPv6 ............. 9 Programming interface information ...... 29 OSPF interfaces ............ 10 Trademarks .............. 29 Point-to-point links for OSPF ....... 11 Terms and conditions ........... 29 i5/OS OSPF Authentication ........ 11 © Copyright IBM Corp. 2002, 2010 iii iv IBM i: Networking Open Shortest Path First (OSPF) support Open Shortest Path First support i5/OS support includes the Open Shortest Path First (OSPF) protocol.
    [Show full text]
  • Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN)
    Data Sheet Learning Services Cisco Training on Demand Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Overview Building Core Networks with OSPF, IS-IS, BGP, and MPLS Bootcamp (BCN) is a Cisco Training on Demand course that provides you with the required knowledge and skills to design, deploy, operate, and maintain an ISP backbone network. This course takes you through the process of building a network from scratch, starting with Interior Gateway Protocols (IGP), moving to Border Gateway Protocols (BGP), and then to Multi-Protocol Label Switching (MPLS). The course begins by asking the question, What is an interior gateway protocol? and then proceeds to distinguish the two interior link-state protocols: Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS), as well as their characteristics. You also learn how to set up a basic BGP configuration. BGP is a path-vector protocol that exchanges routing information between autonomous systems. You learn to set up interior and exterior neighbor peering sessions and policies because we don’t always want to advertise certain routes to certain neighbors. Peering session policy is accomplished with multiexit discriminator (MED) and local preference, and there are two ways to establish criteria for multihoming. Multihoming, or multiple connections, is a strategy that reduces the potential for catastrophic failure should any one router in a network fail. Basic MPLS configuration and VPN functionality is examined to see how they ensure isolated and secure traffic. This course also shows how to build traffic-engineering tunnels from head-end router to tail-end router, and test how dynamic traffic rerouting occurs to maintain traffic flow.
    [Show full text]
  • Ipv6 Routing: Ospfv3 Authentication Support with Ipsec
    IPv6 Routing: OSPFv3 Authentication Support with IPsec In order to ensure that Open Shortest Path First version 3 (OSPFv3) packets are not altered and re-sent to the device, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. • Finding Feature Information, page 1 • Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • Restrictions for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • Information About IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • How to Configure IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 3 • Configuration Examples for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 6 • Additional References for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 6 • Feature Information for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 7 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. IP Routing: OSPF Configuration Guide, Cisco IOS Release 15SY 1 IPv6 Routing: OSPFv3 Authentication Support with IPsec Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec Configure the IP Security (IPsec) secure socket application program interface (API) on OSPFv3 in order to enable authentication and encryption.
    [Show full text]
  • Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1Aq Protocol Simulator on NS-3
    International Journal of Computer and Communication Engineering Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1aq Protocol Simulator on NS-3 Samuel A. Ajila*, Yoonsoon Chang Department of Systems and Computer Engineering Carleton University, K1S 5B6, Ottawa, ON Canada. * Corresponding author. Tel.: 1-613-5202600 ext. 2673; e-mail: [email protected] Manuscript submitted April 22, 2016; accepted August 4, 2016. doi: 10.17706/ijcce.2017.6.1.1-18 Abstract: Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for fine- grained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation. Key words: Ethernet, cloud, bridge, switch, virtualization. 1. Introduction Since Ethernet was released to the market of local area network (LANs), it has been successfully and widely deployed.
    [Show full text]
  • Survey on the Open Shortest Path First (OSPF) Routing Protocols
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 10, October 2017 Survey on the Open Shortest Path First (OSPF) Routing Protocols Poovizhi. A1, Mahalakshmi. B2 Assistant Professor, School of Computer Studies, RVS College of Arts and Science, Coimbatore, India1,2 Abstract: Open shortest path first (OSPF) is the most commonly used intera-domain routing protocol. Open Shortest Path First (OSPF) is a link state routing protocol. In exiting different type of routing protocols can be extant, but the most well-known routing protocols are Routing Information protocol (RIP) and the Open Shortest Path First (OSPF). In this paper, surveyed OSPF protocols and algorithm. OSPF router saves path of the state of all the various network connections (links) between itself and a network it is trying to send data to. This makes it a link-state routing protocol. Open Shortest Path First (OSPF) is one of the most broadly used intra-domain routing protocol. The OSPF protocol does not provide efficient routing in terms of packet sending to achieve any network optimization neutral. The high cost of network assets and profitable and modest nature of Internet service provisioning. The service providers are absorbed in performance optimization of their networks. This help to reducing congestion network and improving resource consumption across the network, which, in turn, results in an increased income collection. One way of achieving this is through Traffic Engineering. Keywords: Open Shortest Path First. I. INTRODUCTION The Open Shortest Path First (OSPF) protocol is a link state protocol that handles routing for IP traffic.
    [Show full text]
  • Open Shortest Path First (OSPF) Support
    IBM i 7.2 Networking Open Shortest Path First (OSPF) support IBM Note Before using this information and the product it supports, read the information in “Notices” on page 25. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Open Shortest Path First support........................................................................... 1 What's new for IBM i 7.1..............................................................................................................................1 PDF file for Open Shortest Path First support.............................................................................................1 Open Shortest Path First support concepts................................................................................................ 2 OSPF routing domain and areas.............................................................................................................2 OSPF area aggregation........................................................................................................................... 4 Link-state advertisements......................................................................................................................6 Aging of link-state
    [Show full text]
  • Link State Routing Dijkstra's Shortest Path First
    1/26/10 Link State Routing Observation: loop can be prevented if each node knows the actual network topology In link-state routing, each node: • floods the network with the state (up, down) of its links • uses Dijkstra’s Shortest Path First (SPF) algorithm to compute a shortest-path tree What is advertised: • DV: all nodes reachable from me, advertised to all neighbors • LS: all my immediate neighbors, advertised to all nodes 1 Dijkstra’s Shortest Path First (SPF) Algorithm A greedy algorithm for solving single-source shortest path problem • assume non-negative edge weights • even if we’re only interested in the path from s to a single destination, d, we need to find the shortest path from s to all vertices in G (otherwise, we might have missed a shorter path) • if the shortest path from s to d passes through an intermediate node u, i.e., P = {s, . , u, . , d}, then P’ = {s, . , u} must be the shortest path from s to u 2 1 1/26/10 Dijkstra’s Shortest Path First (SPF) Algorithm SPF(startnode s)! { // Initialize! !table = createtable(|V|); // stores spf, cost, predecessor! !table[*].spf = false; table[*].cost = INFINITY;! !pq = createpq(|E|); // empty pq! !table[s].cost = 0;! !pq.insert(0, s); // pq.insert(cost, v)! !while (!pq.isempty()) {! ! !v = pq.getMin();! ! !if (!table[v].spf) { // not on sp tree! ! ! !table[v].spf = true;! ! ! !for each u = v.neighbors() {! ! ! ! !newcost = weight(u, v) + table[v].cost; ! ! ! ! !if (table[u].cost > newcost) {! ! ! ! ! !table[u].cost = newcost;! ! ! ! ! !table[u].pred = v;! ! ! ! ! !pq.insert(newcost,
    [Show full text]
  • Laboratory 6
    Laboratory 6 Objective The purpose of this lab is to demonstrate the behavior of OSPF routing protocol. Overview In this lab we will study the OSPF routing protocol. The objective is to construct a network and configure it with all the necessary parameters for OSPF routing. Using this network we will analyze the behavior of the OSPF routing protocol. Procedure The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) used for routing in Internet Protocol (IP) networks. As a link state routing protocol, OSPF is more robust against network topology changes than distance vector protocols such as RIP, IGRP, and EIGRP. OSPF can be used to build large scale networks consisting of hundreds or thousands of routers. Open Shortest Path First (OSPF) uses the Dijkstra’s algorithm to compute the shortest path to a destination. The algorithm calculates the shortest path to each destination based on the cumulative cost required to reach that destination. The cumulative cost is a function of the cost of the various interfaces needed to be traversed in order to reach that destination. The cost (or the metric) of an interface in OSPF is an indication of the overhead required to send packets across that interface. The cost of an interface is calculated based on the bandwidth -- it is inversely proportional to the bandwidth of that specific interface (i.e., a higher bandwidth indicates a lower cost). For example, the cost of a T1 interface is much higher than the cost of a 100Mbit Ethernet interface because there is more overhead (e.g., time delays) involved in crossing a T1 interface.
    [Show full text]
  • Networks G22.2262-001
    Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part II Routing Algorithms and Routing Protocol Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda Routing Strategies Interplay Between Routing and Forwarding Graph Abstraction Routing Algorithm Classification Link-State Routing (LS) Algorithm Distance Vector (DV) Algorithm Comparison of LS and DV Algorithms Hierarchical Routing Interconnected ASes Inter-AS Tasks Intra-AS Routing Internet Inter-AS Routing – Border Gateway Protocol Why Different Intra- and Inter-AS Routing? 2 1 Part I Routing Strategies 3 Routing Strategies Fixed Flooding Random Adaptive 4 2 Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change in network topology 5 Fixed Routing Tables 6 3 Flooding No network info required Packet sent by node to every neighbor Incoming packets retransmitted on every link except incoming link Eventually a number of copies will arrive at destination Each packet is uniquely numbered so duplicates can be discarded Nodes can remember packets already forwarded to keep network load in bounds Can include a hop count in packets 7 Flooding Examples 8 4 Properties of Flooding All possible routes are tried Very robust At least one packet will have taken minimum hop count route Can be used to set up virtual circuit All nodes are visited Useful to distribute information
    [Show full text]
  • Link State Routing
    ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Link State Routing Jean‐Yves Le Boudec 2014 1 Contents 1. Link state 2. OSPF and Hierarchical routing with areas 3. Dynamic metrics and Braess paradox 2 1. Link State Routing Principle of link state routing each router keeps a topology database of whole network link state updates flooded, or multicast to all network routers compute their routing tables based on topology often uses Dijkstra’s shortest path algorithm Used in OSPF (Open Shortest Path First), IS‐IS (similar to OSPF) and PNNI (ATM routing protocol) 3 (a) Topology Database Synchronization Neighbouring nodes synchronize before starting any relationship Hello protocol; keep alive initial synchronization of database description of all links (no information yet) Once synchronized, a node accepts link state advertisements contain a sequence number, stored with record in the database only messages with new sequence number are accepted accepted messages are flooded to all neighbours sequence number prevents anomalies (loops or blackholes) 4 Example network Each router knows directly connected networks n3 n6 B D E n2 n4 n5 n7 A C F n1 5 Initial routing tables D E net type net type B n6 Ether n6 Ether net type n5 P-to-P n7 Ether n3 n6 n3 Ether n2 P-to-P n4 P-to-P B D E n2 n4 A n5 n7 net type F n1 Ether A C F n2 P-to-P net type C n1 Ether n7 Ether n1 net type n1 Ether n4 P-to-P n5 P-to-P 6 After Flooding The local metric information is flooded to all routers After convergence, all routers have the same information rtr net cost n6 A n1 10 n3 A
    [Show full text]