Open Standards and Proprietary Protocols for Data Center Networking

Total Page:16

File Type:pdf, Size:1020Kb

Open Standards and Proprietary Protocols for Data Center Networking DECUSATIS LAYOUT_Layout 1 8/23/12 12:38 PM Page 26 CLOUD COMPUTING: NETWORKING AND COMMUNICATIONS CHALLENGES Communication within Clouds: Open Standards and Proprietary Protocols for Data Center Networking Carolyn J. Sher DeCusatis and Aparico Carranza, New York City College of Technology Casimer M. DeCusatis, IBM Corporation BSTRACT A available on affordable commodity x86 servers Cloud computing and other highly virtualized within the last decade or so. In recent years, data center applications have placed many new many equipment vendors have contributed to and unique requirements on the data center net- the hardware and software infrastructure, which work infrastructure. Conventional network pro- has made enterprise-class virtualization widely tocols and architectures such as Spanning Tree available. This, in turn, enables new designs for Protocol and multichassis link aggregation can cloud computing, including hosting multiple limit the scale, latency, throughput, and virtual independent tenants on a shared infrastructure, machine mobility for large cloud networks. This rapid and dynamic provisioning of new features, has led to a multitude of new networking proto- and implementing advanced load balancing, cols and architectures. We present a tutorial on security, and business continuity functions some of the key requirements for cloud comput- (including multisite transaction mirroring). This ing networks and the various approaches that has brought about profound changes in many have been proposed to implement them. These aspects of data center design, including new include industry standards (e.g., TRILL, SPB, requirements for the data center network. software-defined networking, and OpenFlow), Modern cloud data centers employ resource best practices for standards-based data center pooling to make more efficient use of data center networking (e.g., the open datacenter interoper- appliances and to enable dynamic reprovisioning in able network), as well as vendor proprietary response to changing application needs. Examples approaches (e.g., FabricPath, VCS, and Qfabric). of this include elastic workloads where application components are added, removed, or resized based on the traffic load; mobile applications relocating INTRODUCTION to different hosts based on distance from the host or hardware availability; and proactive disaster Cloud computing is a method of delivering com- recovery solutions, which relocate applications in puting services from a large, highly virtualized response to a planned site shutdown or a natural data center to many independent end users, disaster. It has been shown [2] that highly virtual- using shared applications and pooled resources. ized servers place unique requirements on the data While there are many different definitions for center network. Cloud data center networks must cloud computing [1], it is typically distinguished contend with huge numbers of attached devices by the following attributes: on-demand self-ser- (both physical and virtual), large numbers of isolat- vice, broad network access, resource pooling, ed independent subnetworks, multitenancy (appli- rapid and elastic resource provisioning, and cation components belonging to different tenants metered service at various quality levels. are collocated on a single host), and automated Implementation of these attributes as part of creation, deletion, and migration of virtual a large enterprise-class cloud computing service machines (facilitated by large layer 2 network that provides continuous availability to a large domains). Furthermore, many cloud data centers number of users typically requires significantly now contain clusters or pods of servers, storage, more server, networking, and storage resources and networking, configured so that the vast majori- than conventional data centers (up to an order ty of traffic (80–90 percent in some cases) flows of magnitude more in many cases). This is only between adjacent servers within a pod (so-called achievable through extensive use of virtualiza- east-west traffic). This is a very different traffic pat- tion. While server virtualization has existed since tern from conventional data center networks, the 1960s, when it was first implemented on which supported higher levels of traffic between IBM mainframes, it has only become widely server racks or pods (so-called north-south traffic). 26 0163-6804/12/$25.00 © 2012 IEEE IEEE Communications Magazine • September 2012 DECUSATIS LAYOUT_Layout 1 8/23/12 12:38 PM Page 27 MC-LAG and LAG STP and LAG To help overcome LAG LAG the limitations of STP, several enhancements have MC-LAG MC-LAG been standardized. These include Multi- LAG STP blocked LAG LAG ple STP, which con- figures a separate spanning tree for Figure 1. MC-LAG configuration without STP (left) and with STP (right). each virtual local area network group To cope with these problems, many attempts EtherChannel [MCEC], also referred to as Vir- and blocks all but have been made to develop best practices for net- tual Port Channels [vPC] for Cisco switches.) working design and management. Several new The changing requirements of cloud data center one of the possible industry standards and proprietary network archi- networks are forcing designers to reexamine the alternate paths tectures have recently been proposed. Many net- role of STP. One of the drawbacks of a spanning work designers, users, and administrators have tree protocol is that in blocking redundant ports within each span- long expressed a desire for standardization and and paths, a spanning tree reduces the aggregate ning tree. multivendor interoperability in the data center, to available network bandwidth significantly. Addi- simplify management, improve reliability, and tionally, STP can result in circuitous and subop- avoid being locked into one particular vendor’s timal communication paths through the network, proprietary product offerings and pricing struc- adding latency and degrading application perfor- ture. These conclusions were supported by a mance. A spanning tree cannot easily be segre- recent analyst report [3], which determined that gated into smaller domains to provide better multisourcing of network equipment is not only scalability, fault isolation, or multitenancy. Final- practical, but can reduce total cost of ownership ly, the time taken to recompute the spanning by 15–25 percent. Furthermore, a recent survey of tree and propagate the changes in the event of a 468 business technology professionals on their failure can vary widely, and sometimes becomes data networking purchasing preferences [4] quite large (seconds to minutes). This is highly showed that adherence to industry standards was disruptive for elastic applications and virtual their second highest requirement, behind virtual- machine migrations, and can lead to cascaded ization support. Standardization also encourages system-level failures. future-proofing of the network and helps promote To help overcome the limitations of STP, sev- buying confidence. Despite these advantages, eral enhancements have been standardized. These many large network equipment providers have include Multiple STP (MSTP), which configures a advocated for proprietary network protocols. A separate spanning tree for each virtual local area recent study [5] showed that five out of the six network (VLAN) group and blocks all but one of largest network equipment manufacturers include the possible alternate paths within each spanning proprietary features in their products, and only tree. Also, the link aggregation group (LAG) three of the six claimed interoperability with standard (IEEE 802.3ad) allows two or more other vendors’ access layer switches. physical links to be bonded into a single logical In this article, we present a tutorial on cloud link, either between two switches or between a networking design practices, including both server and a switch. Since a LAG introduces a industry standard and vendor proprietary alter- loop in the network, STP has to be disabled on natives. It should be noted that although modern network ports using LAGs. It is possible for one data centers will almost certainly require some end of the link aggregated port group to be dual- version of these new protocols, many of these homed into two different devices to provide approaches are far less mature than convention- device-level redundancy. The other end of the al network designs. Early adopters should use group is still single-homed and continues to run caution when evaluating the best choices for normal LAG. This extension to the LAG specifi- their data center needs. cation is called multichassis link aggregation (MC-LAG), and is standardized as IEEE 802.1ax (2008). As shown in Fig. 1, MC-LAG can be used SPANNING TREE PROTOCOL AND to create a loop-free topology without relying on ULTICHASSIS INK GGREGATION STP; because STP views the LAG as a single link, M L A it will not exclude redundant links within the Spanning Tree Protocol (STP) is a layer 2 switch- LAG. For example, it is possible for a pair of net- ing protocol used by classical Ethernet that work interface cards (NICs) to be dual-homed ensures loop-free network topologies by always into a pair of access switches (using NIC team- creating a single path tree structure through the ing), and then use MC-LAG to interconnect the network. In the event of a link failure or recon- access switches with a pair of core switches. figuration, the network halts all traffic while the Most MC-LAG systems allow dual homing spanning tree algorithm
Recommended publications
  • OSPF: Open Shortest Path First a Routing Protocol Based on the Link-State Algorithm
    LAB 7 OSPF: Open Shortest Path First A Routing Protocol Based on the Link-State Algorithm OBJECTIVES The objective of this lab is to confi gure and analyze the performance of the Open Shortest Path First (OSPF) routing protocol. OVERVIEW 65 In the RIP lab, we discussed a routing protocol that is the canonical example of a routing protocol built on the distance-vector algorithm. Each node constructs a vector containing the distances (costs) to all other nodes and distributes that vector to its immediate neighbors. Link- state routing is the second major class of intradomain routing protocol. The basic idea behind link-state protocols is very simple: Every node knows how to reach its directly connected neigh- bors, and if we make sure that the totality of this knowledge is disseminated to every node, then every node will have enough knowledge of the network to build a complete map of the network. Once a given node has a complete map for the topology of the network, it is able to decide the best route to each destination. Calculating those routes is based on a well-known algo- rithm from graph theory—Dijkstra’s shortest-path algorithm. OSPF introduces another layer of hierarchy into routing by allowing a domain to be partitioned into areas. This means that a router within a domain does not necessarily need to know how to reach every network within that domain; it may be suffi cient for it to know how to get to the right area. Thus, there is a reduction in the amount of information that must be transmitted to and stored in each node.
    [Show full text]
  • Open Shortest Path First Routing Protocol Simulation
    Open Shortest Path First Routing Protocol Simulation Sloan is settleable: she queen reparably and parallels her drabbet. Fagged See yawps that cheesecake pacificated fraternally and interact centrically. Bivalve and dern Benton always mound but and imbrue his glyph. For large simulation model parts in simulated and languages to open capabilities. Initial Configurations for OSPF over Non-Broadcast Links Cisco. Cognitive OSPF Open Shortest Path mode and EIGRP Enhanced Interior. Simulation study Three priority scenarios and small network scenarios tested. The concept called as. Instead of open shortest routing protocol is open shortest path, and service as the eigrp_ospf network. The other protocols determine paths to be responsible for hello packet delay variation, as a stub domains would be used in traffic sent data. Introduction other and mtu for use in the open shortest path to recognize the first protocol using this address planning and mobilenetwork is open shortest routing protocol? Distribution of Dynamic Routing Protocols Is-Is EIGRP OSPF. DESIGN OF OPEN SHORTEST PATH FIRST PROTOCOL A. Solution is normally one place this topology changes to verify that makes routing table in green, eigrp has been used. When a simulated work? The manufacturers began to deliver such a computer and sends complete. Obtain acomplete view, a routing protocol focused on a network topology activity was concerned with faster to a to infect others. OSPF Open Shortest Path order is compulsory most widely used IOSPF is based on. OSPF is a routing protocol Two routers speaking OSPF to seed other exchange information about the routes they seen about and the place for.
    [Show full text]
  • Networking Open Shortest Path First (OSPF) Support 7.1
    IBM IBM i Networking Open Shortest Path First (OSPF) support 7.1 IBM IBM i Networking Open Shortest Path First (OSPF) support 7.1 Note Before using this information and the product it supports, read the information in “Notices,” on page 27. This edition applies to IBM i 7.1 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright IBM Corporation 2002, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Open Shortest Path First support.... 1 Enabling of i5/OS OSPF job tracing ..... 13 What's new for IBM i 7.1 .......... 1 Open Shortest Path First support tasks ..... 13 PDF file for Open Shortest Path First support ... 1 Configuring i5/OS for OSPF networking ... 13 Open Shortest Path First support concepts .... 2 Enabling TCP/IP for OSPF on i5/OS ..... 14 OSPF routing domain and areas ....... 2 Open Shortest Path First support reference .... 14 OSPF area aggregation .......... 5 Open Shortest Path First API and commands .. 15 Link-state advertisements ......... 6 Scenarios: Configuring OSPF ....... 16 Aging of link-state records......... 8 Packet types for OSPF .......... 8 Appendix. Notices .......... 27 OSPF for IPv6 ............. 9 Programming interface information ...... 29 OSPF interfaces ............ 10 Trademarks .............. 29 Point-to-point links for OSPF ....... 11 Terms and conditions ........... 29 i5/OS OSPF Authentication ........ 11 © Copyright IBM Corp. 2002, 2010 iii iv IBM i: Networking Open Shortest Path First (OSPF) support Open Shortest Path First support i5/OS support includes the Open Shortest Path First (OSPF) protocol.
    [Show full text]
  • Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN)
    Data Sheet Learning Services Cisco Training on Demand Building Core Networks with OSPF, IS-IS, BGP and MPLS Bootcamp (BCN) Overview Building Core Networks with OSPF, IS-IS, BGP, and MPLS Bootcamp (BCN) is a Cisco Training on Demand course that provides you with the required knowledge and skills to design, deploy, operate, and maintain an ISP backbone network. This course takes you through the process of building a network from scratch, starting with Interior Gateway Protocols (IGP), moving to Border Gateway Protocols (BGP), and then to Multi-Protocol Label Switching (MPLS). The course begins by asking the question, What is an interior gateway protocol? and then proceeds to distinguish the two interior link-state protocols: Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS), as well as their characteristics. You also learn how to set up a basic BGP configuration. BGP is a path-vector protocol that exchanges routing information between autonomous systems. You learn to set up interior and exterior neighbor peering sessions and policies because we don’t always want to advertise certain routes to certain neighbors. Peering session policy is accomplished with multiexit discriminator (MED) and local preference, and there are two ways to establish criteria for multihoming. Multihoming, or multiple connections, is a strategy that reduces the potential for catastrophic failure should any one router in a network fail. Basic MPLS configuration and VPN functionality is examined to see how they ensure isolated and secure traffic. This course also shows how to build traffic-engineering tunnels from head-end router to tail-end router, and test how dynamic traffic rerouting occurs to maintain traffic flow.
    [Show full text]
  • Ipv6 Routing: Ospfv3 Authentication Support with Ipsec
    IPv6 Routing: OSPFv3 Authentication Support with IPsec In order to ensure that Open Shortest Path First version 3 (OSPFv3) packets are not altered and re-sent to the device, OSPFv3 packets must be authenticated. OSPFv3 uses the IPsec secure socket API to add authentication to OSPFv3 packets. This API supports IPv6. • Finding Feature Information, page 1 • Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • Restrictions for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • Information About IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 2 • How to Configure IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 3 • Configuration Examples for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 6 • Additional References for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 6 • Feature Information for IPv6 Routing: OSPFv3 Authentication Support with IPsec, page 7 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. IP Routing: OSPF Configuration Guide, Cisco IOS Release 15SY 1 IPv6 Routing: OSPFv3 Authentication Support with IPsec Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec Prerequisites for IPv6 Routing: OSPFv3 Authentication Support with IPsec Configure the IP Security (IPsec) secure socket application program interface (API) on OSPFv3 in order to enable authentication and encryption.
    [Show full text]
  • Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1Aq Protocol Simulator on NS-3
    International Journal of Computer and Communication Engineering Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1aq Protocol Simulator on NS-3 Samuel A. Ajila*, Yoonsoon Chang Department of Systems and Computer Engineering Carleton University, K1S 5B6, Ottawa, ON Canada. * Corresponding author. Tel.: 1-613-5202600 ext. 2673; e-mail: [email protected] Manuscript submitted April 22, 2016; accepted August 4, 2016. doi: 10.17706/ijcce.2017.6.1.1-18 Abstract: Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for fine- grained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation. Key words: Ethernet, cloud, bridge, switch, virtualization. 1. Introduction Since Ethernet was released to the market of local area network (LANs), it has been successfully and widely deployed.
    [Show full text]
  • Survey on the Open Shortest Path First (OSPF) Routing Protocols
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319 5940 International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 10, October 2017 Survey on the Open Shortest Path First (OSPF) Routing Protocols Poovizhi. A1, Mahalakshmi. B2 Assistant Professor, School of Computer Studies, RVS College of Arts and Science, Coimbatore, India1,2 Abstract: Open shortest path first (OSPF) is the most commonly used intera-domain routing protocol. Open Shortest Path First (OSPF) is a link state routing protocol. In exiting different type of routing protocols can be extant, but the most well-known routing protocols are Routing Information protocol (RIP) and the Open Shortest Path First (OSPF). In this paper, surveyed OSPF protocols and algorithm. OSPF router saves path of the state of all the various network connections (links) between itself and a network it is trying to send data to. This makes it a link-state routing protocol. Open Shortest Path First (OSPF) is one of the most broadly used intra-domain routing protocol. The OSPF protocol does not provide efficient routing in terms of packet sending to achieve any network optimization neutral. The high cost of network assets and profitable and modest nature of Internet service provisioning. The service providers are absorbed in performance optimization of their networks. This help to reducing congestion network and improving resource consumption across the network, which, in turn, results in an increased income collection. One way of achieving this is through Traffic Engineering. Keywords: Open Shortest Path First. I. INTRODUCTION The Open Shortest Path First (OSPF) protocol is a link state protocol that handles routing for IP traffic.
    [Show full text]
  • Open Shortest Path First (OSPF) Support
    IBM i 7.2 Networking Open Shortest Path First (OSPF) support IBM Note Before using this information and the product it supports, read the information in “Notices” on page 25. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Open Shortest Path First support........................................................................... 1 What's new for IBM i 7.1..............................................................................................................................1 PDF file for Open Shortest Path First support.............................................................................................1 Open Shortest Path First support concepts................................................................................................ 2 OSPF routing domain and areas.............................................................................................................2 OSPF area aggregation........................................................................................................................... 4 Link-state advertisements......................................................................................................................6 Aging of link-state
    [Show full text]
  • Link State Routing Dijkstra's Shortest Path First
    1/26/10 Link State Routing Observation: loop can be prevented if each node knows the actual network topology In link-state routing, each node: • floods the network with the state (up, down) of its links • uses Dijkstra’s Shortest Path First (SPF) algorithm to compute a shortest-path tree What is advertised: • DV: all nodes reachable from me, advertised to all neighbors • LS: all my immediate neighbors, advertised to all nodes 1 Dijkstra’s Shortest Path First (SPF) Algorithm A greedy algorithm for solving single-source shortest path problem • assume non-negative edge weights • even if we’re only interested in the path from s to a single destination, d, we need to find the shortest path from s to all vertices in G (otherwise, we might have missed a shorter path) • if the shortest path from s to d passes through an intermediate node u, i.e., P = {s, . , u, . , d}, then P’ = {s, . , u} must be the shortest path from s to u 2 1 1/26/10 Dijkstra’s Shortest Path First (SPF) Algorithm SPF(startnode s)! { // Initialize! !table = createtable(|V|); // stores spf, cost, predecessor! !table[*].spf = false; table[*].cost = INFINITY;! !pq = createpq(|E|); // empty pq! !table[s].cost = 0;! !pq.insert(0, s); // pq.insert(cost, v)! !while (!pq.isempty()) {! ! !v = pq.getMin();! ! !if (!table[v].spf) { // not on sp tree! ! ! !table[v].spf = true;! ! ! !for each u = v.neighbors() {! ! ! ! !newcost = weight(u, v) + table[v].cost; ! ! ! ! !if (table[u].cost > newcost) {! ! ! ! ! !table[u].cost = newcost;! ! ! ! ! !table[u].pred = v;! ! ! ! ! !pq.insert(newcost,
    [Show full text]
  • (GRE) Tunnel Over Ipsec VPN Using Transport Mode with Open Shortest
    Avaya Solution & Interoperability Test Lab Configuring a Generic Routing Encapsulation (GRE) Tunnel Over IPSec VPN Using Transport Mode with Open Shortest Path First (OSPF) Routing Protocol between an Avaya G250 Media Gateway and a Cisco Access Router - Issue 1.0 Abstract These Application Notes present the steps necessary to configure a Generic Routing Encapsulation (GRE) tunnel over IPSec VPN using transport mode for Open Shortest Path First (OSPF) routing protocol between the Avaya G250 Media Gateway and a Cisco Access Router. Without a GRE tunnel, an IPSec configuration cannot transfer routing protocols, such as OSPF. JZ; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 21 GAK 6/16/2005 ©2005 Avaya Inc. All Rights Reserved. G250-GRE-VPN.doc 1. Introduction The network diagram in Figure 1 shows two offices. The office labeled “Main Office” uses an Avaya S8500 Media Server and an Avaya G650 Media Gateway. The office labeled “Small Office” contains an Avaya G250-BRI Media Gateway. As shown in Figure 1, a VPN tunnel across the Internet between the Avaya G250-BRI Media Gateway and the Cisco 3745 Access Router is used between the Main and Small Offices. Normal IP Security (IPSec) configurations cannot transfer routing protocols, such as Open Shortest Path First (OSPF). These Application Notes illustrate how to configure a Generic Routing Encapsulation (GRE) tunnel to accomplish the routing between the different networks. The access to the Internet from the Avaya G250-BRI Media Gateway and the Cisco Access Router are configured to use PPP over T1 in the sample configuration. The Avaya Inter-Gateway Alternate Routing (IGAR) feature provides a means of alternately using PSTN facilities when the IP link is incapable of carrying the bearer connection.
    [Show full text]
  • Laboratory 6
    Laboratory 6 Objective The purpose of this lab is to demonstrate the behavior of OSPF routing protocol. Overview In this lab we will study the OSPF routing protocol. The objective is to construct a network and configure it with all the necessary parameters for OSPF routing. Using this network we will analyze the behavior of the OSPF routing protocol. Procedure The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) used for routing in Internet Protocol (IP) networks. As a link state routing protocol, OSPF is more robust against network topology changes than distance vector protocols such as RIP, IGRP, and EIGRP. OSPF can be used to build large scale networks consisting of hundreds or thousands of routers. Open Shortest Path First (OSPF) uses the Dijkstra’s algorithm to compute the shortest path to a destination. The algorithm calculates the shortest path to each destination based on the cumulative cost required to reach that destination. The cumulative cost is a function of the cost of the various interfaces needed to be traversed in order to reach that destination. The cost (or the metric) of an interface in OSPF is an indication of the overhead required to send packets across that interface. The cost of an interface is calculated based on the bandwidth -- it is inversely proportional to the bandwidth of that specific interface (i.e., a higher bandwidth indicates a lower cost). For example, the cost of a T1 interface is much higher than the cost of a 100Mbit Ethernet interface because there is more overhead (e.g., time delays) involved in crossing a T1 interface.
    [Show full text]
  • Networks G22.2262-001
    Data Communication & Networks G22.2262-001 Session 7 - Main Theme Networks: Part II Routing Algorithms and Routing Protocol Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences 1 Agenda Routing Strategies Interplay Between Routing and Forwarding Graph Abstraction Routing Algorithm Classification Link-State Routing (LS) Algorithm Distance Vector (DV) Algorithm Comparison of LS and DV Algorithms Hierarchical Routing Interconnected ASes Inter-AS Tasks Intra-AS Routing Internet Inter-AS Routing – Border Gateway Protocol Why Different Intra- and Inter-AS Routing? 2 1 Part I Routing Strategies 3 Routing Strategies Fixed Flooding Random Adaptive 4 2 Fixed Routing Single permanent route for each source to destination pair Determine routes using a least cost algorithm Route fixed, at least until a change in network topology 5 Fixed Routing Tables 6 3 Flooding No network info required Packet sent by node to every neighbor Incoming packets retransmitted on every link except incoming link Eventually a number of copies will arrive at destination Each packet is uniquely numbered so duplicates can be discarded Nodes can remember packets already forwarded to keep network load in bounds Can include a hop count in packets 7 Flooding Examples 8 4 Properties of Flooding All possible routes are tried Very robust At least one packet will have taken minimum hop count route Can be used to set up virtual circuit All nodes are visited Useful to distribute information
    [Show full text]