Upload
suzanna-pearson
View
249
Download
0
Tags:
Embed Size (px)
Citation preview
Dynamic Routing
Distance Vector and Link StateRIP
OSPF
Internet Routing• IP implements datagram forwarding• Both hosts and routers
• Have an IP module•Forward datagrams
• IP forwarding is table-driven• Table known as routing table
Routing Tables• Static routing
•Fixes routes at boot time•Useful only for simplest cases
• Dynamic routing•Table initialized at boot time•Values inserted/updated by protocols that propagate
route information -> Routers use protocols to learn new information and update their routing table dynamically
•Necessary in large internets
4
Interdomain and Intradomain Routing Intradomain Routing
• Routing within an AS• Ignores the Internet outside the AS• Protocols for Intradomain routing are also called Interior
Gateway Protocols or IGP’s. • Popular protocols are
• RIP (simple, old)• OSPF (better)
Interdomain Routing• Routing between AS’s• Assumes that the Internet
consists of a collection of interconnected AS’s
• Normally, there is one dedicated router in each AS that handles interdomain traffic.
• Protocols are collectively called Exterior Gateway Protocols or EGP’s.
• Routing protocols:• Border Gateway Protocol
(BGP) v4 current
Routing Domains
6
Components of a Routing Algorithm
• A procedure for sending and receiving reachability information about a network to other routers
• A procedure for calculating optimal routes• Routes are calculated using a shortest path
algorithm (least “cost”)
• A procedure for reacting to and advertising topology changes
7
Two Basic Shortest Path Routing Algorithms
Distance Vector Routing • Each node knows the distance (cost) to its directly connected
neighbors• A node sends periodically a list of routing updates to its
neighbors.• If all nodes update their distances to destinations using neighbor
information, the routing tables eventually converge• New nodes advertise themselves to their neighbors.
Link State Routing • Each node knows the distance (cost) to its directly connected
neighbors• The distance information is broadcast to all nodes in the network• Each node calculates the routing tables independently using
global information.
8
Internet Routing Algorithms
Distance Vector
• Routing Information Protocol (RIP)
• Gateway-to-Gateway Protocol (GGP)
• Exterior Gateway Protocol (EGP)
• Interior Gateway Routing Protocol (IGRP)
Link State
• Intermediate System - Intermediate System (IS-IS)
• Open Shortest Path First (OSPF)
Distance Vector Algorithm
• Initialize routing table with one entry for each directly connected Network
• Periodically run a distance-vector update to exchange information with routers that are reachable over directly connected networks
Distance Vector Dynamic Updates
• Every router sends list of its routes to all its neighbors• List contains pairs of destination network and distance• Receiver replaces entries in its table if routing through the
sender (i.e., router that just sent an update) is less expensive than the current route in its table
• Receiver propagates new routes next time it sends out an update
• Update Algorithm has well-known shortcomings (we will see an example later)
Updates Reflected in Table
Example
Assume: • link cost is 1 on all hops • all updates occur simultaneously• initially each router only knows the cost of
connected interfaces = 0.
Rip Convergence Example
After First Update
After Second Update
After Third Update
Last Update for Convergence
18
The Count-to-Infinity Problem
1 1
Network 4.0.0.0 goes down
Event: Update from B to C occurs
Node C uses that Update to Update its table
This same process repeats when B sends again its update to C, and vice versa. The metric will increase to infinity so this phenomenon is called “counting to infinity”
21
Count-to-Infinity • The reason for the count-to-infinity problem is that each node ONLY has a “next-hop-view”
• For example, in the first step, B did not realize that its route (with cost 1) to network 4.0.0.0 went through node C and C did not realize that B’s update was based on its connectivity information.
• How can the Count-to-Infinity problem be solved?
How to Prevent Count to Infinity
• SPLIT HORIZON:• A router never sends information about a route back in same
direction which is original information came, routers keep track of where the information about a route came from. Means when router A sends update to router B about any failure network, router B does not send any update for same network to router A in same direction.
• ROUTE POISONING:• Router consider route advertised with an infinitive metric to
have failed ( metric=16) instead of marking it down. For example, when network 4 goes down, router C starts route poisoning by advertising the metric (hop count) of this network as 16, which indicates an unreachable network.
.
More….• POISON REVERSE:
• The poison reverse rule overwrites split horizon rule. For example, if router B receives a route poisoning of network 4 from router C then router B will send an update back to router C (which breaks the split horizon rule) with the same poisoned hop count of 16. This ensures all the routers in the domain receive the poisoned route update. Notice that every router performs poison reverse when learning about a downed network. In the above example, router A also performs poison reverse when learning about the downed network from B
More• HOLD DOWN TIMERS:
• After hearing a route poisoning, router starts a hold-down timer for that route. If it gets an update with a better metric than the originally recorded metric within the hold-down timer period, the hold-down timer is removed and data can be sent to that network. Also within the hold-down timer, if an update is received from a different router than the one who performed route poisoning with an equal or poorer metric, that update is ignored. During the hold-down timer, the “downed” route appears as “possibly down” in the routing table.
• For example, in the above example, when B receives a route poisoning update from C, it marks network 4 as “possibly down” in its routing table and starts the hold-down timer for network 4. In this period if it receives an update from C informing that the network 4 is recovered then B will accept that information, remove the hold-down timer and allow data to go to that network. But if B receives an update from A informing that it can reach network by 1 (or more) hop, that update will be ignored and the hold-down timer keeps counting.
• Note: The default hold-down timer value = 180 second.
More• TRIGGERED UPDATE :
• When any route failed in network ,do not wait for the next periodic update instead send an immediate update listing the poison route.
• COUNTING TO INFINITY:• Maximum count 15 hops after it will not be reachable.
26
Characteristics of Distance Vector Routing
• Periodic Updates: Updates to the routing tables are sent at the end of a certain time period. A typical value is 90 seconds.
• Triggered Updates: If a metric changes on a link, a router immediately sends out an update without waiting for the end of the update period.
• Full Routing Table Update: Most distance vector routing protocol send their neighbors the entire routing table (not only entries which change).
• Route invalidation timers: Routing table entries are invalid if they are not refreshed. A typical value is to invalidate an entry if no update is received after 3-6 update periods.
Link State Algorithm• Alternative to distance-vector• Distributed computation
•Broadcast information•Allow each router to compute shortest paths
• Avoids problem where one router can damage the entire internet by passing incorrect information
• Also called Shortest Path First (SPF)
Link State Update• Participating routers learn internet topology• Think of routers as nodes in a graph, and
networks connecting them as edges or links• Pairs of directly-connected routers periodically
•Test link between them•Propagate (broadcast) status of link
• All routers•Receive link status messages•Recompute routes from their local copy of information
29
RIP - Routing Information Protocol• A simple intradomain protocol• Straightforward implementation of Distance Vector Routing• Each router advertises its distance vector every 30 seconds (or
whenever its routing table changes) to all of its neighbors (destination address, distance)
• Uses hop count metric and uses 1 as link metric• Maximum hop count is 15, with “16” equal to “”• Routes are timed out (set to 16) after 3 minutes if they are not
updated• Uses split horizon and poison reverse techniques to solve
Inconsistencies• Current standard is RIPv2
Two Forms of RIPActive• Form used by routers• Broadcasts routing updates periodically• Uses incoming messages to update routesPassive• Form used by hosts• Uses incoming update messages to change route
table – changes eliminate ICMP redirects• Does not send updates
Changes to RIP1 in RIPv2• Update includes subnet mask• Authentication supported• Explicit next-hop information• Messages can be multicast (optional)
• IP multicast address is 224.0.0.9
RIP1 Update Format
Route Tag: Used to carry information from other routing protocols (e.g., autonomous system number)
33
RIP Messages• Dedicated port for RIP is UDP port 520.• Two types of command messages:
•Request messages • used to ask neighboring nodes for an update
•Response messages• contains an update
34
Routing with RIP• Initialization: Send a request packet on all interfaces
requesting routing tables from neighboring routers:• RIPv1 uses broadcast if possible, • RIPv2 uses multicast address 224.0.0.9, if possible
• Request received: Routers that receive above request send their entire routing table
• Response received: Update the routing table
• Regular routing updates: Every 30 seconds, send all or part of the routing tables to every neighbor in a response message
• Triggered Updates: Whenever the metric for a route changes, send entire routing table.
RIP Summary• Slow convergence• Limited to 16 hops• Only uses local information for routing decisions
(from neighbors) - relies on others (propagation) for global information
Open Shortest Path First (OSPF)
• Uses Link State routing• Each node requires complete topology information
• Link state information must be flooded to all nodes (uses multicasting)
• Cost metric used to calculate shortest paths. Metric can be any link or network parameter (time, congestion, bandwidth, $$, distance) or a function that combines several weighted parameters
• Guaranteed to converge
37
Link State Routing: Basic principles1. Each router establishes a relationship (“adjacency”)
with its neighbors
2.Each router generates link state advertisements (LSAs) which are distributed to all routers (after all routers have established adjacencies).
LSA = (link id, state of the link, cost, neighbors of the link)
3. Each router maintains a database of all received LSAs (topological database or link state database), which describes the network has a graph with weighted edges
4. Each router uses its link state database to run a shortest path algorithm (Dijikstra’s algorithm) to produce the shortest path to each network
38
Operation of a Link State Routing protocol
ReceivedLSAs
IP Routing Table
Dijkstra’sAlgorithm
Link State
Database
LSAs are flooded to other interfaces
39
Features of OSPF• Provides authentication of routing messages• Enables load balancing by allowing traffic to
be split evenly across routes with equal cost• Type-of-Service routing allows setup of
different routes dependent on the TOS field in IP header
• Uses AREAs to subdivide large networks, providing a hierarchical structure and limit the multicast LSAs within routers of the same area. Area 0 is called the backbone area and all other areas connect directly to it. All OSPF networks must have a backbone area
OSPF Areas
Area Border Routers (ABR) are any routers that have one interface in one area and another interface in another area
OSPF Operation• Link-state routing protocols generate routing updates
only when a change occurs in the network topology.• When a link changes state, the device that detected the
change creates a link-state advertisement (LSA) concerning that link and sends to all neighboring devices using a special multicast address.
• Each routing device takes a copy of the LSA, updates its link-state database (LSDB), and forwards the LSA to all neighboring devices using multicasting in broadcast environments.
OSPF Operation contd.• The entire routing table (LSDB) is transmitted once every
30 minutes• Routing information is shared through Link-state updates
(LSAs)• HELLO messages are used to maintain adjacent
neighbors. • By default, OSPF routers send Hello packets every 10
seconds on multiaccess and point-to-point segments and every 30 seconds on non-broadcast multiaccess (NBMA) segments (e.g. frame relay).
• It is a classless routing protocol. It sends the subnet mask in the routing update.
Link State Advertisements (LSA)
• OSPF routers use LASs to describe its link state.• An LSDB stores all received LSAs on a router.• A router uses Router LSA to describe its interface
IP addresses.• After OSPF is started on a router, it creates an
LSDB that contains one entry: this router’s Router LSA
Types of OSPF Messages• There are five types of OSPF Link-State Packets (LSPs).1. Hello: are used to establish and maintain adjacency
with other OSPF routers. They are also used to elect the Designated Router (DR) and BackupDesignated Router (BDR) on multiaccess networks (like Ethernet or Frame Relay).
2. Database Description (DBD or DD): contains an abbreviated list of the sending router’s link-state database and is used by receiving routers to check against the local link-state database
LSPs contd.3. Link-State Request (LSR): used by receiving
routers to request more information about any entry in the DBD
4. Link-State Update (LSU): used to reply to LSRs as well as to announce new information. LSUs contain seven different types of Link-State Advertisements (LSAs)
5. Link-State Acknowledgement (LSAck): sent to confirm receipt of an LSU message
46
OSPF Packet Format
OSPF MessageIP header
Body of OSPF MessageOSPF MessageHeader
Message TypeSpecific Data
LSA LSALSA ...
LSAHeader
LSAData
...
Destination IP: neighbor’s IP address or 224.0.0.5 (ALLSPFRouters) or 224.0.0.6 (AllDRouters)
TTL: set to 1 (in most cases)
OSPF packets are not carried as UDP payload!OSPF has its own IP protocol number: 89
47
OSPF Packet Format
source router IP address
authentication
authentication
32 bits
version type message length
Area ID
checksum authentication type
Body of OSPF MessageOSPF MessageHeader
2: current version is OSPF V2
Message types:1: Hello (tests reachability)2: Database description3: Link Status request4: Link state update5: Link state acknowledgement
ID of the Area from which the packet originated
Standard IP checksum taken over entire packet
0: no authentication1: Cleartext password2: MD5 checksum(added to end packet)
OSPF Hello Message
Example of OSPF• Suppose OSPF has just been enabled on R1 & R2. Both
R1 and R2 are very eager to discover if they have any neighbors nearby but before sending Hello messages they must first choose an OSPF router identifier (router-id) to tell their neighbors who they are. The Router ID (RID) is an IP address used to identify the router and is chosen using the following sequence:
• The highest IP address assigned to a loopback (logical) interface.
• If a loopback interface is not defined, the highest IP address of all active router’s physical interfaces will be chosen.
• The router ID can be manually assigned
Example contd.• In this example, suppose R1 has 2 loopback interfaces &
2 physical interfaces:• Loopback 0: 10.0.0.1• Loopback 1: 12.0.0.1• eth0/0: 192.168.1.1• eth0/1: 200.200.200.1
• The loopback interfaces are preferred to physical interfaces (because they are never down) so the highest IP address of the loopback interfaces is chosen as the router-id -> Loopback 1 IP address is chosen as the router-id.
Router 1
Router 2
Next Step – Hello Msgs• Now both the routers have the router-id so they
will send Hello packets on all OSPF-enabled interfaces to determine if there are any neighbors on those links.
• The information in the OSPF Hello includes the OSPF Router ID of the router sending the Hello packet.
Hello Msg R1 to R2• R1 wants to find out if it has any neighbor running OSPF
it sends a Hello message to the multicast address 224.0.0.5.
• This is the multicast address for all OSPF routers and all routers running OSPF will process this message.
55
Discovery of Neighbors
• Routers multicasts OSPF Hello packets on all OSPF-enabled interfaces.
• If two routers share a link, they can become neighbors, and establish an adjacency
• After becoming a neighbor, routers exchange their link state databases
OSPF Hello
OSPF Hello: I heard 10.1.10.2
10.1.10.1 10.1.10.2 Scenario:Router 10.1.10.2 restarts
Establishing adjacency• If an OSPF router receives an OSPF Hello packet
that satisfied all its requirement then it will establish adjacency with the router that sent the Hello packet. In this example, if R1 meet R2′s requirements, meaning it has:• the same Hello interval, •Dead interval and •AREA number
• R2 will add R1 to its neighbor table.
Hello Msg Adjacency Parameters
• Hello interval: indicates how often it sends Hello packets.• Dead interval: number of seconds this router should wait
between receiving hello packets from a neighbor before declaring the adjacency to that neighbor down
• AREA number: the area it belongs to
Next – Exchange DD or DBD packets
• R1 and R2 are neighbors but they don’t exchange LSAs immediately. Instead, they send Database Description (DD or DBD) packets which contain an abbreviated list of the sending router’s link-state database.
• The neighbors also determine who will be the master and who will be the slave. The router with higher routerid will become master and initiates the database exchange.
• The receiver acknowledges a received DD packet by sending an identical DD packet back to the sender.
• Each DD packet has a sequence number and only the master can increment sequence numbers.
DD Msg Exchange
60
Neighbor discovery and database synchronization
OSPF Hello
OSPF Hello: I heard 10.1.10.2
Database Description: Sequence = X
10.1.10.1 10.1.10.2
Database Description: Sequence = X, 5 LSA headers = Router-LSA, 10.1.10.1, 0x80000006 Router-LSA, 10.1.10.2, 0x80000007 Router-LSA, 10.1.10.3, 0x80000003 Router-LSA, 10.1.10.4, 0x8000003a Router-LSA, 10.1.10.5, 0x80000038 Router-LSA, 10.1.10.6, 0x80000005
Database Description: Sequence = X+1, 1 LSA header= Router-LSA, 10.1.10.2, 0x80000005
Database Description: Sequence = X+1
Sends empty database description
Discovery of adjacency
Sends database description. (description only contains LSA headers)
Database description of 10.1.10.2Acknowledges
receipt of description
After neighbors are discovered the nodes exchange their databases
LSA Request
R1 or R2 can send Request to get missing LSA from its neighbors
LSA Exchange
R2 sends back an LSAck packet to acknowledge the packet
63
LSA exchanges – Request and Response
10.1.10.1 10.1.10.2
Link State Request packets, LSAs = Router-LSA, 10.1.10.1, Router-LSA, 10.1.10.2, Router-LSA, 10.1.10.3, Router-LSA, 10.1.10.4, Router-LSA, 10.1.10.5, Router-LSA, 10.1.10.6,
Link State Update Packet, LSA = Router-LSA, 10.1.1.6, 0x80000006
Link State Update Packet, LSAs = Router-LSA, 10.1.10.1, 0x80000006 Router-LSA, 10.1.10.2, 0x80000007 Router-LSA, 10.1.10.3, 0x80000003 Router-LSA, 10.1.10.4, 0x8000003a Router-LSA, 10.1.10.5, 0x80000038 Router-LSA, 10.1.10.6, 0x80000005
10.1.10.2 explicitly requests each LSA from 10.1.10.1
10.1.10.1 sends requested LSAs 10.1.10.2 has more
recent value for 10.0.1.6 and sends it to 10.1.10.1(with higher sequence number)
Creating LSDBs• Note that first routers exchange DD msgs that only list
the content of the LSDB but no details.• Once a router gets that info, it can then check to see if it
has that information in its LSDB.• If it doesn’t it requests an LSA to fill in the details.• Reliable transmission: when a router receives an
Update, it sends an Ack to the Update sender.• If the sender does not receivie Ack within a specific
peried, it times out and retransmits Update.• OSPF uses Update-Ack to implement relaible
transmission. It does not use TCP!
65
Routing Data Distribution• LSA-Updates are distributed to all other
routers via Reliable Flooding• Example: Flooding of LSA from 10.10.10.1
10.10.10.1 10.10.10.2 10.10.10.4 10.10.10.6
10.10.10.2 10.10.10.5
LSA
LSA
Updatedatabase
Updatedatabase
ACK
AC
K
LSA
LS
A
LSA
LS
A AC
K
AC
K
ACK
ACK
LSA
LS
A
LSA
LS
A
Updatedatabase
Updatedatabase
ACK
AC
K
ACK
AC
K
Updatedatabase
66
Dissemination of LSA-Update
• A router sends and refloods LSA-Updates, whenever the topology or link cost changes. (If a received LSA does not contain new information, the router will not flood the packet)
• Exception: Infrequently (every 30 minutes), a router will flood LSAs even if there are no new changes.
• Acknowledgements of LSA-updates:• explicit ACK, or• implicit via reception of an LSA-Update
OSPF Tables• There are 3 type of tables stored at a Router:
•Neighbor•Topology•Routing
Neighbor Table• Contain information about the neighbors• Neighbor is a router which shares a link on same
network• Another relationship is adjacency• Not necessarily all neighbors• LSA updates are only when adjacency is
established
Topology Table• Contains information about all network and paths
to reach any network• All LSA’s are entered into the topology table• When topology changes, LSA’s are generated
and router sends new LSA’s• Using the topology table a shortest path
connectivity graph is created (routing table), the algorithm is known as SPF or Dijkstra’s algorithm
Routing Table• Also known as forwarding database• Generated when an algorithm is run on the
topology database• Routing table for each router is unique