Thursday, August 15, 2019
Routing Protocol
1. INTRODUCTION 1. 1 Whatà is Computer Network? The groupà ofà computers and devices linked by communication channels allowing users to share information, data, software and hardware with further users is meant to be computer network. Network protocols bound hardware as well as software components of network. Two or moreà computers are saidà to beà inà a network if and only if they are connectedà mutuallyà andà areà ableà to commune. Computers are connected to a network by the use of allà the ports i. e. , parallel ports, modem ports, Ethernet ports, serial ports, USB portsà , fire wire ports and many more in one or more way. But Ethernet port is the most broadly used portsà for networking. Hosts, end stations or workstations are referred while talkingà about networks. Anythingà attachedà toà the networkà including hubs, bridges, switches, routers,à access points, firewalls, workstations, servers, mainframes, printers, scanners, copiers, fax machinesà and more are included under Host or end stations . Computers are connected in a network for sharing of software and hardware resources, information and data as well as smooth the progress of communication. 1. 2 TCP/IP Layeredà architecture Fig: TCP/IP Layeredà architecture The followingà areà the layersà ofà the TCP/IPà architecture: Application Layer: In theà application layer Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP) uses protocolà for network communication. Application layer protocolsà are mostà frequentlyà linked with client-serverà applications. Transport Layer: End-to-end message transfer capability, flow control, error control and fragmentation etc are providedà by the transport layer. The transport layer ensures source to destination delivery of packets safely and reliably. The service through which applications are connectedà together viaà the useà of ports is provided by transport layer. Network Layer: Packets are logically transmitted overà the entire network in the OSIââ¬â¢s Network layer. Hosts addressing by assigningà themà an IPà addressà and packet routing among multiple networks are handled in this layer. This layer is concerned with routing data; end to end message delivery etc. Interface Layer: The data exchange betweenà the hostà andà the network are monitored by theà interface layer. The protocols forà physical transmissionà of data is defined by Interface Layer . 1. 3à Autonomous System IP networksà and routers collection underà the controlà of one entity representing a common routing policy is called anà Autonomous System. Eachà ASà have a uniqueà AS numberà for useà in routing. Each network is uniquely identified onà theà internet by ASN. IANA (Internetà assigned Numbersà authority) assign AS numbersà and supplyà to Regionalà internet Registries (RIRs)à in blocks. Autonomous System can be dividedà into three categories: Multihomedà Autonomous System:à Connectionsà to more than oneà AS is maintained by a Multihomedà AS. Stubà autonomous System:à Connectionà to only one otherà AS is Stubà autonomous System. Transità autonomous System:à Connections through itselfà to separate networks are provided by Transità autonomous System. 1. 4 Routing The methodà of selecting pathsà inà a network via whichà to send data is meant to be routing. The processà of findingà a pathway fromà a senderà toà a desired destination is also said to be routing. The telephone network,à theà internetà and transport networks, etc perform routing. Network Layerà of either TCP/IP layered model orà the OSI (Open Systemà interconnect) Reference model mainly carry out routing. The logicallyà addressed packets are passed fromà their sourceà to destination viaà intermediary nodes i. e. orwarding is directed by routing. Routing tasks are performed by routers. Routing and packet forwarding is performed by ordinaryà computers available with multiple network cards in a limited manner. Forwarding is directed by the routing process onà the basisà of routing tables where routing record to different network destinations are maintained. In order to have efficient routing, construction of routing table heldà inà the routers' memory is most necessary thing. Only one network path are frequently used by routingà algorithms à atà a time, butà the useà of multipleà alternative paths is made possible by multi-path routing techniques. Following are the typesà of routing delivery semantics: Unicast: A message is delivered toà a single specified node by router. Fig: Unicasting Broadcast: à A message is deliveredà toà all nodesà inà the network by router. Fig: Broadcasting Multicast: à A message is deliveredà to assemblyà of nodes that have expressedà interestà in gettingà the message by router. Fig: Multicasting Anycast: A message is deliveredà toà any one outà ofà a setà of nodes, typicallyà the one nextà toà the source. Fig:à anycasting 2. TYPESà OF ROUTING Following are the typesà of Routing mechanisms. Theyà are: Static Routing Dynamic Routing 2. Static Routing: The processà by which routes can be manually entered into the routing table with the help of a configuration file which loads automatically as soon as router starts is called static routing. Networkà administrator, who configures the routes, can enter these routes as an option. Thus ââ¬Ëstatic' rou tes mean the routes that cannot be changed (exceptà a person changesà them)à after their configuration. The simplestà typeà of routing is static routing. In case of change of routing information often or configuration on a huge number of routing devices (router) it doesnââ¬â¢t work fine as it is a manual process. The outages or down connections are not handled properly by static routing becauseà manually configured route must be reconfigured physically in orderà to fix or renovateà any lost connectivity. 2. 2 Dynamic Routing: Network destinations are discovered dynamicallyà by means of softwareà applications called Dynamic routing protocols. A routing table is created and managed by routerà in Dynamic Routing. Firstly, a router will ââ¬Ëlearn' routesà toà the directly connected entire networks. It willà then learn routes from other routers using the same routing protocol. One or more best routes are selected from the list of routes for each and every network destination by router. ââ¬ËBest route'à information are distributedà to other routers runningà the same routing protocol by Dynamic protocols, distributingà theà information on what networks it subsistà and can be reached. This provide dynamic routing protocolsà theà capabilityà toà get used to logical networkà topology changes, equipment failures or network outages ââ¬Ëonà the fly'. 2. 3 Typesà of Dynamic Routing Distance-Vector Routing Paths are calculated using Bellman Ford Algorithm byà a distance-vector routing protocol. RIPv1à and 2à and IGRP (Interior Gateway Routing Protocol) are examplesà of distance-vector routing protocols. Earlier, distance vector protocols such as RIPv1 show classful behavior but newer distance vector protocols suchà as RIPv2à and Enhancedà interior Gateway Routing Protocol (EIGRP) show signs of classless behavior. Distance-vector routing protocols â⬠¢ Easyà and competentà in small networks â⬠¢ Deprived convergence properties â⬠¢ Facilitate inà the growthà of more complex but more scalable link-state routing protocolsà for useà in large networks. Periodic copiesà ofà a routing table are passed from routerà to router by distance vector routingà algorithms. â⬠¢ Logical broadcast is the most commonly usedà addressing scheme. Periodic updates are sent by routers runningà a distance vector routing protocol even ifà thereà are no changesà inà the network. â⬠¢ Complete routing table is included underà the periodic rou ting update in a pure distance vector environment. â⬠¢ All known routes can be verified and changes can be madeà by gettingà a neighborââ¬â¢s complete routing table based on simplifiedà information also called as ââ¬Å"routing by rumorâ⬠. Fig: Distance Vector Routing Periodic routing updates are received from router A to router B inà the figure. Distance vector metric (suchà as hop count) are added by Router B to each route learned from router A,à risingà the distance vector. Its own routing tablesà are passed to its neighbor, router C. This process occursà between directly connected neighbor routers inà all directions. The chief purposeà isà to decideà the top routeà toà containà inà the table when the routing table is updated byà a routing protocolà algorithm. Different routing metric is used to determineà the best route by each distance vector routing protocol. Metric valueà is generated for each path through network by theà algorithm. Usually, the path is better if metric is smaller. Single characteristicà ofà a path helps in calculation of metrics and combination of several path characteristics helps in calculation of more complex metrics. The most commonly usedà metrics used by distance vector routing protocols are: Hop Count: Packetââ¬â¢s numberà of passages throughoutà the output portà of one router Bandwidth: Linkââ¬â¢s data capacity Delay: Time necessaryà to shiftà a packet from starting placeà to destination. Load: work load onà router or link. Reliability: each network linkà bit error rate Maximum Transmission Unit (MTU):à the utmost message extentà in octets satisfactoryà toà all links onà the path. Link-State Routing Packet-switched networks use link-state routing protocolà for computer communications. OSPFà andà IS-IS are its examples. Aà topological database is built by the help of link-state routing that describes extraà preciseà inter-network routes. Large networks use link state routing protocols and now used by most of the organization and ISP. Router performs the link-state protocol inà the network. A mapà ofà the connectivityà ofà the network is constructed by every node in the form of graph showing node connection to other node is the basic conceptà of link-state routing. The best next hop is calculated by each nodeà independently for every possible destinationà inà the network. The routing table for the node is formed byà the collectionà of best next hops. Fig: Link-State Routing To find outà the shortest path from itselfà to every other nodeà inà the network anà algorithm is run by each nodeà independently overà the map. OSPF, EIGRP and Novell's NLSP (NetWare Link State Protocol) are the examples of link state routing protocol. IPX is only supported by Novell's NLSP. A partial mapà ofà the network is maintained by each router in this typeà of routing protocol. Link stateà advertisement (LSA)à is flooded throughoutà the network whenà a network link changes state (upà to down, or vice versa). The changes are noted and routes are re-computed by allà the routersà accordingly. Greater flexibilityà and sophistication are provided by Link State Routing protocols thanà the Distance Vector routing protocols. Overall broadcast traffic is reducedà and better decisions are madeà about routing by taking characteristics suchà as bandwidth, delay, reliability,à and loadà into consideration,à insteadà of takingà their decisions only on hop count. 3. ROUTINGà ALGORITHMS 3. 1 Bellman-Fordà Algorithm: â⬠¢ Also called as Label Correctingà algorithm â⬠¢ Used for negative edge weight â⬠¢ Same as Dijkstra'sà algorithm â⬠¢ In order to maintain distance tables, this algorithm is used by router â⬠¢ Exchangingà information withà the neighboring nodes help to update information in the distance table â⬠¢ All nodesà in the network is represented by the numberà of dataà inà the table The directlyà attached neighbors are represented by the columnsà of table and all destinationsà inà the network are represented by the row. â⬠¢ The numberà of hops, latency,à the numberà of outgoing packets, etc. are measurements in this algorithm. 3. 2 Dijkstraââ¬â¢sà Algorithm: â⬠¢ Edsger Dijkstraà conceived Dijkstra'sà algorithm â⬠¢ Mostly used for routing â⬠¢ Is a graph search algorithm â⬠¢ The single-source shortest path problemà forà a graph is solved by this algorithm with non negative edge path costs â⬠¢ The shortest path tree is produced as a output â⬠¢ Helps in finding shortest route from one router to other A shortest-path spanning tree having route to all possible destinationà is built by this algorithm for router â⬠¢ The router usingà theà algorithmà isà the sourceà of its shortest-path spanning tree 4. ROUTING PROTOCOLS Routing protocol describe the way of communication between routers which helps in the selection of routes between any two nodes on a network. Usually, knowledge of immediate neighbors is known by each router. Thisà information is shared byà a routing protocol to have routers the knowledgeà ofà the networkà topology. Most commonly used Rout ing protocols are as follows: 4. RIP (Routingà information Protocol) â⬠¢ dynamicà inter-network routing protocol â⬠¢ used in private network â⬠¢ routes are automatically discovered â⬠¢ routing tables are built â⬠¢ a Distance-Vector routing protocol â⬠¢ uses Bellman-Fordà algorithm â⬠¢ 15 hops areà allowed with RIP â⬠¢ 180 sec is the hold down time â⬠¢ Full updates are transmitted every 30 sec by each RIP router â⬠¢ Works at network layer â⬠¢ Prevent routing loops â⬠¢ Hop limit â⬠¢ incorrect routingà information are prevented from being propagated â⬠¢ easy configuration â⬠¢ no parameter required Two versionsà of RIP are as follows: RIPv1: â⬠¢ classful routing is used subnet information is not carried by periodic routing updates â⬠¢ no support for VLSM (variable length subnet masks) â⬠¢ Same network class have different sized subnet by the use of RIPv1 â⬠¢ No router authentication â⬠¢ Broadcast based and 15 is the maximum hop count A RIPv1 packetà formatà is shown below: [pic]Fig: RIP packetà format Command:à determine whetherà the packetà isà a request orà a response. A router sendà all or partà of its routing table is asked byà the request. Replyà toà a request or regular routing update means the response. Routing table entries are contained in responses. Version number: RIP version used is specified. Potentiallyà incompatible versions can be signaled by this field. Zero: RFC 1058 RIP doesnââ¬â¢t use this field; it wasà added to have backward compatibility provided to pre-standard varietiesà of RIP. Address family identifier (AFI): à Theà address family used is specified. Address-family identifier is contained inà each entryà toà specifyà the categoryà ofà address being particularized. Theà AFIà for IPà is 2. Address: à The IPà address is particularizedà forà the entry. Metric:à The number of inter-network hops traversedà inà the tripà toà the destination is indicated. 1à and 15à forà an applicable route, or 16à forà an unapproachable route. RIPv2: Developedà in 1994 â⬠¢ Classlessà inter-Domain Routing (CIDR) is supported â⬠¢ Subnetà information can be carried â⬠¢ Addition of MD5à authentication and Rudimentary plain textà authentication for the security of routing updates. â⬠¢ Routing updatesà are multicast to 224. 0. 0. 9 â⬠¢ 15 is the maximum hop count A RIPv2 packetà format is shown below: [pic] Fig: RIPv2 packetà format Command:à determine whetherà the packetà isà a request orà a response. A router sendà all or partà of its routing table is asked byà the request. Replyà toà a request or regular routing update means the response. Routing table entries are contained in responses. Version number: RIP version used is specified. Unused: Zero is the value set. Address-family identifier (AFI):à Theà address family used is specified. Authenticationà information is contained in the remainder of the entry ifà theà AFIà forà the initial entryà is 0xFFFF inà the message. At present,à simple password is the onlyà authentication type. Route tag: The methodology is providedà for distinguishing betweenà internal routes (learned by RIP)à and external routes (learned from other protocols). IPà address: IPà address is particularizedà forà the entry. Subnet mask:à The subnet mask is containedà forà the entry. No subnet mask has been particularizedà forà the entry if this fieldà is zero. Next hop: The IPà addressà ofà the next hop is indicatedà to which packetsà forà the entry should beà forwarded. Metric:à The number of inter-network hops traversedà inà the tripà toà the destination is indicated. 1à and 15à forà an applicable route, or 16à forà an unapproachable route. 4. 2 OSPF (Open Shortest Path First) â⬠¢ A Link-State protocol â⬠¢ usedà for routing between routers belongingà toà a singleà autonomous system â⬠¢ link-state technology is used â⬠¢ à informationà aboutà the direct connectionsà and links is communicated between the routers Identical database is maintained by each OSPF router for the description of à theà autonomous Systemââ¬â¢sà topology â⬠¢ Calculation of a routing table by the construction of a shortest- path tree from this database. â⬠¢ Routes are quickly recalculated in the face of topological changes â⬠¢ equal-cost multi-path are supported â⬠¢ Authentication of all OSPF routing protocol exchanges â⬠¢ Designed for TCP/IP environment â⬠¢ routing updates authentication â⬠¢ IP multicast are utilized in sending/receivingà the updates â⬠¢ routes IP packets based exclusively onà the target IPà address originateà inà the IP packet header Grouping of sets of networks â⬠¢ IP subnets are flexibly configured â⬠¢ Destinationà and mask is available to the route distributed by OSPF The following figure showsà the packetà format used by OSPF: [pic]Fig: OSPF packetà format Version number:à the OSPF version used is specified. Type:à the OSPF packet type is identifiedà as oneà ofà the following: Hello: neighbor relationships are established and maintained. Database description:à the contentsà ofà theà topological database are described. Link-state request: piecesà ofà theà topological database are request ed from neighbor routers. Link-state update:à a link-state request packet is responded. Link-stateà acknowledgment:à link-state update packets are acknowledged. Packet length:à the packet length,à the OSPF header is specified. Router ID: à the sourceà ofà the packet is identified. Area ID: à Theà area of packet is identified. All OSPF packetsà areà linked withà a singleà area. Checksum:à the complete packet contents are checkedà forà any harm sufferedà in travel. Authentication type:à theà authentication type is contained. Authentication ofà all OSPF protocol exchanges. Configuration of theà authentication typeà on per-area basis. Authentication: à authenticationà information is contained. Data: encapsulated upper-layerà information is contained. 5. WORKING 5. 1 Distance Vector Routing: The following methods showà the overall workingà ofà the Distance-Vector Routing: . There is no predefined route i. e. entire route for a particular destination is not known to any router. The port to send out a unicast packet is known by each router on the basis of destination address. Progressively the route is made and there is the formation of the route by the contribution of each router when it receives the packet. The optimal tree is not predefined in DVRP actually. No routers have knowledge for making an optimal tree. Slowly and gradually the tree is made. The tree is formed as soon as a router receives a packet; it is forwarded by router through some of the ports, on the basis of source address. Other down-stream routers make the rest of the tree. The formation of the loops must be prevented by this protocol. Duplications are also prevented in order to make the entire network receive only one copy. In addition to this, the shortest path from source to the destination is the path travelled by a copy. Inconsistencies occurring with Distance-Vector Routing: Incorrect routing entries are caused by slowà inter-network convergence which may bring inconsistencies maintaining routing information. .à The following example describes howà inconsistencies occurà in Distance-Vector routing: The entire figure describes the inconsistencies occurring with Distance-Vector Routing. Definingà a maximumà to prevent countà toà infinity: . With thisà approach,à the routing table update loop is permitted by routing protocol untilà the metric exceeds its maximumà allowed value. Fig: Definingà a maximumà to prevent countà toà infinity 6 hops are defined as the maximumà allowed value. Whenà the metric value exceeds 16 hops, we cannot reach network 10. 4. 0. 0 Routing Loopsà in Distance-Vector Routing: A routing loop is said to be occurred if two or more routers haveà false routingà informationà representing thatà a applicable pathà toà an unapproachable d estination exists via other routers. Fig: Routing Loop Solutionsà to eliminate routing loops Split horizon:à The information is not sent in the direction from where original information comes. The split horizon function is illustrated by the following figure Fig: Split Horizon Route Poisoning:à Routing loops are eliminated. The following figure providesà an exampleà of Route Poisoning: Fig: Route Poisoning Inà additionà to split horizon, route poisoningà and holddown timers, poison reverse, holddown timersà and triggered updatesà are other methodsà to eliminate routing loops. 5. 2 Link-State Routing: The following methods showà the overall workingà of Link-State Routing. Gathering of the neighborà information continuously. Router answering to this protocol are broadcasted the list of neighborà information, process knownà as flooding. Soon, thisà information is distributed to all routers onà the network. Flooding of the neighborà information in caseà ofà a (routing-significant) changeà inà the network. The best path can be calculated to any host on any destination network as everythingà aboutà the network is known by every router. 6. ADVANTAGESà AND DISADVANTAGES Distance-Vector Routing Advantagesà of Distance-Vector Routing: â⬠¢ simpleà and flat network â⬠¢ No special hierarchical design is required. â⬠¢ Implementation of hub-and-spoke networks â⬠¢ No concern for worst-case convergence timesà inà a network â⬠¢ less memoryà and processing power usage Disadvantagesà of Distance-Vector Routing: â⬠¢ Incorrect routing entries create inconsistencies in maintainingà the routingà information â⬠¢ Rise of a condition countà toà infinity â⬠¢ Occurrence of a routing loop â⬠¢ Variable Length Subnet Masking (VLSM) or super netting is not supported â⬠¢ multi-vendor routing environment is not supported Link-State Routing Advantagesà of Link-State Routing: â⬠¢ Paths are chosen via network by the use of cost metrics â⬠¢ changesà inà the networkà topology are reported toà all routersà inà the network quickly â⬠¢ à fast convergence times â⬠¢ No occurrence of routing loops routing decisions are based on the most recent setà ofà information â⬠¢ Link-State protocols use cost metricsà to choose paths thoughà the network. The cost metric reflectsà the capacityà ofà the links on those paths. Disadvantagesà of Link-State Routing: â⬠¢ Topology database,à anà adjacency database,à andà aà forwarding database is required. â⬠¢ a significantà amountà of memoryà is required in large or complex networks â⬠¢ significantà amountà of CPU power usage â⬠¢ need of a strict hierarchical network design to reduce significantà amountà of CPU power usage â⬠¢ network capability or performance is low to transport data . APPLICATIONà AREAS Distance-Vector Routing: â⬠¢ used in mobile, wireless and hoc networks (MANETs) â⬠¢ used for mobileà ad hoc routing (Ad hoc On-Demand Distance Vector Routing) . Link-State Routing: â⬠¢ usedà in larger, more complicated networks â⬠¢ Optimized Link State Routing Protocol (OLSR) designed for mobile, wireless and hoc networks 8. COMPARING DISTANCE-VECTORà AND LINK-STATE ROUTING STRATEGIES â⬠¢ Mostly, best path is determined by Distance Vector protocols, while bandwidth, delay, reliabilityà and load are considered to make routing decision by Link-State protocols Distance Vector protocols are simple and efficient where as Link-State protocols are flexible and sophisticated â⬠¢ Routingà information Protocol (RIP v1à and v2)à andà interior Gateway Routing Protocol (IGRP developed by Cisco) are Distance Vector protocols where as OSPF, EIGRP, Novell's NLSP (NetWare Link State Protocol) are Link-State protocols â⬠¢ Notion of a distance is not required in Distance Vector routing where as Link-State routing is based on minimizing some notion of distance â⬠¢ Uniform policies are not required at all routers in Distance Vector routing but uniform policy is required in Link-State routing Router have little knowledge about network topology in Distance Vector routing where as routing domain has excessive knowledge about topology information in Link-State routing 9. CONCLUSION Introduction, working, use, advantages and disadvantages of Distance-Vectorà and Link-State routingà are explainedà in this project. Bellmanà fordà and Dijkstr aââ¬â¢sà algorithm are also discussed. This project describes the popularity of Distance-Vectorà and Link-State routingà because of their complex, sophisticated, flexible features in recent computer networking field..
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.