Sunday, November 10, 2019
Routing Protocol
1. INTRODUCTION 1. 1 Whatà  is Computer Network? The groupà  ofà  computers and devices linked by communication channels allowing users to share information, data, software and hardware with further users is meant to be computer network. Network protocols bound hardware as well as software components of network. Two or moreà  computers are saidà  to beà  inà  a network if and only if they are connectedà  mutuallyà  andà  areà  ableà  to commune. Computers are connected to a network by the use of allà  the ports i. e. , parallel ports, modem ports, Ethernet ports, serial ports, USB portsà  , fire wire ports and many more in one or more way.  But Ethernet port is the most broadly used portsà  for networking. Hosts, end stations or workstations are referred while talkingà  about networks. Anythingà  attachedà  toà  the networkà  including hubs, bridges, switches, routers,à  access points, firewalls, workstations, servers, mainframes, printers, scanners, copiers, fax machinesà  and more are included under Host or end stations . Computers are connected in a network for sharing of software and hardware resources, information and data as well as smooth the progress of communication. 1. 2 TCP/IP Layeredà  architecture  Fig: TCP/IP Layeredà  architecture The followingà  areà  the layersà  ofà  the TCP/IPà  architecture: Application Layer: In theà  application layer Simple Mail Transfer Protocol (SMTP) and File Transfer Protocol (FTP) uses protocolà  for network communication. Application layer protocolsà  are mostà  frequentlyà  linked with client-serverà  applications. Transport Layer: End-to-end message transfer capability, flow control, error control and fragmentation etc are providedà  by the transport layer. The transport layer ensures source to destination delivery of packets safely and reliably.  The service through which applications are connectedà  together viaà  the useà  of ports is provided by transport layer. Network Layer: Packets are logically transmitted overà  the entire network in the OSIââ¬â¢s Network layer. Hosts addressing by assigningà  themà  an IPà  addressà  and packet routing among multiple networks are handled in this layer. This layer is concerned with routing data; end to end message delivery etc. Interface Layer: The data exchange betweenà  the hostà  andà  the network are monitored by theà  interface layer. The protocols forà  physical transmissionà  of data is defined by Interface Layer . 1. 3à  Autonomous System  IP networksà  and routers collection underà  the controlà  of one entity representing a common routing policy is called anà  Autonomous System. Eachà  ASà  have a uniqueà  AS numberà  for useà  in routing. Each network is uniquely identified onà  theà  internet by ASN. IANA (Internetà  assigned Numbersà  authority) assign AS numbersà  and supplyà  to Regionalà  internet Registries (RIRs)à  in blocks. Autonomous System can be dividedà  into three categories: Multihomedà  Autonomous System:à   Connectionsà  to more than oneà  AS is maintained by a Multihomedà  AS. Stubà  autonomous System:à   Connectionà  to only one otherà  AS is Stubà  autonomous System.  Transità  autonomous System:à  Connections through itselfà  to separate networks are provided by Transità  autonomous System. 1. 4 Routing The methodà  of selecting pathsà  inà  a network via whichà  to send data is meant to be routing. The processà  of findingà  a pathway fromà  a senderà  toà  a desired destination is also said to be routing. The telephone network,à  theà  internetà  and transport networks, etc perform routing. Network Layerà  of either TCP/IP layered model orà  the OSI (Open Systemà  interconnect) Reference model mainly carry out routing. The logicallyà  addressed packets are passed fromà  their sourceà  to destination viaà  intermediary nodes i. e. orwarding is directed by routing. Routing tasks are performed by routers. Routing and packet forwarding is performed by ordinaryà  computers available with multiple network cards in a limited manner. Forwarding is directed by the routing process onà  the basisà  of routing tables where routing    record to different network destinations are maintained. In order to have efficient routing, construction of routing table heldà  inà  the routers' memory is most necessary thing. Only one network path are frequently used by routingà  algorithms à  atà  a time, butà  the useà  of multipleà  alternative paths is made possible by multi-path routing techniques.  Following are the typesà  of routing delivery semantics: Unicast: A message is delivered toà  a single specified node by router. Fig: Unicasting Broadcast: à  A message is deliveredà  toà  all nodesà  inà  the network by router. Fig: Broadcasting Multicast: à  A message is deliveredà  to assemblyà  of nodes that have expressedà  interestà  in gettingà  the message by router. Fig: Multicasting Anycast: A message is deliveredà  toà  any one outà  ofà  a setà  of nodes, typicallyà  the one nextà  toà  the source. Fig:à  anycasting 2. TYPESà  OF ROUTING Following are the typesà  of Routing mechanisms. Theyà  are: Static Routing Dynamic Routing 2. Static Routing: The processà  by which routes can be manually entered into the routing table with the help of a configuration file which loads automatically as soon as router starts is called static routing. Networkà  administrator, who configures the routes, can enter these routes as an option. Thus ââ¬Ëstatic' rou   tes mean the routes that cannot be changed (exceptà  a person changesà  them)à   after their configuration. The simplestà  typeà  of routing is static routing. In case of change of routing information often or configuration on a huge number of routing devices (router) it doesnââ¬â¢t work fine as it is a manual process.  The outages or down connections are not handled properly by static routing becauseà  manually configured route must be reconfigured physically in orderà  to fix or renovateà  any lost connectivity. 2. 2 Dynamic Routing: Network destinations are discovered dynamicallyà  by means of softwareà  applications called Dynamic routing protocols. A routing table is created and managed by routerà  in Dynamic Routing. Firstly, a router will ââ¬Ëlearn' routesà  toà  the directly connected entire networks. It willà  then learn routes from other routers using the same routing protocol.  One or more best routes are selected from the list of routes for each and every network destination by router. ââ¬ËBest route'à  information are distributedà  to other routers runningà  the same routing protocol by Dynamic protocols, distributingà  theà  information on what networks it subsistà  and can be reached. This provide dynamic routing protocolsà  theà  capabilityà  toà  get used to logical networkà  topology changes, equipment failures or network outages ââ¬Ëonà  the fly'. 2. 3 Typesà  of Dynamic Routing Distance-Vector Routing Paths are calculated using Bellman Ford Algorithm byà  a distance-vector routing protocol.  RIPv1à  and 2à  and IGRP (Interior Gateway Routing Protocol) are examplesà  of distance-vector routing protocols. Earlier, distance vector protocols such as RIPv1 show classful behavior but newer distance vector protocols suchà  as RIPv2à  and Enhancedà  interior Gateway Routing Protocol (EIGRP) show signs of classless behavior. Distance-vector routing protocols â⬠¢ Easyà  and competentà  in small networks â⬠¢ Deprived convergence properties â⬠¢ Facilitate inà  the growthà  of more complex but more scalable link-state routing protocolsà  for useà  in large networks. Periodic copiesà  ofà  a routing table are passed from routerà  to router by distance vector routingà  algorithms. â⬠¢ Logical broadcast is the most commonly usedà  addressing scheme. Periodic updates are sent by routers runningà  a distance vector routing protocol even ifà  thereà  are no changesà  inà  the network. â⬠¢ Complete routing table is included underà  the periodic rou   ting update in a pure distance vector environment. â⬠¢ All known routes can be verified and changes can be madeà  by gettingà  a neighborââ¬â¢s complete routing table based on simplifiedà  information also called as ââ¬Å"routing by rumorâ⬠. Fig: Distance Vector Routing  Periodic routing updates are received from router A to router B inà  the figure. Distance vector metric (suchà  as hop count) are added by Router B to each route learned from router A,à  risingà  the distance vector. Its own routing tablesà  are passed to its neighbor, router C. This process occursà  between directly connected neighbor routers inà  all directions. The chief purposeà  isà  to decideà  the top routeà  toà  containà  inà  the table when the routing table is updated byà  a routing protocolà  algorithm. Different routing metric is used to determineà  the best route by each distance vector routing protocol.  Metric valueà  is generated for each path through network by theà  algorithm. Usually, the path is better if metric is smaller. Single characteristicà  ofà  a path helps in calculation of metrics and combination of several path characteristics helps in calculation of more complex metrics. The most commonly usedà  metrics used by distance vector routing protocols are: Hop Count: Packetââ¬â¢s numberà  of passages throughoutà  the output portà  of one router Bandwidth: Linkââ¬â¢s data capacity Delay: Time necessaryà  to shiftà  a packet from starting placeà  to destination.  Load: work load onà  router or link. Reliability: each network linkà  bit error rate Maximum Transmission Unit (MTU):à  the utmost message extentà  in octets satisfactoryà  toà  all links onà  the path. Link-State Routing Packet-switched networks use link-state routing protocolà  for computer communications. OSPFà  andà  IS-IS are its examples. Aà  topological database is built by the help of link-state routing that describes extraà  preciseà  inter-network routes. Large networks use link state routing protocols and now used by most of the organization and ISP.  Router performs the link-state protocol inà  the network. A mapà  ofà  the connectivityà  ofà  the network is constructed by every node in the form of graph showing node connection to other node is the basic conceptà  of link-state routing. The best next hop is calculated by each nodeà  independently for every possible destinationà  inà  the network. The routing table for the node is formed byà  the collectionà  of best next hops. Fig: Link-State Routing To find outà  the shortest path from itselfà  to every other nodeà  inà  the network anà  algorithm is run by each nodeà  independently overà  the map.  OSPF, EIGRP and Novell's NLSP (NetWare Link State Protocol) are the examples of link state routing protocol. IPX is only supported by Novell's NLSP. A partial mapà  ofà  the network is maintained by each router in this typeà  of routing protocol. Link stateà  advertisement (LSA)à  is flooded throughoutà  the network whenà  a network link changes state (upà  to down, or vice versa). The changes are noted and routes are re-computed by allà  the routersà  accordingly. Greater flexibilityà  and sophistication are provided by Link State Routing protocols thanà  the Distance Vector routing protocols.  Overall broadcast traffic is reducedà  and better decisions are madeà  about routing by taking characteristics suchà  as bandwidth, delay, reliability,à  and loadà  into consideration,à  insteadà  of takingà  their decisions only on hop count. 3. ROUTINGà  ALGORITHMS 3. 1 Bellman-Fordà  Algorithm: â⬠¢ Also called as Label Correctingà  algorithm â⬠¢ Used for negative edge weight â⬠¢ Same as Dijkstra'sà  algorithm â⬠¢ In order to maintain distance tables, this algorithm is used by router â⬠¢ Exchangingà  information withà  the neighboring nodes help to update information in the distance table â⬠¢ All nodesà  in the network is represented by the numberà  of dataà  inà  the table The directlyà  attached neighbors are represented by the columnsà  of table and all destinationsà  inà  the network are represented by the row. â⬠¢ The numberà  of hops, latency,à  the numberà  of outgoing packets, etc. are measurements in this algorithm. 3. 2    Dijkstraââ¬â¢sà  Algorithm: â⬠¢ Edsger Dijkstraà  conceived Dijkstra'sà  algorithm â⬠¢ Mostly used for routing â⬠¢ Is a graph search algorithm â⬠¢ The single-source shortest path problemà  forà  a graph is solved by this algorithm with non negative edge path costs â⬠¢ The shortest path tree is produced as a output â⬠¢ Helps in finding shortest route from one router to other A shortest-path spanning tree having route to all possible destinationà  is built by this algorithm for router â⬠¢ The router usingà  theà  algorithmà  isà  the sourceà  of its shortest-path spanning tree 4. ROUTING PROTOCOLS Routing protocol describe the way of communication between routers which helps in the selection of routes between any two nodes on a network. Usually, knowledge of immediate neighbors is known by each router. Thisà  information is shared byà  a routing protocol to have routers the knowledgeà  ofà  the networkà  topology. Most commonly used Rout   ing protocols are as follows: 4. RIP (Routingà  information Protocol) â⬠¢ dynamicà  inter-network routing protocol â⬠¢ used in private network â⬠¢ routes are automatically discovered â⬠¢ routing tables are built â⬠¢ a Distance-Vector routing protocol â⬠¢ uses Bellman-Fordà  algorithm â⬠¢ 15 hops areà  allowed with RIP â⬠¢ 180 sec is the hold down time â⬠¢ Full updates are transmitted every 30 sec by each RIP router â⬠¢ Works at network layer â⬠¢ Prevent routing loops â⬠¢ Hop limit â⬠¢ incorrect routingà  information are prevented from being propagated â⬠¢ easy configuration â⬠¢ no parameter required Two versionsà  of RIP are as follows: RIPv1: â⬠¢ classful routing is used subnet information is not carried by periodic routing updates â⬠¢ no support for VLSM (variable length subnet masks) â⬠¢ Same network class have different sized subnet by the use of RIPv1 â⬠¢ No router authentication â⬠¢ Broadcast    based and 15 is the maximum hop count A RIPv1 packetà  formatà  is shown below: [pic]Fig: RIP packetà  format Command:à  determine whetherà  the packetà  isà  a request orà  a response. A router sendà  all or partà  of its routing table is asked byà  the request. Replyà  toà  a request or regular routing update means the response. Routing table entries are contained in responses. Version number: RIP version used is specified.  Potentiallyà  incompatible versions can be signaled by this field. Zero: RFC 1058 RIP doesnââ¬â¢t use this field; it wasà  added to have backward compatibility provided to pre-standard varietiesà  of RIP. Address family identifier (AFI): à  Theà  address family used is specified. Address-family identifier is contained inà  each entryà  toà  specifyà  the categoryà  ofà  address being particularized. Theà  AFIà  for IPà  is 2. Address: à  The IPà  address is particularizedà  forà  the entry. Metric:à  The number of inter-network hops traversedà  inà  the tripà  toà  the destination is indicated. 1à  and 15à  forà  an applicable route, or 16à  forà  an unapproachable route. RIPv2: Developedà  in 1994 â⬠¢ Classlessà  inter-Domain Routing (CIDR) is supported â⬠¢ Subnetà  information can be carried â⬠¢ Addition of MD5à  authentication and Rudimentary plain textà  authentication for the security of routing updates. â⬠¢ Routing updatesà      are multicast to 224. 0. 0. 9 â⬠¢ 15 is the maximum hop count A RIPv2 packetà  format is shown below: [pic] Fig: RIPv2 packetà  format Command:à  determine whetherà  the packetà  isà  a request orà  a response. A router sendà  all or partà  of its routing table is asked byà  the request. Replyà  toà  a request or regular routing update means the response. Routing table entries are contained in responses.  Version number: RIP version used is specified. Unused: Zero is the value set. Address-family identifier (AFI):à  Theà  address family used is specified. Authenticationà  information is contained in the remainder of the entry ifà  theà  AFIà  forà  the initial entryà  is 0xFFFF inà  the message. At present,à  simple password is the onlyà  authentication type. Route tag: The methodology is providedà  for distinguishing betweenà  internal routes (learned by RIP)à  and external routes (learned from other protocols). IPà  address: IPà  address is particularizedà  forà  the entry. Subnet mask:à  The subnet mask is containedà  forà  the entry.  No subnet mask has been particularizedà  forà  the entry if this fieldà  is zero. Next hop: The IPà  addressà  ofà  the next hop is indicatedà  to which packetsà  forà  the entry should beà  forwarded. Metric:à  The number of inter-network hops traversedà  inà  the tripà  toà  the destination is indicated. 1à  and 15à  forà  an applicable route, or 16à  forà  an unapproachable route. 4. 2 OSPF (Open Shortest Path First) â⬠¢ A Link-State protocol â⬠¢ usedà  for routing between routers belongingà  toà  a singleà  autonomous system â⬠¢ link-state technology is used â⬠¢ à  informationà  aboutà  the direct connectionsà  and links is communicated between the routers Identical database is maintained by each OSPF router for the description of à  theà  autonomous Systemââ¬â¢sà  topology â⬠¢ Calculation of a routing table by the construction of a shortest- path tree from this database. â⬠¢ Routes are quickly recalculated in the face of    topological changes â⬠¢ equal-cost multi-path are supported â⬠¢ Authentication of all OSPF routing protocol exchanges â⬠¢ Designed for TCP/IP environment â⬠¢ routing updates authentication â⬠¢ IP multicast are utilized in sending/receivingà  the updates â⬠¢ routes IP packets based exclusively onà  the target IPà  address originateà  inà  the IP packet header Grouping of sets of networks â⬠¢ IP subnets are flexibly configured â⬠¢ Destinationà  and mask is available to the route distributed by OSPF The following figure showsà  the packetà  format used by OSPF: [pic]Fig: OSPF packetà  format Version number:à  the OSPF version used is specified. Type:à  the OSPF packet type is identifiedà  as oneà  ofà  the following: Hello: neighbor relationships are established and maintained. Database description:à  the contentsà  ofà  theà  topological database are described. Link-state request: piecesà  ofà  theà  topological database are request   ed from neighbor routers.  Link-state update:à  a link-state request packet is responded. Link-stateà  acknowledgment:à   link-state update packets are acknowledged. Packet length:à  the packet length,à  the OSPF header is specified. Router ID: à  the sourceà  ofà  the packet is identified. Area ID: à  Theà  area of packet is identified. All OSPF packetsà  areà  linked withà  a singleà  area. Checksum:à  the complete packet contents are checkedà  forà  any harm sufferedà  in travel. Authentication type:à  theà  authentication type is contained. Authentication ofà  all OSPF protocol exchanges. Configuration of theà  authentication typeà   on per-area basis.  Authentication: à  authenticationà  information is contained. Data: encapsulated upper-layerà  information is contained. 5. WORKING 5. 1 Distance Vector Routing: The following methods showà  the overall workingà  ofà  the Distance-Vector Routing: . There is no predefined route i. e. entire route for a particular destination is not known to any router. The port to send out a unicast packet is known by each router on the basis of destination address. Progressively the route is made and there is the formation of the route by the contribution of each router when it receives the packet.  The optimal tree is not predefined in DVRP actually. No routers have knowledge for making an optimal tree. Slowly and gradually the tree is made. The tree is formed as soon as a router receives a packet; it is forwarded by router through some of the ports, on the basis of source address. Other down-stream routers make the rest of the tree. The formation of the loops must be prevented by this protocol. Duplications are also prevented in order to make the entire network receive only one copy. In addition to this, the shortest path from source to the destination is the path travelled by a copy.  Inconsistencies occurring with Distance-Vector Routing: Incorrect routing entries are caused by slowà  inter-network convergence which may bring inconsistencies maintaining routing information. .à  The following example describes howà  inconsistencies occurà  in Distance-Vector routing: The entire figure describes the inconsistencies occurring with Distance-Vector Routing. Definingà  a maximumà  to prevent countà  toà  infinity: . With thisà  approach,à  the routing table update loop is permitted by routing protocol untilà  the metric exceeds its maximumà  allowed value. Fig: Definingà  a maximumà  to prevent countà  toà  infinity 6 hops are defined as the maximumà  allowed value. Whenà  the metric value exceeds 16 hops, we cannot reach network 10. 4. 0. 0 Routing Loopsà  in Distance-Vector Routing: A routing loop is said to be occurred if two or more routers haveà  false routingà  informationà  representing thatà  a applicable pathà  toà  an unapproachable d   estination exists via other routers. Fig: Routing Loop Solutionsà  to eliminate routing loops Split horizon:à  The information is not sent in the direction from where original information comes. The split horizon function is illustrated by the following figure  Fig: Split Horizon Route Poisoning:à  Routing loops are eliminated. The following figure providesà  an exampleà  of Route Poisoning: Fig: Route Poisoning Inà  additionà  to split horizon, route poisoningà  and holddown timers, poison reverse, holddown timersà  and triggered updatesà  are other methodsà  to eliminate routing loops. 5. 2 Link-State Routing: The following methods showà  the overall workingà  of Link-State Routing. Gathering of the neighborà  information continuously. Router answering to this protocol are broadcasted the list of neighborà  information, process knownà  as flooding.  Soon, thisà  information is distributed to all routers onà  the network. Flooding of the neighborà  information in caseà  ofà  a (routing-significant) changeà  inà  the network. The best path can be calculated to any host on any destination network as everythingà  aboutà  the network is known by every router. 6. ADVANTAGESà  AND DISADVANTAGES Distance-Vector Routing Advantagesà  of Distance-Vector Routing: â⬠¢ simpleà  and flat network â⬠¢ No special hierarchical design is required. â⬠¢ Implementation of hub-and-spoke networks â⬠¢ No concern for worst-case convergence timesà  inà  a network â⬠¢ less memoryà  and processing power usage  Disadvantagesà  of Distance-Vector Routing: â⬠¢ Incorrect routing entries create inconsistencies in maintainingà  the routingà  information â⬠¢ Rise of a condition countà  toà  infinity â⬠¢ Occurrence of a routing loop â⬠¢ Variable Length Subnet Masking (VLSM) or super netting is not supported â⬠¢ multi-vendor routing environment is not supported Link-State Routing Advantagesà  of Link-State Routing: â⬠¢ Paths are chosen via network by the use of cost metrics â⬠¢ changesà  inà  the networkà  topology are reported toà  all routersà  inà  the network quickly â⬠¢ à  fast convergence times â⬠¢ No occurrence of routing loops routing decisions are based on the most recent setà  ofà  information â⬠¢ Link-State protocols use cost metricsà  to choose paths thoughà  the network. The cost metric reflectsà  the capacityà  ofà  the links on those paths. Disadvantagesà  of Link-State Routing: â⬠¢ Topology database,à  anà  adjacency    database,à  andà  aà  forwarding database is required. â⬠¢ a significantà  amountà  of memoryà  is required in large or complex networks â⬠¢ significantà  amountà  of CPU power usage â⬠¢ need of a strict hierarchical network design to reduce significantà  amountà  of CPU power usage â⬠¢ network capability or performance is low to transport data . APPLICATIONà  AREAS Distance-Vector Routing: â⬠¢ used in mobile, wireless and hoc networks (MANETs) â⬠¢ used for mobileà  ad hoc routing (Ad hoc On-Demand Distance Vector Routing) . Link-State Routing: â⬠¢ usedà  in larger, more complicated networks â⬠¢ Optimized Link State Routing Protocol (OLSR) designed for mobile, wireless and hoc networks 8. COMPARING DISTANCE-VECTORà  AND LINK-STATE ROUTING STRATEGIES â⬠¢ Mostly, best path is determined by Distance Vector protocols, while bandwidth, delay, reliabilityà  and load are considered to make routing decision by Link-State protocols Distance    Vector protocols are simple and efficient where as Link-State protocols are flexible and sophisticated â⬠¢ Routingà  information Protocol (RIP v1à  and v2)à  andà  interior Gateway Routing Protocol (IGRP developed by Cisco) are Distance Vector protocols where as OSPF, EIGRP, Novell's NLSP (NetWare Link State Protocol) are Link-State protocols â⬠¢ Notion of a distance is not required in Distance Vector routing where as Link-State routing is based on minimizing some notion of distance â⬠¢ Uniform policies are not required at all routers in Distance Vector routing but uniform policy is required in Link-State routing Router have little knowledge about network topology in Distance Vector routing where as routing domain has excessive knowledge about topology information in Link-State routing 9. CONCLUSION Introduction, working, use, advantages and disadvantages of Distance-Vectorà  and Link-State routingà  are explainedà  in this project. Bellmanà  fordà  and Dijkstr   aââ¬â¢sà  algorithm are also discussed. This project describes the popularity of Distance-Vectorà  and Link-State routingà  because of their complex, sophisticated, flexible features in recent computer networking field..    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.