Basics of Routing and Link-State Routing
|
|
- Karin Wood
- 5 years ago
- Views:
Transcription
1 Basics of Routing and Link-State Routing Antonio Carzaniga Faculty of Informatics Università della Svizzera italiana December 6, 206
2 Outline Routing problem Graph model Classes of routing algorithms Broadcast routing Link-state routing Dijkstra s algorithm
3 Routing Problem
4 Finding paths through a network Routing Problem
5 Routing Problem Finding paths through a network g h j d e f a b c
6 Routing Problem Finding paths through a network g 4 h j d e 9 f 2 a 3 4 b c Example:a j?
7 Graph Model Thenetworkismodeledasagraph G = (V,E)
8 Graph Model Thenetworkismodeledasagraph G = (V,E) Visasetofverticesrepresentingtherouters
9 Graph Model Thenetworkismodeledasagraph G = (V,E) Visasetofverticesrepresentingtherouters E V Visasetofedgesrepresentingcommunicationlinks e.g., (u,v) Eiffrouteruisonthesamesubnetasv
10 Graph Model Thenetworkismodeledasagraph G = (V,E) Visasetofverticesrepresentingtherouters E V Visasetofedgesrepresentingcommunicationlinks e.g., (u,v) Eiffrouteruisonthesamesubnetasv Gisassumedtobeanundirectedgraph,meaningthatlinksarebidirectional i.e., (u,v) E (v,u) Eforallu,v N
11 Graph Model Thenetworkismodeledasagraph G = (V,E) Visasetofverticesrepresentingtherouters E V Visasetofedgesrepresentingcommunicationlinks e.g., (u,v) Eiffrouteruisonthesamesubnetasv Gisassumedtobeanundirectedgraph,meaningthatlinksarebidirectional i.e., (u,v) E (v,u) Eforallu,v N Acostfunctionc :E costsarealwayspositive:c(e)>0foralle E linksaresymmetric:c(u,v) =c(v,u)forallu,v N
12 Routing in the Graph Model Foreveryrouteru V,foreveryotherrouterv V,computethepath P u v =u,x,x 2,...,x n,vsuchthat
13 Routing in the Graph Model Foreveryrouteru V,foreveryotherrouterv V,computethepath P u v =u,x,x 2,...,x n,vsuchthat P u v iscompletelycontainedinthenetworkgraphg.i.e., (u,x ) V,(x,x 2 ) V,...,(x n,v) V
14 Routing in the Graph Model Foreveryrouteru V,foreveryotherrouterv V,computethepath P u v =u,x,x 2,...,x n,vsuchthat P u v iscompletelycontainedinthenetworkgraphg.i.e., (u,x ) V,(x,x 2 ) V,...,(x n,v) V P u v isaleast-costpath,wherethecostofthepathis c(p u v ) =c(u,x )+c(x,x 2 )+...+c(x n,v)
15 Routing in the Graph Model Foreveryrouteru V,foreveryotherrouterv V,computethepath P u v =u,x,x 2,...,x n,vsuchthat P u v iscompletelycontainedinthenetworkgraphg.i.e., (u,x ) V,(x,x 2 ) V,...,(x n,v) V P u v isaleast-costpath,wherethecostofthepathis c(p u v ) =c(u,x )+c(x,x 2 )+...+c(x n,v) Compile u s forwarding table by adding the following entry: A(v) I u (x ) A(v)istheaddress(orsetofaddresses)ofrouterv I u (x )istheinterfacethatconnectsutothefirstnext-hoprouterx in P u v =u,x,x 2,...,x n,v
16 Back To The Example g 4 h j d e 9 f 2 a 3 4 b c Example:a j
17 Back To The Example g 4 h j d e 9 f 2 a 3 4 b c Example:a j least-costpathisp a j =a,e,b,f,j
18 Back To The Example g 4 h j d e 9 f a 3 4 b c Example:a j least-costpathisp a j =a,e,b,f,j a sforwardingtablewillcontainanentryj 2sinceI a (e) =2
19 There are two main strategies to implement a routing algorithm Two General Strategies
20 Two General Strategies There are two main strategies to implement a routing algorithm Link-state routing
21 Two General Strategies There are two main strategies to implement a routing algorithm Link-state routing globalviewofthenetwork local computation of least-cost paths
22 Two General Strategies There are two main strategies to implement a routing algorithm Link-state routing globalviewofthenetwork local computation of least-cost paths Distance-vector routing
23 Two General Strategies There are two main strategies to implement a routing algorithm Link-state routing globalviewofthenetwork local computation of least-cost paths Distance-vector routing localviewofthenetwork global computation of least-cost paths
24 Link-State Routing RouterumaintainsacompleteviewofthenetworkgraphG(includingalllinks and their costs)
25 Link-State Routing RouterumaintainsacompleteviewofthenetworkgraphG(includingalllinks and their costs) everyroutervadvertisesitsadjacentlinks(theircosts)toeveryotherrouterinthe network; this information is called link state link-state advertisements(lsas) are broadcast through the entire network
26 Link-State Routing RouterumaintainsacompleteviewofthenetworkgraphG(includingalllinks and their costs) everyroutervadvertisesitsadjacentlinks(theircosts)toeveryotherrouterinthe network; this information is called link state link-state advertisements(lsas) are broadcast through the entire network routers collect link-state advertisements from other routers, and they use them to compileandmaintainacompleteviewofg
27 Link-State Routing RouterumaintainsacompleteviewofthenetworkgraphG(includingalllinks and their costs) everyroutervadvertisesitsadjacentlinks(theircosts)toeveryotherrouterinthe network; this information is called link state link-state advertisements(lsas) are broadcast through the entire network routers collect link-state advertisements from other routers, and they use them to compileandmaintainacompleteviewofg Using its local representation of G, router u computes the least-cost paths from utoeveryotherrouterinthenetwork
28 Link-State Routing RouterumaintainsacompleteviewofthenetworkgraphG(includingalllinks and their costs) everyroutervadvertisesitsadjacentlinks(theircosts)toeveryotherrouterinthe network; this information is called link state link-state advertisements(lsas) are broadcast through the entire network routers collect link-state advertisements from other routers, and they use them to compileandmaintainacompleteviewofg Using its local representation of G, router u computes the least-cost paths from utoeveryotherrouterinthenetwork the computation is local
29 Link-State Advertisements g 4 h j d e 9 f 2 a 3 4 b c
30 Link-State Advertisements g 4 h j d e 9 f 2 a 3 4 b c LSA a = {(a,b,3),(a,e,),(a,d,)}
31 Link-State Advertisements g 4 h j d e 9 f b 3 a e d 2 a 3 4 b c LSA a = {(a,b,3),(a,e,),(a,d,)}
32 Link-State Advertisements g 4 h j d e 9 f b 3 a e d 2 a 3 4 b c LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)}
33 Link-State Advertisements g 4 h j d e 9 f b 3 a e d h 2 a 3 4 b c f 4 4 j LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)}
34 Link-State Advertisements g 4 h j d e 9 f b 3 a e d h 2 a 3 4 b c f 4 4 j LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)} LSA d = {(d,a,),(d,g,),(d,e,3)}
35 Link-State Advertisements g 4 h j d e 9 f b 3 a e d 3 h g 2 a 3 4 b c f 4 4 j LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)} LSA d = {(d,a,),(d,g,),(d,e,3)}
36 Link-State Advertisements g 4 h j d e 9 f b 3 a e d 3 h g 2 a 3 4 b c f 4 4 j LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)} LSA d = {(d,a,),(d,g,),(d,e,3)} LSA f = {(f,c,),(f,b,),(f,e,3),(f,h,4),(f,j,2)}
37 Link-State Advertisements g 4 h j d e 9 f 2 a 3 4 b c b c 2 3 a e 9 f d 3 h j g LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)} LSA d = {(d,a,),(d,g,),(d,e,3)} LSA f = {(f,c,),(f,b,),(f,e,3),(f,h,4),(f,j,2)}
38 Link-State Advertisements g 4 h j d e 9 f 2 a 3 4 b c b c 2 3 a e 9 f d 3 h j g LSA a = {(a,b,3),(a,e,),(a,d,)} LSA h = {(h,e,),(h,f,4),(h,j,4)} LSA d = {(d,a,),(d,g,),(d,e,3)} LSA f = {(f,c,),(f,b,),(f,e,3),(f,h,4),(f,j,2)}...
39 What do we need to implement link-state routing? Link-State Routing Ingredients
40 Link-State Routing Ingredients What do we need to implement link-state routing? EveryroutersendsitsLSAtoeveryotherrouterinthenetwork,soweneeda broadcast routing scheme
41 Link-State Routing Ingredients What do we need to implement link-state routing? EveryroutersendsitsLSAtoeveryotherrouterinthenetwork,soweneeda broadcast routing scheme OncewehavealltheLSAsfromeveryrouter,andthereforewecomplete knowledgeofg,weneedanalgorithmtocomputeleast-costpathsinagraph
42 Broadcast Routing
43 Broadcast Routing Flooding every router forwards a broadcast packet to every adjacent router, except the one that sent the packet
44 Broadcast Routing Flooding every router forwards a broadcast packet to every adjacent router, except the one that sent the packet Simple and elegant
45 Broadcast Routing Flooding every router forwards a broadcast packet to every adjacent router, except the one that sent the packet Simple and elegant Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router
46 Broadcast Routing Flooding every router forwards a broadcast packet to every adjacent router, except the one that sent the packet Simple and elegant Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router Any problem with this solution?
47 Broadcast Routing Flooding every router forwards a broadcast packet to every adjacent router, except the one that sent the packet Simple and elegant Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router Any problem with this solution? cycles in the network create packet storms
48 Broadcast Routing (2)
49 Broadcast Routing (2) Reverse-path broadcast every router forwards a broadcast packet to every adjacent router, except the one where it received the packet router arouteruacceptsabroadcastpacketporiginatingatroutersonlyifparriveson thelinkthatisonthedirect(unicast)pathfromutos
50 Broadcast Routing (2) Reverse-path broadcast every router forwards a broadcast packet to every adjacent router, except the one where it received the packet router arouteruacceptsabroadcastpacketporiginatingatroutersonlyifparriveson thelinkthatisonthedirect(unicast)pathfromutos Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router
51 Broadcast Routing (2) Reverse-path broadcast every router forwards a broadcast packet to every adjacent router, except the one where it received the packet router arouteruacceptsabroadcastpacketporiginatingatroutersonlyifparriveson thelinkthatisonthedirect(unicast)pathfromutos Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router NopacketstormseveninthepresenceofcyclesinG
52 Broadcast Routing (2) Reverse-path broadcast every router forwards a broadcast packet to every adjacent router, except the one where it received the packet router arouteruacceptsabroadcastpacketporiginatingatroutersonlyifparriveson thelinkthatisonthedirect(unicast)pathfromutos Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router NopacketstormseveninthepresenceofcyclesinG Any problem with this solution?
53 Broadcast Routing (2) Reverse-path broadcast every router forwards a broadcast packet to every adjacent router, except the one where it received the packet router arouteruacceptsabroadcastpacketporiginatingatroutersonlyifparriveson thelinkthatisonthedirect(unicast)pathfromutos Correct w.r.t. the broadcast requirement: a broadcast packet will eventually reach every router NopacketstormseveninthepresenceofcyclesinG Any problem with this solution? it requires(unicast) routing information so it is obviously useless to implement a routing algorithm
54 Sequence-number controlled flooding Broadcast Routing (3)
55 Broadcast Routing (3) Sequence-number controlled flooding theoriginatorsofabroadcastpacketmarksthepacketwithasequencenumbern s
56 Broadcast Routing (3) Sequence-number controlled flooding theoriginatorsofabroadcastpacketmarksthepacketwithasequencenumbern s everyrouterustoresthemostrecentsequencenumberseenfromeachsource router.let sassumethatuhasseensequencenumbersfromsupton s
57 Broadcast Routing (3) Sequence-number controlled flooding theoriginatorsofabroadcastpacketmarksthepacketwithasequencenumbern s everyrouterustoresthemostrecentsequencenumberseenfromeachsource router.let sassumethatuhasseensequencenumbersfromsupton s arouteracceptsabroadcastpacketporiginatingatsonlyifpcarriesasequence numberseq(p)thatishigherthanthemostrecentoneseenfroms:seq(p)>n s
58 Broadcast Routing (3) Sequence-number controlled flooding theoriginatorsofabroadcastpacketmarksthepacketwithasequencenumbern s everyrouterustoresthemostrecentsequencenumberseenfromeachsource router.let sassumethatuhasseensequencenumbersfromsupton s arouteracceptsabroadcastpacketporiginatingatsonlyifpcarriesasequence numberseq(p)thatishigherthanthemostrecentoneseenfroms:seq(p)>n s accepted packets are forwarded to every adjacent router, except the previous-hop router
59 Broadcast Routing (3) Sequence-number controlled flooding theoriginatorsofabroadcastpacketmarksthepacketwithasequencenumbern s everyrouterustoresthemostrecentsequencenumberseenfromeachsource router.let sassumethatuhasseensequencenumbersfromsupton s arouteracceptsabroadcastpacketporiginatingatsonlyifpcarriesasequence numberseq(p)thatishigherthanthemostrecentoneseenfroms:seq(p)>n s accepted packets are forwarded to every adjacent router, except the previous-hop router uupdatesitstableofsequencenumbersn s seq(p)
60 Executing locally at node u Dijkstra s Algorithm
61 Dijkstra s Algorithm Executing locally at node u Variables storing values known at each iteration
62 Dijkstra s Algorithm Executing locally at node u Variables storing values known at each iteration D[v],costoftheleast-costpathfromutov
63 Dijkstra s Algorithm Executing locally at node u Variables storing values known at each iteration D[v],costoftheleast-costpathfromutov p[v],nodeprecedingv(neighborofv)ontheleast-costpathfromutov
64 Dijkstra s Algorithm Executing locally at node u Variables storing values known at each iteration D[v],costoftheleast-costpathfromutov p[v],nodeprecedingv(neighborofv)ontheleast-costpathfromutov N,nodesofGwhoseleast-costpathfromuisdefinitelyknown
65 DIJKSTRA(G = (V,E),u) N {u} 2 forallv V 3 doifv neighbors(u) 4 thend[v] c(u,v) 5 p[v] u 6 elsed[v] 7 whilen V 8 dofindw NsuchthatD[w]isminimum 9 N N {w} 0 forallv neighbors(w)\n doifd[w]+c(w,v)<d[v] 2 thend[v] D[w]+c(w,v) 3 p[v] w Dijkstra s Algorithm
66 Example g 4 h j DIJKSTRA(G = (V,E),u) N {u} 2 forallv V 3 doifv neighbors(u) 4 thend[v] c(u,v) 5 p[v] u 6 else D[v] 7 whilen V 8 dofindw NsuchthatD[w]isminimum 9 N N {w} 0 forallv neighbors(w)\n doifd[w]+c(w,v)<d[v] 2 thend[v] D[w]+c(w,v) 3 p[v] w d e 9 f 2 a 3 4 b c
Distance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationLecture 18: Network Layer Link State and Distance Vector Routing
Lecture 8: Network Laer Link State and Distance Vector Routing COMP 33, Spring 08 Victoria Manfredi Acknowledgements: materials adapted Computer Networking: A Top Down Approach 7 th edition: 996-06, J.F
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationLink State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01
Link State Routing Stefano Vissicchio UCL Computer Science CS 335/GZ Reminder: Intra-domain Routing Problem Shortest paths problem: What path between two vertices offers minimal sum of edge weights? Classic
More informationLecture 8 Link-State Routing
6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures 1-5, 7-8 are
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationRouting Algorithm Classification. A Distance Vector Routing Algorithm
Routing lgorithm lassification Global or decentralied information? Global: ll routers have complete topolog, link cost info Link state algorithms Decentralied: Router knows phsicallconnected neighbors,
More informationCSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)
CSE/EE 46 Link State Routing Last Time Routing Algorithms Introduction Distance Vector routing (RIP) Application Presentation Session Transport Network Data Link Physical This Lecture Routing Algorithms
More informationLink State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013
Link State Routing Brad Karp UCL Computer Science CS 33/GZ 3 rd December 3 Outline Link State Approach to Routing Finding Links: Hello Protocol Building a Map: Flooding Protocol Healing after Partitions:
More informationLink State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008
Link State Routing In particular OSPF dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 4, 2008 dr. C. P. J. Koymans (UvA) Link State Routing March 4, 2008 1 / 70 1 Link State Protocols
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationOSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP
OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP Agenda OSPF Principles Introduction The Dijkstra Algorithm Communication Procedures LSA Broadcast Handling Splitted Area
More informationOSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database
OSPF - Open Shortest Path First OSPF Fundamentals Open Shortest Path First Routing Protocol Internet s Second IGP distance vector protocols like RIP have several dramatic disadvantages: slow adaptation
More informationIntroduction to OSPF. ISP Workshops. Last updated 11 November 2013
Introduction to OSPF ISP Workshops Last updated 11 November 2013 1 OSPF p Open Shortest Path First p Open: n Meaning an Open Standard n Developed by IETF (OSPF Working Group) for IP RFC1247 n Current standard
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 16.3, 2017/03/09 11:25:31) Tuesday, March 7, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationLink State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)
Link State Routing In particular OSPF Karst Koymans Informatics Institute University of Amsterdam (version 17.4, 2017/11/30 12:33:57) Tuesday, November 28, 2017 Karst Koymans (UvA) Link State Routing Tuesday,
More informationQuestion No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.
Volume: 335 Questions Question No: 1 What is the default preference value for a static route in the Alcatel-Lucent 7750 SR? A. 0 B. 5 C. 10 D. 15 Answer: B Question No: 2 In an OSPF Hello packet, which
More informationComputer Networks II
ipartimento di Informatica e Sistemistica omputer Networks II Routing protocols Overview Luca Becchetti Luca.Becchetti@dis.uniroma.it.. 2009/200 Goals escribe approaches and give overview of mechanisms
More informationNetwork Layer (Routing)
Network Layer (Routing) Where we are in the ourse Moving on up to the Network Layer! Application Transport Network Link Physical SE 61 University of Washington Topics Network service models Datagrams (packets),
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationIntroduction to Local and Wide Area Networks
Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationOSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the
More informationSybex ICND Chapter 4 and 18: OSPF. Instructor & Todd Lammle
Sybex ICND2 200-105 Chapter 4 and 18: OSPF Instructor & Todd Lammle Chapter 4 objectives The ICND2 topics covered in this chapter include: 2 OSPF design example. An OSPF hierarchical design minimizes routing
More informationCCNA Routing and Switching Study Guide Chapters 5 & 19: Multi-Area OSPF
CCNA Routing and Switching Study Guide Chapters 5 & 19: Multi-Area OSPF Instructor & Todd Lammle Chapter 20 objectives The ICND2 topics covered in this chapter include: IP Routing Technologies Configure
More informationFoundations of Distributed Systems: Tree Algorithms
Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal
More informationOSPF. Routing Protocols and Concepts Chapter 11
OSPF Routing Protocols and Concepts Chapter 11 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate the
More informationM U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic
M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic
More informationSimple Search Algorithms
Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost
More informationITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public
OSPF Routing Protocols and Concepts Chapter 11 1 Objectives Describe the background and basic features of OSPF Identify and apply the basic OSPF configuration commands Describe, modify and calculate l
More informationConfiguring OSPF. Information About OSPF CHAPTER
CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The
More informationLow-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
1 Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks WeiZhao Wang Xiang-Yang Li Abstract Numerous routing protocols have been proposed for wireless networks. A common assumption made by
More informationRouting Messages in a Network
Routing Messages in a Network Reference : J. Leung, T. Tam and G. Young, 'On-Line Routing of Real-Time Messages,' Journal of Parallel and Distributed Computing, 34, pp. 211-217, 1996. J. Leung, T. Tam,
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and
More informationOSPF Inbound Filtering Using Route Maps with
OSPF Inbound Filtering Using Route Maps with a Distribute List Finding Feature Information OSPF Inbound Filtering Using Route Maps with a Distribute List Last Updated: July 19, 2011 The OSPF Inbound Filtering
More informationScalable Routing Protocols for Mobile Ad Hoc Networks
Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview
More informationA GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS
A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless
More informationA GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks
MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio
More informationLink State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1
Link State Routing Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol (Chapter 6 in Huitema) 7310/Comnet 1 Link State Routing Principles 7310/Comnet 2 Link state routing
More informationEnergy Saving Routing Strategies in IP Networks
Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationSimulative Comparison of MPLS Protection Switching vs. OSPF Re-routing
C O R P O R A T E T E C H N O L O Y Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing nformation & Sandrine PASQUALINI Antoine FROT Andreas Iselt Andreas Kirstädter C O R P O R A T
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationTable of Contents. OSPF Configuration 1
Table of Contents OSPF Configuration 1 Introduction to OSPF 1 Basic Concepts 2 Area Based OSPF Network Partition 3 Router Types 7 Classification of OSPF Networks 9 DR and BDR 9 OSPF Packet Formats 11 Supported
More informationMobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay
Mobile Ad Hoc Networks Theory of Interferences, Trade-Offs between Energy, Congestion and Delay 5th Week 14.05.-18.05.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Unit Disk Graphs
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationConfiguring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging
Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration
More informationEmpirical Probability Based QoS Routing
Empirical Probability Based QoS Routing Xin Yuan Guang Yang Department of Computer Science, Florida State University, Tallahassee, FL 3230 {xyuan,guanyang}@cs.fsu.edu Abstract We study Quality-of-Service
More informationInternational Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:
Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com
More informationOverview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network
Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationOSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda
OSPF Domain / OSPF Area OSPF Advanced Topics Areas,, Backbone, Summary-LSA, ASBR, Stub Area, Route Summarization, Virtual Links, Header Details OSPF domain can be divided in multiple OSPF areas to improve
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : JN0-643 Title : Enterprise Routing and Switching, Professional (JNCIP-ENT) Version : Demo 1 / 10 1.Which connection method do OSPF routers use to communicate with each other? A. IP
More informationCSE 123: Computer Networks
Total Points = 27 CSE 123: Computer Networks Homework 3 Solutions Out: 5/11, Due: 5/18 Problems 1. Distance Vector Routing [9 points] For the network shown below, give the global distance vector tables
More informationLSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR
More informationGuide to OSPF Application on the CSS 11000
Guide to OSPF Application on the CSS 11000 Document ID: 12638 Contents Introduction Before You Begin Conventions Prerequisites Components Used Description OSPF Configuration Task List Configuration Global
More informationWireless Sensor Networks 17th Lecture
Wireless Sensor Networks 17th Lecture 09.01.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Goals of this chapter Means for a node to determine its physical position (with respect to
More informationmaterial. For more information on how to get additional questions, please see a.
Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationDV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK
DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK CHUAN CAI, LIANG YUAN School of Information Engineering, Chongqing City Management College, Chongqing, China E-mail: 1 caichuan75@163.com,
More informationOLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig
OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,
More informationLocali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall
Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage
More informationPath Planning with Fast Marching Methods
Path Planning with Fast Marching Methods Ian Mitchell Department of Computer Science The University of British Columbia research supported by National Science and Engineering Research Council of Canada
More information4.4 Shortest Paths in a Graph Revisited
4.4 Shortest Paths in a Graph Revisited shortest path from computer science department to Einstein's house Algorithm Design by Éva Tardos and Jon Kleinberg Slides by Kevin Wayne Copyright 2004 Addison
More informationJunos Intermediate Routing
Junos Intermediate Routing Chapter 4: Open Shortest Path First 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing
More informationProblem Set 10 Solutions
Design and Analysis of Algorithms May 8, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Problem Set 10 Solutions Problem Set 10 Solutions
More informationProblem 1 (15 points: Graded by Shahin) Recall the network structure of our in-class trading experiment shown in Figure 1
Solutions for Homework 2 Networked Life, Fall 204 Prof Michael Kearns Due as hardcopy at the start of class, Tuesday December 9 Problem (5 points: Graded by Shahin) Recall the network structure of our
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationSurvey of MANET based on Routing Protocols
Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing
More informationA HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING
A HYBRID GENETIC ALGORITHM FOR THE WEIGHT SETTING PROBLEM IN OSPF/IS-IS ROUTING L.S. BURIOL, M.G.C. RESENDE, C.C. RIBEIRO, AND M. THORUP Abstract. Intra-domain traffic engineering aims to make more efficient
More informationRouting and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.
Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities Ala I. Al-Fuqaha, Ph.D. Overview Transport Network Architectures: Current Vs. IP
More informationMobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo In this lecture We will describe techniques to reprogram a sensor network while deployed. We describe
More informationCommon Mistakes. Quick sort. Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen.
Common Mistakes Examples of typical mistakes Correct version Quick sort Only choosing one pivot per iteration. At each iteration, one pivot per sublist should be chosen. e.g. Use a quick sort to sort the
More informationRobonet - MANET for Robot Communication
Robonet - MANET for Robot Communication Authors: Stiven Andre Supervisor: Aram Movsisian Motivation Robotic developers need a way for robots to communicate. Swarm of robots want to communicate in a constantly
More informationAn Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction
, pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,
More informationA Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information
A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu
More informationPerformance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani
Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis
More informationSYNAPTIC PLASTICITY IN SPINNAKER SIMULATOR
SYNAPTIC PLASTICITY IN SPINNAKER SIMULATOR SpiNNaker a spiking neural network simulator developed by APT group The University of Manchester SERGIO DAVIES 18/01/2010 Neural network simulators Neural network
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: for Sensing in Cognitive Radio Networks Ying Dai, Jie Wu Department of Computer and Information Sciences, Temple University Motivation Spectrum sensing is one of the key phases in Cognitive
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationLow-Latency Multi-Source Broadcast in Radio Networks
Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationAPPM 4120/5120, Spring 2015 HW 3
APPM 4120/5120, Spring 2015 HW 3 1. (Transportation Problem) Mr. Cupid, a lonely gentleman, does not want to spend Valentine s day alone in 2015. As one of his New Year s resolutions, he intends to send
More informationIntelligent Agents & Search Problem Formulation. AIMA, Chapters 2,
Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to
More informationOSPF. OSPF Areas. BSCI Module Cisco Systems, Inc. All rights reserved. Cisco Public. Review of OSPF area characteristics:
OSPF BSCI Module 3 1 Minimizes routing table entries Localizes impact of a topology change within an area Detailed LSA flooding stops at the area boundary Requires a hierarchical network design OSPF Areas
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationSelf-Organizing Localization for Wireless Sensor Networks Based on Neighbor Topology
Self-Organizing Localization for Wireless Sensor Networks Based on Neighbor Topology Range-free localization with low dependence on anchor node Yasuhisa Takizawa Yuto Takashima Naotoshi Adachi Faculty
More informationOSPF for IPv6. ISP Workshops
OSPF for IPv6 ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 17
More informationAIMA 3.5. Smarter Search. David Cline
AIMA 3.5 Smarter Search David Cline Uninformed search Depth-first Depth-limited Iterative deepening Breadth-first Bidirectional search None of these searches take into account how close you are to the
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationThe Temperature Controlled Window Matt Aldeman and Chase Brill ME 224 June 2003
The Temperature Controlled Window Matt Aldeman and Chase Brill ME 224 June 2003 Design Objectives The purpose of our device is to control a window based on the temperature of a specified area. The goal
More informationConstructing K-Connected M-Dominating Sets
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona State University University of Florida Outline Introduction
More informationPerformance Comparison of AODV, DSDV and ZRP Routing Protocols
Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department
More information