Lecture 8 Link-State Routing

Similar documents
OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 16.3, 2017/03/09 11:25:31)

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008

Link State Routing. In particular OSPF. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.4, 2017/11/30 12:33:57)

Introduction to Local and Wide Area Networks

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Link-state protocols and Open Shortest Path First (OSPF)

Question No: 2 In an OSPF Hello packet, which of the following fields must match for all neighbor routers on the segment? Choose three answers.

OSPF Domain / OSPF Area. OSPF Advanced Topics. OSPF Domain / OSPF Area. Agenda

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging

Configuring OSPF. Information About OSPF CHAPTER

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

CS 457 Lecture 16 Routing Continued. Spring 2010

Introduction to OSPF. ISP Workshops. Last updated 11 November 2013

Guide to OSPF Application on the CSS 11000

Computer Networks II

CSE/EE 461. Link State Routing. Last Time. This Lecture. Routing Algorithms Introduction Distance Vector routing (RIP)

OSPF. OSPF Areas. BSCI Module Cisco Systems, Inc. All rights reserved. Cisco Public. Review of OSPF area characteristics:

OSPF. Routing Protocols and Concepts Chapter 11. ITE PC v4.0 Chapter Cisco Systems, Inc. All rights reserved. Cisco Public

OSPF. Routing Protocols and Concepts Chapter 11

ITE PC v4.0. Chapter Cisco Systems, Inc. All rights reserved. Cisco Public

Network Layer (Routing)

OSPF for IPv6. ISP Workshops


Junos Intermediate Routing

Simulative Comparison of MPLS Protection Switching vs. OSPF Re-routing

Distance-Vector Routing

Table of Contents. OSPF Configuration 1

Configuring OSPF. The Cisco OSPF Implementation

CCNA Routing and Switching Study Guide Chapters 5 & 19: Multi-Area OSPF

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

Energy Saving Routing Strategies in IP Networks

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

KillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX

Scalable Routing Protocols for Mobile Ad Hoc Networks

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Link State Routing. Link state routing principles Dijkstra s shortest-path-first algorithm The OSPF protocol. (Chapter 6 in Huitema) E7310/Comnet 1

Sybex ICND Chapter 4 and 18: OSPF. Instructor & Todd Lammle

Cisco IOS IP Routing: OSPF Command Reference

IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 2

Achieving Network Consistency. Octav Chipara

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Rev a. Single-Area OSPF. c cnac o okbook.com

OSPF Mechanism to Exclude Connected IP Prefixes from LSA Advertisements

material. For more information on how to get additional questions, please see a.

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

IP Routing: OSPF Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)

Robonet - MANET for Robot Communication

IP Routing: OSPF Configuration Guide, Cisco IOS Release 12.2SX

Babel A flexible routing protocol

OSPF Inbound Filtering Using Route Maps with

IP Routing: OSPF Configuration Guide, Cisco IOS Release 12.4

CS649 Sensor Networks IP Lecture 9: Synchronization

Routing and Wavelength Assignment in All-Optical DWDM Transport Networks with Sparse Wavelength Conversion Capabilities. Ala I. Al-Fuqaha, Ph.D.

Lab Topology R16 R12 R15. Lo R /32 R /32 R /32 R /32 R / /

Lecture 18: Network Layer Link State and Distance Vector Routing

Zebra MCR Software 1.0 Manual Yin Wang Networking Laboratory of Helsinki University of Technology

OSPF Nonstop Routing. Finding Feature Information. Prerequisites for OSPF NSR

Network Working Group Request for Comments: Category: Standards Track A. Zinin Alcatel-Lucent R. Coltun Acoustra Productions July 2008

OSPF Enhanced Traffic Statistics for OSPFv2 and OSPFv3

Empirical Probability Based QoS Routing

Data Dissemination in Wireless Sensor Networks

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Papers. Ad Hoc Routing. Outline. Motivation

Foundations of Distributed Systems: Tree Algorithms

Basics of Routing and Link-State Routing

Local Area Networks NETW 901

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Grundlagen der Rechnernetze. Introduction

OSPF Per-Interface Link-Local Signaling

Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Interlayer routing issues for wireless networks

Wireless Internet Routing. IEEE s

Lecture 8: Media Access Control

Foundations of AI. 3. Solving Problems by Searching. Problem-Solving Agents, Formulating Problems, Search Strategies

Link-State Routing in Networks with Unidirectional Links

Self Organizing and Self-Healing Ad-hoc Networks

SourceSync. Exploiting Sender Diversity

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Chapter 10 Mobile Communication Systems

Routing Algorithm Classification. A Distance Vector Routing Algorithm

Optimisation and Operations Research

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

Outline for today s lecture Informed Search Optimal informed search: A* (AIMA 3.5.2) Creating good heuristic functions Hill Climbing

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

CSE 123: Computer Networks

OSPF Enhanced Traffic Statistics

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Secure Ad-Hoc Routing Protocols

Fiber Distributed Data Interface

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Introduc)on to Computer Networks

Wireless Mesh Networks

Coding for Efficiency

Transcription:

6998-02: Internet Routing Lecture 8 Link-State Routing John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved.

Announcements Lectures 1-5, 7-8 are available. There will be no lecture on 10/3 (Inauguration). Homework 3 will be assigned on 10/1. Relax. Think about your projects. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 2

Link-State Routing ach router starts by knowing: Its attached networks. Its neighbors. Cost to get to its neighbors. ach router creates a Link State Advertisement (LSA) Also called a Link State Packet (LSP). List of neighbors and cost to get to each one of them. ach router transmits its LSA to all other routers. How? ach router receives LSAs from all other routers. Puts together all the LSAs to form a complete graph. ach router can now compute routes to each destination. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 3

Meet the Neighbors How does a router find who its neighbors are? y manual configuration. Automatically. Some variant of My name is ob and I m a router. hello packet. On point-to-point links, there is only one neighbor. No need for retransmissions if there is some other indication that the link was broken. On shared links, periodically multicast (or broadcast) the hello packet. Not all physical neighbors need to become neighbors in the LS protocol sense. We call this establishing adjacencies. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 4

A New LSA Is Constructed: Periodically. When a new neighbor (new link) shows up. When a neighbor (link) goes away. When the cost of the link to a neighbor changes. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 5

isseminating LSAs How do we send information to routers that we don t know how to reach? This was not an issue in V because we were only sending vectors to our immediate neighbors. A: y flooding. ach LSA received is transmitted to all links but the one it came from. How to avoid exponential growth of packets? Store each LSA (obviously). If you get an LSA that you ve already stored, ignore it and don t propagate. ut it s not that simple. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 6

Getting the Correct LSA How do we know that the LSA we got was the one most recently sent out? Packets take multiple paths. Arrive out of order. Timestamps? Non-global timestamps can cause problems: A corrupted packet appearing to be from the far future would cause valid LSAs to be ignored. Global timestamps could provide sanity checks: If LSA from the distant future or past, just ignore. How do we pick the sanity interval? Require synchronized clocks. Harder problem than LSA distribution. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 7

Maybe Sequence Numbers? Sequence numbers by themselves are somewhat equivalent to non-global timestamps. A large field guarantees uniqueness. but suffers from the corruption problem. A small field can quickly wrap around. What then? Need a way to compare SNs in the presence of wraparound. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 8

Circular Sequence Number Space Space of size n (n = 2 k ). Given two numbers a and b, a is less than b if: a b n/2 and a < b, or a b > n/2 and a > b. Pictorially: > a < a a n-2 n-1 0 1 September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 9

Problems with Sequence Numbers This doesn t solve the problem either: If a router crashes and starts at 0, it will start sending unusable packets again. Somewhat reduces, but does not eliminate the problem of corrupted packets. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 10

Add an Age Field Use an age field in the LSA in addition to the SN. Routers decrement this field at a fixed rate. While age > 0, only LSAs with increasing SNs are accepted. When age reaches zero, an LSA is accepted regardless of its SN. oes this solve the problem? September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 11

ARPANT, ca. 1980 LSAs contain source, s/n, age, list of neighbors. When router generates an LSA: Sets the s/n to 1 more (mod n) than the previous LSA it had generated. Sets age to max value. When router receives an LSA (not its own!): Accepts it if s/n > stored s/n for the same source. Accepts it always if age of stored LSA is zero. Only propagates LSAs with non-zero age (of course). If a router does not hear back an LSA that it generated within 100ms, it assumes it was lost and retransmits. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 12

ARPANT, cont d Sequence number is a 6 bit field. Age starts at 56 seconds, decrements every 8 seconds: 3 bit field (56 = 7x8). Routers wait 90 seconds at startup (let everything age out). Routers generate a new LSA within 60 seconds of the previous one. oes it work? September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 13

ARPANT, October 27 th, 1980 ARPANT stops working. Three different LSAs from the same source are being continuously flooded: 40 44 8 8 < 40 < 44 < 8! 0 September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 14

No Way to Recover! LSAs arriving in the right order. LSAs being retransmitted in the same order. LSAs have no time to age out, since they are being replaced by newer LSAs. How did it happen? it corruption: 44d=101100b, 40d=101000b, 8d=001000b! How did we recover? Take down offending IMP. Patch all IMPs to ignore (and not propagate) offending LSAs. Fix offending IMP, bring back up. Repatch all IMPs to accept all LSAs. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 15

Requirements for LS Protocols LSAs must be distributed correctly (unchanged), and completely (to all routers). Otherwise different routers will have different maps of the network and will compute different routes, Possibly resulting in routing loops. LSA distribution must not cause unbounded creation of LSA packets. Similar to TTL notion in IP. ut as we just saw, these were not enough. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 16

Requirements for LS Protocols, cont d Self-stabilization: Recover from corrupted packets. Recover from defective equipment. Recover from malicious attacks. o so in a reasonable amount of time. fficiency: o not generate too many packets. o not consume too many router resources. Responsiveness: o not wait for a long time before you can start routing packets. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 17

Improved LSA istribution Sequence number is a linear space. No circular comparisons. ut has to be large enough. Age is set by the originating router (~1h). ecremented by each router propagating it. Further decremented as it sits in memory. IS-IS decrements; OSPF increments. A received LSA is not immediately retransmitted. Sits in per-link queues. A new LSA arriving before an older one has made it out overwrites the older one. Queues are scanned round-robin and LSAs are sent out one link at a time. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 18

Improved LSA istribution, cont d LSAs should get acknowledged. Various ways of doing that, somewhat different per protocol. LSAs that have not been refreshed in some time should get flushed. Again, this varies between protocols. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 19

The Link State atabase Consider this network (oyle, p174) : A 2 4 4 5 5 G 4 3 1 1 2 10 5 2 3 2 8 1 8 6 H 5 C 2 2 F 2 4 September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 20

ach Router Advertises Its adjacent neighbors: (router I, neighbor I, cost of link) Its directly attached stub (no neighbors) networks: (router I, network prefix, cost of link).g., advertises: (, A, 5), (,, 3), (, G, 1), (, H, 8), (, F, 2), (,, 2). y fitting the LSAs ( jigsaw puzzle routing ), each router forms the same topological database for the network. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 21

ijkstra s SPF Algorithm (All routing algorithms strive to compute the shortest path!) Review this from your W4231 notes! The Tree atabase. ranches (links) definitely assigned to the tree. When finished, this is the SPT. The Candidate atabase. ranches from which the next branch to go to Tree will be selected. The Link State atabase. Remaining (rejected or not considered) branches. Two sets of nodes: Connected by branches in the Tree database. Rest. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 22

SPF for Routers From A s point of view. Initialize Tree by placing A as root. A September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 23

Links to all of A s neighbors are added to Candidate. Cost to root is computed. A 4/4 4/4 September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 24

Lowest-cost link is added to tree. A 4/4 4/4 1/3 10/12 is dropped from candidate because we have a better link to (A) C C is lowest cost in Candidate, and is added to tree September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 25

C s neighbors are added to Candidate. A 4/4 4/4 A and A are equal cost to A; Pick A, add to Tree 5/9 G 3/7 s neighbors are added to Candidates 1/3 is dropped from candidate because we have a better link to C 2/5 F September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 26

A is lowest cost, added to Tree A 4/4 4/4 5/9 G s neighbors are added to Candidates 1/5 8/12 1/3 2/6 H C 2/5 F Higher cost links are dropped. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 27

A 4/4 4/4 G 1/3 1/5 8/12 Higher cost links are dropped. H C 2/5 F 4/9 CF s neighbor is added to Candidates CF is added to the tree September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 28

A 4/4 4/4 G G is added to the tree 1/5 H 1/3 C 2/5 F 4/9 FH is added to the tree September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 29

The Shortest Path Tree, from A A 4/4 4/4 G 1/5 H 1/3 C 2/5 F 4/9 September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 30

A s forwarding table estination A C F G H Next hop self To send a packet to G, hand it to. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 31

From s perspective, step 0 Tree A 2 4 4 5 5 Candidate G 4 3 1 Link State 1 2 10 5 2 3 2 8 1 8 6 H 5 C 2 2 F 2 4 All links start in the LS database September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 32

From s perspective, steps 1 & 2 Tree A 4 4 5 5 G Candidate 2 Link State 1 2 5/5 3/3 1/1 8/8 6 H 5 C 2 2 F 4 s neighbors become candidates; root costs computed. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 33

From s perspective, step 3 Tree A 2 4 4 5 5 G Candidate Link State 1 2 5/5 3/3 1/1 8/8 6 H 5 C 2 2 F 4 Cheapest candidate added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 34

From s perspective, steps 4 & 5 Tree A 4 4 5/6 G Candidate 2 Link State 1 2 5/5 3/3 1/1 8/8 6 H 5 C 2 2 F 4 G s neighbor becomes candidate; root costs computed. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 35

From s perspective, steps 6 & 7 Tree A 4 4 G Candidate 2 Link State 1 2 5/5 3/3 1/1 8/8 6 H 5 C 2 2 F 4 G removed ( better path to ); F (cheapest) added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 36

From s perspective, steps 8 & 9 Tree A 4 4 G Candidate 2 Link State 1 2 5/5 3/3 1/1 8/8 H 5 C 2/4 F 4/6 F s neighbors become candidates; root costs computed September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 37

From s perspective, steps 10 & 11 Tree A 4 4 G Candidate 2 Link State 1 2 5/5 3/3 1/1 H 5 C 2/4 F 4/6 H removed (FH better); (chepest) added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 38

From s perspective, steps 12 & 13 Tree A 4 4 G Candidate Link State 2/4 1/3 5/5 3/3 1/1 H C 2/4 F 4/6 s neighbors become candidates; root costs computed. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 39

From s perspective, steps 14, 15 & 16 Tree A 4 4 G Candidate Link State 2/4 1/3 3/3 1/1 H C F 4/6 FC&A removed (C&A cheaper); C added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 40

From s perspective, step 17 Tree A 4 4 Candidate G Link State 2/4 1/3 3/3 1/1 H C F 4/6 No neighbors to add. (cheapest) added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 41

From s perspective, steps 18 & 19 Tree A 4/7 G Candidate Link State 2/4 1/3 3/3 1/1 H C F 4/6 s neighbor added to candidates; root costs computed. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 42

From s perspective, steps 20 & 21 Tree A G Candidate Link State 2/4 1/3 3/3 1/1 H C F 4/6 A removed (A cheaper). A (cheapest) added to tree. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 43

From s perspective, last step. one! Tree A G Candidate Link State 2/4 1/3 3/3 1/1 H C F 4/6 FH added to tree September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 44

s forwarding table estination A C F G H Next hop self F G F G is directly attached, just give him the packet. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 45

What about the return path? Work out G s tree. Next hop for A is. At, next hop for A is. Work out s tree. At, next hop for A is A. So the route is not symmetric. This is a very common thing. This is a very good thing. Playing with Link costs allows us to do dictate how traffic flows. This is an example of Traffic ngineering. September 26th, 2002 Lecture 08 of 6998-02: Internet Routing 46