1 / 35

# Intradomain Routing Protocols - PowerPoint PPT Presentation

Intradomain Routing Protocols. By Behzad Akbari These slides are based in part upon slides of Prof. Shivkumar (Rpi university) and Sanjay Rao (Purdue university ). Outline. Intradomain routing protocols Distance Vector RIP, RIPv2, EIGRP Link State OSPF, IS-IS

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

By

These slides are based in part upon slides of Prof. Shivkumar (Rpi university) and Sanjay Rao (Purdue university)

Outline
• Distance Vector
• RIP, RIPv2, EIGRP
• OSPF, IS-IS

60

4

1

50

x

z

y

RIP: Routing Information Protocol
• Uses hop count as metric (max: 16 is infinity)
• Tables (vectors) “advertised” to neighbors every 30 s.
• routes via neighbor invalidated
• link failure info quickly propagates to entire net
• poison reverse used to prevent ping-pong loops (infinite distance = 16 hops)
• If Z routes through Y to get to X :
• Z tells Y its (Z’s) distance to X is infinite (so Y won’t route to X via Z)
• will this completely solve count to infinity problem?
RIPv1 Problems (Continued)
• Split horizon/poison reverse does not guarantee to solve count-to-infinity problem
• 16 = infinity => RIP for small networks only!
• Slow convergence
• RIPv1 does not support subnet masks (VLSMs)
• It does not support authentication
RIPv2
• Why ? Installed base of RIP routers
• Provides:
• VLSM support
• Authentication
• Multicasting
• Uses reserved fields in RIPv1 header.
• First route entry replaced by authentication info.
EIGRP (Interior Gateway Routing Protocol)
• CISCO proprietary; successor of RIP (late 80s)
• Several metrics (delay, bandwidth, reliability, load etc)
• Uses TCP to exchange routing updates
• Loop-free routing via Distributed Updating Alg. (DUAL) based on diffused computation
• Freeze entry to particular destination
• Diffuse a request for updates
• Other nodes may freeze/propagate the diffusing computation (tree formation)
• Tradeoff: temporary un-reachability for some destinations
• More stable (aka fewer routing loops)
• Faster convergence than distance vector
• Easier to discover network topology, troubleshoot network.
• Can do better source-routing with link-state
• Type & Quality-of-service routing (multiple route tables) possible
• Key: Create a network “map” at each node.
• 1. Node collects the state of its connected links and forms a “Link State Packet” (LSP)
• 2. Flood LSP => reaches every other node in the network and everyone now has a network map.
• 3. Given map, run Dijkstra’s shortest path algorithm (SPF) => get paths to all destinations
• 4. Routing table = next-hops of these paths.
• 5. Hierarchical routing: organization of areas, and filtered control plane information flooded.
• Reliable Flooding: sequence #s, age
• LSA types, Neighbor discovery and maintenance (hello)
• Efficiency in Broadcast LANs, NBMA, Pt-Mpt subnets: designated router (DR) concept
• Areas and Hierarchy
• Area types: Normal, Stub, NSSA: filtering
• External Routes (from other ASs), interaction with inter-domain routing.

X

A

C

B

D

X

A

• X Wants to Send Information
• Sends on all outgoing links
• When Node Y Receives Information from Z
• Send on all links other than Z
• Naïve Approach:
• Floods indefinitely.
• Prevent through sequence numbers

C

B

D

(a)

(b)

X

A

X

A

C

B

D

C

B

D

(c)

(d)

OSPF Reliable Flooding
• Originating Router
• List of directly connected neighbors of that node with the cost of the link to each one
• Sequence Number
• Incremented each time sending new link information
• Packet expires when a threshold is reached,
OSPF Flooding Operation
• Node X Receives LSA from Node Y
• With Sequence Number q
• Looks for entry with same origin/link ID
• Cases
• No entry present
• Add entry, propagate to all neighbors other than Y
• Entry present with sequence number p < q
• Update entry, propagate to all neighbors other than Y
• Entry present with sequence number p > q
• Send entry back to Y
• To tell Y that it has out-of-date information
• Entry present with sequence number p = q
• Ignore it
Flooding Issues
• When Should it be Performed
• Periodically
• When status of link changes
• Detected by connected node
• What Happens when Router Goes Down & Back Up
• Sequence number reset to 0
• Other routers may have entries with higher sequence numbers
• Router will send out LSAs with number 0
• Will get back LSAs with last valid sequence number p
• Router sets sequence number to p+1 & resends

a

b

a

b

Max

0

Max

0

a < b

a < b

Flooding Issues (Cont.)
• What if Sequence Number Wraps Around
• Use circular comparison
• OSPF v1
• Force sequence number back to 0
• OSPF v2
• With 32-bit counter, doesn’t happen very often

E

C

3

1

• Modification to Dijkstra’s algorithm
• Keep track of all links giving optimum cost d(v)
• Only get multiple routes when exactly same cost
• Routing
• Tends to cause packets to arrive out of order

F

1

1

6

1

D

3

A

3

B

Type of Service (TOS) Metrics
• Link Characteristic Vary in Multiple Dimensions
• Latency
• Throughput
• Cost
• Reliability
• Example
• High throughput, long latency
• High throughput, low latency
• Routing Requirements Vary
• Typing at terminal: minimize latency for short packet
• Sending video data: maximize throughput
Proposed OSPF Support for TOS
• Support up to Five Different Routing Metrics
• Normal service
• Don’t do anything extreme
• Minimize cost
• For networks that charge for traffic
• Maximize reliability
• Maximize throughput
• Minimize delay
• Link Can Have Different LSA for each TOS
• Expressed in units where lower value is better
• Path cost either sum or maximum of link costs
Designated Router (DR)

Dijkstra algo view

Encoding of LSAs,

Flooding/DB sync model

New Question: Who creates the network-LSA?

Designated Router (…)
• One router elected as a designated router (DR) on LAN
• Each router maintains flooding adjacency with the DR, I.e., sends acks of LSAs to DR
• DR informs each router of other routers on LAN
• DR generates the network-LSA on subnet’s behalf after synchronizing with all routers
Primary/Backup: DR, BDR (…)
• Backup DR (BDR) also syncs with all routers, and takes over if DR dies (typically 5 s wait)
• Total: 2N – 1 adjacencies
• DR election:
• First router on net = DR, second = BDR
• RouterPriority: [0, 127] indicated in Hello packet=> highest priority router becomes DR
• If network is partitioned and healed, the two DRs are reduced to one by looking at RouterPriority
Why Hierarchy?
• Information hiding (filtered) => computation, bandwidth, storage saved => efficiency => scalability
• But filtering in control plane, not data plane
• Address abstraction vs. Topology Abstraction
• Multiple paths possible between two adj. areas

Area
• Configured area ID
• A set of address prefixes
• Do not have to be contiguous
• So a prefix can be in only one area
• A set of router IDs
• Router functions may be interior, inter-area, or external
Hierarchical OSPF
• Two-level hierarchy: local area, backbone.
• each nodes has detailed area topology; only know direction (shortest path) to nets in other areas.
• Two-level restriction avoids count-to-infinity issues in backbone routing.
• Area border routers (ABR):“summarize” distances to nets in own area, advertise to other Area Border routers.
• Backbone routers: uses a DV-style routing between backbone routers
• Boundary routers (AS-BRs): connect to other ASs (generate “external” records)
IS-IS Overview
• The Intermediate Systems to Intermediate System Routing Protocol (IS-IS) was originally designed to route the ISO Connectionless Network Protocol (CLNP) . (ISO10589 or RFC 1142)
• Adapted for routing IP in addition to CLNP (RFC1195) as Integrated or Dual IS-IS (1990)
• IS-IS is a Link State Protocol similar to the Open Shortest Path First (OSPF). OSPF supports only IP
• IS-IS competed neck-to-neck with OSPF.
• OSPF deployed in large enterprise networks
• IS-IS deployed in several large ISPs
IS-IS Terminology

Intermediate system (IS)- Router

Designated Intermediate System (DIS)- Designated Router

End System (ES)- Network Host or workstation

Network Service Access Point (NSAP)-Network Layer Address

Subnetwork Point of attachment (SNPA)- Datalink interface

Packet data Unit (PDU)- Analogous to IP Packet

Link State PDU (LSP)- Routing information packet

Level 1 and Level 2 –Area 0 and lower areas

Functional Comparison
• Protocols are recognizably similar in function and mechanism (common heritage)
• Two level hierarchies
• Designated Router on LANs
• Widely deployed (ISPs vs. enterprises)
• Multiple interoperable implementations
• OSPF more “optimized” by design (and therefore significantly more complex)
Sample comparison points
• Encapsulation
• OSPF runs on top of IP=> Relies on IP fragmentation for large LSAs
• IS-IS runs directly over L2 (next to IP) => fragmentation done by IS-IS
• Media support
• Both protocols support LANs and point-to-point links in similar ways
• IS-IS supports NBMA in a manner similar to OSPF pt-mpt model: as a set of point-to-point links
• OSPF NBMA mode is configuration-heavy and risky (all routers must be able to reach DR; bad news if VC fails)
Packet Encoding
• OSPF is “efficiently” encoded
• Positional fields, 32-bit alignment
• Only LSAs are extensible (not Hellos, etc.)
• Unrecognized types not flooded. Opaque-LSAs recently introduced.
• IS-IS is mostly Type-Length-Value (TLV) encoded
• No particular alignment
• Extensible from the start (unknown types ignored but still flooded)
• All packet types are extensible
• Nested TLVs provide structure for more granular extension

No. of Octets

Intra-domain Routing Protocol Discriminator

1

Length Indicator

1

Version/Protocol ID Extension

1

ID Length

1

R

R

R

PDU Type

1

Version

1

1

Reserved

1

TLV Fields

IS-IS LS Database: Generic Packet Format

B

1

1

2

B

B

A

1

1

D

1

4

E

2

2

1

2

A

C

D

D

E

E

1

2

Can not do this with OSPF

1

2

A

C

C

Traffic Engineering: Motivation
• TE: “…that aspect of Internet network engineering dealing with the issue of performance evaluation and performance optimization of operational IP networks …’’
• 90’s approach to TE was by changing link weights in IGP (OSPF, IS-IS) or EGP (BGP-4)
• Performance limited by the shortest/policy path nature
• Assumptions: Quasi-static traffic, knowledge of demand matrix
Traffic Engineering
• What is traffic engineering?
• Control and optimization of routing, to steer traffic through the network in the most effective way
• Two fundamental approaches to adaptation
• Distribute traffic and performance measurements
• Compute paths based on load, and requirements
• Collect measurements of traffic and topology
• Optimize the setting of the “static” parameters

QoS routing = optimization of user QoS objectives

TE = optimization of user AND network QoS objectives

Outline: Three Alternatives
• Load-sensitive routing at packet level