Professional Documents
Culture Documents
******** ********
MINISTERE DE
MINISTERE DE L´ENSEIGNEMENT
L´ENSEIGNEMENT MINISTRY
MINISTRY OF
OF HIGHER
HIGHER EDUCATION
EDUCATION
` SUPERIEURE
SUPERIEURE *********
*********
******** SIANTOU
******** SIANTOU HIGHER
HIGHER INSTITUTE
INSTITUTE OF
OF
TECHNOLOGY
TECHNOLOGY AND INDUSTRY
AND INDUSTRY
INSTITUTE UNIVERSITE
INSTITUTE UNIVERSITE SIANTOU
SIANTOU
DEPARTMENT
DEPARTMENT OF
OF COMPUTER
COMPUTER ENGINEERING
ENGINEERING
DEPARTEMENT D’INGENIERIE
DEPARTEMENT D’INGENIERIE
INFORMATIQUE
INFORMATIQUE
ROUTING IN DATA NETWORKS AND INTERNET
ROUTING (Part IV)
BACHELORS DEGREE
PRESENTED BY:
Course Supervisor:
Mr ATEH
1
Table des matières
................................................................................................................................................... 1
A. HISTORY .................................................................................................................... 3
B. TERMINOLOGIES ..................................................................................................... 3
C. TECHNOLOGY .......................................................................................................... 4
1. Internet routing......................................................................................................... 4
4. Characterisation ....................................................................................................... 5
2
I. CHARACTERISATION OF OPTIMAL ROUTING
A. HISTORY
The early days of the internet involved manual routing of packets between networks. In the
1970s, the first automated routing protocols, namely Routing Information Protocol (RIP) and
Open Shortest Path First (OSPF), were developed. Since then, several routing protocols such
as Border Gateway Protocol (BGP), and Enhanced Interior Gateway Routing Protocol
(EIGRP) have been developed. The first routing algorithm was developed in 1964. Since then,
many routing algorithms have been developed, including shortest path algorithms, link-state
algorithms, and distance-vector algorithms.
B. TERMINOLOGIES
3
C. TECHNOLOGY
1. Internet routing
Routing is the process of selecting a path across on or more networks. During internet
routing, a packet-switched network selects the paths for IP packets to travel from their origin
to their destination. These internet routing decisions are made by specialized network
hardware called routers.
In the image above, for a data packet to travel from computer A to computer B, the packet will
take a shorter path through networks 2 and 4, but networks 1, 3 and 5 may be faster at
forwarding packets than 2 and 4. These are the kind of choices routers constantly make.
2. Optimal Routing
Optimal routing is the approach where packets are switched within a network based on
optimization, which is, finding the optimum pathway from the available paths through which
the packets are going to be passed.
The approach is to assign a cost for passing through a network. The cost can be referred to as
a metric. High cost is believed to be bad while low cost is believed to be good. For example,
high throughput and low delay means low cost, while high delay and low throughput is
assimilated to high cost.
4
3. Optimality Principle
This is a general statement about optimal routes without regard to network topology or traffic.
It states that “If router J is on the optimal path from router I to router K, then the optimal path
from J to K also falls along the same route.
As a direct consequence of the optimality principle, we can see that the set of optimal routes
from all sources to a given destination form a tree rooted at the destination. Such a tree is
called a sink tree. The goal of all routing algorithms is to discover and use the sink trees for
all routers
Sink trees do not contain any loop so each packet will be delivered within a finite number of
hops.
4. Characterisation
Characterisation of optimal internet routing refers to properties that are desirable for packets
within the network to be routed optimally. These characteristics or properties are discussed
below.
a) Reliability
A reliable network provides a platform on which applications, can rely on for day-to-day
operations. Applications rely on networks for timely data transmission. Therefore, a network
should deliver packets within reasonable delay and jitter characteristics from any host to any
host.
In other words, a reliable network delivers virtually every packet accepted by the network to
the right destination, within a reasonable amount of time.
5
Even though the job of a network is to reliably deliver data in the form of packets, the
networks will however sometimes reject traffic. This is because the traffic offered by the
devices within the network will most likely always be higher than the total amount of traffic
the network can handle.
b) Resiliency
The network should stay up all the time regardless of what the world throws in terms of failed
or dirty links, failing equipment and overload condition.
c) Robustness
This simply means that failure of one device constituting the network should not be a rad
d) Simplicity
Network designers consider the manageability, troubleshooting should be fairly easy because
failures occasionally occurs. Finding and fixing a problem should not take many hours no
matter in what corner of the network the problem is found.
e) Security
The network should be secure and provide few places and opportunities for an attacker to
disrupt it, consequently disrupting the traffic flow and the applications that rely on it.
f) Manageability
The network should have some sort of monitoring facility to determine what is going on at
any given time with devices, protocols and links.
The network should be easily modifiable to account for network growth or just changes in
general
Routing protocols enable routers to build up a routing table that associates the final
destinations with next hop addresses. Routing can be done through two ways: first is static
routing and second is dynamic routing. The router sends data on the shortest path defined in
its routing table. The manual selection of path in a router is called static routing and if the path
selection is done on the basis of a routing protocol (for example RIP, OSPF and EIGRP) then
6
this type of routing is called dynamic routing. Dynamic routing is efficient than static routing
because it automatically adopts the topological changes happened in the network. A usual
objection against static routing is that it is hard to administer. This objection is valid for
medium to large scale networks but it is not valid for small networks with few or no
alternative routes. The dynamic routing is done through protocols called routing protocols.
The dynamic routing have two types of protocols, first is Interior Gateway Protocol (IGP) and
second is Exterior Gateway Protocol (EGP). The protocols that run within an autonomous
system are called Interior Gateway Protocols (IGP) and the protocols that run among two or
more autonomous systems are called Exterior Gateway Protocols (EGP). In context of
routing, an autonomous system has a single routing policy. In dynamic routing, we have three
IGP routing protocols that are RIP, OSPF, and EIGRP. On the other hand, we have one EGP
protocol named as BGP.
RIPv1:
It functions by measuring the metric (hop count) from its present router to the
destination router. It shares updates to its routing table by broadcasting packets to an
address 255.255.255.255.
Limitations of RIPv1
- RIPv1 has a limit of 15 hops. A network that spans more than 15 hops (15 routers) is
considered unreachable.
- RIP has no concept of network delays and link costs. Routing decisions are based on
hop counts. The path with the lowest hop count to the destination is always preferred
even if the longer path has a better aggregate link bandwidth and less delays.
- Periodic broadcasts of the full routing table consume a large amount of bandwidth.
This is a major problem with large networks especially on slow links and WAN
clouds.
- RIP cannot handle Variable Length Subnet Masks (VLSM). Given the shortage of IP
addresses and the flexibility VLSM gives in the efficient assignment of IP addresses,
this is considered a major flaw.
RIPv2:
Sends the routing updates by using the multicast address 224.0.0.9 which is used by it
for multicasting between RIP version 2 routers. RIP2 addresses the issues of VLSM,
authentication, and multicast routing updates.
All Cisco routers by default are configured to RIPv1. So, if they are to be configured for
RIPv2 then this information will be updated into the routers manually.
8
(OSPF) is a link-state routing protocol that is used to find the best path between the source
and the destination router using its own Shortest Path First). OSPF is developed as one of the
Interior Gateway Protocol (IGP), the protocol which aims at moving the packet within a large
autonomous system or routing domain. OSPF uses multicast address 224.0.0.5 for normal
communication and 224.0.0.6 for update to designated router (DR
IGRP is considered a classful routing protocol. Because the protocol has no field for a subnet
mask, the router assumes that all subnetwork addresses within the same Class A, Class B, or
Class C network have the same subnet mask as the subnet mask configured for the interfaces
in question. This contrasts with classless routing protocols that can use variable length subnet
masks. Classful protocols have become less popular as they are wasteful of IP address space.
EIGRP (Enhanced Interior Gateway Routing Protocol) is an advanced distance vector routing
protocol. This protocol is an evolution of an earlier Cisco protocol called IGRP, which is now
considered obsolete. EIGRP supports classless routing and VLSM, route summarization,
incremental updates, load balancing and many other useful features.
9
EIGRP was previously a Cisco-owned protocol. However, Cisco has now made it an open-
standard protocol. Therefore, any vendor can use it now on their equipment. It does not have a
hop count limit of 15 like RIP. Therefore, it supports very large networks.
Routers running EIGRP must become neighbors before exchanging routing information. To
dynamically discover neighbors, EIGRP routers use the multicast address of 224.0.0.10. Each
EIGRP router stores routing and topology information in three tables:
EIGRP calculates it’s metric by using bandwidth, delay, reliability and load. By default, only
bandwidth and delay are used when calculating metric, while reliability and load are set to
zero.
The protocol can connect together any internetwork of autonomous system using an arbitrary
topology. The only requirement is that each AS have at least one router that is able to run BGP
and that is router connect to at least one other AS’s BGP router. BGP’s main function is to
exchange network reach-ability information with other BGP systems. Border Gateway
Protocol constructs an autonomous systems’ graph based on the information exchanged
between BGP routers.
Initial peer acquisition and authentication: BGP allows the right peer to be identified,
authenticated, and connected to, making the network run more efficiently.
Sending of negative or positive reachability information: BGP sends information
regarding whether or not a peer is reachable. This saves time by eliminating errant
connections.
Verification that the peers and the network connection between them are functioning
correctly: Once a connection happens, BGP is able to verify the health of the
communication. In this way, BGP facilitates more consistent, reliable connections.
11
Complexity: Optimal routing tends to implement more complexity in the network,
especially in the implementation process. Whenever a router adapt to the changes in
the network it must constantly remove unwanted information from the routing table.
This type of situation adds more complexity in the routing protocol.
Security: Optimal routing is less secure due to their multicasting and broadcasting
updates. The only way to increase the security is by using additional configuration
settings such as routing protocol and passive interface.
Bandwidth Shortages: Using routing protocols, router communicate with each other so
that they can share information about network topology. If it is a low speed link such
as a large or unstable network, this can drastically consume more bandwidth leading to
bandwidth shortages.
Administration Control: The routes the dynamic routes has to choose is decided by the
routing protocol. The network administrator has nothing to do with them.
12